To the Point Cybersecurity
A podcast series from Forcepoint
Join international security leaders and influencers changing the face of cyber across the globe for communities, businesses and governments of all sizes
Impact of emerging technologies on modern security efficacy like AI, quantum, 5G and more
New ways for businesses and governments to stay ahead of an ever-changing threat landscape
Innovative views on the role of the individual in helping to mitigate threats to business
Podcast
Latest Episodes
37 mins
Bridging the Skills Gap: Effective Cybersecurity Leadership and Collaboration with Bill Anderson - Part II
Episode 322
April 22, 2025
23 mins
Bridging the Skills Gap: Effective Cybersecurity Leadership and Collaboration with Bill Anderson - Part I
Episode 321
April 15, 2025
32 mins
Cyber Experience Matters: Tackling Industry Challenges with Saaim Khan - Part II
Episode 320
April 7, 2025
33 mins
Cyber Experience Matters: Tackling Industry Challenges with Saaim Khan - Part I
Episode 319
April 1, 2025
Podcast
All episodes

The Cyber Mentality With Katie Arrington, Part 3
Joining the podcast for part 3 this week is Katie Arrington, the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

The Cyber Mentality With Katie Arrington, Part 2
Joining the podcast for part 2 this week is Katie Arrington, the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

The Cyber Mentality With Katie Arrington, Part 1
Joining the podcast this week is Katie Arrington the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

Decoys, Canaries... It's All Deception Technology to Me with Greg Edwards
Joining the podcast this week is Canauri founder and CTO, Greg Edwards. He gives us a deep dive view into deception technology including decoys, canaries, watcher files, deception technology defense, and how it helps organizations fare against ransomware attacks. We also discuss the growing ransomware problem and its recent designation by the White House as a “national security threat.”

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 2 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 1 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Privacy: Keep People at the Center of It All With Mishi Choudhary (Part 2)
Joining the podcast for the part two discussion this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspective on the privacy discussion including freedom of thought, the right to be forgotten, end-to-end encryption for and protecting user data.

Privacy: Keep People at the Center of It All (Part 1) with Mishi Choudhary
Joining the podcast this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspectives on the privacy discussion including freedom of thought, the right to be forgotten, end-to-end encryption for protecting user data.
About our Hosts

Rachael Lyon
