Join international security leaders and influencers changing the face of cyber across the globe for communities, businesses and governments of all sizes
Impact of emerging technologies on modern security efficacy like AI, quantum, 5G and more
New ways for businesses and governments to stay ahead of an ever-changing threat landscape
Innovative views on the role of the individual in helping to mitigate threats to business
Podcast
Latest Episodes
48 mins
Closing Cybersecurity Blind Spots: Civic Engagement and Policy Innovations with Betsy Cooper
Episode 336
September 8, 2025
43 mins
Exploring Rowhammer, ECC, and the Future of Secure Data Storage with JB Baker
Episode 335
September 2, 2025
35 mins
Navigating the Maze of AI Governance: Insights on ISO 42001 and New Regulations with Walter Haydock
Episode 334
August 25, 2025
29 mins
The Evolving Cyber Threat Landscape in Healthcare: Insights from Fortified Health Security’s Russell Teague - Part II
Episode 333
August 18, 2025
Podcast
All episodes

Lawyers Who Think Like Coders with Ilona Cohen
Joining the podcast this week is Ilona Cohen, the Chief Legal Officer, Chief Policy Officer, and Corporate Secretary at HackerOne. We dive into hot topics including the National Cyber Strategy, how government organizations can manage priorities, what lessons can be learned from the past and the “voluntary” reporting and compliance approach, along with breaking down the myriad funding pathways and allocations to truly make the National Cyber Strategy a reality.

Is This the Dreadnought Moment? with Dr. Andrew Hammond
Dr. Andrew Hammond, Historian and Curator of the International Spy Museum joins us this week - and let’s be honest he has just about the coolest job out there today! Hammond takes us through the classic period of espionage and the reliance on physical data and spycraft techniques to transport through to the modern day battlefield of cyber intelligence and espionage.

Eyes Everywhere: The Importance of Continuous AppSec Scanning with Patrick Vandenberg
For this week’s episode of the podcast, we’re joined by Patrick Vandenberg, director of product marketing at Invicti Security. Patrick helps us unpack the reasons behind why 70% of security incidents start from web applications and talks us through the importance of application security and dynamic application security testing (DAST).

The Cyberbalanced Diet with Javvad Malik
Joining us on the To The Point podcast this week is Javvad Malik, Security Awareness Advocate at KnowBe4. We cover an array of themes including the need to “protect the seams,” understanding where risks are moving, how small interventions can deliver quick security wins, understanding people in the cybersecurity equation and the importance of cybersecurity equation training, the AI debate, smishing attacks, and more!

The Cyber Mentality With Katie Arrington, Part 3
Joining the podcast for part 3 this week is Katie Arrington, the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

The Cyber Mentality With Katie Arrington, Part 2
Joining the podcast for part 2 this week is Katie Arrington, the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

The Cyber Mentality With Katie Arrington, Part 1
Joining the podcast this week is Katie Arrington the founder of LD Innovations, LLC Cybersecurity and the former Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to the Under Secretary of Defense for Acquisition and Sustainment (USD(A&S)). We cover many interesting themes in our lively discussion including Cybersecurity Maturity Model Certification (CMMC), the impact of a cyber mentality and culture, the National Cybersecurity Strategy, the CHIPS Act, risk reduction strategies, the future of cybersecurity, China’s 100-year plan, Huawei, MITRE, Paperwork Reduction Act, and so much more.

Decoys, Canaries... It's All Deception Technology to Me with Greg Edwards
Joining the podcast this week is Canauri founder and CTO, Greg Edwards. He gives us a deep dive view into deception technology including decoys, canaries, watcher files, deception technology defense, and how it helps organizations fare against ransomware attacks. We also discuss the growing ransomware problem and its recent designation by the White House as a “national security threat.”

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)
About our Hosts

Rachael Lyon
