To the Point Cybersecurity
A podcast series from Forcepoint
Join international security leaders and influencers changing the face of cyber across the globe for communities, businesses and governments of all sizes
Impact of emerging technologies on modern security efficacy like AI, quantum, 5G and more
New ways for businesses and governments to stay ahead of an ever-changing threat landscape
Innovative views on the role of the individual in helping to mitigate threats to business
Podcast
Latest Episodes
26 mins
Inside Fintech Security: Erika Dean on Tackling AI Threats and Third-Party Risks - Part II
Episode 329
June 9, 2025
27 mins
Inside Fintech Security: Erika Dean on Tackling AI Threats and Third-Party Risks - Part I
Episode 328
June 2, 2025
44 mins
From Battlefield to Boardroom: Ricoh Danielson’s Lessons on Cyber Warfare and Digital Forensics
Episode 327
May 27, 2025
24 mins
Balancing Policy, Technology, and Security: Expert Advice from Former Deputy Federal CIO Maria Roat - Part II
Episode 326
May 20, 2025
Podcast
All episodes

Decoys, Canaries... It's All Deception Technology to Me with Greg Edwards
Joining the podcast this week is Canauri founder and CTO, Greg Edwards. He gives us a deep dive view into deception technology including decoys, canaries, watcher files, deception technology defense, and how it helps organizations fare against ransomware attacks. We also discuss the growing ransomware problem and its recent designation by the White House as a “national security threat.”

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 2 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 1 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Privacy: Keep People at the Center of It All With Mishi Choudhary (Part 2)
Joining the podcast for the part two discussion this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspective on the privacy discussion including freedom of thought, the right to be forgotten, end-to-end encryption for and protecting user data.

Privacy: Keep People at the Center of It All (Part 1) with Mishi Choudhary
Joining the podcast this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspectives on the privacy discussion including freedom of thought, the right to be forgotten, end-to-end encryption for protecting user data.

So Many Cyber Scams – With Names Like Pig Butchering With Jennifer Cook
Joining us this week is Jennifer Cook, Senior Director of Marketing at the National Cybersecurity Alliance and we discuss all the hot and trending online scams facing consumers today including the growing prevalence of romance scams ($1.3B in losses last year!), job seeker scams, tax fraud scams, sextortion, and the latest cyber scam making the rounds – pig butchering scams.

Tales of Frogs, Scorpions, and AI Machine Learning with Tony Dahbura
This week joining the podcast is Anton (Tony) Dahbura, executive director of the Johns Hopkins University Information Security Institute and co-director of the Johns Hopkins Institute of Assured Autonomy. We deep dive into the realm of AI Machine Learning technology and the exponential applications for it across every aspect of our lives.

CBOMs and Automating Compliance Problem Solving with Brian Hajost
Joining the podcast this week is Brian Hajost, the founder and COO of SteelCloud. Brian shares insights on his concept of a Compliance Bill of Materials (CBOMs). For those that have heard of Software Bill of Materials (SBOMs) it’s a similar concept.
About our Hosts

Rachael Lyon
