Ahead of the Breach
Episodes
Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting
04 Mar 2026
Contributed by Lukas
What makes a vulnerability truly shocking is simplicity, once you notice the assumption everyone else missed. In this episode, Daniel shares a memorab...
Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry
11 Feb 2026
Contributed by Lukas
What does effective threat hunting actually look like inside large, complex environments? In this episode of Ahead of the Breach, we sit down with Mat...
Citi's Ryan Hays Navigating Risk and Resilience at Scale
06 Jan 2026
Contributed by Lukas
What does navigating risk really look like at global scale? In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Ryan Hays fro...
Microsoft's Tori Westerhoff on Offensive Security in the Age of AI
23 Dec 2025
Contributed by Lukas
In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Tori Westerhoff, a member of Microsoft’s AI Red Team, to explore what o...
Nevada Air National Guard's Nikita Belikov on Real-World Cyber Defense at Scale
17 Dec 2025
Contributed by Lukas
In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Nikita Belikov of the Nevada Air National Guard to explore what cybersecu...
MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats
12 Dec 2025
Contributed by Lukas
Live from Black Hat 2025, host Casey Cammalleri sits down with Seth Arnoff, a cybersecurity engineer at the John D. and Catherine T. MacArthur Foundat...
F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime
02 Dec 2025
Contributed by Lukas
Live from Black Hat USA 2025, host Casey Cammilleri sat down with cyber threat-intelligence researcher Megan Squire to break down one of the fastest-g...
What Makes Hybrid Pentesting So Powerful?
30 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
GreyNoise’s Andrew Morris on Internet Background Noise as Data
23 Sep 2025
Contributed by Lukas
What if you could predict major security vulnerabilities weeks before they're publicly disclosed? Andrew Morris, Founder & Chief Architect at Grey...
How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?
16 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There
09 Sep 2025
Contributed by Lukas
Modern attackers have abandoned obvious indicators and now mimic legitimate engineering activities so closely that traditional detection methods fail....
Why is Continuous Pentesting a Must for Dynamic Environments?
02 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence
26 Aug 2025
Contributed by Lukas
What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds them to their Known Exploited Vulnerabilities lis...
How Do You Build an Offensive Security Program from Scratch?
19 Aug 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Covert Entry: Tools, Tricks, and True Stories from the Field
12 Aug 2025
Contributed by Lukas
What happens when a covert entry specialist turns a Super Bowl hotel room into a rooftop breach point? Brent White, Sr. Principal Security Consultant ...
What Should You Ask Before Choosing an Offensive Security Platform?
05 Aug 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Phillip Wylie on How IoT Devices Become Corporate Network Entry Points
29 Jul 2025
Contributed by Lukas
After 21 years in cybersecurity, Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show, has learned how a critical flaw in ho...
What Tools Do You Need for an Offensive Security Stack?
22 Jul 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
AccessIT Group’s Brett Price on Governance-Driven Cybersecurity
15 Jul 2025
Contributed by Lukas
Many cybersecurity programs fail because they prioritize tools over understanding what they're protecting. Brett Price, Lead Cybersecurity Consultant ...
What Steps Should You Take to Build a Modern Pentesting Program?
08 Jul 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Parthasarathi Chakraborty on Building Architectural Assurance Functions
01 Jul 2025
Contributed by Lukas
Most security architecture programs struggle to demonstrate their value because they focus on creating diagrams rather than driving implementation. Pa...
What Are the Common Myths About Continuous Pentesting?
24 Jun 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags
17 Jun 2025
Contributed by Lukas
When Tim Silverline received a pentest report that was essentially a clean bill of health with zero evidence of actual testing, he knew his security p...
How Do You Prepare for the Future of Pentesting?
10 Jun 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks
03 Jun 2025
Contributed by Lukas
The shift from annual compliance-driven security testing to continuous validation represents one of the most critical evolutions in modern cybersecuri...
What’s Broken About Legacy Pentesting?
29 May 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...
WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal
19 May 2025
Contributed by Lukas
From a casual gaming project at NASA's JPL to powering 700+ cybersecurity vendors, WhoisXML API has become the foundation of modern threat intelligenc...
Why Continuous Pentesting Outperforms Bug Bounties
15 May 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today’...
Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems
06 May 2025
Contributed by Lukas
How do you effectively measure security operations in a world where vulnerabilities never stop coming? Cody Florek, Director of Information Security O...
Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems
22 Apr 2025
Contributed by Lukas
From intercepting key fob signals with HackRF devices to setting up rogue cellular networks with USRP transceivers, Ayyappan Rajesh, Offensive Securit...
OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production
08 Apr 2025
Contributed by Lukas
Implementing effective DevSecOps requires balancing security controls with developer experience — a challenge Eyal Paz, VP of Research at OX Securit...
Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security
25 Mar 2025
Contributed by Lukas
"It's kind of like homeowners’ insurance," says Joshua Brown, Founder of Digital Defense Consulting & CISO at Spektrum Labs, about security prog...
Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security
11 Mar 2025
Contributed by Lukas
In this episode of Ahead of the Breach, Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology, details the tec...
NerdWallet’s DK Koran on Building Proactive Security Through Red Teams
25 Feb 2025
Contributed by Lukas
From testing critical infrastructure and IoT devices to leading application security at NerdWallet, DK Koran, BISO, draws from his experience finding ...
Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups
11 Feb 2025
Contributed by Lukas
What can a controversial cyber weapon teach us about everyday security? From chemistry labs to cyber weapons development, Rapyd’s CISO/CIO, Nir Roth...
Eptura’s Sean Finley on Building Risk-Based Application Security Programs
28 Jan 2025
Contributed by Lukas
What if vulnerability management was less about filling backlogs with findings and more about strategic risk reduction? Sean Finley, Director of Appli...
Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities
14 Jan 2025
Contributed by Lukas
From a friendly gaming challenge to uncovering critical vulnerabilities, Vladimir Tokarev's journey showcases the power of curiosity in cybersecurity....
N-able’s Keiran Smith on Building Better Security Through Development Experience
07 Jan 2025
Contributed by Lukas
From executing his first SQL injection at age 14 to contributing to the Linux kernel, Keiran Smith’s path to becoming Lead Pentest Engineer at N-abl...
RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter
17 Dec 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Lorenzo Pedroncelli, Senior Manager at RSA, who shares his insights on the evolving landscap...
DigiCert’s Bindi Davé on Digital Trust in Cybersecurity
03 Dec 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Bindi Davé, Deputy CISO at DigiCert, who shares her extensive experience in cybersecurity, ...
Collectors’ Arif Basha on Proactive Security and Attack Surface Management
19 Nov 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with cybersecurity leader and expert, Arif Basha. Arif offers his insights on the critical import...
Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture
05 Nov 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson. Joe brings his extensive ...
Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities
22 Oct 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic. Konrad explores critical topics ...
MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing
08 Oct 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Al Imran Husain, CISO & VP of Global Infrastructure at MillerKnoll. Al Imran shares his ...
Gong’s Jack Leidecker on Balancing Innovation and Security
24 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Jack Leidecker, CISO at Gong, who shares his extensive experience in cybersecurity, emphasiz...
Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security
16 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Dan Creed, CISO of Allegiant Travel Company, who shares his expertise on the evolving landsc...
Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface
09 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Mario DiNatale, CISO at Odyssey Group. Mario shares his insights on the importance of unders...
Sprocket’s Pen Test Team on Bypassing Web Application Security
03 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey chats with Nicholas Anastasi, Director of Technical Operations; Nate Fair, Penetration Tester & Cybe...
Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming
27 Aug 2024
Contributed by Lukas
In this episode of Ahead of the Breach, host Casey Cammilleri, CEO & Founder of Sprocket, chats with Mike Takahashi, Security Engineering Expert &...