Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Ahead of the Breach

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting

04 Mar 2026

Contributed by Lukas

What makes a vulnerability truly shocking is simplicity, once you notice the assumption everyone else missed. In this episode, Daniel shares a memorab...

Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry

11 Feb 2026

Contributed by Lukas

What does effective threat hunting actually look like inside large, complex environments? In this episode of Ahead of the Breach, we sit down with Mat...

Citi's Ryan Hays Navigating Risk and Resilience at Scale

06 Jan 2026

Contributed by Lukas

What does navigating risk really look like at global scale? In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Ryan Hays fro...

Microsoft's Tori Westerhoff on Offensive Security in the Age of AI

23 Dec 2025

Contributed by Lukas

In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Tori Westerhoff, a member of Microsoft’s AI Red Team, to explore what o...

Nevada Air National Guard's Nikita Belikov on Real-World Cyber Defense at Scale

17 Dec 2025

Contributed by Lukas

In this episode of Ahead of the Breach, host Casey Cammilleri sits down with Nikita Belikov of the Nevada Air National Guard to explore what cybersecu...

MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats

12 Dec 2025

Contributed by Lukas

Live from Black Hat 2025, host Casey Cammalleri sits down with Seth Arnoff, a cybersecurity engineer at the John D. and Catherine T. MacArthur Foundat...

F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime

02 Dec 2025

Contributed by Lukas

Live from Black Hat USA 2025, host Casey Cammilleri sat down with cyber threat-intelligence researcher Megan Squire to break down one of the fastest-g...

What Makes Hybrid Pentesting So Powerful?

30 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

GreyNoise’s Andrew Morris on Internet Background Noise as Data

23 Sep 2025

Contributed by Lukas

What if you could predict major security vulnerabilities weeks before they're publicly disclosed? Andrew Morris, Founder & Chief Architect at Grey...

How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?

16 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There

09 Sep 2025

Contributed by Lukas

Modern attackers have abandoned obvious indicators and now mimic legitimate engineering activities so closely that traditional detection methods fail....

Why is Continuous Pentesting a Must for Dynamic Environments?

02 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence

26 Aug 2025

Contributed by Lukas

What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds them to their Known Exploited Vulnerabilities lis...

How Do You Build an Offensive Security Program from Scratch?

19 Aug 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Covert Entry: Tools, Tricks, and True Stories from the Field

12 Aug 2025

Contributed by Lukas

What happens when a covert entry specialist turns a Super Bowl hotel room into a rooftop breach point? Brent White, Sr. Principal Security Consultant ...

What Should You Ask Before Choosing an Offensive Security Platform?

05 Aug 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Phillip Wylie on How IoT Devices Become Corporate Network Entry Points

29 Jul 2025

Contributed by Lukas

After 21 years in cybersecurity, Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show, has learned how a critical flaw in ho...

What Tools Do You Need for an Offensive Security Stack?

22 Jul 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

AccessIT Group’s Brett Price on Governance-Driven Cybersecurity

15 Jul 2025

Contributed by Lukas

Many cybersecurity programs fail because they prioritize tools over understanding what they're protecting. Brett Price, Lead Cybersecurity Consultant ...

What Steps Should You Take to Build a Modern Pentesting Program?

08 Jul 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Parthasarathi Chakraborty on Building Architectural Assurance Functions

01 Jul 2025

Contributed by Lukas

Most security architecture programs struggle to demonstrate their value because they focus on creating diagrams rather than driving implementation. Pa...

What Are the Common Myths About Continuous Pentesting?

24 Jun 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags

17 Jun 2025

Contributed by Lukas

When Tim Silverline received a pentest report that was essentially a clean bill of health with zero evidence of actual testing, he knew his security p...

How Do You Prepare for the Future of Pentesting?

10 Jun 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks

03 Jun 2025

Contributed by Lukas

The shift from annual compliance-driven security testing to continuous validation represents one of the most critical evolutions in modern cybersecuri...

What’s Broken About Legacy Pentesting?

29 May 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today's...

WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal

19 May 2025

Contributed by Lukas

From a casual gaming project at NASA's JPL to powering 700+ cybersecurity vendors, WhoisXML API has become the foundation of modern threat intelligenc...

Why Continuous Pentesting Outperforms Bug Bounties

15 May 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top questions our listeners have asked us. In today’...

Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems

06 May 2025

Contributed by Lukas

How do you effectively measure security operations in a world where vulnerabilities never stop coming? Cody Florek, Director of Information Security O...

Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems

22 Apr 2025

Contributed by Lukas

From intercepting key fob signals with HackRF devices to setting up rogue cellular networks with USRP transceivers, Ayyappan Rajesh, Offensive Securit...

OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production

08 Apr 2025

Contributed by Lukas

Implementing effective DevSecOps requires balancing security controls with developer experience — a challenge Eyal Paz, VP of Research at OX Securit...

Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security

25 Mar 2025

Contributed by Lukas

"It's kind of like homeowners’ insurance," says Joshua Brown, Founder of Digital Defense Consulting & CISO at Spektrum Labs, about security prog...

Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security

11 Mar 2025

Contributed by Lukas

In this episode of Ahead of the Breach, Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology, details the tec...

NerdWallet’s DK Koran on Building Proactive Security Through Red Teams

25 Feb 2025

Contributed by Lukas

From testing critical infrastructure and IoT devices to leading application security at NerdWallet, DK Koran, BISO, draws from his experience finding ...

Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups

11 Feb 2025

Contributed by Lukas

What can a controversial cyber weapon teach us about everyday security? From chemistry labs to cyber weapons development, Rapyd’s CISO/CIO, Nir Roth...

Eptura’s Sean Finley on Building Risk-Based Application Security Programs

28 Jan 2025

Contributed by Lukas

What if vulnerability management was less about filling backlogs with findings and more about strategic risk reduction? Sean Finley, Director of Appli...

Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities

14 Jan 2025

Contributed by Lukas

From a friendly gaming challenge to uncovering critical vulnerabilities, Vladimir Tokarev's journey showcases the power of curiosity in cybersecurity....

N-able’s Keiran Smith on Building Better Security Through Development Experience

07 Jan 2025

Contributed by Lukas

From executing his first SQL injection at age 14 to contributing to the Linux kernel, Keiran Smith’s path to becoming Lead Pentest Engineer at N-abl...

RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter

17 Dec 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Lorenzo Pedroncelli, Senior Manager at RSA, who shares his insights on the evolving landscap...

DigiCert’s Bindi Davé on Digital Trust in Cybersecurity

03 Dec 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Bindi Davé, Deputy CISO at DigiCert, who shares her extensive experience in cybersecurity, ...

Collectors’ Arif Basha on Proactive Security and Attack Surface Management

19 Nov 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with cybersecurity leader and expert, Arif Basha. Arif offers his insights on the critical import...

Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture

05 Nov 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson. Joe brings his extensive ...

Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities

22 Oct 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic. Konrad explores critical topics ...

MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing

08 Oct 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Al Imran Husain, CISO & VP of Global Infrastructure at MillerKnoll. Al Imran shares his ...

Gong’s Jack Leidecker on Balancing Innovation and Security

24 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Jack Leidecker, CISO at Gong, who shares his extensive experience in cybersecurity, emphasiz...

Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security

16 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Dan Creed, CISO of Allegiant Travel Company, who shares his expertise on the evolving landsc...

Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface

09 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Mario DiNatale, CISO at Odyssey Group. Mario shares his insights on the importance of unders...

Sprocket’s Pen Test Team on Bypassing Web Application Security

03 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey chats with Nicholas Anastasi, Director of Technical Operations; Nate Fair, Penetration Tester & Cybe...

Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming

27 Aug 2024

Contributed by Lukas

In this episode of Ahead of the Breach, host Casey Cammilleri, CEO & Founder of Sprocket, chats with Mike Takahashi, Security Engineering Expert &...