The Cybersecurity Readiness Podcast Series
Episodes
Episode 101: AI vs. AI in Cybersecurity: Why Continuous Validation Is Now Essential
27 Feb 2026
Contributed by Lukas
In this forward-looking Episode 101 of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee is joined by Snehal Antani—CEO and Co-Founder...
Episode 100: From Cyber Defense to Trust Governance
28 Jan 2026
Contributed by Lukas
In this milestone 100th episode of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee reflects on nearly one hundred conversations that c...
Episode 99: Access Control Reimagined — Why Identity, Devices, and Zero Trust Must Converge
14 Jan 2026
Contributed by Lukas
In this landmark 99th episode of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee is joined by Denny LeCompte—CEO of Portnox (https:/...
Episode 98 -- Beyond Certification — Turning Compliance into Competitive Firepower
30 Dec 2025
Contributed by Lukas
In this timely and hard-hitting episode, Dr. Dave Chatterjee is joined by Sandeep Pauddar—an accomplished global auditor with over 30 years of exper...
Episode 97 -- AI’s Missing Puzzle Piece — Why Information Readiness Determines AI Success
16 Dec 2025
Contributed by Lukas
In this insightful episode, Dr. Dave Chatterjee speaks with Greg Clark—longtime enterprise content management and cybersecurity leader—about a fou...
Episode 96 -- The Man Behind the Hollywood Movie Breach: Cyber Lessons from a Real FBI Ghost
01 Dec 2025
Contributed by Lukas
In this riveting episode, Dave Chatterjee, Ph.D., sits down with Eric O’Neill, a legendary FBI undercover operative whose real-life spy hunt inspire...
Episode 95 -- Defending Digital Trust – Battling the Deepfake Surge with AI-Powered Detection
19 Nov 2025
Contributed by Lukas
In this episode, Dave Chatterjee, Ph.D. sits down with Sandy Kronenberg, Founder and CEO of Netarx, an AI-driven platform designed to detect and preve...
Guardians of Trust: The CISO’s Strategic Role in Global Non-Profits
04 Nov 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee sits down with Pam Lindemoen, Chief Security Officer and Vice President of Strategy at the Retail & Hospitali...
Episode 93 -- The New Browser Wars: Why the Enterprise Browser Has Become Cybersecurity’s Next Battleground
19 Oct 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee speaks with Anupam Upadhyay, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product an...
The AI Augmented SOC: Balancing Technology, Talent, and Trust
08 Oct 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee speaks with Will Ledesma, Director of MDR Cybersecurity Operations at Adlumin, a veteran SOC leader and cybe...
Leading Under Fire: Legal and Leadership Lessons from Cyber Crises
23 Sep 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee speaks with Josh Cook, a seasoned cybersecurity and privacy attorney who has guided multinational corporations an...
AI vs. AI: Automating Defense to Outpace Automated Attacks
08 Sep 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee speaks with Roi Cohen, CEO and Co-Founder of Vicarius, about the urgent need to counter AI-driven attacks with eq...
Beyond Passwords: Making Identity-Based Attacks Impossible in the Age of AI
26 Aug 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee sits down with Jasson Casey, CEO & Co-Founder @ Beyond Identity, to dissect the growing threat of identity-ba...
Closing the Remediation Gap with Agentic AI
21 Jul 2025
Contributed by Lukas
In this compelling episode, Dr. Dave Chatterjee engages with John Amaral, a serial entrepreneur and cybersecurity innovator, to explore how his compan...
AI Security in the Public Sector: Balancing Innovation and Risk
17 Jun 2025
Contributed by Lukas
In this episode, Dr. Dave Chatterjee is joined by Burnie Legette, Director of IoT and AI at Intel Corporation and former professional football player....
Holistic Identity Security: Shifting the Paradigm from Reactive to Proactive
17 May 2025
Contributed by Lukas
In this compelling episode, Dr. Dave Chatterjee is joined by Damon Fleury, Chief Product Officer, SpyCloud to dissect one of cybersecurity’s most ex...
From Botnets to AI: Defending Against the Future of DDoS Warfare
03 May 2025
Contributed by Lukas
In this episode of the Cybersecurity Readiness Podcast, Dr. Dave Chatterjee sits down with Richard Hummel, Director of Threat Intelligence at NETSCOUT...
Stopping Social Engineered Vishing Attacks Before They Start
22 Apr 2025
Contributed by Lukas
Social engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 ...
Future-Proofing Your Data: Preparing for the Post-Quantum Era
31 Mar 2025
Contributed by Lukas
Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. David, a Chief Solutions A...
Securing AI's Blind Spots: The Hidden Risks in Enterprise AI Adoption
05 Mar 2025
Contributed by Lukas
The adoption of Artificial Intelligence (AI) and Generative Artificial Intelligence (Gen-AI) applications and tools are exploding. The global AI infra...
Elevating Your Offensive Security Program
18 Feb 2025
Contributed by Lukas
Dr. Dave Chatterjee hosts a discussion on elevating your offensive program with Mark Carney, CEO @ Evolve Security, and Yaron Levi, Chief Information ...
Using Blockchain Technology to Make Messaging Apps More Secure and Private
03 Feb 2025
Contributed by Lukas
Dr. Dave Chatterjee and Kee Jefferys, Technical Co-Founder of Session, discuss the use of blockchain technology in enhancing the security and privacy ...
Authenticate without Storing Credentials: MIT Scientist Cracks the Code
13 Jan 2025
Contributed by Lukas
Despite companies’ best efforts, stored access credentials inevitably get stolen or misused. Whether it is a disgruntled employee posting the data,...
Lessons from 2024's Biggest Cyber Incidents and Building Stronger Defenses for 2025
31 Dec 2024
Contributed by Lukas
In this episode, Shrav Mehta, Founder, and CEO at Secureframe, joins me to discuss major cybersecurity incidents in 2024, highlighting five significan...
Stopping Deepfake Threats Through Identity Verification
14 Dec 2024
Contributed by Lukas
In this episode, Aaron Painter, CEO at Nametag, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should prot...
From reactive to proactive: How behavioral psychology is transforming enterprise security
20 Nov 2024
Contributed by Lukas
IBM recently reported a 71% year-over-year increase in attacks using valid credentials. This continued use of stolen credentials is also evident throu...
Compliance in the Cloud: Challenges and Best Practices
01 Nov 2024
Contributed by Lukas
Accelerating into the cloud without caution often brings complexities that can cause more harm than good. Gartner has noted that cloud configuration e...
Reducing the Risk of Social Engineering to Exploit IT Help Desk
20 Oct 2024
Contributed by Lukas
In this episode, Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education, and Ori Eisen, the Founder and CEO of Trusona, ...
Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber Education
06 Oct 2024
Contributed by Lukas
In this episode, Laurie Salvail, Ph.D., Executive Director of CYBER.ORG, joins me to discuss the importance of cybersecurity education for K-12 studen...
Large Language Model (LLM) Risks and Mitigation Strategies
23 Sep 2024
Contributed by Lukas
As machine learning algorithms continue to evolve, Large Language Models (LLMs) like GPT-4 are gaining popularity. While these models hold great promi...
Identity Continuity in Multi-Cloud Environments
02 Sep 2024
Contributed by Lukas
The importance of maintaining uninterrupted services cannot be overemphasized, especially in light of the recent global IT outage fiasco. With the inc...
Securing SMBs Serving Defense Industrial Base and U.S. Critical Infrastructure
20 Aug 2024
Contributed by Lukas
In this episode, Chris Petersen, Co-Founder and CEO of RADICL, and I discuss the challenges of securing the small and medium-sized businesses (SMBs) t...
2024 Cyber Trends and Predictions: Global IT Outage and More
31 Jul 2024
Contributed by Lukas
In this episode, John Funge, Managing Director at DataTribe, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based...
Fortifying Healthcare Data: Proactive Defense Strategies
25 Jun 2024
Contributed by Lukas
The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different t...
Quantum Computing and Cybersecurity – Examining Trends and Implications
05 Jun 2024
Contributed by Lukas
The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts o...
Creating a Security-Minded Culture
22 May 2024
Contributed by Lukas
In this podcast, I enjoyed talking with Chirag Shah, Model N's Global Information Security Officer and Data Privacy Officer, about creating a security...
Securing the Future: Inside Student-Led Cybersecurity Clinics
05 May 2024
Contributed by Lukas
Student-led cybersecurity clinics are increasingly playing an essential role in strengthening the digital defenses of nonprofits, hospitals, municipal...
Developing Resilient and Secure Mission Critical Facilities (Data Centers)
24 Apr 2024
Contributed by Lukas
Developing and maintaining resilient and secure data centers is a huge part of cybersecurity readiness. Spiros Liolis, Chief Technologist and Managing...
Securing Application Programming Interfaces (APIs)
10 Apr 2024
Contributed by Lukas
Application Programming Interfaces (APIs) play a vital role in modern software development, enabling the integration of services and facilitating the ...
The Last Line of Defense Against a Ransomware Attack
27 Mar 2024
Contributed by Lukas
Attackers have started increasingly targeting victims' backups to prevent organizations from restoring their data. Veeam's "2023 Ransomware Trends Rep...
Overcoming the Stale Nature of Tabletop Exercises
13 Mar 2024
Contributed by Lukas
While tabletop exercises (TTX) are considered a proven tool for finding gaps in an organization’s security posture, they can be painstakingly challe...
Securing Artificial Intelligence (AI) Applications
28 Feb 2024
Contributed by Lukas
As artificial intelligence (AI) technologies continue to evolve and be leveraged, organizations need to make a concerted effort to safeguard their AI ...
Building a Resilient Disaster Recovery Infrastructure
14 Feb 2024
Contributed by Lukas
The latest disaster recovery statistics reveal that modern businesses still face costly interruptions due to a variety of threats, ranging from&n...
Unraveling the Positive and Negative Impacts of Generative AI
22 Nov 2023
Contributed by Lukas
In a very thought-provoking discussion, Artificial Intelligence (AI) expert Tony Hoang, Ph.D., traced the evolution of Gen AI, highlighted the ma...
Best Practices for Overcoming Troublesome Vulnerability Management Trends
01 Nov 2023
Contributed by Lukas
A 2023 State of Vulnerability Management Report finds that only half of the surveyed organizations (51%) have, at best, a moderate level of visibility...
Streamlining and Improving Security by Standardizing Identity Management
18 Oct 2023
Contributed by Lukas
While cloud computing has become a great digitization enabler to enterprises, multiple clouds—especially when intersecting with on-premises systems ...
How Informed is the Board of Directors on Cybersecurity Risks?
03 Oct 2023
Contributed by Lukas
With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the ...
Enhancing Incident Response Effectiveness
06 Sep 2023
Contributed by Lukas
According to a 2023 IBM report, companies take 197 days to identify a breach and 69 days to contain one on average. The delay between infection, detec...
Cybersecurity in the Age of AI
12 Jul 2023
Contributed by Lukas
While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber...
Identity Orchestration Strategies and Best Practices
28 Jun 2023
Contributed by Lukas
Cloud migration and remote work requirements are forcing organizations to modernize their applications and identity systems. Making the transition is ...
Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage
14 Jun 2023
Contributed by Lukas
Recent cybersecurity workforce study reports reveal that a) there’s still a global shortage of 3.4 million workers in this field, and b) only 25% of...
Countering Insider Threats: Seven Science-Based Commandments
26 Apr 2023
Contributed by Lukas
Research finds that there was a 44% increase in insider threat incidents across all types of organizations, and 56% of the reported incidents were due...
Mitigating Risks from Unmonitored Communication Channels
14 Apr 2023
Contributed by Lukas
Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and sup...
Implementing Secure and Fast Authentication Processes
30 Mar 2023
Contributed by Lukas
Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If devel...
Proactive Resilient Approach to Cybersecurity
15 Mar 2023
Contributed by Lukas
It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and su...
The Challenges and Best Practices of Cyber Security in Emerging Markets
01 Mar 2023
Contributed by Lukas
“While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes ...
Cybersecurity Perspectives of a Community College President
15 Feb 2023
Contributed by Lukas
In this episode, Pamela Senegal, President, Piedmont Community College, shares several best practices, including having an information technology pres...
From Law Enforcement Officer to Chief Information Security Officer
01 Feb 2023
Contributed by Lukas
In this episode, Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School, shares his excitin...
To trust or not to trust: the overwhelming challenge
18 Jan 2023
Contributed by Lukas
Clinical psychologist Beatrice Cadet, Scientist Integrator at Netherland's Organization for Applied Scientific Research (TNO), draws upon multiple con...
Useful Technology Should Be Attack Agnostic
04 Jan 2023
Contributed by Lukas
In this episode, Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency, she...
Do you see what attackers see? Threat modeling done right
21 Dec 2022
Contributed by Lukas
Threat modeling is an intrinsic part of information security governance and needs to be done well. However, research finds that many organizations don...
Implementing Phishing Resistant Multifactor Authentication
07 Dec 2022
Contributed by Lukas
The Cybersecurity and Infrastructure Security Agency (CISA) recently (Oct 31, 2022) released fact sheets urging all organizations to implement phishin...
How do SMBs protect themselves from ransomware attacks?
23 Nov 2022
Contributed by Lukas
A recent Global SMB Ransomware survey finds that nearly half of small and medium-sized businesses (SMBs) have experienced a ransomware attack, yet the...
Cybersecurity As A Strategic Opportunity
09 Nov 2022
Contributed by Lukas
In this episode, Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist, shares his vision of the future of cyber gov...
Comprehensive Asset Discovery
26 Oct 2022
Contributed by Lukas
Comprehensive asset discovery is foundational to robust and proactive cybersecurity governance. The Cybersecurity and Infrastructure Security Agency r...
Is Cybersecurity A Moving Target at Academic Institutions?
12 Oct 2022
Contributed by Lukas
In a highly engrossing and in-depth discussion, Tej Patel, Vice President, and CIO at Stevens Institute of Technology sheds light on the various infor...
Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience
28 Sep 2022
Contributed by Lukas
As more organizations embrace cloud-based services, securely migrating to the cloud is becoming an important capability. Keith Weller, former Vice Pre...
Detecting Malicious Insider Threats by Monitoring User Journeys
14 Sep 2022
Contributed by Lukas
Insider threats are often considered the biggest risk for organizations because they can cause the most destruction. Survey reports, and studies, h...
Skilling Up for Security Operations Center Roles
31 Aug 2022
Contributed by Lukas
The Security Operations Center (SOC) is at the heart of an organization's cyber defense system. Highly skilled and motivated personnel must work in th...
Bridging the Gap Between Intentions and Practicality in Cybersecurity
17 Aug 2022
Contributed by Lukas
Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka, firmly believes that CISOs have the very best of intentions -- "we all m...
Preparing for the Future of Device Management
03 Aug 2022
Contributed by Lukas
With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping ...
The State of Attack Surface Management
20 Jul 2022
Contributed by Lukas
With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report o...
Global Security and Post Breach Management Best Practices
06 Jul 2022
Contributed by Lukas
"If you can plan for the zombie apocalypse, you can probably face just about anything," said Tim Callahan, Senior Vice President, and Global Chief In...
How to Tackle Burnout in Cybersecurity
22 Jun 2022
Contributed by Lukas
Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of...
Actionable Threat Intelligence and the Dark Web
08 Jun 2022
Contributed by Lukas
In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti ransomware group. The FBI est...
Reducing the Disconnect Between Security and Development Teams
25 May 2022
Contributed by Lukas
How do you make security a first-class citizen of the software development process? According to an industry report, “many information security engi...
Perspectives of a Global Chief Information Security Officer
11 May 2022
Contributed by Lukas
In a wide-ranging discussion, Vishal Salvi, CISO & Head of Cyber Practice at Infosys, sheds light on a range of topics from CISO empowerment to cr...
Thinking Like A Hacker
27 Apr 2022
Contributed by Lukas
Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent...
Is Cybersecurity Regulatory Compliance Good Enough?
13 Apr 2022
Contributed by Lukas
"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or security. The ship was carrying 2,...
Is Cyber Insurance Necessary?
30 Mar 2022
Contributed by Lukas
"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless add-on as an essential busine...
Dealing with Cyber Trauma
16 Mar 2022
Contributed by Lukas
The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal with it. Patrick Wheeler, a Lu...
A Deep Dive into Ransomware Attacks and Negotiations
02 Mar 2022
Contributed by Lukas
Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evolution and escalation of ransomwar...
Making Cybersecurity Communication Effective
16 Feb 2022
Contributed by Lukas
Cybersecurity communication should be simple, immersive, attractive, continuous, and multi-channel, says Marcin Ganclerz, a subject matter expert. He ...
Securing the Smart Supply Chain
02 Feb 2022
Contributed by Lukas
In episode 18, Alan Mihalic, President IoT Security Institute, speaks to the challenges and success factors associated with securing Internet-of-Thing...
Reducing the Carbon Footprint
19 Jan 2022
Contributed by Lukas
When justifying cybersecurity investments, Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance, recommends making t...
Role of Emotional Intelligence in Creating a Healthy Information Security Culture
05 Jan 2022
Contributed by Lukas
Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive, highlights the importance of leveraging emotional intelligen...
Significance of the Human Element in Cybersecurity
22 Dec 2021
Contributed by Lukas
Renowned authority in human-technology interactions and Presidential appointee Prof. Missy Cummings of Duke University, spoke to the importance of und...
Enhancing Organizational Readiness by Simulating Cyber Attacks
08 Dec 2021
Contributed by Lukas
Robert Austin, Professor, Ivey Business School, discusses the value of cyber-attack simulation by drawing upon the learning tool (IT Management Simula...
Cybersecurity is Patient Safety
24 Nov 2021
Contributed by Lukas
"Cybersecurity is patient safety and patient safety is cybersecurity," is how Stoddard Manikin, Chief Information Security Officer, Children's Healthc...
Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management
10 Nov 2021
Contributed by Lukas
The incredibly articulate Anne Leslie, Threat Management Consultant, IBM Security, shares some powerful messages and recommendations on threat managem...
Fly the Plane: A CIO's Approach to Cybersecurity Readiness
27 Oct 2021
Contributed by Lukas
Fly the Plane is how Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia, characterizes his philosophy and approa...
Passwordless Authentication: Myths and Realities
13 Oct 2021
Contributed by Lukas
Driven by a mission and passion to fight online crime, Ori Eisen, Founder and CEO of Trusona, explains the fundamentals of passwordless authentication...
Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs)
29 Sep 2021
Contributed by Lukas
While small and medium-sized enterprises (SMEs) face the same cybersecurity issues as large enterprises, SMEs don’t have the resources to effectivel...
What Does Good Cyber Governance Look Like? A Legal Perspective
15 Sep 2021
Contributed by Lukas
From the standpoint of cybersecurity governance, how does an organization stay on the right side of the law? Rois Ni Thuama, Ph.D. (Doctor of Law), He...
Multidisciplinary and Integrative Approach to Cybersecurity Education
01 Sep 2021
Contributed by Lukas
In a very engaging and thoughtful discussion, Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duk...
Holistic Approach to Cybersecurity Readiness
18 Aug 2021
Contributed by Lukas
Ram R. Kumar, Executive Director, AT&T Business, discusses at length significant cybersecurity governance issues, from achieving inter-and intra-...
Being An Effective Chief Information Security Officer (CISO)
04 Aug 2021
Contributed by Lukas
Richard Biever, Chief Information Security Officer, Duke University, shares valuable insights on how to create an effective CISO function. In a wide-r...
The Human Vulnerability Factor
21 Jul 2021
Contributed by Lukas
A widely reported 2019 survey found that 99% of the attacks are focused on exploiting human vulnerabilities by targeting people instead of computer sy...
Going Above and Beyond the Mandated Checklist
07 Jul 2021
Contributed by Lukas
When top management proactively takes every possible precaution to protect sensitive data because it is the right thing to do and not because there is...
Protecting Academic Institutions from Ransomware and Other Forms of Cyber Attacks
23 Jun 2021
Contributed by Lukas
Educational institutions have been the target and victim of ransomware attacks. Garry Scobie, Deputy Chief Information Security Officer, The Universit...