Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Cybersecurity Readiness Podcast Series

Business

Activity Overview

Episode publication activity over the past year

Episodes

Showing 1-100 of 102
Page 1 of 2 Next → »»

Episode 101: AI vs. AI in Cybersecurity: Why Continuous Validation Is Now Essential

27 Feb 2026

Contributed by Lukas

In this forward-looking Episode 101 of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee is joined by Snehal Antani—CEO and Co-Founder...

Episode 100: From Cyber Defense to Trust Governance

28 Jan 2026

Contributed by Lukas

In this milestone 100th episode of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee reflects on nearly one hundred conversations that c...

Episode 99: Access Control Reimagined — Why Identity, Devices, and Zero Trust Must Converge

14 Jan 2026

Contributed by Lukas

In this landmark 99th episode of the Cybersecurity Readiness Podcast Series, Dr. Dave Chatterjee is joined by Denny LeCompte—CEO of Portnox (https:/...

Episode 98 -- Beyond Certification — Turning Compliance into Competitive Firepower

30 Dec 2025

Contributed by Lukas

In this timely and hard-hitting episode, Dr. Dave Chatterjee is joined by Sandeep Pauddar—an accomplished global auditor with over 30 years of exper...

Episode 97 -- AI’s Missing Puzzle Piece — Why Information Readiness Determines AI Success

16 Dec 2025

Contributed by Lukas

In this insightful episode, Dr. Dave Chatterjee speaks with Greg Clark—longtime enterprise content management and cybersecurity leader—about a fou...

Episode 96 -- The Man Behind the Hollywood Movie Breach: Cyber Lessons from a Real FBI Ghost

01 Dec 2025

Contributed by Lukas

In this riveting episode, Dave Chatterjee, Ph.D., sits down with Eric O’Neill, a legendary FBI undercover operative whose real-life spy hunt inspire...

Episode 95 -- Defending Digital Trust – Battling the Deepfake Surge with AI-Powered Detection

19 Nov 2025

Contributed by Lukas

In this episode, Dave Chatterjee, Ph.D. sits down with Sandy Kronenberg, Founder and CEO of Netarx, an AI-driven platform designed to detect and preve...

Guardians of Trust: The CISO’s Strategic Role in Global Non-Profits

04 Nov 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee sits down with Pam Lindemoen, Chief Security Officer and Vice President of Strategy at the Retail & Hospitali...

Episode 93 -- The New Browser Wars: Why the Enterprise Browser Has Become Cybersecurity’s Next Battleground

19 Oct 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee speaks with Anupam Upadhyay, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product an...

The AI Augmented SOC: Balancing Technology, Talent, and Trust

08 Oct 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee speaks with Will Ledesma, Director of MDR Cybersecurity Operations at Adlumin, a veteran SOC leader and cybe...

Leading Under Fire: Legal and Leadership Lessons from Cyber Crises

23 Sep 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee speaks with Josh Cook, a seasoned cybersecurity and privacy attorney who has guided multinational corporations an...

AI vs. AI: Automating Defense to Outpace Automated Attacks

08 Sep 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee speaks with Roi Cohen, CEO and Co-Founder of Vicarius, about the urgent need to counter AI-driven attacks with eq...

Beyond Passwords: Making Identity-Based Attacks Impossible in the Age of AI

26 Aug 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee sits down with Jasson Casey, CEO & Co-Founder @ Beyond Identity, to dissect the growing threat of identity-ba...

Closing the Remediation Gap with Agentic AI

21 Jul 2025

Contributed by Lukas

In this compelling episode, Dr. Dave Chatterjee engages with John Amaral, a serial entrepreneur and cybersecurity innovator, to explore how his compan...

AI Security in the Public Sector: Balancing Innovation and Risk

17 Jun 2025

Contributed by Lukas

In this episode, Dr. Dave Chatterjee is joined by Burnie Legette, Director of IoT and AI at Intel Corporation and former professional football player....

Holistic Identity Security: Shifting the Paradigm from Reactive to Proactive

17 May 2025

Contributed by Lukas

In this compelling episode, Dr. Dave Chatterjee is joined by Damon Fleury, Chief Product Officer, SpyCloud to dissect one of cybersecurity’s most ex...

From Botnets to AI: Defending Against the Future of DDoS Warfare

03 May 2025

Contributed by Lukas

In this episode of the Cybersecurity Readiness Podcast, Dr. Dave Chatterjee sits down with Richard Hummel, Director of Threat Intelligence at NETSCOUT...

Stopping Social Engineered Vishing Attacks Before They Start

22 Apr 2025

Contributed by Lukas

Social engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 ...

Future-Proofing Your Data: Preparing for the Post-Quantum Era

31 Mar 2025

Contributed by Lukas

Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. David, a Chief Solutions A...

Securing AI's Blind Spots: The Hidden Risks in Enterprise AI Adoption

05 Mar 2025

Contributed by Lukas

The adoption of Artificial Intelligence (AI) and Generative Artificial Intelligence (Gen-AI) applications and tools are exploding. The global AI infra...

Elevating Your Offensive Security Program

18 Feb 2025

Contributed by Lukas

Dr. Dave Chatterjee hosts a discussion on elevating your offensive program with Mark Carney, CEO @ Evolve Security, and Yaron Levi, Chief Information ...

Using Blockchain Technology to Make Messaging Apps More Secure and Private

03 Feb 2025

Contributed by Lukas

Dr. Dave Chatterjee and Kee Jefferys, Technical Co-Founder of Session, discuss the use of blockchain technology in enhancing the security and privacy ...

Authenticate without Storing Credentials: MIT Scientist Cracks the Code

13 Jan 2025

Contributed by Lukas

Despite companies’ best efforts, stored access credentials inevitably get stolen or misused. Whether it is a disgruntled employee posting the data,...

Lessons from 2024's Biggest Cyber Incidents and Building Stronger Defenses for 2025

31 Dec 2024

Contributed by Lukas

In this episode, Shrav Mehta, Founder, and CEO at Secureframe, joins me to discuss major cybersecurity incidents in 2024, highlighting five significan...

Stopping Deepfake Threats Through Identity Verification

14 Dec 2024

Contributed by Lukas

In this episode, Aaron Painter, CEO at Nametag, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should prot...

From reactive to proactive: How behavioral psychology is transforming enterprise security

20 Nov 2024

Contributed by Lukas

IBM recently reported a 71% year-over-year increase in attacks using valid credentials. This continued use of stolen credentials is also evident throu...

Compliance in the Cloud: Challenges and Best Practices

01 Nov 2024

Contributed by Lukas

Accelerating into the cloud without caution often brings complexities that can cause more harm than good. Gartner has noted that cloud configuration e...

Reducing the Risk of Social Engineering to Exploit IT Help Desk

20 Oct 2024

Contributed by Lukas

In this episode, Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education, and Ori Eisen, the Founder and CEO of Trusona, ...

Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber Education

06 Oct 2024

Contributed by Lukas

In this episode, Laurie Salvail, Ph.D., Executive Director of CYBER.ORG, joins me to discuss the importance of cybersecurity education for K-12 studen...

Large Language Model (LLM) Risks and Mitigation Strategies

23 Sep 2024

Contributed by Lukas

As machine learning algorithms continue to evolve, Large Language Models (LLMs) like GPT-4 are gaining popularity. While these models hold great promi...

Identity Continuity in Multi-Cloud Environments

02 Sep 2024

Contributed by Lukas

The importance of maintaining uninterrupted services cannot be overemphasized, especially in light of the recent global IT outage fiasco. With the inc...

Securing SMBs Serving Defense Industrial Base and U.S. Critical Infrastructure

20 Aug 2024

Contributed by Lukas

In this episode, Chris Petersen, Co-Founder and CEO of RADICL, and I discuss the challenges of securing the small and medium-sized businesses (SMBs) t...

2024 Cyber Trends and Predictions: Global IT Outage and More

31 Jul 2024

Contributed by Lukas

In this episode, John Funge, Managing Director at DataTribe, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based...

Fortifying Healthcare Data: Proactive Defense Strategies

25 Jun 2024

Contributed by Lukas

The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different t...

Quantum Computing and Cybersecurity – Examining Trends and Implications

05 Jun 2024

Contributed by Lukas

The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts o...

Creating a Security-Minded Culture

22 May 2024

Contributed by Lukas

In this podcast, I enjoyed talking with Chirag Shah, Model N's Global Information Security Officer and Data Privacy Officer, about creating a security...

Securing the Future: Inside Student-Led Cybersecurity Clinics

05 May 2024

Contributed by Lukas

Student-led cybersecurity clinics are increasingly playing an essential role in strengthening the digital defenses of nonprofits, hospitals, municipal...

Developing Resilient and Secure Mission Critical Facilities (Data Centers)

24 Apr 2024

Contributed by Lukas

Developing and maintaining resilient and secure data centers is a huge part of cybersecurity readiness. Spiros Liolis, Chief Technologist and Managing...

Securing Application Programming Interfaces (APIs)

10 Apr 2024

Contributed by Lukas

Application Programming Interfaces (APIs) play a vital role in modern software development, enabling the integration of services and facilitating the ...

The Last Line of Defense Against a Ransomware Attack

27 Mar 2024

Contributed by Lukas

Attackers have started increasingly targeting victims' backups to prevent organizations from restoring their data. Veeam's "2023 Ransomware Trends Rep...

Overcoming the Stale Nature of Tabletop Exercises

13 Mar 2024

Contributed by Lukas

While tabletop exercises (TTX) are considered a proven tool for finding gaps in an organization’s security posture, they can be painstakingly challe...

Securing Artificial Intelligence (AI) Applications

28 Feb 2024

Contributed by Lukas

As artificial intelligence (AI) technologies continue to evolve and be leveraged, organizations need to make a concerted effort to safeguard their AI ...

Building a Resilient Disaster Recovery Infrastructure

14 Feb 2024

Contributed by Lukas

The latest disaster recovery statistics reveal that modern businesses still face costly interruptions due to a variety of threats, ranging from&n...

Unraveling the Positive and Negative Impacts of Generative AI

22 Nov 2023

Contributed by Lukas

In a very thought-provoking discussion, Artificial Intelligence (AI) expert Tony Hoang, Ph.D., traced the evolution of Gen AI, highlighted the ma...

Best Practices for Overcoming Troublesome Vulnerability Management Trends

01 Nov 2023

Contributed by Lukas

A 2023 State of Vulnerability Management Report finds that only half of the surveyed organizations (51%) have, at best, a moderate level of visibility...

Streamlining and Improving Security by Standardizing Identity Management

18 Oct 2023

Contributed by Lukas

While cloud computing has become a great digitization enabler to enterprises, multiple clouds—especially when intersecting with on-premises systems ...

How Informed is the Board of Directors on Cybersecurity Risks?

03 Oct 2023

Contributed by Lukas

With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the ...

Enhancing Incident Response Effectiveness

06 Sep 2023

Contributed by Lukas

According to a 2023 IBM report, companies take 197 days to identify a breach and 69 days to contain one on average. The delay between infection, detec...

Cybersecurity in the Age of AI

12 Jul 2023

Contributed by Lukas

While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber...

Identity Orchestration Strategies and Best Practices

28 Jun 2023

Contributed by Lukas

Cloud migration and remote work requirements are forcing organizations to modernize their applications and identity systems. Making the transition is ...

Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage

14 Jun 2023

Contributed by Lukas

Recent cybersecurity workforce study reports reveal that a) there’s still a global shortage of 3.4 million workers in this field, and b) only 25% of...

Countering Insider Threats: Seven Science-Based Commandments

26 Apr 2023

Contributed by Lukas

Research finds that there was a 44% increase in insider threat incidents across all types of organizations, and 56% of the reported incidents were due...

Mitigating Risks from Unmonitored Communication Channels

14 Apr 2023

Contributed by Lukas

Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and sup...

Implementing Secure and Fast Authentication Processes

30 Mar 2023

Contributed by Lukas

Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If devel...

Proactive Resilient Approach to Cybersecurity

15 Mar 2023

Contributed by Lukas

It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and su...

The Challenges and Best Practices of Cyber Security in Emerging Markets

01 Mar 2023

Contributed by Lukas

“While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes ...

Cybersecurity Perspectives of a Community College President

15 Feb 2023

Contributed by Lukas

In this episode, Pamela Senegal, President, Piedmont Community College, shares several best practices, including having an information technology pres...

From Law Enforcement Officer to Chief Information Security Officer

01 Feb 2023

Contributed by Lukas

In this episode, Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School, shares his excitin...

To trust or not to trust: the overwhelming challenge

18 Jan 2023

Contributed by Lukas

Clinical psychologist Beatrice Cadet, Scientist Integrator at Netherland's Organization for Applied Scientific Research (TNO), draws upon multiple con...

Useful Technology Should Be Attack Agnostic

04 Jan 2023

Contributed by Lukas

In this episode, Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency, she...

Do you see what attackers see? Threat modeling done right

21 Dec 2022

Contributed by Lukas

Threat modeling is an intrinsic part of information security governance and needs to be done well. However, research finds that many organizations don...

Implementing Phishing Resistant Multifactor Authentication

07 Dec 2022

Contributed by Lukas

The Cybersecurity and Infrastructure Security Agency (CISA) recently (Oct 31, 2022) released fact sheets urging all organizations to implement phishin...

How do SMBs protect themselves from ransomware attacks?

23 Nov 2022

Contributed by Lukas

A recent Global SMB Ransomware survey finds that nearly half of small and medium-sized businesses (SMBs) have experienced a ransomware attack, yet the...

Cybersecurity As A Strategic Opportunity

09 Nov 2022

Contributed by Lukas

In this episode, Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist, shares his vision of the future of cyber gov...

Comprehensive Asset Discovery

26 Oct 2022

Contributed by Lukas

Comprehensive asset discovery is foundational to robust and proactive cybersecurity governance. The Cybersecurity and Infrastructure Security Agency r...

Is Cybersecurity A Moving Target at Academic Institutions?

12 Oct 2022

Contributed by Lukas

In a highly engrossing and in-depth discussion, Tej Patel, Vice President, and CIO at Stevens Institute of Technology sheds light on the various infor...

Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience

28 Sep 2022

Contributed by Lukas

As more organizations embrace cloud-based services, securely migrating to the cloud is becoming an important capability. Keith Weller, former Vice Pre...

Detecting Malicious Insider Threats by Monitoring User Journeys

14 Sep 2022

Contributed by Lukas

Insider threats are often considered the biggest risk for organizations because they can cause the most destruction. Survey reports, and studies, h...

Skilling Up for Security Operations Center Roles

31 Aug 2022

Contributed by Lukas

The Security Operations Center (SOC) is at the heart of an organization's cyber defense system. Highly skilled and motivated personnel must work in th...

Bridging the Gap Between Intentions and Practicality in Cybersecurity

17 Aug 2022

Contributed by Lukas

Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka, firmly believes that CISOs have the very best of intentions -- "we all m...

Preparing for the Future of Device Management

03 Aug 2022

Contributed by Lukas

With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping ...

The State of Attack Surface Management

20 Jul 2022

Contributed by Lukas

With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report o...

Global Security and Post Breach Management Best Practices

06 Jul 2022

Contributed by Lukas

"If you can plan for the zombie apocalypse, you can probably face just about anything," said Tim Callahan, Senior Vice President, and Global Chief In...

How to Tackle Burnout in Cybersecurity

22 Jun 2022

Contributed by Lukas

Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of...

Actionable Threat Intelligence and the Dark Web

08 Jun 2022

Contributed by Lukas

In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti ransomware group. The FBI est...

Reducing the Disconnect Between Security and Development Teams

25 May 2022

Contributed by Lukas

How do you make security a first-class citizen of the software development process? According to an industry report, “many information security engi...

Perspectives of a Global Chief Information Security Officer

11 May 2022

Contributed by Lukas

In a wide-ranging discussion, Vishal Salvi, CISO & Head of Cyber Practice at Infosys, sheds light on a range of topics from CISO empowerment to cr...

Thinking Like A Hacker

27 Apr 2022

Contributed by Lukas

Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent...

Is Cybersecurity Regulatory Compliance Good Enough?

13 Apr 2022

Contributed by Lukas

"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or security. The ship was carrying 2,...

Is Cyber Insurance Necessary?

30 Mar 2022

Contributed by Lukas

"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless add-on as an essential busine...

Dealing with Cyber Trauma

16 Mar 2022

Contributed by Lukas

The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal with it. Patrick Wheeler, a Lu...

A Deep Dive into Ransomware Attacks and Negotiations

02 Mar 2022

Contributed by Lukas

Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evolution and escalation of ransomwar...

Making Cybersecurity Communication Effective

16 Feb 2022

Contributed by Lukas

Cybersecurity communication should be simple, immersive, attractive, continuous, and multi-channel, says Marcin Ganclerz, a subject matter expert. He ...

Securing the Smart Supply Chain

02 Feb 2022

Contributed by Lukas

In episode 18, Alan Mihalic, President IoT Security Institute, speaks to the challenges and success factors associated with securing Internet-of-Thing...

Reducing the Carbon Footprint

19 Jan 2022

Contributed by Lukas

When justifying cybersecurity investments, Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance, recommends making t...

Role of Emotional Intelligence in Creating a Healthy Information Security Culture

05 Jan 2022

Contributed by Lukas

Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive, highlights the importance of leveraging emotional intelligen...

Significance of the Human Element in Cybersecurity

22 Dec 2021

Contributed by Lukas

Renowned authority in human-technology interactions and Presidential appointee Prof. Missy Cummings of Duke University, spoke to the importance of und...

Enhancing Organizational Readiness by Simulating Cyber Attacks

08 Dec 2021

Contributed by Lukas

Robert Austin, Professor, Ivey Business School, discusses the value of cyber-attack simulation by drawing upon the learning tool (IT Management Simula...

Cybersecurity is Patient Safety

24 Nov 2021

Contributed by Lukas

"Cybersecurity is patient safety and patient safety is cybersecurity," is how Stoddard Manikin, Chief Information Security Officer, Children's Healthc...

Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management

10 Nov 2021

Contributed by Lukas

The incredibly articulate Anne Leslie, Threat Management Consultant, IBM Security, shares some powerful messages and recommendations on threat managem...

Fly the Plane: A CIO's Approach to Cybersecurity Readiness

27 Oct 2021

Contributed by Lukas

Fly the Plane is how Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia, characterizes his philosophy and approa...

Passwordless Authentication: Myths and Realities

13 Oct 2021

Contributed by Lukas

Driven by a mission and passion to fight online crime, Ori Eisen, Founder and CEO of Trusona, explains the fundamentals of passwordless authentication...

Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs)

29 Sep 2021

Contributed by Lukas

While small and medium-sized enterprises (SMEs) face the same cybersecurity issues as large enterprises, SMEs don’t have the resources to effectivel...

What Does Good Cyber Governance Look Like? A Legal Perspective

15 Sep 2021

Contributed by Lukas

From the standpoint of cybersecurity governance, how does an organization stay on the right side of the law? Rois Ni Thuama, Ph.D. (Doctor of Law), He...

Multidisciplinary and Integrative Approach to Cybersecurity Education

01 Sep 2021

Contributed by Lukas

In a very engaging and thoughtful discussion, Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duk...

Holistic Approach to Cybersecurity Readiness

18 Aug 2021

Contributed by Lukas

Ram R. Kumar, Executive Director, AT&T Business, discusses at length significant cybersecurity governance issues, from achieving inter-and intra-...

Being An Effective Chief Information Security Officer (CISO)

04 Aug 2021

Contributed by Lukas

Richard Biever, Chief Information Security Officer, Duke University, shares valuable insights on how to create an effective CISO function. In a wide-r...

The Human Vulnerability Factor

21 Jul 2021

Contributed by Lukas

A widely reported 2019 survey found that 99% of the attacks are focused on exploiting human vulnerabilities by targeting people instead of computer sy...

Going Above and Beyond the Mandated Checklist

07 Jul 2021

Contributed by Lukas

When top management proactively takes every possible precaution to protect sensitive data because it is the right thing to do and not because there is...

Protecting Academic Institutions from Ransomware and Other Forms of Cyber Attacks

23 Jun 2021

Contributed by Lukas

Educational institutions have been the target and victim of ransomware attacks. Garry Scobie, Deputy Chief Information Security Officer, The Universit...

Page 1 of 2 Next → »»