Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The SafeHouse

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Cyber Risk: Where Mitigation Meets Insurance With Michael Phillips

12 Mar 2026

Contributed by Lukas

Cyber risk management is often framed as a choice between prevention and insurance. In reality, the most resilient organizations combine both.In this ...

Making Sense of Risk Management with Davis Hake

26 Feb 2026

Contributed by Lukas

Cyber risk is no longer just a technical issue. It’s a financial one.In this episode of The SafeHouse Podcast, Jeff Edwards sits down with Davis Hak...

When Cybersecurity became a state responsibility with James Saunders

12 Feb 2026

Contributed by Lukas

Nearly a year after federal cybersecurity policy shifted responsibility and funding to the states, what does that change actually look like in practic...

Why Cyber Warranties Are Not Insurance — and Why That Matters

22 Jan 2026

Contributed by Lukas

Most people think warranties and insurance are interchangeable.They’re notInsurance transfers risk after loss. Warranties enforce behavior before lo...

Cybersecurity Frameworks Made Practical: From Confusion to Clarity,

09 Jan 2026

Contributed by Lukas

In this episode of The SafeHouse Podcast, we’re joined by Ryan Ettridge, CEO of CyberCert, an Australian innovator helping SMBs and enterprises t...

Cybercrime Is a Human Problem: A Conversation with Charlotte Hooper of The Cyber Helpline

18 Dec 2025

Contributed by Lukas

When cybercrime hits, most people don’t know where to turn.In this episode of The SafeHouse Podcast, Jeff Edwards sits down with Charlotte Hooper, C...

From Bootcamps to Battlefields: Keith Gologorsky on Modern Cyber Training

04 Dec 2025

Contributed by Lukas

In this episode of the Safe House Initiative podcast, host Jeff Edwards welcomes Keith Gologorsky, Head of Public Sector at Hack the Box, for an in-de...

Cyber Decision Diagrams for OT/ICS: Turning Tribal Knowledge into Action w/ Sarah Flukes, CTO, Admeritia

13 Nov 2025

Contributed by Lukas

Host Jeff Edwards talks with Sarah Flukes, CTO of Admeritia, about a simple but powerful idea: cyber decision diagrams. Born from real-world work...

SMB Cybersecurity in the Age of AI — Practical Defense with Chuck Brooks (Georgetown | Brooks Consulting)

30 Oct 2025

Contributed by Lukas

Host Jeff Edwards sitsdown with Chuck Brooks—adjunct professor at Georgetown andpresident of Brooks Consulting—to cut through the noise on SMB ...

SMB Cyber Insurance: Why Only 4% Buy — Myths, Budgets & Better Options (w/ Eric Cernak)

16 Oct 2025

Contributed by Lukas

Why do only ~4% of small and midsize businesses carry a standalone cyber policy? Host Jeff Edwards digs in with returning guest Eric Cernak (Hanov...

Thoughtful Reflection: Cyber Insurance Summer Series Conclusion with Tawana Johnson

25 Sep 2025

Contributed by Lukas

And that's a wrap on our Cyber Insurance Summer Series! 🎬 In this must-watch conclusion, series co-host Tawana Johnson joins Jeff Edwards to di...

When Business Stops: Coverage Litigation and the Fight for Recovery with Ted Brown

28 Aug 2025

Contributed by Lukas

In this episode of the Safe House Initiative, hosts Jeff Edwards and Tawana Johnson are joined by Ted Brown, a partner at Lavin Rindner Duffield. Ted ...

When Business Stops: BI Litigation and the Fight for Recovery with Jane Warring

21 Aug 2025

Contributed by Lukas

In this episode of the Safe House Initiative, host Jeff Edwards and Tawana speak with Jane Warring, a partner at Zel Law, who specializes in handling ...

Breach to Bench: How Class Actions Are Born From Cyber Incidents with Chris Wood

14 Aug 2025

Contributed by Lukas

In this episode of the Safe House Initiative, host Jeff Edwards and Tawana Johnson speak with Chris Wood, a partner at Lewis Brisbois law firm, on the...

Cradle to the Grave: The Full Lifecycle of a Cyber Claim with Toni Sukhan

07 Aug 2025

Contributed by Lukas

In this podcast episode, we feature cyber claims examiner Toni Sukhan as she outlines the critical steps businesses must take when facing a cyber inci...

Lost in Translation: Bridging the Cyber Policy Communication Gap with Brandy Vargas

31 Jul 2025

Contributed by Lukas

Brandy Vargas, Senior Manager of Cyber Solutions at Crum & Forster, offers crucial insights for small to midsize businesses (SMBs) on cyber insura...

What Underwriters Really See: From Application Pitfalls to Threat Intel with Heather Mongeau

17 Jul 2025

Contributed by Lukas

In this episode of the Safe House Initiative, we're joined by Heather Mongeau, VP and Director of Cyber Product Solutions at Allied World Insuranc...

The Broker Disconnect: Why Isn't Cyber Being Pitched with Ryan Mercer

10 Jul 2025

Contributed by Lukas

In this episode of the Safe House Cyber Insurance Summer Series, we dive deep with Ryan Mercer, VP of Cyber at McGriff brokerage. With over a decade o...

Cyber Insurance Summer Series: Quantifying Risk with Safe Security's Steven Schwartz

03 Jul 2025

Contributed by Lukas

In this episode, Jeff Edwards and Tawana Johnson from the Safe House Initiative podcast are joined by Steven Schwartz, Chief Insurance Officer at Safe...

From Risk to Recovery-Every Stop: The Cyber Insurance Journey with Tawana Johnson

26 Jun 2025

Contributed by Lukas

The Safe House Initiative podcast, hosted by Jeff Edwards and co-hosted by Tawana Johnson, delves into cyber insurance for small to mid-sized business...

The Federal Cyber Enterprise: A New Way Forward with Craig Bowman

19 Jun 2025

Contributed by Lukas

In this episode of the Safe House Initiative, host Jeff Edwards welcomes Craig Bowman, Vice President at Trellix and the visionary co-founder of the R...

Navigating the Future: Federal Enterprise Prototypes in Threat Pursuit Part 2 with Daron Hartvigsen

12 Jun 2025

Contributed by Lukas

In this episode of the Safehouse Initiative, host Jeff Edwards sits down with Daron Hartvigsen, a former technical services agent and cyber program ma...

Navigating the Future: Federal Enterprise Prototypes in Threat Pursuit Part 1 with Luke Tenery

30 May 2025

Contributed by Lukas

What does it take to defend national infrastructure in a rapidly evolving threat landscape? In this episode of the SafeHouse podcast, host Jeff Edward...

Backup: Cybersecurity’s Silent Partner with W. Curtis Preston

22 May 2025

Contributed by Lukas

System Backup operations are often viewed as separate from the Cybersecurity policies and procedures. But listen to W. Curtis Preston, known in the in...

When Cyber Security collides with AI with Jeff Crume

01 May 2025

Contributed by Lukas

Jeff Crume, IBM Distinguished Engineer, CTO IBM Security Americas, and Cybersecurity Architect joins Jeff Edwards, Co-Chair of the SafeHouse Initiativ...

The Human Nature of AI with Alastair Paterson

24 Apr 2025

Contributed by Lukas

AI: Friend or Foe in Business? Unpacking the Human ElementAre companies truly ready for the AI revolution? In this episode of the SafeHouse podcast, h...

Beyond Cyber Security: Risk Management with AJ Dharma Wardana

10 Apr 2025

Contributed by Lukas

Join us in this enlightening episode of Beyond Cyber Security, as Jeff Edwards welcomes AJ Dharma Wardana, a seasoned portfolio manager at Envelop Ri...

The Federal Cyber Enterprise: Protecting U.S. Business From Cybersecurity Threats with Alex Green

03 Apr 2025

Contributed by Lukas

Current cyber defenses are often fragmented, leaving U.S. businesses vulnerable to increasingly sophisticated attacks. Discover the transformative con...

The Rise and Importance of InsureSec for SMBs with Gordon Malin - Part 2

03 Apr 2025

Contributed by Lukas

In this second part of the 2-part podcast episode, host Jeff Edwards continues his conversation with Gordon Malin, co-founder and CEO of Elpha Sec...

The Rise and Importance of InsureSec for SMBs with Gordon Malin - Part 1

06 Mar 2025

Contributed by Lukas

In this thought-provoking first of the two-part episode, host Jeff Edwards is joined by Gordon Malin, co-founder and CEO of Elpha Secure, to unpack th...

Now What? How to Pay Your Ransom with Marc Grens

27 Feb 2025

Contributed by Lukas

In this episode of the Safe House Initiative Podcast, host Jeff Edwards and Marc Grens, co-founder of Digital Mint, explore the intricate world of ran...

Origins: Cybersecurity and Beyond with Matthew Cullina - Part 2

21 Feb 2025

Contributed by Lukas

In this second part of our conversation with Matthew Cullina, head of the Global Cyber Insurance Group at TransUnion, Jeff Edwards dives deeper into t...

Origins: Cybersecurity and Beyond with Matthew Cullina - Part 1

06 Feb 2025

Contributed by Lukas

In this insightful first episode of a two-part series, Jeff Edwards and Matt Cullina, head of TransUnion’s Global Cyber Insurance Group, explore the...

The Ever Expanding Cyber Insurance Ecosystem with Mark Greisiger

30 Jan 2025

Contributed by Lukas

Welcome to this episode of The Safe House, hosted by Jeff Edwards, co-chair of the Safe House Initiative. Join us as we dive into the evolving world ...

ABCs of MDR with Mark Sangster - Part 2

23 Jan 2025

Contributed by Lukas

In this second part of a two-part series, Mark dives deep into the role of MDR in cybersecurity, and discusses real-world implications of different cy...

Data-Driven Research Approach to Cyber Risk with Wade Baker

17 Jan 2025

Contributed by Lukas

In this episode of The Safe House, host Jeff Edwards sits down with Wade Baker, co-founder of the Scientia Institute, to delve into the world of cyber...

ABCs of MDR with Mark Sangster - Part 1

09 Jan 2025

Contributed by Lukas

Join us in this enlightening episode hosted by Jeff Edwards, as we navigate the complex world of cybersecurity acronyms and concepts like MDR (Manage...

5 Ws of Cybersecurity Maturity Model Certification

02 Jan 2025

Contributed by Lukas

In this episode of the Safehouse podcast, Jeff Edwards welcomes Jody Stoehr, Co-founder & Chief Revenue Officer of SMPL-C, to discuss the critical...

Global Cybersecurity Perspective: A Quick History Lesson

28 Dec 2024

Contributed by Lukas

In this episode of the Safe House Initiative podcast, host Jeff Edwards welcomes Jude Sunderbruch, the managing director at Cyber Defense Lab, to dis...

Using Frameworks Effectively to Plot Your Cybersecurity Journey

19 Dec 2024

Contributed by Lukas

Cybersecurity is a journey and navigating it can often feel overwhelming. With numerous frameworks available, many organizations grapple with question...

Anatomy of Incident Response, Part 2

12 Dec 2024

Contributed by Lukas

Join us for this second part of a two-part series entitled ‘𝘛𝘩𝘦 𝘈𝘯𝘢𝘵𝘰𝘮𝘺 𝘰𝘧 𝘐𝘯𝘤𝘪𝘥𝘦𝘯𝘵 𝘙...

Anatomy of Incident Response, Part 1

05 Dec 2024

Contributed by Lukas

What is the best way for you to reduce the impact of cyber incidents? Every business has a ‘digital footprint.’ We rely on digital systems that ca...

The Summer of Ransomware

14 Nov 2024

Contributed by Lukas

Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk and Resilience at the US Department of Homeland Security, joins Jeff Edwards, Co...

Crisis Response: Protecting Your Reputation

08 Nov 2024

Contributed by Lukas

Stephanie Craig, President of Kith.co joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to learn how your personal and company reputation are a...

The NIST NCCOE: The Hub of Cybersecurity Collaboration

31 Oct 2024

Contributed by Lukas

Cherilyn Pascoe, Director of the National Cybersecurity Center of Excellence (NCCOE) at the National Institute of Standards and Technology (NIST) join...

Addressing the Cybersecurity Shortage Through Internships

24 Oct 2024

Contributed by Lukas

Mike Battistella, President & CTO of Solutions cubed, and Director of Government Solutions at the DVMS Institute joins Jeff Edwards, Co-Chair of t...

Addressing the Cybersecurity Shortage Through Internships

24 Oct 2024

Contributed by Lukas

Mike Battistella, President & CTO of Solutions cubed, and Director of Government Solutions at the DVMS Institute joins Jeff Edwards, Co-Chair of t...

What is a vCISO and why you need one

17 Oct 2024

Contributed by Lukas

Greg Schaffer, SMB Advisory CISO, Founder vCISO Services, Author, Podcast Host, and Cybersecurity Subject Matter Expert joins Jeff Edwards, Co-Chair o...

Cybersecurity Fundamentals: What is it and Why do you need it?

10 Oct 2024

Contributed by Lukas

Christian Redshaw, President, TyneBridge Digital Partners, and host of the Digital Trust Podcast, joins Jeff Edwards, Co-Chair of the SafeHouse Initia...

Cyber Risk and Insurance for Small Businesses

03 Oct 2024

Contributed by Lukas

Eric Cernak, President, Cyber at the Hanover Insurance Group joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to manage risk as...

SOC2: Why should you care?

26 Sep 2024

Contributed by Lukas

Angelika Mayen and Beau Butaud, Co-Founders of Render Compliance and SOC Champions, join Jeff Edwards, Co-Chair of the SafeHouse Initiative, to discus...

Building the ISC 2 New Jersey Chapter Internship Program

19 Sep 2024

Contributed by Lukas

Ken Fishkin, Information Security and Privacy Evangelist, ISC 2 Chapter President, Infraguard Advisory Board Member, and Senior Manager of Information...

Evolution or Revolution: Cyber Risk and Resilience

12 Sep 2024

Contributed by Lukas

Neal Mullen, European Director of Cyber Security at CRH, BCI Hall of Fame, and SafeHouse Initiative Advisory Board Director joins Jeff Edwards, Co-Cha...

Insider Threat Management and Data Loss Prevention

05 Sep 2024

Contributed by Lukas

Kyle Schlosser, Insider Threat Management, Data Loss Prevention and eDiscovery Subject Matter Expert joins Jeff Edwards, Co-Chair of the SafeHouse In...

The 10 Flaws in Incident Response Plans - Summary and Recap

30 Aug 2024

Contributed by Lukas

Over the last 11 weeks, guest co-host Alex Waintraub joined Jeff Edwards to discuss and explore the 10 most common flaws in Incident Response Plans. E...

10 Common Flaws in Incident Response Plans - Flaw #10: Actually Executing the Plan

22 Aug 2024

Contributed by Lukas

Michael Wilkes, Chief Information Security Officer, Resilience Champion, Advisor, and Board Member joins Jeff Edwards, Co-Chair of the SafeHouse Initi...

10 Common Flaws in Incident Response Plans - Flaw #9: Untested Incident Response Plans

15 Aug 2024

Contributed by Lukas

Paul Caron, Head of Cybersecurity - Americas at S-RM joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintraub, Cyber Sec...

10 Common Flaws in Incident Response Plans - Flaw #8: Failure to consider the Worst-Case Scenario

08 Aug 2024

Contributed by Lukas

Matt Lee, Senior Director of Security and Compliance with Pax8 joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintraub,...

10 Common Flaws in Incident Response Plans - Flaw #7: Incident Response Plan Readiness

01 Aug 2024

Contributed by Lukas

John Sharpe, Sr. Manager, Global Security Operations Center joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintraub, Cy...

10 Common Flaws in Incident Response Plans - Flaw #6: Leveraging External Expertise

25 Jul 2024

Contributed by Lukas

Israel Bryski, Chief Information Security Officer at MIO Partners, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintr...

10 Common Flaws in Incident Response Plans - Flaw #5: Legal & Regulatory

18 Jul 2024

Contributed by Lukas

Stu Panensky, Founding Partner at Law Firm Pierson Ferdinand LLP, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintra...

10 Common Flaws in Incident Response Plans - Flaw #4: Inadequate Communications Strategies

11 Jul 2024

Contributed by Lukas

Randy Pargman, Director of Threat Detection at Proofpoint, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and guest host Alex Waintraub, Cyb...

10 Common Flaws in Incident Response Plans - Flaw #3: Organizational Silos

11 Jul 2024

Contributed by Lukas

Aaron Goldstein, VP of Incident Response and Field Information Security Officer at Todyl, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and...

10 Common Flaws in Incident Response Plans - Flaw #2: Undefined Roles & Responsibilities

28 Jun 2024

Contributed by Lukas

Frank Angiolelli, Founder and Managing Director of mSOC, author and Cybersecurity expert joins Jeff Edwards, Co-Chair of the SafeHouse Initiative and ...

10 Common Flaws in Incident Response Plans - Flaw #1: Not Having a Plan

28 Jun 2024

Contributed by Lukas

Ken Fishkin, Information Security and Privacy Evangelist, ISC2 Chapter President, and InfraGard Advisory Board Member joins Jeff Edwards, Co-Chair of...

10 Common Flaws in Incident Response Plans

13 Jun 2024

Contributed by Lukas

Alex Waintraub, Cybersecurity and DFIR expert consultant joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to introduce him and his observation...

The NIST Cybersecurity Quick Start for SMB's

06 Jun 2024

Contributed by Lukas

Daniel Eliot, Lead for Small Business Engagement, with the National Institute of Standards and Technology (NIST) Applied Cybersecurity Division, join...

Cybersecurity Risk Management is a Business Issue

30 May 2024

Contributed by Lukas

Rick Lemieux, Founding Member & Executive Director of the DVMS Institute, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss why ...

How to Avoid the Snakes of Financial Fraud

23 May 2024

Contributed by Lukas

Matt Quamen, Co-Founder and President of Optimize Cyber, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss practical ways of protect...

Managing Third Party Risk

16 May 2024

Contributed by Lukas

Subject Matter Expert Jason Butler joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to manage Third Party Risk. Learn about the...

The Pitfalls of Backups for Ransomware Business Resumption

09 May 2024

Contributed by Lukas

Curtis Preston, Backup & Cyber Recovery Expert, aka "Mr. Backup" joins Jeff Edwards, Co-Chair of the SafeHouse Initiative once again to ...

Data Driven Computer Defense - Implementation Examples

02 May 2024

Contributed by Lukas

Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the Sa...

Data-Driven Computer Defense - Mental Maps and Operational Frameworks

25 Apr 2024

Contributed by Lukas

Podcast 3: Volume 4: Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss...

Data Driven Computer Defense - Root Causes

18 Apr 2024

Contributed by Lukas

The Data-Driven Computer Defense - Podcast 2, Volume 3. Roger Grimes, noted industry author and cybersecurity expert, returns to join Jeff Edwards, Co...

Meet Roger Grimes and Data Driven Computer Defense

11 Apr 2024

Contributed by Lukas

The Data-Driven Computer Defense - Podcast 1, Volume 1&2. Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Cha...

The Identity Crisis Where to start in securing cloud networks

04 Apr 2024

Contributed by Lukas

Jeff Moncrief, Field CTO and Director of Sales Engineering for Sonrai Security and SafeHouse Initiative contributor joins Jeff Edwards, Co-Chair of th...

Joining the Global Fight - Cyber Resilience Centre for London

28 Mar 2024

Contributed by Lukas

Simon Newman, CEO of the Cyber Resilience Centre for London joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to share what the CRC is doing to...

Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 3

21 Mar 2024

Contributed by Lukas

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response...

Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 2

21 Mar 2024

Contributed by Lukas

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response...

Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 1

21 Mar 2024

Contributed by Lukas

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response...

Never let a good crisis go to waste, Part 2

14 Mar 2024

Contributed by Lukas

Building on Episode 9, Kevin Sandschafer, COO and VP of Cyber Risk and Assurance joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss ...

Defending yourself against Long Game Phishing

08 Mar 2024

Contributed by Lukas

Noted industry author and cybersecurity expert, Roger Grimes, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to defend agains...

Never let a good crisis go to waste, Part 1

29 Feb 2024

Contributed by Lukas

Rob Stewart, Founder and CEO of White Tuque joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, discuss his extensive experience in preparing, r...

Cybersecurity includes Data Disposal & Data Privacy

22 Feb 2024

Contributed by Lukas

Santosh Kamani, Co-Founder and CEO of CyberFIT Solutions joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss the importance of Data Pr...

In Perspective: Frameworks, Standards and Regulations

13 Feb 2024

Contributed by Lukas

Join James Hatcher, Asia Pacific Channel Manager for Lansweeper as he discusses with Jeff Edwards, Co-Chair of the SafeHouse Initiative, the meaning a...

Critical Infrastructure - Successfully Navigating a Breach

01 Feb 2024

Contributed by Lukas

Scott Grayson, CEO of the American Public Works Association (APWA) joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Cybersecurity i...

When Cybersecurity Collides with AI

16 Jan 2024

Contributed by Lukas

Jeff Crume, IBM Distinguished Engineer, CTO IBM Security Americas, and Cybersecurity Architect joins Jeff Edwards, Co-Chair of the SafeHouse Initiativ...

You've been breached! Now what?

08 Jan 2024

Contributed by Lukas

Robert Walker, Partner and Chair of the Data Privacy and Cybersecurity Practice at Lewis Brisbois joins Jeff Edwards, Co-Chair of the SafeHouse Initia...

The Long Tail Issues with a Cyber Incident

12 Dec 2023

Contributed by Lukas

In this episode, David Finz, First Vice President at Alliant Insurance Services returns to our podcast to explore the Long Tail Issues with a Cyber In...

Backup: Cybersecurity’s Silent Partner

15 Nov 2023

Contributed by Lukas

System Backup operations are often viewed as separate from Cybersecurity policies and procedures. But listen to W. Curtis Preston, known in the indust...

Cyber Risk Quantification

13 Oct 2023

Contributed by Lukas

Jeff Edwards, Founding Member and Co-Chair of the SafeHouse Initiative interviews David Finz, First Vice President of Specialty Claims and Adam Rauf, ...