Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what’s happening in the tech space — from startups to industry leaders, emerging tech, and what’s ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
…
continue reading
Futurum Group Podcasts
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading

1
The Futurum Group's Fernando Montenegro on the OODA Loop Approach to Security Strategy
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04What happens when you apply economic principles like opportunity cost and comparative advantage to cybersecurity decision-making? Fernando Montenegro, VP & Practice Lead of Cybersecurity at The Futurum Group, demonstrates how viewing security through an economics lens reveals critical blind spots most practitioners miss. His approach transforms how…
…
continue reading

1
SIG's Rob van der Veer on Why "Starting Small" with AI Security Might Fail
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01What happens when someone who's been building AI systems for 33 years confronts the security chaos of today's AI boom? Rob van der Veer, Chief AI Officer at Software Improvement Group (SIG), spotlights how organizations are making critical mistakes by starting small with AI security — exactly the opposite of what they should do. From his early work…
…
continue reading

1
Vigilocity's Karim Hijazi on Supply Chain Threat Intelligence
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Karim Hijazi’s approach to threat hunting challenges conventional wisdom about endpoint security by proving that some of the most critical intelligence exists outside organizational networks. As Founder & CEO of Vigilocity, his 30-year journey from the legendary Mariposa botnet investigation to building external monitoring capabilities demonstrates…
…
continue reading

1
CyberHoot's Craig Taylor on Why Fear-Based Phishing Training Fails
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Psychology beats punishment when building human firewalls. Craig Taylor, CEO & Co-founder of CyberHoot, brings 30 years of cybersecurity experience and a psychology background to challenge the industry's fear-based training approach. His methodology replaces "gotcha" phishing simulations with positive reinforcement systems that teach users to ident…
…
continue reading

1
T. Rowe Price’s PJ Asghari’s "What, So What, Now What" Framework for Threat Intel
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34What does it take to transform a traditional event-driven SOC into an intelligence-driven operation that actually moves the needle? At T. Rowe Price, it meant abandoning the "spray and pray" approach to threat detection and building a systematic framework that prioritizes threats based on actual business risk rather than industry hype. PJ Asghari, …
…
continue reading

1
Transcend's Aimee Cardwell on Turning Security into a Growth Driver
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Most security leaders position themselves as guardians against risk, but Aimee Cardwell, CISO in Residence at Transcend and Board Member at WEX, built her reputation on a different approach: balancing risk to accelerate business growth. Her unconventional path from Fortune 5 CIO to CISO of a 1,200-person security team at UnitedHealth Group showcase…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Criminal Business Models
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the intersection of cybercrime and legitimate business, where his team's human intelligence gathering in Dark Web communities provides early warning systems tha…
…
continue reading

1
McAfee's Manisha Agarwal-Shah on Testing Ransomware Plans Before You Need Them
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Most security leaders are fighting yesterday's ransomware war while today's attackers have moved to data exfiltration and reputation destruction. Manisha Agarwal-Shah, Deputy CISO at McAfee, brings 18 years of cybersecurity experience from consulting through AWS to explore why traditional ransomware defenses miss the mark against modern threat acto…
…
continue reading

1
Team Cymru's Threat Researchers on Operation Endgame Intelligence
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Team Cymru's threat researchers have spent years developing an almost psychological understanding of cybercriminals, tracking their behavioral patterns alongside technical infrastructure to predict where attacks will emerge before they happen. Josh and Abigail share with David how their multi-year tracking of Russian cybercrime groups enabled criti…
…
continue reading

1
Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech comp…
…
continue reading

1
Digital Turbine's Vivek Menon on AI Acceleration vs Attack Expansion
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16The security industry's obsession with cutting-edge threats often overshadows a more pressing reality: the vast majority of organizations are still mastering basic AI implementation. Vivek Menon, CISO & Head of Data at Digital Turbine, brings his insights from the RSA expo floor to share why the agentic AI security rush may be premature, while high…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading

1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading

1
GigaOm’s Howard Holton on Why AI Will Be the OS of Security Work
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43The cybersecurity industry has witnessed numerous technology waves, but AI's integration at RSA 2025 signals something different from past hype cycles. Howard Holton, Chief Technology Officer at GigaOm, observed AI adoption across virtually every vendor booth, yet argues this represents genuine transformation rather than superficial marketing. His …
…
continue reading

1
Online Business Systems' Jeff Man on PCI 4.0's Impact
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31The cybersecurity industry has long operated on fear-based selling and vendor promises that rarely align with practical implementation needs. Jeff Man, Sr. Information Security Evangelist at Online Business Systems, brings a pragmatic perspective after years of navigating compliance requirements and advising organizations from Fortune 100 enterpris…
…
continue reading

1
Trellix's John Fokker on Why Ransomware Groups Are Fragmenting
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51The criminal underground is experiencing its own version of startup disruption, with massive ransomware-as-a-service operations fragmenting into smaller, more agile groups that operate like independent businesses. John Fokker, Head of Threat Intelligence at Trellix, brings unique insights from monitoring hundreds of millions of global sensors, reve…
…
continue reading

1
Frost & Sullivan's Martin Naydenov on AI's Cybersecurity Trust Gap
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14In this special RSA episode of Future of Threat Intelligence, Martin Naydenov, Industry Principal of Cybersecurity at Frost & Sullivan, offers a sobering perspective on the disconnect between AI marketing and implementation. While the expo floor buzzes with "AI-enabled" security solutions, Martin cautions that many security teams remain reluctant t…
…
continue reading

1
Unspoken Security’s AJ Nash on Protecting Against AI Model Poisoning
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32In our latest episode of The Future of Threat Intelligence, recorded at RSA Conference 2025, AJ Nash, Founder & CEO, Unspoken Security, provides a sobering assessment of AI's transformation of cybersecurity. Rather than focusing solely on hype, AJ examines the double-edged nature of AI adoption: how it simultaneously empowers defenders while dramat…
…
continue reading

1
Cyware’s Jawahar Sivasankaran on Automating Threat-Centric Operations
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53In this special RSA 2025 episode of The Future of Threat Intelligence, David speaks with Jawahar Sivasankaran, President of Cyware, about their partnership with Team Cymru to democratize threat intelligence. Jawahar outlines how their CTI program in a box approach enables organizations to implement comprehensive threat intelligence capabilities in …
…
continue reading

1
Rapid7’s Lonnie Best on Measuring SOC Success Beyond Alert Closures
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In a world obsessed with cutting-edge security technology, Lonnie Best, Senior Manager of Detection & Response Services at Rapid7, makes a compelling case for mastering the fundamentals. After transitioning from craft beer journalism through nuclear security to cybersecurity, Lonnie witnessed the evolution of ransomware attacks from "spray and pray…
…
continue reading

1
Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. In this no-holds-barred conve…
…
continue reading

1
Option Care’s Jill Rhodes on Uniting Legal Expertise and Cybersecurity in Healthcare
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Jill Rhodes, SVP & CISO at Option Care Health, shares her unconventional journey from international development lawyer stationed in Bolivia and Moscow to healthcare leader, where she built the security program from the ground up as the organization's first CISO. Jill outlines for David how a transformative assignment at an intelligence agency spark…
…
continue reading

1
Silverado Policy Accelerator’s Dmitri Alperovitch on Hunting Intruders After They're Already In
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00In this episode of The Future of Threat Intelligence, Dmitri Alperovitch, Co-founder & Executive Chairman at Silverado Policy Accelerator and Author of World on the Brink: How America Can Beat China in the Race for the 21st Century, delivers a stark warning about the second Cold War with China that's unfolding, from military and nuclear arms races …
…
continue reading

1
Directions on Microsoft’s Wes Miller on Harmonizing Microsoft's Security & Identity Tools
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28What happens when Microsoft's on-premises security falls behind while cloud innovation accelerates? In this episode of The Future of Threat Intelligence, Wes Miller, Research Analyst for Microsoft Identity, Security, and Management at Directions on Microsoft, pulls back the curtain on Microsoft's fragmented security landscape. Having survived the h…
…
continue reading

1
Wikistrat’s Jeffrey Caruso on New Methods in Cyber-Physical Attacks
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20In this episode of The Future of Threat Intelligence, Jeffrey Caruso, Senior Analyst at Wikistrat & Author of Inside Cyber Warfare, shares examples of how teams with minimal budgets achieved kinetic effects through OT system manipulation — from destroying missile research facilities to compromising subway systems and burning down FSB-affiliated ban…
…
continue reading