On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading

1
Mike Witt on NASA’s cybersecurity mission in space
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Mike Witt, NASA's Senior Agency Information Security Officer and Chief Information Security Officer for Cybersecurity and Privacy, has a long history of public service. In addition to serving 10 years in the U.S. Army, Mike was the director of the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security and a…
…
continue reading

1
Lt. Gen. Lori Reynolds on the evolution of cyber warfare
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38Lieutenant General Lori Reynolds' (Ret., USMC) career journey from a Naval Academy graduate to a key figure in cybersecurity and information warfare illustrates the progression of military communications and cyber operations. Initially commissioned as a Marine Corps communications officer in 1986, Lori’s career took her from managing traditional ra…
…
continue reading

1
Melissa Vice on the value of vulnerability disclosure programs
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17The Department of Defense Cyber Crime Center (DC3) operates a Vulnerability Disclosure Program (VDP) that handles critical cybersecurity issues reported by the public, including using an actual red phone for urgent matters. In the latest episode of WE’RE IN!, Melissa Vice, director of DC3’s VDP, describes how they respond to cyberthreats and collab…
…
continue reading

1
The AI Episode: Experts Share Security Insights on LLMs and GenAI
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry.…
…
continue reading

1
Bill Dunnion on the push for transparency in security breaches
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. In this episod…
…
continue reading

1
Jennifer Villarreal on how she upped her hacking game
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON.…
…
continue reading

1
Sara Mosley on best practices for Zero Trust
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She rec…
…
continue reading

1
Michael Daniel on untangling cybersecurity’s complexity problem
35:13
35:13
Play later
Play later
Lists
Like
Liked
35:13Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Tas…
…
continue reading

1
Anand Prakash on cloud security startups and next-gen hacking
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38Anand Prakash on cloud security startups and next-gen hacking Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by Se…
…
continue reading

1
Ads Dawson on developing the OWASP Top 10 for Large Language Models
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the info…
…
continue reading

1
Kevin Tambascio on balancing security with availability of services in healthcare
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilanc…
…
continue reading

1
Tennisha Martin on bridging the cyber talent gap through diversity
31:01
31:01
Play later
Play later
Lists
Like
Liked
31:01Cybersecurity organizations tend to have unrealistic hiring expectations, according to Tennisha Martin, founder and executive director of the training-focused nonprofit BlackGirlsHack. That can make it hard for would-be candidates to stand out and contribute to solving urgent cybersecurity challenges. In the latest episode of WE’RE IN!, Tennisha un…
…
continue reading

1
Mara Winn on protecting America’s critical infrastructure from cyberthreats
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER), is in cha…
…
continue reading

1
Amy Chang on squaring cyber policy with real-world threats
33:39
33:39
Play later
Play later
Lists
Like
Liked
33:39Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an …
…
continue reading

1
Mark Kuhr on AI pentesting and the Synack Red Team
36:18
36:18
Play later
Play later
Lists
Like
Liked
36:18Dr. Mark Kuhr, a former National Security Agency employee, faced a host of challenges when he co-founded Synack with CEO Jay Kaplan in 2013. As CTO for the security testing company, Mark has led Synack through dramatic growth while working to shift the mindset of some cybersecurity practitioners. For instance, the Synack platform, featuring access …
…
continue reading

1
Anthony Newman on cyberthreats to higher education
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges face…
…
continue reading

1
Dennis Fisher on the future of cybersecurity journalism
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and I…
…
continue reading

1
Jason Loomis on finding the humanity in cybersecurity
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes …
…
continue reading

1
Sarah Armstrong-Smith on understanding the attacker mindset
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37Season 3 Episode 3 Sarah Armstrong-Smith on understanding the attacker mindset Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what's next with the ons…
…
continue reading

1
Andreas Wuchner on Cyber Resiliency in Financial Services
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland's National Financial Services Information Sharing and Analysis Center, has a…
…
continue reading

1
Ryan Kazanciyan on Securing the AI future
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup. The cloud se…
…
continue reading
Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE'RE IN! Hosted by Synack's Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer …
…
continue reading

1
Lauren Zabierek on “Sharing the Mic” to Foster Cyber Innovation
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure S…
…
continue reading

1
Jeremiah Roe Unpacks the “Puzzle” of Pentesting
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the Darknet Diaries podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack. Jeremiah is a fan of escape…
…
continue reading

1
Demystifying OT Cybersecurity with Danielle Jablanski
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations…
…
continue reading