On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading

1
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Da…
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
Cyber Battlefield Insights: Lessons in Incident Response and Dark Web Tour
1:03:48
1:03:48
Play later
Play later
Lists
Like
Liked
1:03:48Join host Joshua Nicholson, a seasoned cybersecurity veteran with over 24 years of frontline experience, as he dives deep into the high-stakes world of incident response and takes you on an exclusive dark web tour. In this power-packed episode, Joshua shares real-world lessons learned from handling hundreds of cyber incidents, breaking down the bes…
…
continue reading

1
Job Hunting in 2025: Top 10 Tips to Land Your Next Cybersecurity Role
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47🎙 Episode 34 - Job Hunting: Top 10 Tips to Land the Next One Looking for your next big career move? In this episode of Cyber Security America, we break down the Top 10 Tips to help you navigate the job market and secure your next role with confidence. Whether you're a seasoned cybersecurity professional or just starting out, we’ll cover essential s…
…
continue reading

1
Top 10 GRC Program Tooling for Success - (Build vs. Buy)
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06Top 10 GRC Program Tips – Build vs. Buy with an Amazon Leader! We’re back with another powerful episode featuring one of the top minds at Amazon. In this episode, we dive deep into Governance, Risk, and Compliance (GRC) and explore the Top 10 Tips for GRC Program Success. Should you build your own security governance tools or buy them off the shelf…
…
continue reading

1
Zero Trust in the Middle East: Navigating Cybersecurity Challenges & Opportunities
54:02
54:02
Play later
Play later
Lists
Like
Liked
54:02Welcome to Episode 32 of our podcast, where we explore the evolving landscape of cybersecurity in the Middle East. In this installment, we delve into the complexities of implementing Zero Trust in the region, focusing on the challenges and opportunities foreign companies face while adopting this vital framework. Zero Trust is more than a buzzword—i…
…
continue reading

1
Cyber Battlefield Insights: Identifying Critical Shifts & Errors Leading to Intrusions
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00Episode 31, Welcome to season two of the Cyber Security America podcast. In this episode, we explore the evolving landscape of cloud security, focusing on critical considerations for organizations migrating to Office 365 and Azure AD. Stay tuned as we unravel essential strategies and insights to bolster your security posture in the cloud. In tradit…
…
continue reading

1
Governor Pat McCory: Cyber Challenges in Government
1:03:53
1:03:53
Play later
Play later
Lists
Like
Liked
1:03:53Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local go…
…
continue reading

1
Zero-Trust Paradigm: Secure Browsing Technology - Conceal.io
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:36Welcome to the Cyber Security America show, a platform for exploring the dynamic and ever-evolving world of cybersecurity and information technology. In episode 17, we delve deep into the topic of zero trust, a security model that assumes all users, devices, and applications are potentially hostile, and requires strict access controls and verificat…
…
continue reading

1
Artificial Intelligence: Cyber AI is the new Tesla of Security
57:42
57:42
Play later
Play later
Lists
Like
Liked
57:42Welcome to our podcast, where we explore the fascinating world of generative AI and its profound impact on various fields. Join us as we delve into the intricate details of different models designed for specific tasks, such as text generation, native speech processing, and image/video generation. We also address the pressing concerns surrounding pr…
…
continue reading

1
Cloud Security: AWS Essentials, Challenges, Best Practices
1:00:40
1:00:40
Play later
Play later
Lists
Like
Liked
1:00:40Welcome to another episode of Cyber Security America with your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/). In this episode, we delve into the world of cloud computing and its impact on cybersecurity. We explore the major cloud platforms such as AWS, Azure, and GCP, along with their deployment and service models. Discover …
…
continue reading

1
Cybersecurity Training: A 101st Airborne Veteran's Journey
55:22
55:22
Play later
Play later
Lists
Like
Liked
55:22In episode 29, host Joshua Nicholson welcomes Dennis Kraft, a Penn State graduate and former United States Army Captain who served with the 101st Airborne Division Air Assault in Afghanistan from 2010 to 2011. After his military service, Dennis transitioned to a career in cybersecurity, working for the Department of Veterans Affairs, the Department…
…
continue reading

1
Securing E-Learning in a New World: Spoilage & Deepfakes
1:01:13
1:01:13
Play later
Play later
Lists
Like
Liked
1:01:13Welcome to episode 28 of the Cyber Security America podcast with your host Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/). He is excited to welcome Dayle Alsbury (https://www.linkedin.com/in/daylealsbury/), a distinguished cybersecurity expert with over two decades of experience in information security. Dayle has led diverse glo…
…
continue reading

1
Measuring Cybersecurity Risks: The Relevance of GRC
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04Welcome to our latest podcast episode (Episode 27), where Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/) embarks on an insightful journey through the dynamic world of #cybersecurity. Our distinguished guest, Joshua Copeland, brings his battle-tested expertise and extensive experience to the forefront. As the Director of Cyber at…
…
continue reading

1
Operational Threat Intelligence: How does that work?
1:00:14
1:00:14
Play later
Play later
Lists
Like
Liked
1:00:14Welcome to the 26th episode of How do you managed an operational threat intelligence program? In this installment, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/) traverses the realms of business, technology, and those often-unnoticed opportunities that slip through the cracks. Today, our spotlight turns towards a paramount facet th…
…
continue reading

1
Cybersecurity in the Middle East: Operations Challenges & Threats
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09Welcome to Episode 25 of the podcast, where we dive deep into the intriguing world of cybersecurity in the Middle East. In this installment, we're exploring the unique operational challenges faced by foreign companies operating in the region. Join us as we uncover the threats, risks, and intricate dynamics of this operating environment. Building up…
…
continue reading

1
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities
59:53
59:53
Play later
Play later
Lists
Like
Liked
59:53Welcome to **Cyber Security America**, your ultimate hub for all things cybersecurity in the digital era. I'm your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/), and today we're delving deep into the realm of cutting-edge cyber security managed and consulting services. Get ready to uncover groundbreaking strategies that are …
…
continue reading

1
Building a Cybersecurity Career: The Journey to CISO, Part II
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50Welcome to Episode 23 of Cyber Security America, where we delve deeper into the world of cybersecurity careers in part 2 of our special series, Building a Cybersecurity Career: The Journey to CISO. In this episode, we are honored to host two remarkable guests who have risen to the prestigious position of Chief Information Security Officer (CISO) in…
…
continue reading

1
Ransomware Attacks: Best Practices for Defense & Response
58:13
58:13
Play later
Play later
Lists
Like
Liked
58:13In the 14th episode of Cyber Security America, we explore one of the most devastating threats that small and large business face today. Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. In recent years…
…
continue reading

1
Security Operations: Adapting SOC Delivery to Threat Actors
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19At the center of your cyber security universe is the Security Operations Center (SOC). This is supposed to be part of your 24/7 Managed Detection & Response (MDR) capability. But how do you know if your security operations team is running in a mature and highly capable manner. This is where the rubber meets the road when identifying and respond to …
…
continue reading

1
Cyber Supply Risk Management: Defense Strategy Best Practices
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44In today's hyper-connected world, no organization can tackle computer threats alone using just their own people, processes, and technology. A successful Chief Information Security Officer (CISO) or Director of Security Operations needs to engage and leverage technology vendors, strategic integrators, and consulting partners to accomplish their miss…
…
continue reading

1
Thought Leadership: Bruce Schneier on "A Hacker's Mind"
55:12
55:12
Play later
Play later
Lists
Like
Liked
55:12Welcome to Cyber Security America, the podcast where we delve deep into the world of cybersecurity and provide insights on past trends, current challenges, and areas for improvement. Our goal is to help you stay informed and prepared for the next cyber threat. In this episode, we have a very special guest, Bruce Schneier, an internationally renowne…
…
continue reading

1
Cybersecurity Solutions: Innovative cutting edge problem-solving
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55Welcome to today's episode! In contrast to our previous discussions on #artificialintelligence, #cloudsecurity, and #burnout, we are taking a different approach today. We have the pleasure of hosting two remarkable CEOs from cybersecurity technology companies. These individuals are at the forefront of driving innovative solutions to tackle the most…
…
continue reading

1
Artificial Intelligence: Automating SOC Workflows - Salem Cyber
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.com/learn/) Cyber Threat Intelligence (CTI) desk and the latest in cybersecurity innovation with Salem Cyber. Prepare for an informative and engaging discussion! #malware #information…
…
continue reading

1
Cybersecurity Burn-Out: How to sustain high performing teams?
57:40
57:40
Play later
Play later
Lists
Like
Liked
57:40There is no doubt that corporate America and our Nation is in desperate need of #cybersecurity analysts and engineers to protect critical infrastructure. For most of the shows on the #CyberSecurityAmerica podcast, we focus on tactical areas of knowledge in order upskill security practitioners in management and executive #leadership. In this episode…
…
continue reading

1
Cyber Security Governance: Big Shift at SEC & CISA
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37SEC cybersecurity risk governance rule and its impact on the market. Chris Hetner is the former Cyber Security Advisor to the Chair of the US Securities and Exchange Commission (SEC) and a former Senior Member of the US Department of Treasury Financial Banking Information Infrastructure Committee. He talks about the final process of approving the c…
…
continue reading

1
Cyber Security Jobs: Demystifying the Various Roles
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Welcome to the Cyber Security America Show, where we dive into the sea of complex technologies and provide real-world context to the world of Cyber Security and Information Technology. In episode 16, we explore the various jobs and roles within the industry, including penetration testers, vulnerability managers, detection analysts, threat hunters, …
…
continue reading

1
Breaking Down CISO Communication Barriers Between CIO and Board
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15Don't forget to like, subscribe, and turn on notifications for future episodes. Welcome to the 13th episode of Cyber Security America, where we delve into the challenges and issues related to managing up and cultivating the complex relationship between the Chief Information Officer (CIO), Chief Information Security Officer (CISO), and the Board of …
…
continue reading

1
Security Operations: Hybrid SOC Delivery & Maturity
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Tune in to episode 12 of Cyber Security America, airing live on Tuesdays at Noon ET on VoiceAmerica. In this week's discussion, we will continue the conversation from the previous episode and delve deeper into the topic of Security Operations Center (SOC) delivery models. Join Josh and special guest, Mr. Paul Dwyer, as they explore the best practic…
…
continue reading

1
Diversity & Inclusion: Women in Cyber - New Path Forward
56:32
56:32
Play later
Play later
Lists
Like
Liked
56:32The Untold History of Women in Cyber Security. In this new episode, we hear from women who are leading cyber defense teams, developing cutting-edge technology, and driving innovation in the cyber security field. They will share their stories, the challenges they have faced, and how they met them head on. We also discuss how the cyber security indus…
…
continue reading

1
Cyber Risk Management: Identity & Access Mgt (IAM)
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13In the 10th episode of Cyber Security America, we delve into the crucial field of Identity & Access Management (IAM). We discuss how identities, access rights, and permissions all play a crucial role in providing secure access to data and applications across multiple ecosystems. Our guest Rakesh, a cybersecurity leader with over 18 years of experie…
…
continue reading

1
Building a Cybersecurity Career: The Journey to CISO
1:01:38
1:01:38
Play later
Play later
Lists
Like
Liked
1:01:38Join us for the 9th episode of Cyber Security America as we explore the journey of a cybersecurity professional who climbed the ranks from junior Cybersecurity consultant to the coveted position of Chief Information Security Officer (CISO). Our guest, Josh, shares his experience of working as a consultant at EY and ultimately leading the cybersecur…
…
continue reading

1
Cyber Control Testing: New Purple Teaming Revolution
59:15
59:15
Play later
Play later
Lists
Like
Liked
59:15The landscape of cyber security threats is evolving, and with it, so are the methods of penetration testing and control validation. Sophisticated organizations now use a continuous purple-teaming methodology that combines offensive testers (Red Teamers) with Cyber Defenders (Blue Teamers) to identify blind spots in their Detection & Response (D&R) …
…
continue reading

1
Threat Mitigation: Attack Surface Reduction (ASR) paradigm shift
55:00
55:00
Play later
Play later
Lists
Like
Liked
55:00Join us for an engaging and thought-provoking episode of Cyber Security America, as we delve into the crucial topic of The Confusion Between Attack Surface Reduction (ASR) and Vulnerability Management (VM). Our expert guest, Jason Nordquist and Ken Gonzales, share their insights on the current state of cybersecurity and the challenges faced by orga…
…
continue reading

1
Threat Detection & Analytics: Best Practices for Improved Visibility and Response
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Protecting what you don't know about is impossible, and detecting unseen threats is equally challenging. In this episode, we delve into Threat Detection & Analytics, discussing the best practices for structuring a program, utilizing effective tools and techniques, and improving an organization's visibility, threat detection, and response capabiliti…
…
continue reading

1
What Makes A Good Threat Intelligence Program In 2023?
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09In the world of Cyber Security, an essential component needed in the fight is a mature Threat Intelligence program tied to a strong Attack Surface Reduction (ASR) function. In this episode. We explore the world of Cyber Intelligence in the enterprise and in small business environments. We will learn from former military, intelligence, and NSA analy…
…
continue reading

1
2022 Cyber Threats: Security Vulnerabilities & Major Impacts
1:12:55
1:12:55
Play later
Play later
Lists
Like
Liked
1:12:55This year there has been a tsunami of security vulnerabilities and events that have caused major impact to governments and corporations around the world. We will focus on major security threats and how security programs adapted and responded. Real world accounts from cyber–Incident responders and threat analysts on what worked, what didn't, and les…
…
continue reading