Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what’s happening in the tech space — from startups to industry leaders, emerging tech, and what’s ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
…
continue reading
The Futurum Group Podcasts
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Yuval Boger, Chief Commercial Officer at QuEra, hosts thought leaders in quantum computing, quantum sensing, and quantum communications to discuss business and technical aspects that impact the quantum ecosystem. Full transcripts are available at podcast.yboger.com
…
continue reading

1
Marsh's Sjaak Schouteren on the Golden Rule of Risk Assessment
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28Cyber insurance has transformed from a liability-focused niche product into a comprehensive business continuity tool, but widespread misconceptions continue to prevent organizations from maximizing its strategic value. Sjaak Schouteren, Cyber Growth Leader - Europe at Marsh, offers David how they combine risk quantification with business-focused co…
…
continue reading

1
Cisco quantum networking with Vijoy Pandey and Reza Nejabati
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23Vijoy Pandey, who leads Cisco’s Outshift incubation group, and Reza Nejabati, Cisco’s head of quantum research, are interviewed by Yuval Boger. They discuss Cisco’s strategy to enable distributed quantum computing and a future “quantum internet.” Vijoy and Reza explain why Cisco won’t build QPUs, focusing instead on room-temperature, telecom-band e…
…
continue reading

1
SIG's Rob van der Veer on Why "Starting Small" with AI Security Might Fail
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01What happens when someone who's been building AI systems for 33 years confronts the security chaos of today's AI boom? Rob van der Veer, Chief AI Officer at Software Improvement Group (SIG), spotlights how organizations are making critical mistakes by starting small with AI security — exactly the opposite of what they should do. From his early work…
…
continue reading

1
Vigilocity's Karim Hijazi on Supply Chain Threat Intelligence
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Karim Hijazi’s approach to threat hunting challenges conventional wisdom about endpoint security by proving that some of the most critical intelligence exists outside organizational networks. As Founder & CEO of Vigilocity, his 30-year journey from the legendary Mariposa botnet investigation to building external monitoring capabilities demonstrates…
…
continue reading

1
Bert de Jong, Director of the Quantum Systems Accelerator (QSA) at Berkeley Lab
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Bert de Jong, Director of the Quantum Systems Accelerator (QSA) at Berkeley Lab, is interviewed by Yuval Boger. Bert describes how the center develops superconducting, trapped-ion, and neutral-atom technologies in parallel, and the importance of certification in verifying quantum computations. They discuss the roadmap for integrating quantum into H…
…
continue reading

1
CyberHoot's Craig Taylor on Why Fear-Based Phishing Training Fails
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Psychology beats punishment when building human firewalls. Craig Taylor, CEO & Co-founder of CyberHoot, brings 30 years of cybersecurity experience and a psychology background to challenge the industry's fear-based training approach. His methodology replaces "gotcha" phishing simulations with positive reinforcement systems that teach users to ident…
…
continue reading

1
The Futurum Group's Fernando Montenegro on the OODA Loop Approach to Security Strategy
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04What happens when you apply economic principles like opportunity cost and comparative advantage to cybersecurity decision-making? Fernando Montenegro, VP & Practice Lead of Cybersecurity at The Futurum Group, demonstrates how viewing security through an economics lens reveals critical blind spots most practitioners miss. His approach transforms how…
…
continue reading

1
Sebastian Weidt, CEO and co-founder of Universal Quantum
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57Sebastian Weidt, CEO and co-founder of Universal Quantum, is interviewed by Yuval Boger. They discuss his company’s unique approach to building scalable trapped-ion quantum computers. Sebastian explains how Universal Quantum focuses on overcoming key scaling challenges—such as error-free modular connections, laser-free control, and integrated elect…
…
continue reading

1
T. Rowe Price’s PJ Asghari’s "What, So What, Now What" Framework for Threat Intel
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34What does it take to transform a traditional event-driven SOC into an intelligence-driven operation that actually moves the needle? At T. Rowe Price, it meant abandoning the "spray and pray" approach to threat detection and building a systematic framework that prioritizes threats based on actual business risk rather than industry hype. PJ Asghari, …
…
continue reading

1
Transcend's Aimee Cardwell on Turning Security into a Growth Driver
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Most security leaders position themselves as guardians against risk, but Aimee Cardwell, CISO in Residence at Transcend and Board Member at WEX, built her reputation on a different approach: balancing risk to accelerate business growth. Her unconventional path from Fortune 5 CIO to CISO of a 1,200-person security team at UnitedHealth Group showcase…
…
continue reading

1
Scott Buchholz, Global Quantum Computing Lead, Deloitte
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56Scott Buchholz, global leader for Deloitte Consulting's quantum computing efforts, is interviewed by Yuval Boger. Scott explains how Deloitte helps clients understand quantum technology and its potential applications, particularly in solving business problems. They discuss the timelines for quantum computing becoming commercially useful, referencin…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Criminal Business Models
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the intersection of cybercrime and legitimate business, where his team's human intelligence gathering in Dark Web communities provides early warning systems tha…
…
continue reading

1
McAfee's Manisha Agarwal-Shah on Testing Ransomware Plans Before You Need Them
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Most security leaders are fighting yesterday's ransomware war while today's attackers have moved to data exfiltration and reputation destruction. Manisha Agarwal-Shah, Deputy CISO at McAfee, brings 18 years of cybersecurity experience from consulting through AWS to explore why traditional ransomware defenses miss the mark against modern threat acto…
…
continue reading

1
Tal David, Co-Founder and CEO, Quantum Art
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02Yuval Boger interviews Tal David, CEO and co-founder of Quantum Art, a quantum computing company based in Israel focused on full-stack quantum computing with trapped ions. They discuss Quantum Art's unique architecture, which emphasizes sophisticated multi-qubit gate operations, optical tweezers for segmenting ion chains, and dynamic reconfigurabil…
…
continue reading

1
Team Cymru's Threat Researchers on Operation Endgame Intelligence
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Team Cymru's threat researchers have spent years developing an almost psychological understanding of cybercriminals, tracking their behavioral patterns alongside technical infrastructure to predict where attacks will emerge before they happen. Josh and Abigail share with David how their multi-year tracking of Russian cybercrime groups enabled criti…
…
continue reading
Scott Genin, Vice President of Materials Discovery at OTI Lumionics, is interviewed by Yuval Boger. Scott outlines his role in overseeing materials design and simulation programs, focusing on OLEDs and cathode patterning materials. He highlights OTI's growth and its strategic integration of quantum-inspired methods due to current limitations in qua…
…
continue reading

1
Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech comp…
…
continue reading

1
Preeti Chalsani and Harley Johnson, Illinois Quantum and Microelectronics Park
34:38
34:38
Play later
Play later
Lists
Like
Liked
34:38Preeti Chalsani, Chief Quantum Officer at Intersect Illinois, and Harley Johnson, CEO of the Illinois Quantum and Microelectronics Park, are interviewed by Yuval Boger. Preeti and Harley discuss the rapid creation and ambitious goals of the IQMP, a state-backed initiative to support the scale-up of quantum computing and microelectronics. They talk …
…
continue reading

1
Digital Turbine's Vivek Menon on AI Acceleration vs Attack Expansion
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16The security industry's obsession with cutting-edge threats often overshadows a more pressing reality: the vast majority of organizations are still mastering basic AI implementation. Vivek Menon, CISO & Head of Data at Digital Turbine, brings his insights from the RSA expo floor to share why the agentic AI security rush may be premature, while high…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading

1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading

1
GigaOm’s Howard Holton on Why AI Will Be the OS of Security Work
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43The cybersecurity industry has witnessed numerous technology waves, but AI's integration at RSA 2025 signals something different from past hype cycles. Howard Holton, Chief Technology Officer at GigaOm, observed AI adoption across virtually every vendor booth, yet argues this represents genuine transformation rather than superficial marketing. His …
…
continue reading

1
Online Business Systems' Jeff Man on PCI 4.0's Impact
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31The cybersecurity industry has long operated on fear-based selling and vendor promises that rarely align with practical implementation needs. Jeff Man, Sr. Information Security Evangelist at Online Business Systems, brings a pragmatic perspective after years of navigating compliance requirements and advising organizations from Fortune 100 enterpris…
…
continue reading

1
Planckian: Michele Dallari, co-founder and CEO, and Marco Polini, co-founder
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Michele Dallari, co-founder and CEO, and Marco Polini, co-founder, of Planckian, are interviewed by Yuval Boger. Michele and Marco talk about their company’s novel superconducting chip architecture, which uses global control and always-on ZZ interactions to drastically reduce wiring complexity and improve scalability. They discuss the advantages of…
…
continue reading

1
Trellix's John Fokker on Why Ransomware Groups Are Fragmenting
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51The criminal underground is experiencing its own version of startup disruption, with massive ransomware-as-a-service operations fragmenting into smaller, more agile groups that operate like independent businesses. John Fokker, Head of Threat Intelligence at Trellix, brings unique insights from monitoring hundreds of millions of global sensors, reve…
…
continue reading

1
Frost & Sullivan's Martin Naydenov on AI's Cybersecurity Trust Gap
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14In this special RSA episode of Future of Threat Intelligence, Martin Naydenov, Industry Principal of Cybersecurity at Frost & Sullivan, offers a sobering perspective on the disconnect between AI marketing and implementation. While the expo floor buzzes with "AI-enabled" security solutions, Martin cautions that many security teams remain reluctant t…
…
continue reading

1
Unspoken Security’s AJ Nash on Protecting Against AI Model Poisoning
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32In our latest episode of The Future of Threat Intelligence, recorded at RSA Conference 2025, AJ Nash, Founder & CEO, Unspoken Security, provides a sobering assessment of AI's transformation of cybersecurity. Rather than focusing solely on hype, AJ examines the double-edged nature of AI adoption: how it simultaneously empowers defenders while dramat…
…
continue reading

1
Cyware’s Jawahar Sivasankaran on Automating Threat-Centric Operations
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53In this special RSA 2025 episode of The Future of Threat Intelligence, David speaks with Jawahar Sivasankaran, President of Cyware, about their partnership with Team Cymru to democratize threat intelligence. Jawahar outlines how their CTI program in a box approach enables organizations to implement comprehensive threat intelligence capabilities in …
…
continue reading

1
Romana Schirhagl, co-founder, and Deepak Veeregowda, CEO of QT Sense
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30Romana Schirhagl, co-founder, and Deepak Veeregowda, CEO of QT Sense, are interviewed by Yuval Boger. QT Sense develops quantum sensing technology using NV center sensors in nanodiamonds for biomedical applications. Romana explains how their technology measures magnetic noise from free radicals inside cells, indicating cellular stress, similar to a…
…
continue reading

1
Rapid7’s Lonnie Best on Measuring SOC Success Beyond Alert Closures
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In a world obsessed with cutting-edge security technology, Lonnie Best, Senior Manager of Detection & Response Services at Rapid7, makes a compelling case for mastering the fundamentals. After transitioning from craft beer journalism through nuclear security to cybersecurity, Lonnie witnessed the evolution of ransomware attacks from "spray and pray…
…
continue reading