Cyber risk touches legal obligations, operational priorities, and even geopolitical decisions. This episode explores a consulting model that puts business understanding first—and builds security around it.
Access Roulette: How to Stop Betting Your Security on Standing Privileges | A Brand Story with Ofir Stein, CTO and Co-Founder of Apono | A Black Hat USA 2025 Conference On Location Brand Story
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story
Ransomware groups are increasingly abandoning file encryption in favor of high-value data theft, using extortion to extract massive payouts while avoiding the spotlight. This conversation reveals who they target, how they operate, and what organizations can do to shut down their most exploitable weaknesses.
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | A Brand Story with Deidre Diamond, CEO of CyberSN, and Carraig Stanwyck | A Black Hat USA 2025 On Location Brand Story
This episode shifts the conversation from technology to the people powering cybersecurity success, revealing how workforce risk management transforms retention, alignment, and operational efficiency. Discover how real-time visibility into capabilities and roles empowers leaders to make smarter staffing decisions, strengthen budgets, and keep teams fulfilled.
How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Brand Story with Mike Wayne, VP, Global Sales at BlinkOps | A Black Hat USA 2025 On Location Brand Story
AI-powered micro agents are enabling organizations to automate targeted tasks quickly and reliably, reducing manual work and accelerating response times in security and beyond. This conversation reveals how a platform approach can extend automation benefits from SOCs to every corner of the enterprise.
Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chief Trust Officer at ReversingLabs | A Black Hat USA 2025 On Location Brand Story
Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.
Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity
The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Brand Story with HD Moore, Founder and CEO of RunZero | Black Hat USA 2025 Coverage
When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI
As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).
The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with Bimal Sheth and Vincent Bennekers
What makes a security certification actually reliable—and how do you measure that value over time? In this episode, HITRUST shares findings from their 2025 Trust Report, revealing how real-world threat data, quality assurance, and continuous validation are reshaping the way organizations—and their partners—view risk, resilience, and trust.
Building a Dynamic Framework for Cyber Risk and Control Alignment: A Threat-Adaptive Approach to Cybersecurity Readiness | A HITRUST Brand Story with Michael Moore
Cybersecurity assessments can’t be one-and-done—and they can’t rely on outdated frameworks. This episode explores how a threat-adaptive model helps organizations stay in sync with real-world attacks by aligning assessments to live data, enabling more accurate control scoping, better boardroom conversations, and stronger third-party assurance.
From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An infosecurity Europe 2025 Conference On Location Brand Story
Reaching Human Equivalency with Agentic AI: A Real-World Look at Security Outcomes | An eSentire Brand Story With Dustin Hillard
What does it really take to stop a cyberattack before it spreads—and can AI truly help without sidelining human judgment? In this episode, eSentire CTO Dustin Hillard shares how his team has spent years applying machine learning, artificial intelligence, and now agentic AI to supercharge security investigations, helping analysts contain threats faster while maintaining transparency, control, and trust.
From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story
Jim Manico shares how his decades of secure coding experience are shaping a new era of AI-assisted development, revealing both the risks of insecure code generation and the potential to teach AI to do better. From developer training to launching the AISVS project, this episode highlights a personal and professional journey at the forefront of application security innovation.
Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story
Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay ahead of adversaries, this conversation is for you.
From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story
Charles Henderson of Coalfire shares how cybersecurity programs can become more impactful by moving beyond tactical testing and toward coordinated, threat-driven operations that tell a complete story—from red teaming to executive reporting. He also reflects on the human side of the industry, from musical creativity to hacker culture, and why nurturing talent is key to long-term success.
Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story
Mark Manzano, General Manager of Cybersecurity at SandboxAQ, shares how his team is tackling the urgent challenges of quantum-era cryptography and the explosion of AI agents across enterprise environments. From real-time cryptographic agility to continuous non-human identity management, this episode reveals how organizations can modernize security before it’s too late.
From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story
Rob Allen, Chief Product Officer at ThreatLocker, shares how organizations can move from theory to action with Zero Trust by starting with visibility and enforcing practical controls that actually work. This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder—without making yours more complex.