Future of Cyber Risk Podcast
1) State CISOs on Why Cyberattacks Against 1 State Attack All of America
Michael Moore, CISO for the Secretary of State of Arizona's office, explains how he acts as a virtual CISO for all 15 counties by conducting physical security assessments at election facilities and pr...Show More
2) Safebooks AI’s Ahikam Kaufman on Why CFOs Need Company-Specific AI Models for Fraud Detection
Unlike CISOs who work with consistent vulnerabilities across cloud environments, CFOs face company-specific financial processes that change constantly, making automation historically complex to solve ...Show More
3) Marsh's Sjaak Schouteren on the Golden Rule of Risk Assessment
Cyber insurance has transformed from a liability-focused niche product into a comprehensive business continuity tool, but widespread misconceptions continue to prevent organizations from maximizing it...Show More
4) SIG's Rob van der Veer on Why "Starting Small" with AI Security Might Fail
What happens when someone who's been building AI systems for 33 years confronts the security chaos of today's AI boom? Rob van der Veer, Chief AI Officer at Software Improvement Group (SIG), spotlight...Show More
SIG's Rob van der Veer on Why "Starting Small" with AI Security Might Fail
34:01 | Sep 11th, 2025
5) Vigilocity's Karim Hijazi on Supply Chain Threat Intelligence
Karim Hijazi’s approach to threat hunting challenges conventional wisdom about endpoint security by proving that some of the most critical intelligence exists outside organizational networks. As Found...Show More
6) CyberHoot's Craig Taylor on Why Fear-Based Phishing Training Fails
Psychology beats punishment when building human firewalls. Craig Taylor, CEO & Co-founder of CyberHoot, brings 30 years of cybersecurity experience and a psychology background to challenge the industr...Show More
7) The Futurum Group's Fernando Montenegro on the OODA Loop Approach to Security Strategy
What happens when you apply economic principles like opportunity cost and comparative advantage to cybersecurity decision-making? Fernando Montenegro, VP & Practice Lead of Cybersecurity at The Futuru...Show More
8) T. Rowe Price’s PJ Asghari’s "What, So What, Now What" Framework for Threat Intel
What does it take to transform a traditional event-driven SOC into an intelligence-driven operation that actually moves the needle? At T. Rowe Price, it meant abandoning the "spray and pray" approach ...Show More
T. Rowe Price’s PJ Asghari’s "What, So What, Now What" Framework for Threat Intel
25:34 | Aug 14th, 2025
9) Transcend's Aimee Cardwell on Turning Security into a Growth Driver
Most security leaders position themselves as guardians against risk, but Aimee Cardwell, CISO in Residence at Transcend and Board Member at WEX, built her reputation on a different approach: balancing...Show More
10) Digital Asset Redemption's Steve Baer on Criminal Business Models
The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the inters...Show More