Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy. We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives. Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you ...
…
continue reading
We reconnect with Richard Stiennon to chart how AI is rewriting cybersecurity, from the rise of 290 AI security vendors to SOC automation, investor momentum, and the criteria that separate true AI players from marketing. • Explosion of AI security vendors since late 2022 • Criteria for defining AI-first cybersecurity companies • Investor appetite, …
…
continue reading
In this clip, Karl Mosgofian breaks down why most vendor pitches lose buyers in the first minutes and how to fix it with a simple, direct first-meeting flow. We show how to validate pain fast, lead with what you built, and make differentiation tangible so a champion can emerge. • One-slide pain validation with a quick head nod • Skip the long probl…
…
continue reading
We explore how to sell to CIOs who are flooded with pitches yet hungry for real innovation, and how sellers can move from vague benefits to clear outcomes and CFO-ready cases. Carl Mosgofian shares how to frame differentiation, map to the stack, and help champions win internal approval. • CIO and CISO partnership realities and reporting nuance • Ve…
…
continue reading
We unpack how a failed “AI Rapture” spread from a viral prophecy to AI‑stamped pamphlets and sycophantic chatbots, and we trace the feedback loops that keep bad ideas alive. Along the way, we compare models, costs, and trade‑offs, and ask what real discernment looks like at work and online. • origins of the rapture rumor and AI‑branded pamphlet • s…
…
continue reading
Josh Bruyning welcomes Rafael Ramirez to discuss communicating AI concepts, building community in cybersecurity, and navigating the tech industry as an immigrant. Rafael has almost 30,000 followers on LinkedIn. The conversation reveals practical strategies for explaining complex technologies to non-technical audiences and developing genuine profess…
…
continue reading
In this conversation, Joshua Bruyning engages with DataTribe Managing Directors Rob Ackerman and Leo Scott to explore the intricate dynamics of cybersecurity startups and venture capital. They discuss the essential qualities of successful founders, the importance of coachability, and the unique challenges faced in the cybersecurity landscape. The c…
…
continue reading
In this episode of Cybernomics, Al Kennickell joins me to discuss the importance of embracing AI in small and medium businesses, addressing common misconceptions and hesitations surrounding its use. We emphasize that many negative opinions about AI stem from a lack of understanding and experience. Our discussion highlights practical applications of…
…
continue reading
Charles Payne and Olivia Phillips join us to explore the evolving relationship between CISOs and BISOs, examining how business-focused security leadership is transforming cybersecurity from a technical function to a strategic business enabler. • BISOs serve as the "Swiss army knife" of the CISO, bringing deeper business knowledge to security decisi…
…
continue reading
We explore organizational theory applications to AI agents and examine the transformation of Security Operations Centers through artificial intelligence solutions. • Traditional organizational structures like military-style hierarchies are being applied to AI agent systems in cybersecurity • Matrix organizations with multiple reporting lines have p…
…
continue reading
Josh Bruyning and Richard Stiennon explore how AI agents are fundamentally changing the SaaS industry and traditional software models. They discuss the shift from feature-based to outcome-based solutions and why companies must adapt to survive. • Richard Stiennon shares insights about Security Yearbook 2025 and IT Harvest's database tracking over 4…
…
continue reading
EU's complex regulatory environment creates both challenges and opportunities for businesses navigating data privacy, financial services, and healthcare regulations across member states. • Significant differences exist between EU-wide regulations and country-specific implementations • Large companies like Meta and Uber have faced multi-million Euro…
…
continue reading
Marcus Peet, Senior Director of Information Security at PT Solutions, shares his unique perspective as both a cybersecurity expert and father of three on navigating the complex world of digital parenting. His "growth with guardrails" philosophy demonstrates how parents can protect their children online while allowing them the freedom to develop nec…
…
continue reading
Kyle and I dive into the reality of the RSA Conference experience, exploring how the security industry's biggest event has transformed into a vendor-dominated spectacle with declining CISO attendance. • The conference atmosphere is overwhelmingly loud with vendors everywhere and marketing materials covering every available surface • San Francisco c…
…
continue reading
AI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investment landscape reflects this shift, with 78% of venture capital reportedly flowing into AI companies despit…
…
continue reading
Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide. Beyond just modernizing paperwork, Dean reveals why attorneys have become prime targets for sophisticated hackers and nation-states. …
…
continue reading
In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027. • SOC automation represents the most imme…
…
continue reading
Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires both leadership commitment and proper resource allocation to overcome the natural friction between IT and s…
…
continue reading
Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than just a cost center. • Most companies don't need to hire a full security team – outsourcing cybersecurity …
…
continue reading
1
Market Watch: When Markets Fall, Savvy Investors Go Shopping for Cybersecurity Companies, with Richard Stiennon
41:31
Market fluctuations cause cybersecurity stocks to drop 4-7%, creating buying opportunities for savvy investors despite fears surrounding Trump's new tariff policies. • Tariff impacts vary across cybersecurity companies—hardware manufacturers like Palo Alto and Fortinet face direct challenges with 54% tariffs on Chinese-made equipment • Current tari…
…
continue reading
The extraordinary success of Israeli cybersecurity companies on the global stage represents a fascinating case study in how a small nation can dominate a critical technology sector. Despite having just 9 million citizens, Israel has become the world's second-largest hub for cybersecurity innovation, home to over 450 security startups that collectiv…
…
continue reading
Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagnosed using a medical device, Christian dedicated his career to ensuring these life-saving technologies rem…
…
continue reading
We explore the emergence of a new AI-driven economy that's creating unprecedented opportunities for entrepreneurs and businesses of all sizes to compete at enterprise levels with minimal resources. • AI represents the most significant technological advancement since the wheel, democratizing powerful capabilities previously available only to large c…
…
continue reading
Google makes a monumental $32 billion acquisition of cloud security leader Wiz, marking one of the largest cybersecurity acquisitions in history after previously attempting to purchase the company for $23 billion last year. • Wiz offers simple cloud security deployment that provides immediate visibility into cloud environments • Founded by a team t…
…
continue reading
1
Cyber Acquisitions #1 - Armis x OTORIO, ForcePoint x GetVisibility, CyberGuru x Mantra SAS - Niche is King (Right Now)
5:47
The cybersecurity industry is undergoing rapid consolidation as established companies expand their capabilities through strategic acquisitions rather than internal development. Three major acquisitions in March 2025 highlight key trends: the growing importance of securing operational technology, the central role of AI in data security, and the cont…
…
continue reading
In this episode, we explore the intricate relationship between risk management and business objectives, specifically tailored for small and medium-sized businesses. Chad Boeckmann discusses strategies to elevate cybersecurity risk awareness among executive leadership, the role of cyber insurance, and the importance of bridging the gap between secur…
…
continue reading
In this episode of Cybernomics, Josh Bruyning and Kyle Bhiro discuss the hidden costs associated with vulnerability management in cybersecurity. They explore the importance of understanding these costs, the role of AI in improving efficiency, and the necessity of human oversight in security operations. The conversation also touches on the concept o…
…
continue reading
1
The Hidden Costs of Regulating Cybersecurity and AI Privacy
1:02:04
1:02:04
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:02:04On this episode of Cybernomics, Josh explores the Hidden Costs of Cybersecurity Regulations and conducts a cost-benefit analysis with Michael Nouguier, CISO at Richey May, and our guest co-host, Igor Volovich, former CISO at Invensys and Schneider Electric. Hidden Costs of Regulating Cybersecurity: Compliance costs (audits, certifications, and tech…
…
continue reading
Greg and Josh pull back the curtain on the pitfalls and strategic voids left by frequent CISO transitions, which can leave companies vulnerable and scrambling for continuity. We shed light on the arduous onboarding process new CISOs face, taking months to assess existing security frameworks and the ripple effects this delay has on strategic initiat…
…
continue reading
Authenticity emerges as a vital theme in our latest episode, showcasing how being true to oneself can create more genuine connections in cybersecurity and beyond. Mel "Fireball" Reyes shares his personal journey of embracing authenticity and its significant impact on audience engagement, trust, and organizational culture. • Discussion on the need f…
…
continue reading
This episode explores the transformative role of automation in cybersecurity through Cyngular Security's innovative approach. By focusing on Cloud Investigation and Response Automation (CIRA), we discuss how this technology alleviates alert fatigue, reduces burnout among analysts, and empowers teams to enhance their security efforts. • Cyngular Sec…
…
continue reading
Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independ…
…
continue reading
Unlock the secrets of API security with our esteemed guest, Randolph Barr, the new Chief Information Security Officer at Cequence Security. With a stellar career spanning companies like Zoom, Qualys, Cisco, and Webex, Randy is the perfect guide to navigate the complexities of the digital world. We explore the innovative strategies Sequence Security…
…
continue reading
In this episode of Cybernomics (formerly Security Market Watch), host Josh Bruyning engages with Ian Poynter, founder of Kalahari Security, to explore the economics of cybersecurity. They discuss the challenges of selling security solutions, the importance of understanding business needs, and the inadequacy of mere sympathy in the face of security …
…
continue reading
Buchi Reddy, CEO and founder of Levo AI, shares his unique immigrant story and the journey that led him to start his own cybersecurity company. Levo AI focuses on API security and helps enterprises protect their digital footprint and applications using AI. Buchi discusses the challenges he faced as an immigrant and the importance of mentors and ski…
…
continue reading
Dov Yoran, co-founder and CEO of Command Zero, shares his journey in the cybersecurity industry and the mission of his company. The conversation covers topics such as the category Command Zero falls into, the problem they are solving, the challenges of being an entrepreneur, and the importance of teamwork. Dov emphasizes the need to keep driving fo…
…
continue reading
In this conversation, Josh Bruyning interviews Randy Blasik, the CTO and co-founder of ComplianceAide, about his journey as an AI bro and the use of generative AI in building his company. They discuss the power and potential of generative AI, the challenges of bringing a product like Compliance Aid to market, and the skepticism and misconceptions s…
…
continue reading
What happens when 75% of Chief Information Security Officers contemplate leaving their jobs? In this compelling episode of Security Market Watch, we engage with Matt Webster, CEO and CISO at Cyvergence, to tackle this critical issue head-on. With his extensive background as a former CISO, Matt sheds light on the alarming turnover rates in the indus…
…
continue reading
Join us as Tina unpacks the challenges and triumphs of transitioning from a service-based to a product-based business. From navigating the complexities of venture capital to balancing technical oversight with strategic planning, Tina's experiences offer invaluable lessons for aspiring entrepreneurs. She highlights the critical importance of a stron…
…
continue reading
Discover the intriguing parallel worlds of cyber security and finance as we navigate through compelling discussions with our distinguished guest, Igor Volovich. Promising to equip you with a nuanced understanding of the convergence of risk and compliance, we catapult into the breach of SolarWinds and the ensuing SEC charges. With Igor's expert insi…
…
continue reading
Ready for a crash course in cybersecurity? Grab your note-taking tools and join us for a riveting conversation with the esteemed Dr. Nikki Robinson, the trailblazing STSM and lead architect at IBM, and a Cybersecurity Influencer of the Year. Armed with a wealth of knowledge and insights, Dr. Robinson guides us through the labyrinth of vulnerability…
…
continue reading
Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work o…
…
continue reading
Are you ready to unravel the mysteries of cybersecurity and exploit prediction? We're joined by our esteemed guest, Jay Jacobs. Today's episode promises to be a thrilling ride into the world of data insecurity as we welcome the innovator behind the groundbreaking EPSS (exploit prediction scoring system). This ingenious machine learning model, launc…
…
continue reading
Today's guest, Charles Payne, brings a unique perspective to cybersecurity with his background in finance, his current roles as CISO and CTO at Neptune Media, and his experiences as an angel investor. Charles shines a light on his transition from finance to cybersecurity, unraveling how his technical knowledge has given him a unique perspective on …
…
continue reading
Get set for a mind-expanding journey as we navigate the intriguing world of AI and blockchain with our special guest, Jonathan Capriola, the innovative CEO and founder of AI Blockchain Ventures. Jonathan, a best-selling author, successful entrepreneur, and futurist, captivates with his unique perspective on the rapidly evolving world of technology.…
…
continue reading
Dubbed the Oprah of Cybersecurity and the Cybersecurity Social Media Queen, Dana Mantilia joins us for an exhilarating journey into the world of cybersecurity. Starting from zero just four years ago, Dana has since built a notable presence on LinkedIn and YouTube with her accessible approach to educating the everyday person about cybersecurity. The…
…
continue reading
Ready to get your mind blown by the intriguing world of policy orchestration? Gain a whole new perspective as we dissect this cutting-edge concept alongside Gerry Geble from Strata. Gerry introduces us to the fascinating world of identity query language (IDQL) - a revolutionary approach to defining access rules and policies. Come along on this invi…
…
continue reading
Are you ready to unlock the secrets of API security? Today, we've got a thrilling dialogue with Ameya Talwalkar and Varun Kohli from Cequence, a cybersecurity firm that's been securing APIs for prominent financial institutions and Fortune 500 companies for nearly a decade. In a world where 80% of internet traffic is API-related, our conversation co…
…
continue reading
Get ready for an enlightening exchange with seasoned industry expert, Richard Stiennon, as he uncovers the secrets behind his successful journey in the security ecosystem. Richard, the mastermind behind IT-Harvest, offers exclusive insights into the creation and operations of a data-driven analyst product that stands in contrast to Gartner as a bea…
…
continue reading
We're thrilled to welcome Mark Dorsi, CISO at Netlify, to our show for a deep dive into the complexities of startup maturity and the vital role of security practice. Mark spills the secrets on transitioning startups from early stages to full maturity, and the different types of exits that companies can pursue. He offers his invaluable perspective o…
…
continue reading
Are you ready to understand the vital role of disaster recovery planning and the importance of cybersecurity in today's digital age? Join hosts Maggie Dillon and Josh as they sit down with Jack Bensimon, who walks us through a disaster recovery manual in a way that's easy to grasp. Jack helps us understand the necessity of preparing for potential d…
…
continue reading