Show overview
Cyber Security America has been publishing since 2023, and across the 3 years since has built a catalogue of 53 episodes. That works out to roughly 45 hours of audio in total. Releases follow a monthly cadence, with the show now in its 2nd season.
Episodes typically run thirty-five to sixty minutes — most land between 48 min and 59 min — and the run-time is fairly consistent across the catalogue. None of the episodes are flagged explicit by the publisher. It is catalogued as a EN-language Technology show.
The show is actively publishing — the most recent episode landed 1 weeks ago, with 5 episodes already out so far this year. The busiest year was 2023, with 29 episodes published. Published by Joshua R Nicholson.
From the publisher
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America with your host Joshua Nicholson. You'll learn what it's like running cyber security operations teams inside some of the world's largest companies. It's a cyber backstage pass and real world advice for cyber defenders, CISOs, and security professionals.
Latest Episodes
View all 53 episodesHow Ad Fraud Drains $160 B Annually - Rich Khan & Joshua R Nicholson
S2 Ep 52The hidden talent pool in Kathmandu, Nepal that is transforming cybersecurity.
Discover how a Nepali American founder turned a personal frustration with security questionnaires into a rapidly growing AI-driven platform revolutionizing enterprise compliance. Pukar Hamal, CEO of Security Pal, reveals the untold story behind building one of the fastest-growing cybersecurity tools trusted by OpenAI, Figma, and Snapchat — and how Kathmandu's overlooked talent pool is shaping the future of cybersecurity innovation. In this explosive episode, you'll learn how Security Pal slashes the time to respond to complex security questionnaires from months to hours — transforming a tedious regulatory burden into a strategic advantage. Pukar shares his unique journey from a startup co-founder to a Silicon Valley CEO, highlighting the paradox of building trust in enterprise security while fighting misinformation and AI hallucinations. We break down specific techniques that will empower CISOs and security teams: how to leverage AI for continuous vendor monitoring, how to identify hidden risks through dynamic questionnaires, and how to use data-driven insights to propel security into a growth enabler. You'll discover how Security Pal's AI doesn't just automate answers — it predicts vulnerabilities, surfaces gaps, and helps companies stay ahead of technological and regulatory curves. Why is understanding the evolving security landscape critical right now? Because the traditional questionnaire isn't going away — instead, it's becoming the backbone of risk management that, if mastered, unlocks faster deal cycles, stronger compliance, and market differentiation. Next-generation security leaders can harness these insights to anticipate threats, streamline vendor assessments, and turn compliance from a bottleneck into a business booster. Perfect for security executives, compliance officers, and tech founders ready to harness AI's potential at scale — this episode unveils the future of cybersecurity at the intersection of talent, technology, and global opportunity. Whether you're navigating third-party risks or seeking competitive edge, you'll walk away with actionable strategies to elevate your security game in a fast-changing world. Join Pukar Hamal for a behind-the-scenes look at how AI, overlooked talent pools, and strategic insights are redefining what's possible in enterprise security. Don't miss this chance to learn from an innovator who's transforming the industry, one questionnaire at a time. www.darkstack7.com
S2 Ep 51From Startup to Scale-Up: Building Cybersecurity Companies with Ondefend & CyberSurv
In this episode of the Cyber Security America Podcast, host Joshua R Nicholson sits down with Chris Freedman, CEO of Ondefend, and Ron Frechette, CEO of CyberSurv, for a deep dive into cybersecurity entrepreneurship. Both guests share their journeys building companies in the cybersecurity space—from early startup challenges to scaling services, building strong company cultures, and navigating the rapidly evolving role of artificial intelligence in security. Chris discusses how Ondefend identified an opportunity on the preventative side of cybersecurity, focusing on red teaming, vulnerability discovery, and proactive security testing rather than crowded monitoring and incident response markets. Ron shares his path from executive search into cybersecurity during the early days of HIPAA compliance and how that experience eventually led him to focus on helping small and mid-sized businesses improve cyber hygiene and resilience. Together, they explore what it really takes to move a cybersecurity company from zero to one—and eventually from one to scale. In This Episode Why cybersecurity remains one of the largest and fastest-growing markets The realities of launching a bootstrapped cybersecurity startup How partnerships and subcontracting helped scale early services Why culture, mission, and hiring the right people matter most How AI is transforming cybersecurity services and advisory work The growing demand for fractional CIO and fractional CISO leadership Lessons learned from scaling consulting and cybersecurity service firms Key Takeaways The hardest stage of building a company is going from zero to your first customers. Strong partnerships can accelerate growth when building credibility in cybersecurity. AI is rapidly changing how cybersecurity assessments and advisory services are delivered. Many organizations are shifting toward fractional cybersecurity leadership models to gain specialized expertise without full-time executive hires. Featured Guests Chris Freedman CEO of Ondefend Entrepreneur and cybersecurity innovator focused on proactive defense, red teaming, and security testing technologies. Ron Frechette CEO of CyberSurv Serial entrepreneur helping organizations improve cyber hygiene through AI-driven cybersecurity advisory services. 🎧 Listen now on Spotify, Apple Podcasts, or your favorite podcast platform. #Cybersecurity #InfoSec #CyberThreats #CyberDefense #RedTeam #PenTesting #IncidentResponse #CyberHygiene #DataSecurity #MDR (Managed Detection & Response). Thanks to our show sponsor Darkstack7 Cyber Defense services www.darkstack7.com.
S2 Ep 50From FBI to Google Cloud: Cybersecurity Leadership Secrets with MK Palmore.
Episode 50 — Cybersecurity Leadership Secrets with MK Palmore In this milestone episode of Cyber Security America, Joshua Nicholson sits down with Malcolm "MK" Palmore — former FBI cybersecurity executive, Naval Academy graduate, U.S. Marine, and former Director of Security at Google Cloud — for a powerful conversation on leadership, risk, and the future of cybersecurity. MK shares lessons from leading one of the FBI's largest cyber investigative teams in Silicon Valley, helping shape security strategy at Google Cloud, and advising enterprises through complex cyber risk and digital transformation challenges. This episode goes beyond technology and tools to explore what truly drives successful cybersecurity programs: leadership, decision-making, and strategic clarity. Key topics include: How top CISOs think about cyber risk and executive leadership Lessons from FBI cyber investigations and real-world breach response The evolution of Zero Trust and cloud security strategy AI, emerging threats, and the future of enterprise defense Why fractional and strategic cybersecurity leadership is reshaping the industry Communicating cyber risk effectively to boards and executives This episode is essential listening for CISOs, executives, board members, security leaders, and anyone responsible for protecting modern enterprises in an era of accelerating cyber threats. 🎧 Listen to the Cyber Security America Podcast — a cybersecurity podcast focused on real-world incident response, threat intelligence, ransomware, and security leadership. https://www.youtube.com/playlist?list=PLBl5Ef4QLoa3szw4NGDVZCY0aa1tixnsa 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-security-america/id1668216285 🎙️Spotify: https://open.spotify.com/show/3wmyUbe1TY5hNl96Q8UFFI 🎙️Instagram: https://www.instagram.com/cybersecurityamericapodcast/ 🎙️TikTok: https://www.tiktok.com/@cybersecurityamerica 🎙️X.com: https://x.com/nicholsonj7111 📱 Follow Cyber Security America for short clips and updates: 👤 Host — Joshua R. Nicholson: https://www.linkedin.com/in/joshuarnicholson/ 🎙️Cyber Security America on LinkedIn: https://www.linkedin.com/company/cyber-security-america-podcast [email protected] for show inquires, guest requests, and sponsorship discussions or collaboration ideas or contact us through our website www.darkstack7.com/contact
S2 Ep 49AI & MDR - The Future of Cyber Security Detection & Response
In episode 49 of Cyber Security America, we explore how Artificial Intelligence is reshaping cybersecurity, Managed Detection and Response (MDR), and modern security operations. As cyber threats grow more advanced, organizations must evolve from reactive defense to proactive, intelligence-driven protection. 📱 Follow Cyber Security America on Youtube for short clips and updates Featuring Woo An (CEO of Zaun.ai) and Tyler Lackey (AI Security Builder), this episode delivers real-world insight into how AI-native security platforms are improving detection, response, and operational scale across enterprise environments. We discuss: The future of MDR and AI-driven security operations How AI agents and automation are transforming incident response Shadow AI, data leakage, and governance challenges AI security risks, role-based controls, and detection engineering Scaling cybersecurity outcomes without replacing security teams Real-world enterprise lessons from AI-powered security innovation Whether you're a CISO, security leader, MDR provider, or cybersecurity professional, this episode provides practical insight into how AI is redefining cyber defense and how organizations can stay ahead of evolving threats. 🎧 Listen to the Cyber Security America Podcast — a cybersecurity podcast focused on real-world incident response, threat intelligence, ransomware, and security leadership. YouTube Playlist: https://www.youtube.com/playlist?list=PLBl5Ef4QLoa3szw4NGDVZCY0aa1tixnsa 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-security-america/id1668216285 🎙️ Spotify: https://open.spotify.com/show/3wmyUbe1TY5hNl96Q8UFFI 🎙️ Instagram: https://www.instagram.com/cybersecurityamericapodcast/ 🎙️ TikTok: https://www.tiktok.com/@cybersecurityamerica 🎙️ X (Twitter): https://x.com/nicholsonj7111 📱 Follow Cyber Security America for short clips and updates 👤 Host — Joshua R. Nicholson: https://www.linkedin.com/in/joshuarnicholson/ 🎙️ Cyber Security America on LinkedIn: https://www.linkedin.com/company/cyber-security-america-podcast 📩 For show inquiries, guest requests, sponsorship discussions, or collaboration ideas: [email protected] 🌐 Contact via website: www.darkstack7.com/contact #CyberSecurity #ArtificialIntelligence #AIinCybersecurity #MDR #ManagedDetectionAndResponse #CyberDefense #SecurityOperations #SecOps #CyberRisk #CISO #CyberLeadership #ThreatDetection #IncidentResponse #SecurityAutomation #AIsecurity #CyberThreats #EnterpriseSecurity #CyberResilience #CyberSecurityPodcast #CyberSecurityAmerica
S2 Ep 48Dune Security's Revolutionary Approach: AI and Cybersecurity
*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:0cf8a03d-e57a-43f6-9f7c-26bb6994647d-20" data-testid= "conversation-turn-42" data-scroll-anchor="true" data-turn= "assistant"> 🎙 Episode 48: AI and Cybersecurity — How Dune Security Is Reinventing User Risk Management In this episode of Cyber Security America, we explore how artificial intelligence is transforming cybersecurity—and why traditional security awareness training is no longer enough. I'm joined by David DellaPelle, cybersecurity leader and founder of Dune Security, to break down how AI-driven attacks like phishing, vishing, deepfakes, and social engineering are evolving faster than most security programs can handle. We discuss why 90% of breaches still start with human behavior and how Dune Security is redefining the user layer of cybersecurity with AI-powered risk quantification and remediation. 🔍 Topics covered in this episode: Why legacy security awareness training fails in an AI-driven threat landscape How attackers use GenAI, voice cloning, and deepfakes to bypass MFA The rise of multi-channel social engineering (email, SMS, voice, collaboration tools) How AI can identify high-risk users and reduce enterprise attack surface What CISOs should be doing now to prepare for AI-enabled threats The future of securing both human and AI workforces This conversation is essential listening for CISOs, security leaders, GRC teams, cloud and identity professionals, and anyone responsible for protecting modern organizations against advanced cyber threats. 🎧 Listen now on Apple Podcasts and Spotify to learn how AI is reshaping cybersecurity—for defenders and attackers alike. www.darkstack7.com/podcast #CyberSecurityAmerica #CybersecurityPodcast #AIandCybersecurity #ArtificialIntelligence #SocialEngineering #Phishing #Deepfake #CISO #SecurityAwareness #UserRisk #CloudSecurity #PodcastSEO
S2 Ep 47Spreadsheets to AI Agents The Next Era of Enterprise GRC with Richa Kaul
In episode 47 of Cybersecurity America, host Joshua Nicholson is joined by Richa Kaul, CEO and Founder of Complyance, to explore how agentic AI and intelligent automation are reshaping enterprise Governance, Risk, and Compliance (GRC). Richa breaks down why traditional, spreadsheet-driven GRC programs are failing at scale—and how organizations are moving toward real-time risk monitoring, automated evidence collection, and continuous audit readiness. Drawing from her experience as a GRC executive and privacy advocate, she shares how modern GRC teams can reduce manual effort, improve visibility, and position compliance as a true business enabler. In this conversation, we cover: Why legacy GRC models can't keep up with today's threat landscape How AI agents streamline audits and compliance operations Continuous controls monitoring and real-time risk visibility Privacy-first approaches to enterprise AI adoption Third-party risk, regulatory change, and AI governance What CISOs and GRC leaders should expect heading into 2026 Whether you're a CISO, GRC leader, risk professional, or security executive, this episode offers practical insight into the future of enterprise GRC and AI-driven risk management. About the Show Sponsor: Darkstack7 Darkstack7 is a cybersecurity and IT management firm based in Charlotte, NC, founded by Joshua R. Nicholson, a Marine Corps veteran and seasoned cybersecurity leader with experience at Northrop Grumman, EY, Wells Fargo, and Booz Allen Hamilton. The company delivers Fortune 500–level expertise to mid-sized and growing organizations—specializing in Security Engineering, Incident Response, vCISO advisory, Insider Threat programs, and IT Management consulting. Darkstack7 also provides proactive services such as tabletop exercises, cyber readiness assessments, and strategic security architecture, helping organizations build resilient defenses and align technology investments with business objectives. www.darkstack7.com, https://www.linkedin.com/in/joshuarnicholson/ #Cybersecurity #GRC #RiskManagement #Compliance #AI #AIinSecurity #EnterpriseSecurity #CISO #CyberRisk #Governance #Privacy #DataProtection #InfoSec#ThirdPartyRisk #DigitalRisk #CyberLeadership #Podcast
S2 Ep 46Building the Future with Agentic-AI: Deep Dive with Ben Wilcox
Episode 46: Building the Future with Agentic AI — Deep Dive with Ben Wilcox In this episode of Cybersecurity America, technologist and Proarch leader Ben Wilcox breaks down the biggest insights from Microsoft Ignite, including breakthroughs in agentic AI, emerging security trends, and what organizations must prepare for as AI-driven systems rapidly evolve. Ben reveals: • What's really happening with Microsoft's newest AI technology • How agentic systems are advancing faster than expected • Why data readiness is the foundation of future productivity • How companies should approach security, governance, and infrastructure in the AI era • His early entrepreneurial journey launching a hosting company at age 15 • The unexpected link between technology leadership and high-performance racing We also explore: • Data Security Posture Management (DSPM) • Identity-based attacks and real-world fraud cases • AI's impact on compliance, audits, and supply-chain risk • The rise of agentic workflows, MCP, and automation • Why traditional SaaS may give way to agent-driven platforms This episode is packed with insights for CISOs, IT leaders, engineers, and anyone preparing for the future of enterprise AI. Connect with Ben Wilcox & Proarch: www.proarch.com LinkedIn: Ben Wilcox Sponsored by DarkStack7 – Cybersecurity leadership, vCISO services, incident response, and engineering. www.darkstack7.com Joshua R Nicholson - DarkStack7 Cyber Defense | LinkedIn https://www.youtube.com/channel/UCp94j2q_-F4SwvxgQYI_8Cg Agentic AI, Microsoft Ignite, Microsoft AI, Enterprise cybersecurity, Data security, AI agents, AI automation, CISO insights, Cloud security, AI in business, AIPosture management, Identity-based attacks, Fraud prevention, MCP (Model Context Protocol), AI workflows
S2 Ep 45Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity security is reshaping cyber resilience. We dive deep into today's identity-based attack landscape — from Russian threat campaigns and TLS fragility to how endpoint trust, hardware-backed credentials, and zero trust authentication are converging. Jasson also shares fascinating insights on securing AI agents, drones, and machine identities, and what it really means to make credential-based attacks "impossible." Whether you're a security leader, technologist, or curious about the intersection of identity, AI, and the future of cyber defense, this episode is packed with forward-thinking insights you won't want to miss. 🔐 Key Topics: - The evolution of identity as the new cybersecurity perimeter - How attackers are exploiting TLS and credential sprawl - Why AI agents and drones demand new identity frameworks - TPMs, device-bound credentials, and the end of password-based trust The future of identity defense and zero trust authentication 🎧 Guest: Jasson Casey, CEO & Co-Founder, Beyond Identity 🔗 Learn more: www.beyondidentity.com 🎙 About the Show Sponsor: Darkstack7 Darkstack7 is a cybersecurity and IT management firm based in Charlotte, NC, founded by Joshua R. Nicholson, a Marine Corps veteran and seasoned cybersecurity leader with experience at Northrop Grumman, EY, Wells Fargo, and Booz Allen Hamilton. The company delivers Fortune 500–level expertise to mid-sized and growing organizations—specializing in Security Engineering, Incident Response, vCISO advisory, Insider Threat programs, and IT Management consulting. Darkstack7 also provides proactive services such as tabletop exercises, cyber readiness assessments, and strategic security architecture, helping organizations build resilient defenses and align technology investments with business objectives.
S2 Ep 44Surviving Ransomware: Strategies and Stories with Cybersecurity Expert Matthew Waddell
In episode 44 of Cyber Security America, host Joshua Nicholson sits down with Matthew Waddell, a battle-tested cybersecurity leader with over 25 years of experience in digital forensics, incident response, and ransomware defense. From conducting "just-in-time forensics" under combat conditions in Iraq and Afghanistan to leading global ransomware investigations for Fortune 100 companies, Waddell shares unmatched real-world insight into how cyber threats have evolved—and what it takes to defend against them. Topics Covered: The evolution of ransomware and why it remains a billion-dollar business Real-world stories from digital forensics on the battlefield Practical strategies for preventing lateral movement and improving network segmentation How AI and large language models (LLMs) are changing cybersecurity and cybercrime Why advanced tools like EDR and XDR can fail if humans disable alerts or skip training The promise and peril of AI in security operations, hiring, and incident response Matthew also discusses his upcoming book, Survive Ransomware, a practical playbook for small and medium-sized businesses navigating today's threat landscape. If you're serious about defending your organization—or just curious about how cybersecurity, AI, and human error collide—this episode is packed with lessons, stories, and expert insights. If you are in need of cybersecurity services please visit our sponsor Darkstack7 Cyber Defense at www.darkstack7.com 🎧 Listen, learn, Subscribe, like, and stay secure: http://www.darkstack7.com/media Video podcast on Youtube: Cyber Security America Video Host Info: https://www.linkedin.com/in/joshuarnicholson/ Guest Info: Website: www.tacticallysecure.com LinkedIn: linkedin.com/in/matthewwaddell Book: surviveransomware.com Hashtags: #cybersecurity #ransomware #ai #incidentresponse #digitalforensics #securityoperationscenter #cyberthreats #cyberdefense #infosec #networksecurity #MatthewWaddell #cybersecurityamerica #JoshuaNicholson #dataprotection #techpodcast #cyberawareness #aiinsecurity #SurviveRansomware #edraid #xdr #PowerShellSecurity #TacticallySecure #cyberpodcast #podcast
S2 Ep 43Penetration Testing and Social Engineering: Insights from Steve Stasiukoni
🎙 Inside the World of Cybersecurity with Steve Stasiukonis Tune in to the latest episode of Cyber Security America as we explore real-world solutions for defending against today's ever-evolving cyber threats. Our guest, Steve Stasiukonis, President of Secure Network Technologies, brings over 29 years of experience in penetration testing, information security, and incident response. In this episode, Steve dives deep into the rise of social engineering, AI-driven attacks, and the increasing sophistication of cybercriminals. He shares firsthand stories from the field, discusses the importance of continuous learning, and highlights why programmatic penetration testing is crucial for safeguarding your organization. 🔑 Key Topics: The Evolution of Cyber Threats Social Engineering Tactics AI's Role in Cybersecurity Penetration Testing Insights & Challenges Insider Threats & Corporate Espionage Incident Response & Real-World Stories Don't miss out on Steve's invaluable insights and the lessons every cybersecurity professional (and enthusiast) can learn from the frontlines of the digital battlefield. 🎧 Listen now on Spotify! #CyberSecurity #PenetrationTesting #SocialEngineering #AIinCyberSecurity #CyberDefense #CyberSecurityAmerica 🔗 darkstack7.com
S2 Ep 42Defense Contractors: CMMC Is Here — And the Clock Is Ticking
In our latest Cybersecurity America episode (42), I had the privilege of speaking with Jim Goepel, a true leader in cybersecurity and compliance — and someone who has helped shape the very ecosystem he now advises. Jim is the CEO of Fathom Cyber, a consulting firm in North Wales, PA specializing in: 🔹 CMMC assessment preparation 🔹 CUI education and compliance strategy 🔹 Expert witness services His unique background — lawyer, engineer, author, educator, and one of the architects behind the CMMC ecosystem — means he's seen this challenge from every angle: technical, legal, business, and regulatory. Jim has not only helped companies prepare for and achieve some of the first-ever CMMC certifications, he literally helped create the framework, launch The Cyber AB, and build the financial and training models that sustain the program today. 💡 In our conversation, Jim and I covered: Why CMMC is less about stopping attacks — and more about building resilience The cultural and leadership challenges that make compliance harder than the tech How other governments are now looking to adopt CMMC-like frameworks What small and mid-size businesses must do now to turn compliance into a competitive advantage Whether you're in manufacturing, defense, or any sector touching sensitive government data, this episode is a must-listen if you want to understand not just what's coming, but how to strategically position your organization before the surge. 🎧 Listen here: [https://youtu.be/E0M61k5Z3KI] #CyberSecurity #CMMC #Compliance #RiskManagement #DefenseIndustry #DoD #CyberResilience Sponsored by, www.darkstack7.com - Cyber Defense https://www.linkedin.com/company/cyber-security-america-podcast/posts/?feedView=all&viewAsMember=true
S2 Ep 41From Combat Boots to Cybersecurity - Nia Luckey on her journey
In this episode of the Cybersecurity America Podcast, sponsored by DarkStack7, host Joshua Nicholson sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from military to civilian life, while also unpacking the evolving challenges in today's cybersecurity landscape. From the importance of attention to detail, to burnout among cyber leaders, to the risks and opportunities of AI in security and governance, this episode is packed with insight for both aspiring professionals and seasoned experts. Key Topics Covered: - Nia's journey from Army communications to cybersecurity leadersh- ip - Building resilience and avoiding burnout in high-pressure environments - Specialization vs adaptability in cyber careers - AI, risk quantification, and governance in today's security programs - The future of work in cybersecurity Whether you're a veteran, a cybersecurity professional, or simply interested in how resilience and adaptability shape careers, this episode has something for you. 👉 Don't forget to like, comment, and subscribe for more conversations with today's cybersecurity leaders. #CyberSecurity #VeteransInTech #cyberresilience #leadership #cybercareers #aiincybersecurity #riskmanagement #ciso #cyberpodcast #NiaLuckey #cybersecurityamerica
S2 Ep 40Cybersecurity's Golden Rule: The Legal Blueprint No One Shares
In this episode, sponsored by Darkstack7, Joshua sits down with Chris Cronin, partner at Halock Security Labs and founding partner of Reasonable Risk, to explore the intersection of cybersecurity, risk management, and the legal principles behind "reasonable" safeguards. Chris unpacks the DoCRA Standard and CIS RAM, sharing how historical and legal frameworks can guide today's cybersecurity strategies. From his journey in academia to his leadership in cyber risk, Chris offers practical insights on balancing risk, ensuring compliance, and applying reasonable security measures that stand up to regulatory and legal scrutiny. The discussion covers real-world risk assessments, notable legal cases, and emerging tools that automate and enhance risk management. Key Topics: - How the DoCRA Standard and CIS RAM shape practical risk analysis Applying "reasonableness" from legal precedent to cybersecurity Balancing regulatory specificity with operational flexibility The role of community and professional standards in defining reasonable safeguards Historical analogies, insurance considerations, and executive decision-making in risk management Timestamps: 00:00 Introduction to Cybersecurity Challenges 00:26 Meet Chris: A Cybersecurity Expert 01:25 Chris's Journey into Cybersecurity 02:50 Where Law Meets Cybersecurity 04:37 Defining Reasonable Security Measures 06:37 Regulations and Compliance in Practice 08:24 The Legal Concept of Reasonableness 10:22 Translating Legal Standards into Cyber Practices 14:53 Practical Risk Analysis Steps 21:20 Balancing Flexibility and Specificity in Regulations 24:54 Professional Standards That Shape Reasonableness 25:49 Certifications and Industry Benchmarks 26:17 How Community Shapes Standards 26:34 Lessons from Aviation for Cybersecurity 28:29 The CIS RAM and Risk Assessment Methods 30:51 Legal Implications of Adopting Reasonableness 32:16 Insurance and Risk Management 34:38 Challenges in Incident Response Reporting 39:40 Risk Assessments for Executive Decision-Making 46:02 Closing Thoughts and Call to Action www.darkstack7.com
S2 Ep 39Memory-Only Malware: The Threat You're Probably Missing
In episode 39, host Josh Nicholson is joined by memory forensics expert Andrew Case, co-developer of the Volatility framework and co-author of The Art of Memory Forensics. Together, they explore the critical role of memory analysis in modern incident response—uncovering hidden malware, insider threats, and ransomware techniques invisible to traditional disk forensics or EDR tools. Andrew breaks down what's new in Volatility 3, how memory-only malware operates, and why CISA now recommends memory imaging in its emergency directives. Whether you're a responder, analyst, or just curious about advanced DFIR, this episode is packed with practical insight and real-world experience. 🎧 Stay secure—and subscribe for more expert cyber content. https://youtu.be/2q4z9Z2_cwc www.darkstack7.com
S2 Ep 38Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what's really happening in today's incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like longer dwell times and SSH backdoors) 📨 Surging business email compromise tactics—attachments are the new attack vector 🔐 Why incident response retainers are more valuable than ever 🔥 Rapid resiliency: 5 key misconfigurations every business must address 🧠 How threat actors are using AI (and why they still don't need it to win) 💬 Candid career advice for aspiring DFIR and intel pros Whether you're a CISO, SOC leader, or cyber-curious professional, this episode gives you front-line insights from the experts handling these threats daily. 🎧 Listen now and secure your edge: [https://www.darkstack7.com/podcast] #CyberSecurity #IncidentResponse #DFIR #ThreatIntelligence #Ransomware #BEC #SurefireCyber #CyberSecurityAmerica #Podcast #EDR #mfa #Resilience #digitalforensics https://www.linkedin.com/in/joshuanicholson/
S2 Ep 37Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Data X-ray, is revolutionizing data governance through advanced machine learning and natural language processing (NLP). We explore how Ohalo empowers major banks, governments, and enterprises to discover, classify, and protect sensitive data in a world of increasing complexity, compliance pressure, and security risks. From the rise of generative AI to the ethical implications of automation, this episode is packed with practical insights and future-facing perspectives. Whether you're a tech leader, data scientist, or simply curious about the future of AI and data, this conversation is a must-watch. 🕒 Chapter Timestamps 00:00 – Introduction to Kyle DuPont and Ohalo 01:44 – Kyle's Journey to Founding Ohalo 03:35 – Understanding Data X-ray and Its Applications 05:21 – Challenges in Data Security and AI Solutions 07:04 – The Role of AI in Data Management 13:31 – Cultural Insights and Personal Anecdotes 15:27 – Ideal Customers and Use Cases for Ohalo 17:56 – Future of AI and Data Management 20:56 – The Future of AI: Predictions and Implications 21:10 – Automation and Productivity: Embracing AI Tools 21:55 – The Evolution of Coding and Business Processes 24:36 – AI in Business: Real-World Applications 26:46 – Emerging AI Protocols and Security Concerns 29:53 – Ethical and Legal Implications of AI 36:22 – Advice for Aspiring AI Professionals 38:32 – Conclusion and Final Thoughts 📢 Don't forget to like, comment, and subscribe for more expert-led conversations on data, AI, and the future of technology. For the show video versions and the Cyber Battlefield training series are available. https://www.youtube.com/@cybersecurityamerica_show #AI #ArtificialIntelligence #MachineLearning #DataScience #DataSecurity #CyberSecurity #NaturalLanguageProcessing #FinTech #BigData #DataGovernance #GenerativeAI #TechPodcast #StartupStories #Innovation #Automation #FutureOfWork #DigitalTransformation #UnstructuredData #Ohalo #KyleDuPont #DataPrivacy #AIethics #TechLeadership
S2 Ep 36Telegram Exposed: The Super App Enabling Cyber Crime
In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a "super app" for cyber crime. From crypto laundering and hamster games masking gambling platforms, to automated money laundering, dark web-style marketplaces, and human trafficking operations, Telegram's labyrinthine infrastructure is designed for scale, secrecy, and obfuscation. 🔍 What you'll learn: How Telegram morphed into a platform for organized cyber crime The shocking links to cryptocurrency laundering through games like Hamster Combat The automation of criminal finance using bots and wallets Real-world examples of Telegram-enabled fraud, crime, and digital exploitation What law enforcement is doing—and not doing—to combat it The ethical gray zone of Telegram's elusive founder and the platform's murky governance 📕 Featuring insights from Stephen Arnold's upcoming book The Telegram Labyrinth—exclusive to law enforcement and intelligence professionals. 📢 Don't miss this revealing backstage pass into one of the most sophisticated cybercrime infrastructures on the planet. 🔹 Listen now: https://podcasts.apple.com/us/podcast/cyber-security-america/id1668216285 🔹 Follow the podcast: https://www.darkstack7.com/ 🔹 Connect with Joshua Nicholson: https://www.linkedin.com/in/joshuanicholson/ 🔔 Subscribe, comment, and share if you're ready to stay ahead in the cyber battlefield. #CyberSecurityAmerica #TelegramExposed #CyberCrime #DigitalUnderground #StephenArnold #JoshNicholson #InfoSec #CryptoCrime #TelegramLabyrinth #HamsterCombat #OpenSourceIntel #MDR #IncidentResponse #CyberIntel #clt #charlotte #CyberSecurityPodcast #DarkWeb #AML #DigitalThreats #CyberRisk #CISOInsights

S2 Ep 35Cyber Battlefield Insights: Lessons in Incident Response and Dark Web Tour
Join host Joshua Nicholson, a seasoned cybersecurity veteran with over 24 years of frontline experience, as he dives deep into the high-stakes world of incident response and takes you on an exclusive dark web tour. In this power-packed episode, Joshua shares real-world lessons learned from handling hundreds of cyber incidents, breaking down the best practices, critical backup strategies, and common pitfalls that organizations face when responding to attacks. But that's not all—this episode also unmasks the dark web, revealing its hidden layers, the tools and techniques used to navigate it, and the threats lurking in its shadows. From TOR networks, VPNs, and sock puppets to cybersecurity playbooks and business-aligned security strategies, this episode is a must-listen for IT professionals, CISOs, and business leaders alike. 🔹 Listen now: https://podcasts.apple.com/us/podcast/cyber-security-america/id1668216285 🔹 Follow the podcast: https://www.darkstack7.com/ 🔹 Connect with Joshua Nicholson: https://www.linkedin.com/in/joshuanicholson/ #CyberSecurity #IncidentResponse #DarkWeb #CyberThreats #CyberDefense #InfoSec #SOC #TOR #VPN #CyberRisk #ThreatIntel #DigitalForensics #EthicalHacking #CyberWar #DataBreach #CyberStrategy

S2 Ep 34Job Hunting in 2025: Top 10 Tips to Land Your Next Cybersecurity Role
🎙 Episode 34 - Job Hunting: Top 10 Tips to Land the Next One Looking for your next big career move? In this episode of Cyber Security America, we break down the Top 10 Tips to help you navigate the job market and secure your next role with confidence. Whether you're a seasoned cybersecurity professional or just starting out, we'll cover essential strategies—from optimizing your resume and acing interviews to leveraging your network and standing out in a competitive field. 📺 Watch the full video version on YouTube: Cyber Security America 📝 Read the full article on LinkedIn: Job Hunting 2025: Top 10 Tips to Land Your Next Role 👤 Learn more about the host, Joshua Nicholson: 🔗 Website: www.darkstack7.com 🔗 LinkedIn: www.linkedin.com/in/joshuarnicholson 🎧 Listen now on your favorite podcast platform! Don't miss this essential career guide—subscribe, watch, and read to stay ahead in your job search! 🚀