PLAY PODCASTS
Cybersecurity Awesomeness Podcast

Cybersecurity Awesomeness Podcast

157 episodes — Page 1 of 4

Cybersecurity Awesomeness Podcast - Episode 157

May 15, 202614 min

Cybersecurity Awesomeness Podcast - Episode 156

May 8, 202614 min

Cybersecurity Awesomeness Podcast - Episode 155

May 1, 202613 min

Cybersecurity Awesomeness Podcast - Episode 154

Apr 24, 202615 min

Cybersecurity Awesomeness Podcast - Episode 153

Apr 17, 202613 min

Ep 152Cybersecurity Awesomeness Podcast - Episode 152

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore Google’s recent quantum computing milestone, which significantly accelerates the timeline for "Q-Day." Google’s research suggests that the physical qubit requirement to crack a Bitcoin signature could be slashed from millions to just 500,000, with scalable systems potentially arriving by 2029. While the hosts clarify that today’s blockchain remains secure for now, the announcement underscores an urgent need for organizations to adopt Post-Quantum Cryptography (PQC).The discussion highlights how traditional computing is hitting physical barriers, making quantum specialized power the next logical step for high-intensity tasks. Beyond security risks, Steffen and Buckler discuss the "Star Trek-esque" benefits of quantum, including near-instant DNA sequencing for personalized medicine and the potential for zero-latency deep-space communication via quantum entanglement. Ultimately, the episode serves as a crucial call to action: PQC is no longer a distant science project but a looming requirement. Security professionals must educate themselves and demand quantum-readiness strategies from their vendors to ensure long-term data protection.

Apr 10, 202612 min

Ep 151Cybersecurity Awesomeness Podcast - Episode 151

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler offer a comprehensive recap of RSAC 2026, cutting through the noise of 40,000 attendees to deliver critical takeaways from the industry’s "Super Bowl." While AI dominated nearly 80% of vendor booths, the hosts differentiate between "marketecture" and meaningful innovation. They emphasize that deploying agentic AI without robust Data Security Posture Management (DSPM) is a recipe for unmanaged data sprawl and "Shadow AI" risks, where sensitive proprietary information is accidentally leaked into public models.A significant portion of the discussion focuses on the maturation of identity management, noting a shift toward granular guardrails for AI agents to prevent overprivileged access. The duo also debunks the myth of AI as a headcount replacement for SOC analysts, highlighting its lack of "tribal knowledge" and innovative problem-solving. Beyond the AI hype, the conversation touches on the urgency of Post-Quantum Cryptography (PQC) and the evolving role of the CISO—transitioning from a "head nerd" to a strategic risk manager under new regulatory mandates. Ultimately, the episode serves as a reminder that foundational data governance remains the true anchor in a high-velocity threat landscape.

Apr 3, 202615 min

Ep 150Cybersecurity Awesomeness Podcast - Episode 150

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the 2026 RSAC in San Francisco. Dubbed the "Super Bowl" of security, the event expects over 45,000 attendees and 600 vendors at the Moscone Center. Chris, managing a schedule of nearly 40 meetings, joins Ken to navigate the overwhelming noise of the show floor.The duo identifies Agentic AI and autonomous solutions as the dominant—yet potentially distracting—themes of the year. They caution against the "silver bullet" mentality, urging leaders to focus on securing AI agents against hallucinations and IP leaks rather than viewing them as total replacements for human staff. Beyond the AI hype, they highlight the critical arrival of "Q-Day" and the necessity of Post-Quantum Cryptography (PQC) readiness. The hosts encourage listeners to visit the Innovation Sandbox and Early Stage Expo for emerging tech while maintaining a steadfast commitment to foundational cyber hygiene. Ultimately, they embrace the conference theme, "The Power of Community," emphasizing that face-to-face networking remains the industry’s most valuable asset.

Mar 20, 202615 min

Ep 149Cybersecurity Awesomeness Podcast - Episode 149

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the RSA Conference (RSAC), often described as the "Super Bowl" of cybersecurity by talking about the EMA Vendor Vision report. To help attendees navigate the overwhelming presence of over 600 exhibitors, the hosts break down EMA’s "Vendor Vision" report, which spotlights ten essential innovators. The discussion covers a broad technological spectrum, ranging from Straker’s cutting-edge adversarial AI in the Early Stage Expo to Sky High Security’s leadership in Data Security Posture Management (DSPM).Key highlights include AWS’s unified cloud security suite, Acalvio's deception technologies, F5’s API-driven AI protections, and the evolving identity landscape spearheaded by Yubico and SailPoint. The hosts also examine the maturation of Privileged Access Management through Delinea and Keeper Security, alongside Proofpoint’s focus on human-centric vulnerabilities and business email compromise. By filtering the noise of the Moscone Center, this episode provides a strategic roadmap for identifying the technical trends that will define the industry for the coming months. It serves as an indispensable guide for anyone looking to maximize their impact and insight during the conference.

Mar 13, 202615 min

Ep 148Cybersecurity Awesomeness Podcast - Episode 148

In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.The conversation characterizes AI as a paradox: a tool with "graduate-level intelligence but the gullibility of an eight-year-old." The hosts argue that marginal productivity gains cannot justify catastrophic risks like data destruction or unauthorized access. Ultimately, the episode emphasizes that AI should not be pursued at the expense of foundational security pillars like identity management. CISOs are urged to apply existing human-centric guardrails to AI agents, ensuring these tools remain business enablers rather than liabilities.

Mar 6, 202612 min

Ep 147Cybersecurity Awesomeness Podcast - Episode 147

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for security professionals. Organizations must move beyond traditional binary mindsets to adopt quantum-resistant algorithms, as the transition is a multi-year endeavor rather than an overnight fix. Even for those skeptical of the timeline, the push toward quantum readiness represents a necessary evolution in global security standards. Ultimately, the episode underscores that being quantum ready is no longer a futuristic luxury but a foundational requirement for protecting long-term intellectual property and state secrets in an increasingly complex digital landscape.

Feb 27, 202613 min

Ep 146Cybersecurity Awesomeness Podcast - Episode 146

In this "Cybersecurity 101" episode, Chris Steffen and Ken Buckler demystify quantum computing and its looming implications for modern encryption. Ken contrasts traditional binary bits—static ones and zeros—with qubits, using the analogy of a spinning coin to represent the multiple simultaneous states quantum computers can process. This immense power allows quantum systems to solve complex problems in milliseconds that would take traditional computers lifetimes. However, significant physical hurdles remain, such as the requirement for near-absolute zero cooling environments.The most pressing security concern discussed is "Q-Day" and the "Harvest Now, Decrypt Later" strategy. Malicious actors are currently stockpiling encrypted government secrets, financial records, and intellectual property, waiting for quantum technology to become viable enough to shatter current encryption standards. The hosts emphasize the urgent necessity of Post-Quantum Cryptography (PQC) to protect long-term sensitive data. Chris concludes by noting his upcoming research report on PQC, highlighting how organizations must prepare for a universe where current digital safeguards may soon become obsolete.

Feb 20, 202615 min

Ep 145Cybersecurity Awesomeness Podcast - Episode 145

In this episode, Chris Steffen and Ken Buckler dissect the federal government’s evolving—and somewhat strained—approach to cybersecurity. A major catalyst for the discussion is the recent withdrawal of agencies like CISA, the FBI, and the NSA from the RSAC conference following former CISA head Jen Easterly’s appointment there. While potentially a move toward fiscal responsibility—given the $5,000 per-person total cost of the event—the hosts warn this retreat could stifle vital public-private partnerships and recruitment efforts.The discussion also tackles systemic talent issues within the military. Experts often face a "promotion trap," being moved into management just as they peak technically, while private-sector salaries can reach 10x their military pay. To counter this, units like the Maryland Air National Guard are pivoting from traditional aircraft to dedicated cyber missions. Ultimately, the hosts argue that the government risks falling behind on emerging technology adoption by absenting itself from the industry's largest collaborative forums. This "cyber-isolationism" could leave federal agencies ill-equipped to handle rapidly evolving threats.

Feb 13, 202614 min

Ep 144Cybersecurity Awesomeness Podcast - Episode 144

In this episode of the Cybersecurity Awesomeness Podcast, host Chris Steffen and Simon Wijckmans, CEO of C-side, discuss the critical visibility gap in client-side security. While organizations invest heavily in infrastructure and server-side protection, the user's browser remains a largely unmonitored attack vector. Historically, solutions like Content Security Policies and JavaScript agents have proven brittle or easily bypassed by sophisticated scripts that can hide from crawlers or override security hooks.The conversation highlights a major shift driven by PCI DSS 4.0, which now mandates the monitoring and authorization of client-side scripts. Simon explains that modern browser changes regarding third-party cookies finally support more effective proxy-based approaches. This allows security teams to inspect and block malicious third-party scripts before they reach the end user, preventing data exfiltration like credit card skimming. The hosts urge security professionals to move beyond "head in the sand" tactics, emphasizing that robust browser security is now a regulatory and operational necessity for total asset protection.

Feb 6, 202616 min

Ep 143Cybersecurity Awesomeness Podcast - Episode 143

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler discuss a humorous yet sobering encounter with a failed AI-driven scam. Ken recently received a common "advance fee" investment scam email, but with a unique twist: the attacker accidentally sent the Python source code instead of the intended message. The code contained telltale signs of AI generation, including placeholder instructions like "replace this with the actual import" for the Gemini SDK.The hosts explain that while this specific attacker failed "successfully," the incident provides concrete proof that scammers are using generative AI to replace the broken English of past scams with highly literate, convincing phishing lures. This shift makes it increasingly difficult for users to spot fraud through traditional "tells." Chris emphasizes that manual defense is no longer sufficient against automated bot armies. To stay protected, organizations must integrate AI-driven security tools to match the speed and sophistication of these evolving threats. As Ken notes, the future of these attacks will likely escalate into deepfakes and multimodal social engineering.

Jan 30, 202612 min

Ep 142Cybersecurity Awesomeness Podcast - Episode 142

In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers process highly sensitive data and frequently lack unified management platforms, they offer a 360-degree risk landscape for cybercriminals. The conversation emphasizes that "locking the front door" by declaring a dedicated security owner and integrating print fleets into a unified security strategy is essential. Symphion provides a turnkey solution to bridge this visibility gap, ensuring these "graveyard endpoints" are hardened, monitored, and securely managed.

Jan 23, 202613 min

Ep 141Cybersecurity Awesomeness Podcast - Episode 141

In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.The discussion also addresses the myth of data anonymization, noting that aggregated consumer data is easily de-anonymized and sold to third parties. The hosts conclude that when a device offers "value-add" connectivity, the consumer’s personal data is often the actual product. They urge listeners to adopt a critical mindset regarding the risk-to-benefit ratio of every connected device they bring into their homes.

Jan 16, 202613 min

Ep 140Cybersecurity Awesomeness Podcast - Episode 140

Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.

Jan 9, 202611 min

Ep 139Cybersecurity Awesomeness Podcast - Episode 139

Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.

Dec 19, 202515 min

Ep 138Cybersecurity Awesomeness Podcast - Episode 138

Chris Steffen and Ken Buckler from EMA discuss API security.

Dec 12, 202515 min

Ep 137Cybersecurity Awesomeness Podcast - Episode 137

Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.

Dec 5, 202510 min

Ep 136Cybersecurity Awesomeness Podcast - Episode 136

Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.

Nov 28, 202513 min

Ep 135Cybersecurity Awesomeness Podcast - Episode 135

Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.

Nov 21, 202512 min

Ep 134Cybersecurity Awesomeness Podcast - Episode 134

Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.

Nov 14, 202513 min

Ep 133Cybersecurity Awesomeness Podcast - Episode 133

Chris Steffen and Ken Buckler from EMA discuss trends in network security.

Nov 7, 202519 min

Ep 132Cybersecurity Awesomeness Podcast - Episode 132

Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.

Oct 31, 202513 min

Ep 131Cybersecurity Awesomeness Podcast - Episode 131

Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.

Oct 24, 202516 min

Ep 130Cybersecurity Awesomeness Podcast - Episode 130

Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.

Oct 17, 202516 min

Ep 129Cybersecurity Awesomeness Podcast - Episode 129

Chris Steffen and Ken Buckler from EMA discuss data security and software updates for Cybersecurity Awareness Month.

Oct 10, 202516 min

Ep 128Cybersecurity Awesomeness Podcast - Episode 128

Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.

Oct 3, 202514 min

Ep 127Cybersecurity Awesomeness Podcast - Episode 127

Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.

Sep 26, 202514 min

Ep 126Cybersecurity Awesomeness Podcast - Episode 126

Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.

Sep 19, 202513 min

Ep 125Cybersecurity Awesomeness Podcast - Episode 125

Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.

Sep 12, 202513 min

Ep 124Cybersecurity Awesomeness Podcast - Episode 124

Chris Steffen and Ken Buckler from EMA discuss the largest ever recorded DDoS attack, and the efforts used to stop it.

Sep 5, 202513 min

Ep 123Cybersecurity Awesomeness Podcast - Episode 123

Chris Steffen and Ken Buckler from EMA discuss cybersecurity's role at the start the new school year.

Aug 29, 202514 min

Ep 122Cybersecurity Awesomeness Podcast - Episode 122

Chris Steffen and Ken Buckler from EMA discuss proactive vs. reactive cybersecurity.

Aug 22, 202514 min

Ep 121Cybersecurity Awesomeness Podcast - Episode 121

Chris Steffen and Ken Buckler from EMA present a Black Hat 2025 Wrap-Up and discuss AI security.

Aug 15, 202514 min

Ep 120Cybersecurity Awesomeness Podcast - Episode 120

Chris Steffen and Ken Buckler from EMA discuss data governance for agentic AI.

Aug 8, 202515 min

Ep 119Cybersecurity Awesomeness Podcast - Episode 119

Chris Steffen and Ken Buckler from EMA present a preview of Black Hat 2025.

Aug 1, 202511 min

Ep 118Cybersecurity Awesomeness Podcast - Episode 118

Chris Steffen and Ken Buckler from EMA discuss the latest Zero Day attack on SharePoint.

Jul 25, 202513 min

Ep 117Cybersecurity Awesomeness Podcast - Episode 117

Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: the CIA of security, known as the security triad.

Jul 18, 202515 min

Ep 116Cybersecurity Awesomeness Podcast - Episode 116

Chris Steffen and Ken Buckler from EMA discuss having a false sense of cybersecurity with some of the tools people regularly download and use.

Jul 11, 202514 min

Ep 115Cybersecurity Awesomeness Podcast - Episode 115

Chris Steffen and Ken Buckler from EMA discuss the clickbait news cycle, and how it impacts cybersecurity.

Jul 7, 202514 min

Ep 114Cybersecurity Awesomeness Podcast - Episode 114

Chris Steffen and Ken Buckler from EMA discuss nation state cyber attacks, specifically in light of current events in the Middle East.

Jun 26, 202511 min

Ep 113Cybersecurity Awesomeness Podcast - Episode 113

Chris Steffen and Ken Buckler from EMA discuss the variables between running a workload on premise vs. in the cloud or as a SaaS service.

Jun 20, 202515 min

Ep 112Cybersecurity Awesomeness Podcast - Episode 112

Chris Steffen and Ken Buckler from EMA discuss Penetration Testing as a Service.

Jun 13, 202513 min

Ep 111Cybersecurity Awesomeness Podcast - Episode 111

Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Cybersecurity Maturity.

Jun 6, 202513 min

Ep 110Cybersecurity Awesomeness Podcast - Episode 110

Chris Steffen and Ken Buckler from EMA discuss the recent news about extra devices installed on foreign made products that have no purpose other than to be exploited by a bad actor.

May 23, 202514 min

Ep 109Cybersecurity Awesomeness Podcast - Episode 109

Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.

May 16, 202511 min

Ep 108Cybersecurity Awesomeness Podcast - Episode 108

Chris Steffen and Ken Buckler from EMA recap the RSA Conference.

May 9, 202514 min