PLAY PODCASTS
3 Biggest Cybersecurity Threats & What IT Leaders Need To Know
Episode 501

3 Biggest Cybersecurity Threats & What IT Leaders Need To Know

Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield.

IT Visionaries · Mission.org, Chris Brandt, Stephanie Postles, Lacey Peace

September 25, 202536m 4s

Audio is streamed directly from the publisher (evrstrck.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield.

 

In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025.

 

From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what’s really happening behind the scenes of today’s most dangerous attacks.

 

With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it’s no longer a matter of “if” but “when.”

 

Don’t miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it’s too late.

 

Key Moments:

 

00:00: Lacey Peace Interviews Chris Brandt

04:45 Cyber Extortion and Ransomware

08:17 Supply Chain Attacks

18:20 Creating an Isolated Recovery Environment

20:08 Threat Number Two: IT Worker Attacks

22:14 The Rise of Phishing Attacks

27:26 The Evolution of Social Engineering

30:19 The Role of AI in Cybersecurity

33:01 Challenges in Reporting Cyber Incidents

33:46 The Complexity of Cyber Incident Recovery

34:45 The Role of Governments in Cybersecurity

-- 

This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.

That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.

---

IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org.


Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Topics

reporting cyber incidentsresilience and recovery in itphishing threatscybersecurity 2025insider threatsransomware-as-a-serviceemp-shielded data centercyber incident recoveryit worker attacksisolated recovery environmentsai as defense in cybersecuritysocial engineeringbiggest cyber threats 2025chris brandt cybersecurity insightsit visionaries podcast cyber episodeai security threatsgovernment role in cybersecurityfuture of cybersecuritynorth korean cyber infiltrationartificial intelligence in cybersecurityphishing attackscyber extortionsupply chain attacksexperts of experience podcast crossoverai in cybersecurity