Cyber Focus
To the Point is a new video series from the McCrary Institute for Cyber and Critical Infrastructure Security, found here at Threat Beat. Hosted by McCrary Institute Director Frank Cilluffo, the series delivers fast-moving, high-impact conversations with top national security and cybersecurity leaders. Each episode tackles big ideas with clarity and urgency — getting straight to the point. In this inaugural episode, Frank sits down with Chris Inglis and George Barnes — both former deputy directors of the National Security Agency — for a fast-paced, high-level conversation reflecting their...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Peter W. Singer, strategist at New America, professor at Arizona State, and founder of Useful Fiction. They revisit Singer’s influential book Ghost Fleet and examine how the strategic landscape—particularly U.S.-China competition—has shifted over the past decade. Singer discusses China’s military reorganization and the lessons it's drawing from the war in Ukraine. He also explores how AI is reshaping the nature of cyber threats. The conversation highlights the growing intersection of cyber, physical, and cognitive...
info_outlineCyber Focus
Overview: In this episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing national security challenges. The conversation spans from undersea cable vulnerabilities to public-private integration, the future of quantum and AI, and the enduring need for clarity in cyber policy. A decorated Auburn alum, Rogers reflects on lessons...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Congressman Mike Rogers, Chairman of the House Armed Services Committee. Representing Alabama’s 3rd District, Rogers outlines his top defense priorities, including boosting defense spending, acquisition reform, and preparing for cyber and space warfare. He also shares insights on missile defense, the strategic role of Huntsville, the future of the national cyber workforce, and the growing energy demands of AI. Rogers offers a candid look at how Congress is adapting to emerging threats and why he believes space and cyber will...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Ryan Propis, Vice President for Security and Facilitation at the U.S. Travel Association. With the U.S. preparing to host the World Cup in 2026 and the Olympics in 2028, Propis outlines how these massive international events will test the limits of our country’s travel infrastructure and security systems. Drawing on his experience as Chief of Staff at TSA and a senior staffer on Capitol Hill, he discusses the urgent need to modernize how we screen, move, and protect travelers—especially as daily passenger volumes are set to...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andy Piazza, a senior threat intelligence leader at Unit 42, and Daniel Kroese, a cybersecurity policy expert, both from Palo Alto Networks. They discuss key findings from Palo Alto Networks’ 2025 Global Incident Response Report, highlighting the accelerating speed of cyberattacks, the growing use of AI in both offense and defense, and the increasing sophistication of nation-state and cybercriminal operations. The conversation explores the intersection of cybersecurity technology, policy, and defense strategies,...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Bill Rucker, a seasoned veteran in IT and cybersecurity, currently leading Trustwave Government Solutions. They explore the insights from Trustwave's recent report on cybersecurity challenges facing the manufacturing sector. Rucker highlights the rapidly rising costs of breaches, now averaging $5.8 million, emphasizing vulnerabilities stemming from legacy operational technology (OT) and the complexities of integrating OT with modern IT systems. The conversation also covers the increased sophistication of cyber threats, the...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Harry Krejsa, Director of Studies at Carnegie Mellon University's Institute for Strategy and Technology. Krejsa, a former Pentagon and White House cyber strategist, discusses his latest report, Sunshield, which highlights the intersection of cybersecurity, U.S.-China competition, and grid security. The conversation explores how China's cyber operations exploit technical debt in U.S. critical infrastructure, the cybersecurity risks and opportunities in the energy transition, and how the rapid buildout of AI-driven power...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Cynthia Brumfield, a prolific cybersecurity journalist and analyst. Brumfield discusses her reporting on the human toll of cybersecurity incidents, including mental health challenges and burnout among cyber professionals. She also explores the evolving role of deception technology in cyber defense and highlights key cybersecurity provisions in the latest National Defense Authorization Act (NDAA). The conversation covers the growing threats pose
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andrew Howell, Vice President for Government Affairs at SentinelOne, and Kyle Klein, Deputy Director for Policy and Partnerships at the McCrary Institute. Together, they discuss the evolving cybersecurity legislative landscape in the early days of the 119th Congress. The conversation covers key bills like the Cyber Pivot Act, updates to the Computer Fraud and Abuse Act, efforts to designate space as critical infrastructure, AI regulation, an
info_outlineIn this episode of Cyber Focus, host Frank Cilluffo talks with Bob Kolasky, Senior Vice President at Exeter and former head of the National Risk Management Center at CISA. The conversation covers key topics related to supply chain risk, security, and national defense. Bob provides insights into the evolving threats within supply chains, especially those linked to cybersecurity and critical infrastructure. He also touches on legislative efforts and the role of public-private partnerships in mitigating risks from foreign actors, particularly focusing on concerns regarding Chinese companies like DJI and Huawei.
Main Topics Covered:
- The hybrid nature of supply chain threats and their intersection with cybersecurity
- Notable supply chain attacks like SolarWinds and the role of software vulnerabilities
- The rise of Chinese technology companies, especially DJI, in U.S. supply chains
- Legislative responses to supply chain risks, including the China Select Committee
- Critical infrastructure sectors and the importance of visibility and resilience in supply chains
- The need for secure alternatives to foreign technologies, particularly in drones and communication systems
- Public-private partnerships to address systemic risks in national security
Key Quotes:
"Supply chain has increasingly become an important element of how nations defend themselves, but also an area of attack." – Bob Kolasky
"We're seeing order of magnitudes improvements in manufacturing techniques that are being enabled by digital. And whenever you say the word digital, you can say the word cyber because a digital supply chain is a potentially cyber-vulnerable supply chain." – Bob Kolasky
"How are we as a country going to see the investments made in alternatives to DJI [drones] so that law enforcement can still get a cost effective solution to meet their mission needs?" – Bob Kolasky
"It’s not just about bringing supplies back here. It’s about friend-shoring and trust-shoring and making sure that there are the instruments of power used to stimulate the development of technologies and markets for technologies that are crucial." – Bob Kolasky
"Let's empower the institutions that Congress has created, the executive branch has created to continue to do this work. Administrations may have different priorities, but the more we jump around... the more we get drawn away from the end state goal, which is more security and resilience." – Bob Kolasky
Relevant Links and Resources:
Guest Bio:
Bob Kolasky is the Senior Vice President at Exeter and a former leader at the National Risk Management Center at CISA. His career has focused on addressing supply chain risk, cybersecurity, and critical infrastructure. At CISA, he worked on supply chain security efforts, particularly in defense and technology sectors, and was a key figure in developing national policies to protect critical infrastructure from cyber and physical threats.