Cyber Focus
To the Point is a new video series from the McCrary Institute for Cyber and Critical Infrastructure Security, found here at Threat Beat. Hosted by McCrary Institute Director Frank Cilluffo, the series delivers fast-moving, high-impact conversations with top national security and cybersecurity leaders. Each episode tackles big ideas with clarity and urgency — getting straight to the point. In this inaugural episode, Frank sits down with Chris Inglis and George Barnes — both former deputy directors of the National Security Agency — for a fast-paced, high-level conversation reflecting their...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Peter W. Singer, strategist at New America, professor at Arizona State, and founder of Useful Fiction. They revisit Singer’s influential book Ghost Fleet and examine how the strategic landscape—particularly U.S.-China competition—has shifted over the past decade. Singer discusses China’s military reorganization and the lessons it's drawing from the war in Ukraine. He also explores how AI is reshaping the nature of cyber threats. The conversation highlights the growing intersection of cyber, physical, and cognitive...
info_outlineCyber Focus
Overview: In this episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing national security challenges. The conversation spans from undersea cable vulnerabilities to public-private integration, the future of quantum and AI, and the enduring need for clarity in cyber policy. A decorated Auburn alum, Rogers reflects on lessons...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Congressman Mike Rogers, Chairman of the House Armed Services Committee. Representing Alabama’s 3rd District, Rogers outlines his top defense priorities, including boosting defense spending, acquisition reform, and preparing for cyber and space warfare. He also shares insights on missile defense, the strategic role of Huntsville, the future of the national cyber workforce, and the growing energy demands of AI. Rogers offers a candid look at how Congress is adapting to emerging threats and why he believes space and cyber will...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Ryan Propis, Vice President for Security and Facilitation at the U.S. Travel Association. With the U.S. preparing to host the World Cup in 2026 and the Olympics in 2028, Propis outlines how these massive international events will test the limits of our country’s travel infrastructure and security systems. Drawing on his experience as Chief of Staff at TSA and a senior staffer on Capitol Hill, he discusses the urgent need to modernize how we screen, move, and protect travelers—especially as daily passenger volumes are set to...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andy Piazza, a senior threat intelligence leader at Unit 42, and Daniel Kroese, a cybersecurity policy expert, both from Palo Alto Networks. They discuss key findings from Palo Alto Networks’ 2025 Global Incident Response Report, highlighting the accelerating speed of cyberattacks, the growing use of AI in both offense and defense, and the increasing sophistication of nation-state and cybercriminal operations. The conversation explores the intersection of cybersecurity technology, policy, and defense strategies,...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Bill Rucker, a seasoned veteran in IT and cybersecurity, currently leading Trustwave Government Solutions. They explore the insights from Trustwave's recent report on cybersecurity challenges facing the manufacturing sector. Rucker highlights the rapidly rising costs of breaches, now averaging $5.8 million, emphasizing vulnerabilities stemming from legacy operational technology (OT) and the complexities of integrating OT with modern IT systems. The conversation also covers the increased sophistication of cyber threats, the...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Harry Krejsa, Director of Studies at Carnegie Mellon University's Institute for Strategy and Technology. Krejsa, a former Pentagon and White House cyber strategist, discusses his latest report, Sunshield, which highlights the intersection of cybersecurity, U.S.-China competition, and grid security. The conversation explores how China's cyber operations exploit technical debt in U.S. critical infrastructure, the cybersecurity risks and opportunities in the energy transition, and how the rapid buildout of AI-driven power...
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo speaks with Cynthia Brumfield, a prolific cybersecurity journalist and analyst. Brumfield discusses her reporting on the human toll of cybersecurity incidents, including mental health challenges and burnout among cyber professionals. She also explores the evolving role of deception technology in cyber defense and highlights key cybersecurity provisions in the latest National Defense Authorization Act (NDAA). The conversation covers the growing threats pose
info_outlineCyber Focus
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andrew Howell, Vice President for Government Affairs at SentinelOne, and Kyle Klein, Deputy Director for Policy and Partnerships at the McCrary Institute. Together, they discuss the evolving cybersecurity legislative landscape in the early days of the 119th Congress. The conversation covers key bills like the Cyber Pivot Act, updates to the Computer Fraud and Abuse Act, efforts to designate space as critical infrastructure, AI regulation, an
info_outlineIn this special Cyber Focus Brief, Frank Cilluffo and Bob Kolasky discuss the impact of the recent pager and communication device attack in Lebanon, reportedly orchestrated by the Israeli government. The discussion explores the unprecedented scale and complexity of this operation, the sophisticated use of supply chain vulnerabilities, and the psychological and strategic implications for both nation-states and critical infrastructure. The conversation also highlights the importance of supply chain security in the modern era, emphasizing the blending of cyber and physical threats and the need for enhanced defensive measures to protect vital systems.
Main Topics Covered:
- The scale of planning needed for this type of supply chain infiltration
- Psychological impact on adversaries
- Implications for supply chain security
- Blending of cyber and physical threats
- Strategic lessons for governments and businesses
- The importance of trusted suppliers and defensive measures
Key Quotes:
“When you start seeing something that has potential loss of life and physical consequences, I think maybe people will actually pay some attention to a significant set of issues facing our countries, our societies and obviously our companies.” – Frank Cilluffo
“I do think it will likely lead to some new applications and tactics, techniques and procedures we may see in the battlefield or even in a civilian battlefield.” – Frank Cilluffo
“I keep coming to the phrase hybrid, because I don't want to call this a physical or cyber. It's an element of both things… there's a digital aspect of how the physical attack was done. And so, you know, we're going to get lost if we spend our time debating whether something cyber or not cyber enabled, physical enabled, it's all blended together. – Bob Kolasky
Frank Cilluffo is a leading expert in national security and cybersecurity, having served on the Cyberspace Solarium Commission and the Department of Homeland Security’s Advisory Council. He has advised senior U.S. officials, testified before Congress, and worked closely with NATO and Europol. Following 9/11, Cilluffo was appointed to the Office of Homeland Security by President George W. Bush, where he served as a key advisor on homeland security and counterterrorism strategy.
Bob Kolasky is Senior Vice President for Critical Infrastructure at Exiger, leading efforts to manage third-party and supply chain risks. He previously founded the National Risk Management Center at CISA and held senior roles at DHS, focusing on cybersecurity and infrastructure protection.