Cyber Focus
In this episode of Cyber Focus, host Frank Cilluffo moderates a timely and wide-ranging conversation on the future of AI policy and governance with Sarah Beth Jansen, a senior fellow at the McCrary Institute and longtime DC policy expert, and Austin Carson, founder of SeedAI and former legislative director for Rep. Mike McCaul. The discussion covers the Trump administration’s AI Action Plan, sector-specific regulatory approaches, and how Congress can play a constructive role without stifling innovation. Both guests emphasize the importance of local experimentation, procurement reform, and...
info_outlineCyber Focus
In this episode of Cyber Focus, Frank Cilluffo is joined by Brad Medairy, Executive Vice President at Booz Allen Hamilton, and Dave Forbes, who leads Cyber Physical Defense for the firm. Together, they unpack their joint report with the McCrary Institute, Anchored in Zero Trust, examining the cybersecurity vulnerabilities of U.S. ports. The conversation explores China’s cyber activities, the significance of Volt Typhoon, and the risks posed by Chinese-made cranes operating at American ports. They highlight how economic and national security intersect at ports, the unique challenges of...
info_outlineCyber Focus
In this special Cyber Focus episode recorded at Black Hat 2025, host Frank Cilluffo sits down with two senior leaders from the Cybersecurity and Infrastructure Security Agency (CISA): Chris Butera, a more than decade-long CISA veteran currently serving as Acting Director of the Cybersecurity Division, and Bob Costello, the agency’s Chief Information Officer. They discuss how CISA is adapting its mission in the face of evolving threats, budget pressures, and leadership changes, while maintaining a rapid operational tempo. Topics include the agency’s fast-turn vulnerability response through...
info_outlineCyber Focus
Forescout CEO Barry Mainz joins host Frank Cilluffo to unpack the evolving cybersecurity threat landscape—from nation-state hacktivism to post-quantum vulnerabilities. Mainz highlights how adversaries are leveraging crowdsourced expertise and agentic AI to target critical infrastructure, especially operational technology (OT) systems in sectors like water, energy, and healthcare. The conversation explores Forescout's research on hacktivist proxy groups, the growing danger posed by embedded and aging devices, and the urgency of preparing for post-quantum cryptographic threats. Mainz...
info_outlineCyber Focus
In this special crossover edition of Cyber Focus and the Power Podcast, host Frank Cilluffo sits down with Aaron Larson to explore the evolving intersection of energy innovation and cybersecurity. From breakthroughs in small modular reactors and geothermal technologies to the power demands of AI and electric vehicles, they examine how the U.S. grid is being reshaped by both opportunity and threat. Larson draws on his background in nuclear power and conversations with top industry leaders to highlight the promise of emerging energy sources—and the urgent need to bake in security from the...
info_outlineCyber Focus
Richard Horne, CEO of the United Kingdom’s National Cyber Security Centre (NCSC), joins host Frank Cilluffo to explore how the UK is strengthening cyber resilience across critical infrastructure, private industry, and international partnerships. Drawing from his experience in both government and the private sector, Horne outlines NCSC’s approach to tackling advanced threats, closing resilience gaps, and collaborating with allies on systemic cyber defense. The conversation spans ransomware, AI, supply chain risk, quantum cryptography, and how organizations—large and small—can better...
info_outlineCyber Focus
Kristina Walter, Director of the NSA’s Cybersecurity Collaboration Center, joins Frank Cilluffo to explain how the NSA is building trusted partnerships with private industry to counter advanced cyber threats. Walter shares how collaborative work with defense contractors and tech providers has helped uncover zero-day vulnerabilities, block billions of malicious domains, and expose Chinese operations like Volt Typhoon. She also discusses the role of AI in cyber defense, the race to prepare for quantum computing, and why resilience—not perfection—is the new benchmark for critical...
info_outlineCyber Focus
In this episode of Cyber Focus, Frank Cilluffo sits down with Jonathan Braley, Director of the Food and Agriculture Information Sharing and Analysis Center (Food and Ag-ISAC), to explore the growing cybersecurity threats facing the U.S. food and agriculture sector. They examine the integration of operational technology (OT), the rise in ransomware attacks on farms and food producers, and the fragile nature of supply chain cybersecurity. Braley highlights why even small farms are increasingly targeted and how awareness, threat intelligence sharing, and proactive cyber defense strategies are...
info_outlineCyber Focus
In this special Independence Day episode of Cyber Focus, we bring together highlights from three influential House leaders shaping U.S. cyber policy: Chairman Mark Green (Homeland Security), Chairman Mike Rogers (Armed Services), and Chairman Rick Crawford (Intelligence). From digital warfare and offensive cyber capabilities to workforce development and interagency reform, this episode offers a rare look into how Congress is working to strengthen national security in the digital age. Listen to their full interviews: • Rick Crawford – We Are in a State of Digital Warfare • Mike Rogers...
info_outlineCyber Focus
In this urgent episode of Cyber Focus recorded June 24, 2025, host Frank Cilluffo speaks with retired General Frank McKenzie, former Commander of U.S. Central Command and Executive Director of the Global and National Security Institute at the University of South Florida. The discussion focuses on the unfolding crisis between Iran and Israel, recent U.S. military strikes on Iranian nuclear sites, and the fragile ceasefire now in place. McKenzie offers expert insight into the strategic weakness of Iran, the state of its proxy forces, and the growing threat of Iranian cyberattacks. They also...
info_outlineOriginally Released September 11, 2024
In this episode of Cyber Focus we’re revisiting the conversation Frank Cilluffo had last September with Robert M. Lee. Rob is the CEO and co-founder of Dragos, a leading firm in industrial control systems (ICS) and operational technology (OT) cybersecurity. Rob unpacks the real-world consequences of cyber-enabled threats to physical infrastructure, including attacks on water systems, energy grids, and manufacturing sites. He shares insights into advanced malware like PipeDream and Frosty Goop, explains the growing risk of scalable OT attacks, and highlights adversaries’ shifting tactics — from state-backed intrusions to criminal exploitation. The conversation also covers lessons from Ukraine, implications of Volt Typhoon, and the importance of visibility, public-private collaboration, and outcome-focused regulation in defending critical infrastructure.
Main Topics Covered:
- What operational technology (OT) is — and how it differs from IT
- Why cyber-enabled threats to physical infrastructure are escalating
- Real-world case studies: Ukraine grid attacks, Saudi petrochemical facility, and U.S. water systems
- Dragos' findings on ICS malware: PipeDream, Frosty Goop, and Modbus TCP exploits
- Emerging adversary trends including Volt Typhoon and the shift to scalable, repeatable OT malware
- The state of public-private collaboration and challenges facing OT cybersecurity in the U.S. and globally
- Lessons from Singapore’s regulatory approach and what operators can do today
Key Quotes:
"[Operational technology] is all the stuff you have in IT, plus physics." – Robert M. Lee
"These are cyber enabled attacks that can have physical consequences." – Frank Cilluffo
"[PipeDream] is the first time we've seen ICS or OT malware that is repeatable, reusable, and scalable across industries. It works in everything from a servo motor on an unmanned aerial vehicle to a gas turbine." – Robert M. Lee
"There was an attack in 2017 where an adversary broke into a petrochemical facility in Saudi Arabia explicitly to cause an event at a facility that would have killed people if they were successful." – Robert M. Lee
"Right now in the operations technology community, we deal with low frequency, high consequence attacks. IT deals with high frequency, low consequence attacks. And if we start to see scale, we're going to start to see medium to then high frequency, high consequence attacks. We're not ready." – Robert M. Lee
Relevant Links and Resources:
- Dragos FrostyGoop ICS Malware Intel Brief
- Chernovite and PipeDream Malware Overview
- CNN Opinion: Small-Town Water Systems Are Global Hacking Targets – Robert M. Lee
Guest Bio:
Rob Lee is the CEO and co-founder of Dragos, a cybersecurity company focused on protecting industrial control systems (ICS) and operational technology (OT). With a background in military and intelligence, Rob has worked at the National Security Agency (NSA) and U.S. Cyber Command. He has been instrumental in raising awareness about the vulnerabilities in critical infrastructure and the need for better OT cybersecurity. Rob is widely recognized as a leader in the field, advising government agencies and industry leaders on protecting essential services from cyberattacks.