loader from loading.io
How Apple's iPhone Supply Chain Built China into a Manufacturing Superpower with Patrick McGee show art How Apple's iPhone Supply Chain Built China into a Manufacturing Superpower with Patrick McGee

Cyber Focus

Supply chains are essential infrastructure—and the iPhone’s supply chain sits at the center of U.S.–China competition. As Washington reassesses economic security, this episode explores what it looks like when market incentives collide with geopolitical reality. Frank Cilluffo speaks with Patrick McGee, author of Apple in China, about his reporting on Apple’s deep manufacturing reliance on China—and what that reveals about leverage, resilience, and risk. They explore how industrial capacity is built through repetition, why diversification is harder than headlines suggest, and how...

info_outline
AI, Critical Infrastructure, and Cascading Failures with Madison Horn show art AI, Critical Infrastructure, and Cascading Failures with Madison Horn

Cyber Focus

Madison Horn joins host Frank Cilluffo to explain why AI-driven cyber risk may be quieter, faster, and harder to spot in 2026. She breaks down “cascading failures” in critical infrastructure—and how a disruption in one sector can quickly ripple into others. The conversation zeroes in on AI agents, especially their ability to create new user accounts, get access to systems, and hide inside everyday routine activity. Horn also warns that AI supply chain weaknesses could spread faster than traditional zero-days.   Main Topics Covered  Why AI-enabled attacks may look like...

info_outline
Cyber Leadership, Workforce Morale, and the House Email Breach with Nextgov's David DiMolfetta show art Cyber Leadership, Workforce Morale, and the House Email Breach with Nextgov's David DiMolfetta

Cyber Focus

CISA leadership, NSA/Cyber Command staffing, and offensive cyber operations are colliding early in 2026. Frank Cilluffo and reporter David DiMolfetta unpack Sean Plankey’s renomination for CISA Director, and what a prolonged leadership vacuum can mean for agency direction and momentum. They then turn to Lt. Gen. Rudd’s confirmation hearing and the evolving debate over the Title 10/Title 50 “dual hat.” The conversation also examines morale and workforce pressures inside NSA, including reported staffing reductions. It closes with “Absolute Resolve,” what public discussion of cyber...

info_outline
The Hammer and the Anvil: Offensive Cyber Strategy with Chris Inglis show art The Hammer and the Anvil: Offensive Cyber Strategy with Chris Inglis

Cyber Focus

Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute’s new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why “defend forward” and persistent engagement reshaped authorities and expectations after 2018, including how NSPM-13 changed delegation for operations. The conversation also tackles the messy seam between Title 10 and Title 50 in cyberspace, and why integration—not...

info_outline
Are We Ready for 2026? Top Cyber Predictions on Policy, Tech, and Threats show art Are We Ready for 2026? Top Cyber Predictions on Policy, Tech, and Threats

Cyber Focus

Cyber Focus kicks off 2026 (and its 100th new episode) with rapid-fire predictions from McCrary Institute senior fellows. They flag big policy inflection points—especially whether Congress can reauthorize “CISA 2015,” sustain information-sharing protections, and keep state and local cybersecurity funding on track. Tech-wise, the group focuses on AI’s accelerating integration, the “speed” divide between defenders and adversaries, and emerging pressures across connectivity and infrastructure. On threats, they warn about deepfake-driven social engineering, ransomware that’s getting...

info_outline
AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA’s Nick Andersen show art AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA’s Nick Andersen

Cyber Focus

AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA’s Cybersecurity Division, explains why Anthropic’s recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude models to automate and scale parts of an intrusion. Andersen and Frank Cilluffo unpack what that signal means for resilience, from model safeguards to the infrastructure and people surrounding them. They apply secure-by-design thinking to frontier...

info_outline
Revisiting Offensive Cyber Discussion with Adm. Mike Rogers (Ret.) show art Revisiting Offensive Cyber Discussion with Adm. Mike Rogers (Ret.)

Cyber Focus

In this re-releases episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing national security challenges. The conversation spans from undersea cable vulnerabilities to public-private integration, the future of quantum and AI, and the enduring need for clarity in cyber policy. A decorated Auburn alum, Rogers reflects on...

info_outline
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting show art The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting

Cyber Focus

Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent “accidental” disruptions and growing geopolitical risk. Listeners hear why chokepoints, island dependencies, and hotspots from the Red Sea to the Taiwan Strait keep national security officials up at night. The conversation also explores how redundancy, smarter investigations, and faster permitting can harden this hidden backbone against both...

info_outline
The Army’s “No Fail” Cyber Mission with Brandon Pugh show art The Army’s “No Fail” Cyber Mission with Brandon Pugh

Cyber Focus

Army Principal Cyber Advisor Brandon Pugh joins Frank Cilluffo to address a stark reality: if critical infrastructure fails, the Army cannot mobilize. To meet this “no fail” mission, Pugh explains how the service is aggressively merging cyber with electronic warfare and cutting red tape to field new technology in days rather than years. They also discuss the Army’s unique edge in this digital fight—Reservists who bring high-level private sector expertise directly to the battlefield. The conversation also explores how AI and operational technology are reshaping the Army’s cyber...

info_outline
Inside State Cyber Defense: Whole-of-State Security with Alabama's Daniel Urquhart and Chad Smith show art Inside State Cyber Defense: Whole-of-State Security with Alabama's Daniel Urquhart and Chad Smith

Cyber Focus

State and local governments are stepping up to defend critical services against fast-evolving cyber threats. In this episode of Cyber Focus, Alabama’s top IT leaders show how they’re staying ahead of the curve. They explain how a hybrid, highly decentralized environment forces them to lean on shared standards, SLCGP funding, and whole-of-state partnerships. Along the way, they unpack a recent incident that came dangerously close to crisis and what it revealed about tools, visibility, and trust. They also look ahead to AI-enabled attacks, deepfakes, and “distortion,” and why automation...

info_outline
 
More Episodes

In this special Cyber Focus episode recorded at Black Hat 2025, host Frank Cilluffo sits down with two senior leaders from the Cybersecurity and Infrastructure Security Agency (CISA): Chris Butera, a more than decade-long CISA veteran currently serving as Acting Director of the Cybersecurity Division, and Bob Costello, the agency’s Chief Information Officer. They discuss how CISA is adapting its mission in the face of evolving threats, budget pressures, and leadership changes, while maintaining a rapid operational tempo. Topics include the agency’s fast-turn vulnerability response through the Known Exploited Vulnerabilities (KEV) catalog, expansion and quality focus of the Common Vulnerabilities and Exposures (CVE) program, and the push to strengthen operational technology (OT) security. The conversation also explores resilience strategies like CISA’s new eviction tool, deepening public-private operational collaboration, securing supply chains, and the importance of reauthorizing the Cybersecurity and Information Sharing Act.

Main Topics Covered

  • CISA’s mission, workforce, and adapting to leadership and budget changes
  • Rapid vulnerability response and the Known Exploited Vulnerabilities (KEV) catalog
  • Threat landscape, including nation-state actors and OT security
  • Operational collaboration with industry, JCDC, and new IT platforms
  • CVE program growth and automation for vulnerability management
  • Resilience strategies, eviction tool, and micro-segmentation
  • Supply chain security and Secure by Demand guidance
  • SLTT cybersecurity grants and field support
  • Importance of reauthorizing the Cybersecurity and Information Sharing Act (2015)

Key Quotes:

  • “I'm really honored to work with some of the most experienced cyber professionals I think that exists anywhere in the world… We're seeing people step up into new roles, leadership positions, work on new technical projects that maybe they weren't before. And we're just hitting grand slams every day.” – Bob Costello
  • “[I ask organizations] ‘How can you continue your mission without access to some of your critical systems? Whether these are your billing systems, your IT systems, your even just access to the Internet.’ And I think a lot of organizations don't have those kind of plans in place or can't function in those cases.” – Chris Butera
  • “One of the things that we are trying to do every single day is remove some of those OT systems from the Internet. That is a very critical step that we think that there are very few business cases where you should have an OT system connected directly to the Internet.” – Chris Butera
  • “We absolutely support reauthorization of [CISA 2015 authorities]… collaboration is what we're all about. We talk about cyber being a team sport and this helps make all the teams play a lot better together.” – Bob Costello
  • “I think we all need to think about [supply chains] a lot differently. And it's across the board, whether it's open source, closed source, or hardware, everything is kind of linked together, and often we don't know where those linkages are.” – Bob Costello

Relevant Links and Resources:

Guest Bios:

  • Chris Butera is Associate Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), where he oversees operational efforts to protect the nation’s critical infrastructure from cyber threats.
  • Bob Costello is Chief Information Officer at CISA, leading the agency’s enterprise IT systems, collaboration platforms, and secure information-sharing initiatives with public and private sector partners.