Cyber Focus
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
info_outline
Power, Security, and the Infrastructure of Tomorrow with Power Podcast Host Aaron Larson
07/29/2025
Power, Security, and the Infrastructure of Tomorrow with Power Podcast Host Aaron Larson
In this special crossover edition of Cyber Focus and the Power Podcast, host Frank Cilluffo sits down with Aaron Larson to explore the evolving intersection of energy innovation and cybersecurity. From breakthroughs in small modular reactors and geothermal technologies to the power demands of AI and electric vehicles, they examine how the U.S. grid is being reshaped by both opportunity and threat. Larson draws on his background in nuclear power and conversations with top industry leaders to highlight the promise of emerging energy sources—and the urgent need to bake in security from the start. Together, they underscore the stakes of keeping U.S. energy infrastructure resilient in the face of growing cyber threats and global competition. Main Topics Covered: The transformation of the U.S. power grid from centralized plants to distributed energy resources The impact of AI, data centers, and EVs on electricity demand Innovations in nuclear energy, including SMRs, fusion, and microreactors State-level leadership in clean energy development and workforce transition The need for stronger cybersecurity awareness and integration across the energy sector Strategic competition with China in advanced energy technologies Key Quotes: "We can't [be AI dominant] if we're not energy dominant. The two are inextricably interwoven." — Frank Cilluffo "The nuclear industry will never compromise on safety... because they know any accident at one facility is an accident at all facilities" — Aaron Larson "Volt Typhoon... literally did the cyber equivalent of preparation of the battlefield, where they own that infrastructure and can turn it on or off to meet their needs." — Frank Cilluffo "People know [Cybersecurity] is important...They just don't always think it's their responsibility." — Aaron Larson Guest Bio: Aaron Larson is the Executive Editor of POWER magazine, a team he joined in 2013. Aaron has a bachelor’s degree in nuclear engineering technology and a master’s degree, specializing in finance. He spent 13 years in the U.S. Navy nuclear power program, advancing to Chief Petty Officer. He has worked at commercial nuclear, biomass, and coal-fired power plants, functioning in operations, maintenance, safety, financial, and management capacities.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37578840
info_outline
Inside the UK’s Cyber Strategy: Richard Horne on Resilience, Risk, and AI
07/22/2025
Inside the UK’s Cyber Strategy: Richard Horne on Resilience, Risk, and AI
Richard Horne, CEO of the United Kingdom’s National Cyber Security Centre (NCSC), joins host Frank Cilluffo to explore how the UK is strengthening cyber resilience across critical infrastructure, private industry, and international partnerships. Drawing from his experience in both government and the private sector, Horne outlines NCSC’s approach to tackling advanced threats, closing resilience gaps, and collaborating with allies on systemic cyber defense. The conversation spans ransomware, AI, supply chain risk, quantum cryptography, and how organizations—large and small—can better prepare for disruption. Horne emphasizes the growing complexity of the digital threat landscape and urges a pragmatic, contest-oriented mindset to keep pace. Main Topics Covered: The mission and structure of the UK’s National Cyber Security Centre (NCSC) Cyber resilience through exposure, defenses, and consequence management Gaps in critical infrastructure protection and supply chain vulnerabilities Use of AI and automation in both defense and attack International collaboration and the importance of Five Eyes partnerships Quantum computing and the need to prepare cryptography for post-quantum threats Key Quotes: “AI is almost like… when we moved from wooden [tennis] rackets to composite rackets. Was that an advantage? It was an advantage to both sides. [...] If you stick with a wooden racket, then ultimately you're going to be overcome.” — Richard Horne “We see many cyber attacks exploiting zero-day vulnerabilities that frankly shouldn't be there. And the quality of code that we have in our hardware, software… is a big issue.” — Richard Horne “In the world we're in, we all need to recognize we have a responsibility for cyber security for ourselves and for others.” — Richard Horne “The relationship with the U.S. and the Five Eyes really does underpin especially our understanding of the most advanced threat.” — Richard Horne “You'll often see sort of ransomware attacks against some small company you've never heard of and then potential front page impact the next day.” — Richard Horne Related Links: Guest Bio: Richard Horne has served as CEO of the UK’s National Cyber Security Centre since October 2024. Prior to that, he was a Cyber Security Partner at PwC UK, where he advised global leaders on cyber risk strategy and led responses to major incidents—including the 2021 ransomware attack on Ireland’s health service. He previously led cyber risk management at Barclays and played a key role in developing the UK’s first national cyber security plan during a stint with the Cabinet Office. Richard holds a PhD in Mathematics and has represented the UK in cybersecurity forums at the OECD, European Commission, and ISO.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37482640
info_outline
NSA vs. Zero-Days: Kristina Walter on Speed, Scale, and Stopping Cyber Threats
07/15/2025
NSA vs. Zero-Days: Kristina Walter on Speed, Scale, and Stopping Cyber Threats
Kristina Walter, Director of the NSA’s Cybersecurity Collaboration Center, joins Frank Cilluffo to explain how the NSA is building trusted partnerships with private industry to counter advanced cyber threats. Walter shares how collaborative work with defense contractors and tech providers has helped uncover zero-day vulnerabilities, block billions of malicious domains, and expose Chinese operations like Volt Typhoon. She also discusses the role of AI in cyber defense, the race to prepare for quantum computing, and why resilience—not perfection—is the new benchmark for critical infrastructure protection. Main Topics Covered Origins and mission of the Cybersecurity Collaboration Center Building trust and scaling public-private partnerships Tracking Chinese cyber campaigns and zero-day vulnerabilities NSA’s protective DNS service and pre-ransomware defense AI’s role in threat detection and emerging attack surfaces Post-quantum cryptography and upgrading national systems Workforce development and government-industry collaboration Key Quotes “That service has about 1200 companies enrolled in it today. And it's blocked 4 billion malicious domains… 500 million of them are NSA unique domains.” – Kristina Walter “You can't surge trust in a crisis. We have found that having that established relationship meant that when something did go wrong for some of these companies, they knew who to turn to, and how to work with us, and how we would protect the information they gave us”. – Kristina Walter “We found it in about two weeks of the start of exploitation and were able to get out the hunting and the detections while the patch was being worked so that we could do it all together and try to remediate the threat.” – Kristina Walter “Our focus was… how do we work with interagency partners and industry to expose this trade craft of living off the land… and really unleash the cybersecurity community in the United States to find it and eradicate it on the US Government's behalf.” – Kristina Walter “When we talk about a cryptologically relevant quantum computer, it's really [a question of] when, not if… So what we're really focused on is how do we upgrade all of the cryptographic inventory of the United States and national security systems to be quantum resistant.” – Kristina Walter Relevant Links and Resources Guest Bio Kristina Walter is Director of the NSA’s Cybersecurity Collaboration Center, where she leads efforts to partner with private industry in defense of U.S. national security systems. A founding member of the center, Walter brings deep experience from her work in both operational cybersecurity and workforce development at NSA. She also oversees the NSA’s AI Security Center, advancing the secure development of artificial intelligence technologies while safeguarding U.S. innovation from foreign adversaries.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37363370
info_outline
Hacking the Harvest: Jonathan Braley on Ransomware, GPS Disruption, and Securing U.S. Agriculture
07/08/2025
Hacking the Harvest: Jonathan Braley on Ransomware, GPS Disruption, and Securing U.S. Agriculture
In this episode of Cyber Focus, Frank Cilluffo sits down with Jonathan Braley, Director of the Food and Agriculture Information Sharing and Analysis Center (Food and Ag-ISAC), to explore the growing cybersecurity threats facing the U.S. food and agriculture sector. They examine the integration of operational technology (OT), the rise in ransomware attacks on farms and food producers, and the fragile nature of supply chain cybersecurity. Braley highlights why even small farms are increasingly targeted and how awareness, threat intelligence sharing, and proactive cyber defense strategies are essential. The discussion also touches on the geopolitical dimensions of agricultural cybersecurity, with examples from Ukraine, Israel, and China. Main Topics Covered: • Why cybersecurity threats matter in the agriculture and food production sector • The risks posed by operational technology (OT) and GPS disruption in precision agriculture • The impact of ransomware attacks on small farms and supply chain resilience • Emerging cyber threats tied to foreign adversaries, disinformation, and intellectual property theft • New technologies in agriculture: AI tools, drones, and autonomous farming systems • The importance of cyber threat intelligence sharing and public-private collaboration in agriculture Key Quotes: “Historically we all have this picture of a farm in our heads with the manual tractors and people out on the fields. But there's a lot of technology now baked into the food and agriculture sector.” – Jonathan Braley “If we’re relying on our precision agriculture without a backup plan, when [GPS] goes down, it's not going to be a good situation for us.” – Jonathan Braley “Anywhere along that [supply] line, one of those companies has a cyber incident—it's going to impact everybody.” – Jonathan Braley “The ransomware group seemed to have an understanding of the nature of food and ag, and they hit them when it was most impactful [during peak planting and harvesting season].” – Jonathan Braley “The more we can share with each other [across government and industry], I think we have a better chance of protecting ourselves.” – Jonathan Braley Relevant Links and Resources: • Food and Ag-ISAC: • Guest Bio: Jonathan Braley is the Director of the Food and Ag-ISAC, a key hub for cybersecurity information sharing across the food and agriculture sector. He also serves as Director of Threat Intelligence at the IT-ISAC, where he supports some of the world’s leading technology companies. Braley’s work focuses on improving cyber resilience in agriculture, helping farms, suppliers, and food producers detect and defend against ransomware, OT threats, and supply chain vulnerabilities.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36973875
info_outline
Cyber Warfare, Workforce, and Fixing the System: Top House Chairmen on the Digital Threat
07/01/2025
Cyber Warfare, Workforce, and Fixing the System: Top House Chairmen on the Digital Threat
In this special Independence Day episode of Cyber Focus, we bring together highlights from three influential House leaders shaping U.S. cyber policy: Chairman Mark Green (Homeland Security), Chairman Mike Rogers (Armed Services), and Chairman Rick Crawford (Intelligence). From digital warfare and offensive cyber capabilities to workforce development and interagency reform, this episode offers a rare look into how Congress is working to strengthen national security in the digital age. Listen to their full interviews: • Rick Crawford – We Are in a State of Digital Warfare • Mike Rogers – Cyber, Space, and the Future of Warfare • Mark Green – Bridging the Cybersecurity Gap
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37203315
info_outline
Iran, Ceasefires, and Cyber Threats: A Briefing with General Frank McKenzie (Ret.)
06/24/2025
Iran, Ceasefires, and Cyber Threats: A Briefing with General Frank McKenzie (Ret.)
In this urgent episode of Cyber Focus recorded June 24, 2025, host Frank Cilluffo speaks with retired General Frank McKenzie, former Commander of U.S. Central Command and Executive Director of the Global and National Security Institute at the University of South Florida. The discussion focuses on the unfolding crisis between Iran and Israel, recent U.S. military strikes on Iranian nuclear sites, and the fragile ceasefire now in place. McKenzie offers expert insight into the strategic weakness of Iran, the state of its proxy forces, and the growing threat of Iranian cyberattacks. They also examine how Russia and China are positioning themselves amid the turmoil, the state of U.S. missile defense systems, and what Americans should watch for when it comes to national and homeland security. Main Topics Covered: Iran’s weakened military and the strategic calculus behind the current ceasefire U.S. bunker-busting strikes and implications for Iran’s nuclear program The future of Iran’s proxy forces and risks of terrorism and radicalization China and Russia’s interests in the Middle East crisis Iran’s cyber threat posture and U.S. digital vulnerabilities Space-based missile defense and the future of homeland security strategy Key Quotes: “Iran badly needs a ceasefire. They need to stop the bombardment because they're losing.” — General Frank McKenzie (Ret.) “The fact of the matter is Iran has had poor luck operating in the United States… they're not adept at operating in this environment.” — General Frank McKenzie (Ret.) “I think self radicalization is probably more of a threat… than a highly organized Iranian attack in the United States or through one of their proxies. But you can't rule it out.” — General Frank McKenzie (Ret.) “They do have the ability to attack us here with cyber… they will go where we're weakest.” — General Frank McKenzie (Ret.) “If we want to defend the United States against attacks like this from intercontinental ballistic missiles, we're going to have to be prepared to put systems on orbit, persistent systems on orbit.” — General Frank McKenzie (Ret.) Relevant Links and Resources: Guest Bio: General Frank McKenzie (Ret.) is the Executive Director of the Global and National Security Institute at the University of South Florida and former Commander of U.S. Central Command (CENTCOM). A retired U.S. Marine Corps General, McKenzie brings decades of experience in Middle East operations, nuclear deterrence, and national security strategy. He is a leading voice on cybersecurity, defense policy, and military readiness in the face of global threats.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37139740
info_outline
To the Point: Iran’s Cyber Threat After Israel’s Strikes
06/20/2025
To the Point: Iran’s Cyber Threat After Israel’s Strikes
As tensions explode between Israel and Iran, what cyber threats could hit the U.S. next? In this urgent episode of To the Point, host Frank Cilluffo sits down with Admiral (Ret.) Mark Montgomery—cybersecurity expert and longtime Solarium Commission leader—to assess the growing risk of Iranian cyberattacks on U.S. critical infrastructure. With Iran and its proxies already escalating digital aggression against Israeli targets, Montgomery warns that water systems, energy grids, and transportation networks in the U.S. could soon face similar threats. The conversation explores: The vulnerabilities across U.S. critical infrastructure Iran’s evolving cyber and influence capabilities Lessons from China’s Volt Typhoon campaign The need for a renewed "shields up" posture from CISA Why national cyber defense demands stronger National Guard and reserve roles Montgomery and Cilluffo call for urgent action to harden defenses and rethink public-private coordination in light of this volatile moment on the global stage. More coverage on https://threatbeat.com/
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37093765
info_outline
“We Are in a State of Digital Warfare”: Chairman Rick Crawford on the Cyber Frontlines
06/17/2025
“We Are in a State of Digital Warfare”: Chairman Rick Crawford on the Cyber Frontlines
In this episode of Cyber Focus, host Frank Cilluffo sits down with Congressman Rick Crawford, Chairman of the House Permanent Select Committee on Intelligence. They explore the evolving cyber threat landscape—from Chinese infiltration of U.S. supply chains to the rise of paramilitary cartels leveraging advanced digital tools. Crawford shares his perspective on offensive cyber capabilities, domestic counterintelligence reform, and efforts to close legislative blind spots through inter-committee collaboration. The conversation also covers critical infrastructure vulnerabilities, agricultural data security, and the strategic role of open-source intelligence in modern national security. Main Topics Covered: China’s cyber-enabled influence operations in the Western Hemisphere The evolution of cartels into cyber-capable paramilitary organizations Counterintelligence gaps within the U.S. and the need for stronger domestic protections Hardware vulnerabilities in supply chains, agriculture, and freight logistics Debate over splitting NSA and U.S. Cyber Command leadership (“dual-hat” issue) Legislative focus on reauthorizing CISA and addressing liability protections for reporting The national security importance of open-source intelligence (OSINT) Key Quotes: “We are living in a state of digital warfare… As long as we continue to be in a defensive posture, this will continue to be a pervasive problem.” —Chairman Rick Crawford “[The cartels] have evolved into essentially a paramilitary organization… this is not the 1980s and they are very much a sophisticated adversary.” —Chairman Rick Crawford “It's [China’s] ability to seed critical infrastructure elements…that gives them a foray into our supply chain. That makes us very, very vulnerable.” —Chairman Rick Crawford “[Open source intelligence] comprises about 25% of the President's Daily Brief. That’s significant… but it doesn’t have the appropriate level of attention paid to it.” —Chairman Rick Crawford "We either need to be all in [on Cyber Command] as a combatant command and then stand it up and authorize it the way it should be, fund it appropriately and organize it appropriately, or we need to say we think the NSA can do this and make this sort of a subsidiary of the NSA." —Chairman Rick Crawford Relevant Links and Resources: · Learn more about Congressman Rick Crawford: · House Permanent Select Committee on Intelligence: Guest Bio: Rep. Rick Crawford represents Arkansas’s First Congressional District and serves as Chairman of the House Permanent Select Committee on Intelligence. A former Army EOD technician, Crawford brings a national security lens to issues ranging from intelligence oversight and supply chain security to cyber threats in agriculture. He also serves on the Transportation and Infrastructure Committee and the Agriculture Committee, positioning him uniquely to address cybersecurity across critical infrastructure sectors.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/37024685
info_outline
Splitting Commands, Building Capabilities: DefenseScoop’s Mark Pomerleau on the DoD's Cyber Future
06/10/2025
Splitting Commands, Building Capabilities: DefenseScoop’s Mark Pomerleau on the DoD's Cyber Future
In this episode of Cyber Focus, host Frank Cilluffo sits down with Mark Pomerleau, senior reporter for DefenseScoop, to discuss the evolving landscape of U.S. cyber operations and military doctrine. Pomerleau unpacks the ongoing debate over splitting NSA and U.S. Cyber Command, the rising role of offensive cyber capabilities, and what “Cybercom 2.0” might look like in practice. He also explores the integration of cyber, electronic warfare, and space as part of a new operational triad, and shares lessons learned from Ukraine that are reshaping U.S. strategy. Together, they examine whether U.S. deterrence efforts are keeping pace with adversaries—and what needs to change to meet tomorrow’s threats. Main Topics Covered: The origins and implications of the NSA-Cyber Command dual-hat debate Tactical cyber at the edge: how services are enabling cyber in battlefield operations The emerging cyber-electronic warfare-space triad Cybercom 2.0 and the effort to modernize doctrine, authorities, and force generation The limits of cyber deterrence and the need for a more assertive posture Key Quotes: “As a Title 50 intelligence organization, your goal is to not get caught… using that same infrastructure for military operations… can undermine that [intelligence] mission. And so Cyber Command has been working to really build up its own infrastructure, its own tools.” — Mark Pomerleau “The modern triad… really includes space, special operations forces and cyber. And the notion is that all of these together will be greater than the sum of their parts and be able to provide some really unique mission packages and capabilities for commanders.” — Mark Pomerleau “One of the big lessons that the Department of Defense came away with is that cyber does have a role to play in future conflict, but it's not the role that they necessarily thought it was a few years ago. And that cyber by itself likely isn't going to have the effect that they… initially thought it was.” — Mark Pomerleau “EW is going to be a huge enabler going forward… The faster commanders realize how to harness that and maneuver within that space, combine it with other effects like cyber and RF… we're really going to see that take off.” — Mark Pomerleau “Ultimately, those that are integrating [cyber and EW] into their warfighting strategy, doctrine, and practice are the ones that are going to dominate.” — Frank Cilluffo Relevant Links and Resources: Guest Bio: Mark Pomerleau is a senior reporter for DefenseScoop, covering information warfare, cyber, electronic warfare, information operations, intelligence, and battlefield networks. With over a decade of experience, he is widely regarded as one of the most authoritative voices reporting on military cyber and EW strategy. His reporting regularly shapes the national conversation around U.S. cyber policy and defense modernization.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36926440
info_outline
Space Is the Battlefield: Deterrence, Hypersonics, and China’s Threat with ULA CEO Tory Bruno
06/03/2025
Space Is the Battlefield: Deterrence, Hypersonics, and China’s Threat with ULA CEO Tory Bruno
In this episode of Cyber Focus, host Frank Cilluffo sits down with Tory Bruno, President and CEO of United Launch Alliance (ULA), which is responsible for more than 90% of U.S. national security space launches. Bruno discusses the escalating threat landscape in space, the urgency of a layered missile defense architecture known as the "Golden Dome," and how adversaries like China may initiate future conflicts in orbit before any shots are fired on Earth. The conversation also explores the technological and policy components of space deterrence, Bruno’s insights from decades of leadership in strategic defense, and the role of directed energy in countering hypersonics. Main Topics Covered: ULA’s role in national security and heavy-lift launch capability The increasing likelihood that future conflicts with China will begin in space The case for a layered missile defense system, including THAAD and NGI Vulnerabilities in U.S. space infrastructure and economic dependence on orbit-based systems Directed energy as a solution to maneuvering hypersonic threats Policy priorities for the incoming administration Key Quotes: “A conflict like that on Earth will begin in space because China will see it as a means of leveling the playing field.” – Tory Bruno “[Space is now] a utility for our economy, everything and our society. Not having space would be like not having water, not having highways, not having transportation.” – Tory Bruno “[Space] isn’t a force multiplier. It is now absolutely essential for basic military operations.” – Tory Bruno “North Korea, Iran, Syria… there’s about a dozen countries that we now need to be concerned about. They would not necessarily be able to mount the volume of an attack that a China could. But… they might have some similar [counterspace] capabilities that in the past would have been really beyond their reach.” – Tory Bruno “Golden Dome is way overdue… When you’ve got a dozen countries that have a capability to put either a conventional or, God forbid, a weapon of mass destruction on your kids’ school, then only having a retaliatory deterrent is insufficient.” – Tory Bruno Relevant Links and Resources: Guest Bio: Tory Bruno is President and CEO of United Launch Alliance (ULA), where he leads the country’s most experienced and reliable launch provider. Prior to ULA, he held senior roles at Lockheed Martin, including as Vice President of the THAAD missile program. With decades of experience in missile defense, strategic deterrence, and space systems, Bruno is a leading voice on the intersection of aerospace technology and national security.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36833330
info_outline
OT Under Threat: Dragos' Robert M. Lee on Navigating Cyber-Physical Risks
05/27/2025
OT Under Threat: Dragos' Robert M. Lee on Navigating Cyber-Physical Risks
Originally Released September 11, 2024 In this episode of Cyber Focus we’re revisiting the conversation Frank Cilluffo had last September with Robert M. Lee. Rob is the CEO and co-founder of Dragos, a leading firm in industrial control systems (ICS) and operational technology (OT) cybersecurity. Rob unpacks the real-world consequences of cyber-enabled threats to physical infrastructure, including attacks on water systems, energy grids, and manufacturing sites. He shares insights into advanced malware like PipeDream and Frosty Goop, explains the growing risk of scalable OT attacks, and highlights adversaries’ shifting tactics — from state-backed intrusions to criminal exploitation. The conversation also covers lessons from Ukraine, implications of Volt Typhoon, and the importance of visibility, public-private collaboration, and outcome-focused regulation in defending critical infrastructure. Main Topics Covered: What operational technology (OT) is — and how it differs from IT Why cyber-enabled threats to physical infrastructure are escalating Real-world case studies: Ukraine grid attacks, Saudi petrochemical facility, and U.S. water systems Dragos' findings on ICS malware: PipeDream, Frosty Goop, and Modbus TCP exploits Emerging adversary trends including Volt Typhoon and the shift to scalable, repeatable OT malware The state of public-private collaboration and challenges facing OT cybersecurity in the U.S. and globally Lessons from Singapore’s regulatory approach and what operators can do today Key Quotes: "[Operational technology] is all the stuff you have in IT, plus physics." – Robert M. Lee "These are cyber enabled attacks that can have physical consequences." – Frank Cilluffo "[PipeDream] is the first time we've seen ICS or OT malware that is repeatable, reusable, and scalable across industries. It works in everything from a servo motor on an unmanned aerial vehicle to a gas turbine." – Robert M. Lee "There was an attack in 2017 where an adversary broke into a petrochemical facility in Saudi Arabia explicitly to cause an event at a facility that would have killed people if they were successful." – Robert M. Lee "Right now in the operations technology community, we deal with low frequency, high consequence attacks. IT deals with high frequency, low consequence attacks. And if we start to see scale, we're going to start to see medium to then high frequency, high consequence attacks. We're not ready." – Robert M. Lee Relevant Links and Resources: Guest Bio: Rob Lee is the CEO and co-founder of Dragos, a cybersecurity company focused on protecting industrial control systems (ICS) and operational technology (OT). With a background in military and intelligence, Rob has worked at the National Security Agency (NSA) and U.S. Cyber Command. He has been instrumental in raising awareness about the vulnerabilities in critical infrastructure and the need for better OT cybersecurity. Rob is widely recognized as a leader in the field, advising government agencies and industry leaders on protecting essential services from cyberattacks.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36729730
info_outline
When Fraud Meets Cyber: The Retail Sector’s Expanding Risk Landscape with NRF’s Christian Beckner
05/20/2025
When Fraud Meets Cyber: The Retail Sector’s Expanding Risk Landscape with NRF’s Christian Beckner
In this episode of the Cyber Focus podcast, recorded on April 30 at the RSA Conference in San Francisco, host Frank Cilluffo sits down with Christian Beckner, Vice President of Retail Technology and Cybersecurity at the National Retail Federation. Beckner provides a wide-ranging look at how cybersecurity, fraud, and emerging technologies are reshaping the retail landscape. They discuss how threats have evolved over the past decade, the growing impact of third-party risk, and the rise of fraud tactics such as account takeovers and gift card abuse. Beckner also outlines NRF’s policy work on CIRCIA, the SEC cyber disclosure rule, and the organization’s efforts to build stronger cross-sector collaboration. The conversation offers both a strategic overview and practical insight into one of the nation’s most targeted and complex sectors. Main Topics Covered: The role of NRF and its focus on retail cybersecurity How threats to the sector have evolved over the past 7 years Growing concerns around third-party and vendor risk The surge in fraud, including account takeover and gift card abuse NRF’s development of a fraud taxonomy for the industry How AI is shaping both threats and defenses NRF’s cyber policy priorities and hopes for increased CISA engagement Long-term risks and opportunities for strengthening retail cybersecurity Key Quotes: “Retail is a huge part of the economy. It’s something that touches every person every day, and that’s what makes it such an important piece of the overall cybersecurity landscape.” — Christian Beckner “We’re seeing an increase in account takeover fraud, gift card fraud, return fraud… It’s often hard to draw the line between what’s a fraud issue and what’s a cyber issue.” — Christian Beckner “We’re building a taxonomy for fraud. And that’s critical, because right now, we’re all speaking different languages when we talk about these incidents.” — Christian Beckner Relevant Links and Resources: Guest Bio: Christian Beckner is Vice President of Retail Technology and Cybersecurity at the National Retail Federation and Executive Director of NRF’s Center for Digital Risk & Innovation. He leads the association’s efforts on cybersecurity, fraud prevention, and emerging technologies. Before joining NRF, Beckner was Deputy Director of the Center for Cyber and Homeland Security at George Washington University and served in senior roles on the Senate Homeland Security and Governmental Affairs Committee. He holds degrees from Stanford University and Georgetown University.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36580275
info_outline
The One-Way Street of Digital Transformation: OT Cybersecurity with Nozomi's Edgard Capdevielle
05/13/2025
The One-Way Street of Digital Transformation: OT Cybersecurity with Nozomi's Edgard Capdevielle
In this special RSA Conference edition of Cyber Focus, host Frank Cilluffo sits down with Edgard Capdevielle, President and CEO of Nozomi Networks, to unpack the evolving landscape of operational technology (OT) cybersecurity. Together, they explore how digital transformation and the convergence of IT and OT are reshaping the threat environment for critical infrastructure. Capdevielle outlines the three major phases of the OT security market, reflects on the role of AI and legacy systems, and explains why visibility remains foundational to cybersecurity. The conversation also highlights the growing risk from nation-state actors, the breakdown of air gap assumptions, and the tangible steps owner-operators must take to build resilience. Main Topics Covered: Defining the three phases of OT cybersecurity market maturity The impact of digital transformation and IT/OT convergence Why visibility remains the top concern for infrastructure operators The role of AI in passive detection and firmware profiling Nation-state threats, air gap fallacies, and Volt Typhoon’s implications Practical steps for operators to improve risk visibility and resilience Key Quotes: “Digital transformation is a one-way street. We’re only going to automate more — automate everything — and IT and OT are only going to converge more.” — Edgard Capdevielle “You cannot protect what you can’t see. So having a layer of visibility is number one.” — Edgard Capdevielle “Air gapping has been our number one enemy because it’s not real… It’s brought a level of comfort that is not good for us.” — Edgard Capdevielle Relevant Links and Resources: Guest Bio: Edgard Capdevielle is President and CEO of Nozomi Networks, a global leader in OT and IoT cybersecurity. He has a background in computer science and more than two decades of experience in cybersecurity and enterprise technology. Prior to joining Nozomi in 2016, he held leadership roles at Imperva and EMC (including post-acquisition work with Data Domain) and has served as an investor and advisor to several successful startups in the security space.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36550275
info_outline
The AI Energy Surge: Jason Plautz on Grid Strain and National Stakes
05/06/2025
The AI Energy Surge: Jason Plautz on Grid Strain and National Stakes
In this episode of Cyber Focus, host Frank Cilluffo sits down with award-winning journalist Jason Plautz of Politico’s E&E News Energywire to explore the growing tension between artificial intelligence, energy demand, and infrastructure readiness. Plautz breaks down how AI-driven data centers are reshaping the U.S. power grid—and what state and federal leaders are doing in response. The conversation covers legislative efforts in Texas and Georgia, the controversial idea of “kill switches” for data centers, and major federal moves like the Stargate project and DOE’s push to site data centers on federal lands. Plautz also unpacks the Trump administration’s AI and energy strategy, and highlights how tech companies could accelerate innovation in nuclear, geothermal, and other clean energy sources. Main Topics Covered: Why AI is driving an unprecedented spike in electricity demand The strain data centers are placing on existing grid infrastructure How states like Texas and Georgia are responding with new legislation The feasibility and controversy around data center “kill switches” The Stargate project and the Trump administration’s AI-energy policy direction DOE’s plan to co-locate data centers and power sources on federal land Key Quotes: “Some of these [data centers] have been compared to like mini malls. If you imagine a site that big running computers, imagine how much power that's going to need.” — Jason Plautz “AI or data center use could triple by 2030 in the U.S. Right now it accounts for about 4% of the nation's electricity use. It would account for 12%.... the equivalent of 53 million households just running data centers. — Jason Plautz “Lawmakers have said is they don't want a situation where the grid is strained and you have an entire block of houses without power, and across the street is a data center that's still humming.” — Jason Plautz “This is really an opportunity, I think, to leap forward in some of the energy technology that’s been sitting dormant—because all of a sudden, you have deep pockets and a lot of interest.” — Jason Plautz “We're seeing a lot more concern about what would happen if there were to be a cyberattack on the grid. What would that mean—and how can we build the grid without making it more vulnerable?” — Jason Plautz “This is an economic competitiveness issue as well as a national security issue—and it’s a race neither we nor Beijing want to lose.” — Frank Cilluffo Relevant Links and Resources: “Artificial Intelligence's Thirst for Power Demands Greater Focus on Cybersecurity of the Energy Sector” by Frank Cilluffo "State lawmakers grapple with energy demand for data centers" by Jason Plautz “Study finds headroom on the grid for data centers" by Jason Plautz "Energy is AI’s barrier to entry. David Sacks knows it." by Jason Plautz "Chris Wright elaborates on DOE data center build-out, job cuts" by Jason Plautz Guest Bio: Jason Plautz is an award-winning journalist based in Denver, currently reporting for E&E News’ Energywire, where he covers electricity and the clean energy transition. He focuses on the intersection of environmental policy and politics, and his work has also appeared in Science, High Country News, and Ars Technica. A former reporter in Washington, D.C., Plautz was selected for the Scripps Fellowship in Environmental Journalism at the University of Colorado and brings experience in reporting, editing, and audio production.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36455740
info_outline
Agentic AI, the Future of CISA and International Cyber Strategy: Key Takeaways from RSAC 2025
05/02/2025
Agentic AI, the Future of CISA and International Cyber Strategy: Key Takeaways from RSAC 2025
Recorded on May 1, 2025, at the RSA Conference in San Francisco, this special Cyber Focus episode brings together government, industry, and policy leaders for an insider look at the key takeaways from the biggest cybersecurity event of the year. Frank Cilluffo sits down with David Colberg, a longtime RSA leader and architect of the conference’s policy programming, to discuss how RSAC is shaping global cyber dialogue. Then a panel of McCrary Institute Senior Fellows — Katherine Hennessey, Matt Hayden, Alison King, and Bob Kolasky — joins the conversation to reflect on major themes, from agentic AI and offensive cyber to global cooperation and the CISA reorganization. Designed for Washington’s cyber policy community, this episode delivers a timely snapshot of the conversations driving national and international cybersecurity strategy. Main Topics Covered Rising government and policy engagement at RSAC, anchored by the International Cybersecurity Forum Secretary Noem’s keynote and the evolving vision for CISA under the new administration Agentic AI’s role in shaping both cybersecurity and broader national security operations International collaboration, including Australia’s regional outreach and GCHQ’s first public keynote Offensive cyber strategy, red lines, and the Volt Typhoon threat from China Scaling cyber defense through DARPA’s AI Cyber Challenge and emerging automation tools Workforce, collaboration, and renewed focus on federal cybersecurity priorities Key Quotes “We want government folks to be part of that community and to come out and speak and have opportunities to have valuable conversations which drive action.” — David Colberg “Cybersecurity is national security against what could be an existential threat from China.” — Bob Kolasky “We heard references that you’re going to start onboarding [AI] bots in the same way you would employees. CISOs better get good on their AI bot HR.” — Matt Hayden “The way we look at the data and how we use [AI and] the data to solve our cybersecurity challenges, but also our other physical world challenges, I think is a really fascinating place to be.” — Katherine Hennessey “I always think of AI… as augmented intelligence. It’s a tool that has to be used responsibly, and you have to have ethics attached to it.” — Alison King “Technology, whatever it is, it will change. Human nature doesn’t. And if we’re going to defeat the bad guys… it takes networks to defeat [them].” — Frank Cilluffo Relevant Links and Resources RSA Conference: DARPA AI Cyber Challenge (AIxCC): Cybersecurity and Infrastructure Security Agency (CISA): McCrary Institute for Cyber and Critical Infrastructure Security: Guest Bios David Colberg is an advisor to RSA and has led the development of the conference’s government and policy programming for over a decade. He helped launch the International Cybersecurity Forum at RSAC and plays a key role in building connections between public and private sector leaders. Katherine Hennessey, Matt Hayden, Alison King, and Bob Kolasky are Senior Fellows at the McCrary Institute, each bringing deep expertise from across government and industry in cyber strategy, national security, and public-private collaboration.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36410325
info_outline
Live from RSAC 2025: Cyber Threats, Red Lines, and the China Challenge with Rob Joyce
04/30/2025
Live from RSAC 2025: Cyber Threats, Red Lines, and the China Challenge with Rob Joyce
On this episode of Cyber Focus, host Frank Cilluffo sits down with Rob Joyce, former NSA Cybersecurity Director and longtime leader in national cyber operations, to unpack some of the most pressing cybersecurity threats facing the United States today. Recorded live at RSA, the discussion ranges from Chinese pre-positioning in critical infrastructure to the blurred lines between espionage and cyber warfare. Joyce lays out a three-pronged framework for national cyber strategy, reflects on lessons from the counterterrorism playbook, and warns about the shifting attack surface—from endpoints to network infrastructure and cloud identity. The conversation closes with a call for better coordination, clearer definitions, and a whole-of-nation approach to impose real cost on adversaries. Main Topics Covered AI’s emergence as both opportunity and attack surface China’s Volt Typhoon campaign and the need for deterrence Offensive cyber operations, NSPM-13, and defining “defend forward” Counterterrorism lessons applied to cyber strategy Supply chain risks and the influence of foreign-controlled software The shift in attack surface toward identity, cloud, and network infrastructure Key Quotes “If China were running around and strapping Semtex to bridges, we wouldn't tolerate that. But they're strapping digital Semtex to our energy grid, to our pipelines, to our airlines. And we've got to stop that.” — Rob Joyce "Those who use AI will outperform those who don’t. Period." — Rob Joyce "The attackers are now moving to the network devices and into the cloud, taking identity and just going up into your authenticated cloud." — Rob Joyce “This isn't just a cyber issue, it's a China issue, it's a Russia issue, it's a Iran issue, it's a DPRK issue. So you can't just look at cyber means in itself.” — Rob Joyce “If [Chinese spies] had broken into an office and stolen papers, we would have done diplomatic expulsions from their embassy… Why don’t we…reduce the footprint of their embassy and consulate in the US because they're not behaving in a normative fashion. Those are the tools that are outside the cyber toolbox that we're not using. — Rob Joyce Relevant Links and Resources: NSA Cybersecurity Directorate Cybersecurity and Infrastructure Security Agency (CISA) Volt Typhoon Advisory (NSA/FBI/CISA) Guest Bio: Rob Joyce is a longtime national security and cybersecurity leader with more than 34 years of federal service. He served as Director of the NSA’s Cybersecurity Directorate, Special Assistant to the President and Cybersecurity Coordinator at the White House, and Chief of Tailored Access Operations, the NSA’s elite offensive cyber unit. Throughout his career, he helped shape U.S. cybersecurity strategy, led efforts to counter nation-state threats, and forged deep partnerships across government and industry.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36367480
info_outline
Cyber Focus Presents: To the Point - Episode 1 - with Chris Inglis and George Barnes
04/25/2025
Cyber Focus Presents: To the Point - Episode 1 - with Chris Inglis and George Barnes
To the Point is a new video series from the McCrary Institute for Cyber and Critical Infrastructure Security, found here at Threat Beat. Hosted by McCrary Institute Director Frank Cilluffo, the series delivers fast-moving, high-impact conversations with top national security and cybersecurity leaders. Each episode tackles big ideas with clarity and urgency — getting straight to the point. In this inaugural episode, Frank sits down with Chris Inglis and George Barnes — both former deputy directors of the National Security Agency — for a fast-paced, high-level conversation reflecting their decades of experience at the highest levels of government. They explore which emerging technologies will have the greatest impact on national and economic security, the role of red lines and strategic ambiguity in cyber deterrence, and whether it’s time to split the dual-hat leadership structure of U.S. Cyber Command and the NSA.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36316625
info_outline
How Storytelling Shapes Strategy: Peter W. Singer on China, Cyber, and the Future of Conflict
04/22/2025
How Storytelling Shapes Strategy: Peter W. Singer on China, Cyber, and the Future of Conflict
In this episode of Cyber Focus, host Frank Cilluffo speaks with Peter W. Singer, strategist at New America, professor at Arizona State, and founder of Useful Fiction. They revisit Singer’s influential book Ghost Fleet and examine how the strategic landscape—particularly U.S.-China competition—has shifted over the past decade. Singer discusses China’s military reorganization and the lessons it's drawing from the war in Ukraine. He also explores how AI is reshaping the nature of cyber threats. The conversation highlights the growing intersection of cyber, physical, and cognitive warfare. Singer explains how storytelling can make complex strategies easier to understand and more likely to drive change. He emphasizes the need for cross-domain thinking and a more dynamic approach to building the cybersecurity workforce. Main Topics Covered: China's military reorganization and the emergence of the Information Support Force Lessons from the Russia-Ukraine war and implications for China The role of narrative and “useful fiction” in cybersecurity policy and strategy Hybrid threats: cyber attacks, cognitive warfare, and disinformation Emerging risks tied to AI, automation, and operational technology Breaking down silos and redefining the cybersecurity workforce Key Quotes: "If you are telling yourself that there is not a state of intense cooperation alliance between Russia and China, you are telling yourself fiction." – Peter W. Singer "[In 2015's Ghost Fleet] we portrayed a world where there was China catching up to us in technology capability... we're not as ahead in the race as we were back then." – Peter W. Singer "If we were to see such a kind of scenario [a conflict with China or Russia], the private sector would be touched by it and therefore it needs to start scenario building for it." – Peter W. Singer "[China] didn't enter into a [U.S.] water system because it wanted the intellectual property... No, it was setting up a beachhead in case there was a conflict." – Peter W. Singer "If you read a white paper, one part of your brain lights up. If you read it as told in a scenario—and it can be a true story or it can be a fictionalized story—four parts of your brain light up." – Peter W. Singer Relevant Links and Resources Useful Fiction A storytelling consultancy founded by Peter Singer that helps organizations use narrative to drive strategic thinking and communication. Ghost Fleet: A Novel of the Next World War Singer’s bestselling speculative novel that explores how future warfare might unfold, blending real-world research with fiction. Peter W. Singer – Personal Website Singer’s official website, featuring his books, articles, media appearances, and professional background. Peter W. Singer at New America Singer’s profile at New America, where he serves as a strategist focused on defense policy, cybersecurity, and emerging technologies. China Intelligence – Defense One & BluePath Labs A collaborative project analyzing Chinese military and strategic developments using open-source intelligence. Guest Bio: Peter Warren Singer is a strategist at New America, professor of practice at Arizona State University, and founder of Useful Fiction—a company that helps organizations communicate strategy through storytelling. He’s the bestselling author of books like LikeWar, Wired for War, and Ghost Fleet, and has advised everyone from military leaders to Hollywood producers. Described by The Wall Street Journal as “the premier futurist in the national-security environment,” he’s spoken everywhere from the White House to the Sydney Opera House.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36267935
info_outline
Rethinking Offensive Cyber: Strategy, Deterrence, and Real-World Impact with Adm. Mike Rogers (Ret.)
04/15/2025
Rethinking Offensive Cyber: Strategy, Deterrence, and Real-World Impact with Adm. Mike Rogers (Ret.)
Overview: In this episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing national security challenges. The conversation spans from undersea cable vulnerabilities to public-private integration, the future of quantum and AI, and the enduring need for clarity in cyber policy. A decorated Auburn alum, Rogers reflects on lessons learned, historical inflection points, and what must change for the U.S. to stay ahead in the cyber domain. Main Topics Covered: Shifting to a proactive cyber posture: persistent engagement and defend forward The evolving role of Cyber Command and comparisons to SOCOM Vulnerabilities in undersea cable infrastructure and space-like situational awareness Lessons from Ukraine on real-time public-private integration Strategic implications of AI and quantum technologies Key Quotes: “I believe that what [offensive cyber actions] we ought to authorize is not just going after infrastructure but directly going after capability within those nations that are generating these effects against us.” — Adm. Mike Rogers “If you're going to deter an entity, they have to have some level of awareness of both [your] capability and intent.” — Adm. Mike Rogers “If you had asked me five years ago when I left Cyber Command, would a foreign entity, in this case a nation-state, upload destructive malware into critical U.S. infrastructure in a time of peace?... I would have said to you… there's a low probability. Boy, I got that wrong.” — Adm. Mike Rogers “I think it requires a little precision in how we discuss these matters. Because not all hacks are the same, not all hackers are the same, not all intentions are the same, not all capabilities are the same. [Not] everything is an ‘attack’.” — Frank Cilluffo “I'm not interested in collaboration; I'm interested in integration. I'm interested in a real-time situational awareness between government and the private sector.” — Adm. Mike Rogers Relevant Links and Resources: U.S. Cyber Command – Mission and Vision NSA – About the Agency Cyberspace Solarium Commission Final Report Guest Bio: Adm. Mike Rogers (Ret.) served as the Director of the National Security Agency and Commander of U.S. Cyber Command from 2014 to 2018. A four-star admiral with a distinguished 37-year career in the U.S. Navy, he helped shape modern cyber strategy at the highest levels of government. Since retiring from active duty, he has advised Fortune 500 companies, startups, and global institutions on cyber, intelligence, and national security issues.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/36074480
info_outline
Cyber, Space, and the Future of Warfare with Rep. Mike Rogers
04/08/2025
Cyber, Space, and the Future of Warfare with Rep. Mike Rogers
In this episode of Cyber Focus, host Frank Cilluffo speaks with Congressman Mike Rogers, Chairman of the House Armed Services Committee. Representing Alabama’s 3rd District, Rogers outlines his top defense priorities, including boosting defense spending, acquisition reform, and preparing for cyber and space warfare. He also shares insights on missile defense, the strategic role of Huntsville, the future of the national cyber workforce, and the growing energy demands of AI. Rogers offers a candid look at how Congress is adapting to emerging threats and why he believes space and cyber will define the future of national security. Main Topics Covered: The National Defense Authorization Act (NDAA) process and bipartisan cooperation Calls to raise defense spending to 5% of GDP and enforce acquisition reform Evolving threats in space, cyber, and unmanned warfare domains The future cyber workforce and talent exchange between government and industry Strategic importance of Huntsville, including missile defense and Space Command Grid security, EMP threats, and energy challenges posed by AI infrastructure Key Quotes: We are at the lowest level of defense spending as a percentage of GDP since before World War II. It is dangerously low, 2.9% of GDP. We really should be closer to 5%. – Rep. Mike Rogers You can put a multi-million warehouse stockpile of drones together and we can upgrade them every week or every month without touching them. And those are the kind of changes that we need to make sure that we can move with the speed of relevance. – Rep. Mike Rogers Guam has a big target on it. Number one target by China. If we get into a conflict... it will be target number one. – Rep. Mike Rogers We're going to be doing swarms [of underwater drones] just like we're doing swarms in the air. You're going to find the use of unmanned fighter jets is going to be very commonplace. We're already doing some of that now, but it's going to be a lot. – Rep. Mike Rogers "There will be a lot of battles fought where there's not a gun fired. It's going to be through cyber and through space." – Rep. Mike Rogers Relevant Links and Resources: Guest Bio: Mike Rogers is the U.S. Representative for Alabama’s 3rd Congressional District and Chairman of the House Armed Services Committee. A leading voice on national defense and space policy, Rogers has served in Congress since 2003 and was instrumental in the creation of the U.S. Space Force. He is a strong advocate for strengthening the defense industrial base, modernizing military capabilities, and advancing cybersecurity and national security interests at home and abroad.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35934690
info_outline
Can America’s Travel System Handle What’s Coming? U.S. Travel's Ryan Propis on the Road Ahead
04/01/2025
Can America’s Travel System Handle What’s Coming? U.S. Travel's Ryan Propis on the Road Ahead
In this episode of Cyber Focus, host Frank Cilluffo speaks with Ryan Propis, Vice President for Security and Facilitation at the U.S. Travel Association. With the U.S. preparing to host the World Cup in 2026 and the Olympics in 2028, Propis outlines how these massive international events will test the limits of our country’s travel infrastructure and security systems. Drawing on his experience as Chief of Staff at TSA and a senior staffer on Capitol Hill, he discusses the urgent need to modernize how we screen, move, and protect travelers—especially as daily passenger volumes are set to surge. The conversation highlights the role of technology, data-sharing, and public-private coordination in ensuring secure and efficient travel to and within the United States. Main Topics Covered: Anticipating record-breaking travel volumes in 2026 (World Cup) and 2028 (Olympics) The TSA’s role in balancing efficiency and security at scale How Propis’s experience at TSA and in Congress shaped his approach to modernizing U.S. travel security through both policy and operations Public-private collaboration on travel facilitation and security innovation The importance of interoperability and data-sharing across agencies How travel security fits into broader national security strategy Top Quotes: "We call [it] the mega decade of events coming up here. You've got this summer, the Ryder Cup and the Club World Cup. Next summer, you've got America's 250th anniversary with the FIFA World Cup—the largest they've ever had. More teams than they've ever had. It's across the U.S., Canada, and Mexico—11 cities in the U.S., which is absolutely massive. The Olympics in ’28, Olympics in L.A., we have Olympics in [2034] in Salt Lake. So it just continues to grow and grow." – Ryan Propis "Last year, TSA screened 3 million travelers on two different days. In 2026, when we host the World Cup, we're gonna have 3 million travelers a day on 50 days… and then in 2028, when we have the Olympics, it's going to be on 100 days. The system is just not there. We're not ready yet in terms of efficiency [and] security." – Ryan Propis "Travel is absolutely essential to the economy, to our national security, and really the American way of life." – Ryan Propis "[The commercial facilities sector is] naturally open. You know, there's not natural barriers or hardened security across the space. You know, it's almost not tenable to do that in terms of the economic impact and for the processes and for these operations to take place as they normally would." – Ryan Propis "The cybersecurity risk from American companies operating in China having to report and share certain information just to operate opens up a whole other can of worms that obviously I know we're all concerned about." – Ryan Propis Relevant Links and Resources: Guest Bio: Ryan Propis is the Vice President for Security and Facilitation at the U.S. Travel Association, where he leads efforts to modernize and secure the travel experience across the country. Prior to this role, he served as Chief of Staff at the Transportation Security Administration (TSA) and spent over a decade on Capitol Hill, including as General Counsel and Deputy Staff Director of the House Homeland Security Committee. His expertise spans policy, regulatory coordination, and risk management across transportation and commercial facilities sectors, particularly in preparation for major global events like the World Cup and the Olympics.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35887540
info_outline
Threat Intelligence and AI's role in Cyber Defense with Palo Alto's Andy Piazza and Daniel Kroese
03/25/2025
Threat Intelligence and AI's role in Cyber Defense with Palo Alto's Andy Piazza and Daniel Kroese
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andy Piazza, a senior threat intelligence leader at Unit 42, and Daniel Kroese, a cybersecurity policy expert, both from Palo Alto Networks. They discuss key findings from Palo Alto Networks’ 2025 Global Incident Response Report, highlighting the accelerating speed of cyberattacks, the growing use of AI in both offense and defense, and the increasing sophistication of nation-state and cybercriminal operations. The conversation explores the intersection of cybersecurity technology, policy, and defense strategies, including the importance of behavioral analysis, public-private partnerships, and the evolving role of zero trust in securing networks. Main Topics Covered: Findings from Palo Alto Networks’ 2025 Global Incident Response Report The accelerating speed of cyberattacks and data exfiltration How AI is shaping both cyber threats and defensive capabilities The role of initial access brokers in modern attacks Nation-state involvement in cybercrime and adversarial collaboration The importance of zero trust and behavioral analysis in defense strategies Policy recommendations for the next U.S. administration’s cybersecurity priorities The growing complexity of securing multi-cloud environments Challenges in asset visibility and managing cyber risk Key Quotes: “So, for example, in 25% of the cases, we saw attackers exfiltrating data within five hours of initial compromise. That's really, really fast.” – Andy Piazza “Better cyber defense is a data problem, which means it's solvable. And what is the best way to solve a thorny large scale data problem? AI.” – Daniel Kroese “We always talk about nation states or even cybercriminals stealing data. They don't steal data, they copy it. If they stole data, we would have taken that seriously a long time ago.” – Andy Piazza “Organizations on average take 6 days to respond to a cyber incident. When adversaries are now exfiltrating data in hours, we can actually have real time statistics around mean Time to detect and mean time to respond.” – Daniel Kroese “40% of cloud incidents were because there was unmanaged cloud assets that were out there... From a defense standpoint, you can't secure what you can't see.” – Daniel Kroese Relevant Links and Resources: Guest Bios: Andy Piazza is a senior threat intelligence leader at Unit 42, Palo Alto Networks, and a veteran of both the cybersecurity industry and the U.S. Army. His work focuses on tracking threat actors, understanding cybercriminal tactics, and helping organizations defend against emerging threats. Daniel Kroese is a cybersecurity policy expert at Palo Alto Networks with experience in both government and the private sector. He previously served as staff director for the House Homeland Security Committee and as Chief of Staff to former CIA Director John Ratcliffe.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35777065
info_outline
Legacy Systems and the Future of Manufacturing Security with Bill Rucker
03/19/2025
Legacy Systems and the Future of Manufacturing Security with Bill Rucker
In this episode of Cyber Focus, host Frank Cilluffo sits down with Bill Rucker, a seasoned veteran in IT and cybersecurity, currently leading Trustwave Government Solutions. They explore the insights from Trustwave's recent report on cybersecurity challenges facing the manufacturing sector. Rucker highlights the rapidly rising costs of breaches, now averaging $5.8 million, emphasizing vulnerabilities stemming from legacy operational technology (OT) and the complexities of integrating OT with modern IT systems. The conversation also covers the increased sophistication of cyber threats, the critical need for visibility in cybersecurity, and practical steps manufacturers can take to bolster their defenses. Main Topics Covered: Rising cybersecurity threats in manufacturing Increasing costs and impacts of cybersecurity breaches in manufacturing Challenges with legacy OT devices and integration with IT infrastructure Recommendations for strengthening cybersecurity resilience in manufacturing Importance of collaboration between private sector companies and government cybersecurity efforts Key Quotes: "The average cost of breach in 2023 for the manufacturing sector was about 4.6, 4.7 million dollars. That's closer to 5.8 now." – Bill Rucker "The biggest issue too in manufacturing is the legacy devices and the fact that there's now such a push to take OT devices and put them into IoT." – Bill Rucker "Dwell time—how long an adversary remains undetected—used to be 177 days on average. Now it’s sub-10 days in the last two years, thanks to the explosion of EDR technology." – Bill Rucker “Human nature remains consistent for good or bad, and it's going to take people to have trust and actually work together to get things done." – Frank Cilluffo "Bad news doesn't get better with time. So let's talk about what the challenges are." – Bill Rucker Relevant Links and Resources: Guest Bio: Bill Rucker is the President of Trustwave Government Solutions, with nearly 25 years of experience in cybersecurity and IT. His leadership has been instrumental in securing critical sectors, including government and manufacturing, through strategic cybersecurity initiatives.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35733260
info_outline
China, Clean Energy and the Future of U.S. Energy Security with Harry Krejsa
03/12/2025
China, Clean Energy and the Future of U.S. Energy Security with Harry Krejsa
In this episode of Cyber Focus, host Frank Cilluffo sits down with Harry Krejsa, Director of Studies at Carnegie Mellon University's Institute for Strategy and Technology. Krejsa, a former Pentagon and White House cyber strategist, discusses his latest report, Sunshield, which highlights the intersection of cybersecurity, U.S.-China competition, and grid security. The conversation explores how China's cyber operations exploit technical debt in U.S. critical infrastructure, the cybersecurity risks and opportunities in the energy transition, and how the rapid buildout of AI-driven power demand presents both new challenges and unique opportunities. Krejsa outlines strategic actions the U.S. must take to secure its energy future and broader critical infrastructure against Chinese cyber threats. Main Topics Covered China's cyber threat to U.S. critical infrastructure, including Volt Typhoon's activities The risks of integrating old and new technology in the energy sector How the energy transition presents a unique chance to embed cybersecurity from the start The role of AI data centers in reshaping U.S. energy infrastructure and security Key policy actions needed to reduce U.S. dependency on Chinese-dominated supply chains Lessons from the financial sector in managing systemic cybersecurity risks Key Quotes "The People's Republic of China, we now know, are working to place disruptive and destructive cyber capabilities on various kinds of American infrastructure... to stymie our ability to mobilize a military response to a crisis... [and] induced societal panic." — Harry Krejsa "No critical infrastructure sector in the country has the amount of capital necessary to undergo that [security] transformation, except for one... the electricity sector." — Harry Krejsa “I think we need to put modern energy at the center of our competition with China.” — Harry Krejsa “We need to get the glowering national security hawks like myself, and the affirmative vision granola crunching energy communities sitting down and talking to each other.” — Harry Krejsa "The IT-OT convergence has been a theme we come back to over and over because it is very real. Yet if you look at our defenders, we still don't look at it through the same lens.” — Frank Cilluffo Relevant Links Guest Bio Harry Krejsa is the Director of Studies at Carnegie Mellon University's Institute for Strategy and Technology. A former White House and Pentagon cyber strategist, he played a key role in shaping the National Cyber Strategy and served on the Cyberspace Solarium Commission. His expertise spans China's cyber operations, critical infrastructure security, and the intersection of emerging technology with national defense.
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35642315
info_outline
Cybersecurity Burnout, Deception Tech, and National Security with Cynthia Brumfield
03/05/2025
Cybersecurity Burnout, Deception Tech, and National Security with Cynthia Brumfield
In this episode of Cyber Focus, host Frank Cilluffo speaks with Cynthia Brumfield, a prolific cybersecurity journalist and analyst. Brumfield discusses her reporting on the human toll of cybersecurity incidents, including mental health challenges and burnout among cyber professionals. She also explores the evolving role of deception technology in cyber defense and highlights key cybersecurity provisions in the latest National Defense Authorization Act (NDAA). The conversation covers the growing threats pose
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636420
info_outline
Cybersecurity in the 119th Congress: Insights on What's Ahead from Andrew Howell and Kyle Klein
02/26/2025
Cybersecurity in the 119th Congress: Insights on What's Ahead from Andrew Howell and Kyle Klein
In this episode of Cyber Focus, host Frank Cilluffo sits down with Andrew Howell, Vice President for Government Affairs at SentinelOne, and Kyle Klein, Deputy Director for Policy and Partnerships at the McCrary Institute. Together, they discuss the evolving cybersecurity legislative landscape in the early days of the 119th Congress. The conversation covers key bills like the Cyber Pivot Act, updates to the Computer Fraud and Abuse Act, efforts to designate space as critical infrastructure, AI regulation, an
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636430
info_outline
Signals, Shadows, and Cyber Threats: Sai Molige on Forescout's 2024 Global Threat Roundup
02/19/2025
Signals, Shadows, and Cyber Threats: Sai Molige on Forescout's 2024 Global Threat Roundup
In this episode of Cyber Focus, host Frank Cilluffo speaks with Sai Molige, the leader of the threat hunting team at Forescout. They discuss the key findings from Forescout's 2024 Global Threat Roundup, including the growing role of bulletproof hosting services, increasing attacker dwell time, and targeted cyber intrusions on critical infrastructure. Molige explains how state-sponsored actors and cybercriminals are increasingly collaborating, and how the convergence of IT and OT security is reshaping the cy
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636435
info_outline
Building the Future of Cyber Education at ASCTE with Arthur Orr and Matt Massey
02/12/2025
Building the Future of Cyber Education at ASCTE with Arthur Orr and Matt Massey
In this episode of Cyber Focus, host Frank Cilluffo visits Birmingham to speak with Alabama State Senator Arthur Orr and Matt Massey, President of the Alabama School of Cyber Technology and Engineering (ASCTE). They discuss the origins of ASCTE, its rigorous curriculum, and its dual mission to educate top-tier students while expanding cyber education across the state. The conversation explores the school's national security significance, its unique hands-on learning model, public-private partnerships, and f
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636445
info_outline
Cybersecurity, Espionage, and National Defense with Martin Matishak
02/05/2025
Cybersecurity, Espionage, and National Defense with Martin Matishak
In this week's episode Frank Cilluffo speaks with Martin Matishak, a seasoned cybersecurity journalist currently with The Record and formerly with Politico and National Journal. They discuss China's cyber threats, particularly the Volt Typhoon and Soft Typhoon campaigns, and their implications for critical infrastructure security and espionage tactics. Matishak also unpacks supply chain vulnerabilities, U.S. cyber policy challenges, and the evolving debate over Cyber Command 2.0, a U.S. Cyber Force, and the
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636450
info_outline
Integrating Intelligence: CTIIC's Role in Defending Critical Infrastructure with Laura Galante and Lauren Goldman
01/29/2025
Integrating Intelligence: CTIIC's Role in Defending Critical Infrastructure with Laura Galante and Lauren Goldman
In this episode of Cyber Focus, host Frank Cilluffo sits down with Laura Galante, Director of the Cyber Threat Intelligence Integration Center (CTIIC), and Lauren Goldman, head of Analysis and Analytic Integration at CTIIC. They discuss CTIIC's evolving role in integrating intelligence across agencies and sectors, its initiatives to bolster critical infrastructure resilience, and its approach to public-private partnerships. The conversation also explores threats from adversarial nation-states like China, op
/episode/index/show/259c9a54-bf3b-46b9-84e1-e114ffa39095/id/35636460