Cyber Security America
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America with your host Joshua Nicholson. You’ll learn what it’s like running cyber security operations teams inside some of the world’s largest companies. It’s a cyber backstage pass and real world advice for cyber defenders, CISOs, and security professionals.
info_outline
Dune Security’s Revolutionary Approach: AI and Cybersecurity
12/30/2025
Dune Security’s Revolutionary Approach: AI and Cybersecurity
🎙 Episode 48: AI and Cybersecurity — How Dune Security Is Reinventing User Risk Management In this episode of Cyber Security America, we explore how artificial intelligence is transforming cybersecurity—and why traditional security awareness training is no longer enough. I’m joined by David DellaPelle, cybersecurity leader and founder of Dune Security, to break down how AI-driven attacks like phishing, vishing, deepfakes, and social engineering are evolving faster than most security programs can handle. We discuss why 90% of breaches still start with human behavior and how Dune Security is redefining the user layer of cybersecurity with AI-powered risk quantification and remediation. 🔍 Topics covered in this episode: Why legacy security awareness training fails in an AI-driven threat landscape How attackers use GenAI, voice cloning, and deepfakes to bypass MFA The rise of multi-channel social engineering (email, SMS, voice, collaboration tools) How AI can identify high-risk users and reduce enterprise attack surface What CISOs should be doing now to prepare for AI-enabled threats The future of securing both human and AI workforces This conversation is essential listening for CISOs, security leaders, GRC teams, cloud and identity professionals, and anyone responsible for protecting modern organizations against advanced cyber threats. 🎧 Listen now on Apple Podcasts and Spotify to learn how AI is reshaping cybersecurity—for defenders and attackers alike. www.darkstack7.com/podcast #CyberSecurityAmerica #CybersecurityPodcast #AIandCybersecurity #ArtificialIntelligence #SocialEngineering #Phishing #Deepfake #CISO #SecurityAwareness #UserRisk #CloudSecurity #PodcastSEO
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/39563635
info_outline
Spreadsheets to AI Agents The Next Era of Enterprise GRC with Richa Kaul
12/16/2025
Spreadsheets to AI Agents The Next Era of Enterprise GRC with Richa Kaul
In episode 47 of Cybersecurity America, host Joshua Nicholson is joined by Richa Kaul, CEO and Founder of Complyance, to explore how agentic AI and intelligent automation are reshaping enterprise Governance, Risk, and Compliance (GRC). Richa breaks down why traditional, spreadsheet-driven GRC programs are failing at scale—and how organizations are moving toward real-time risk monitoring, automated evidence collection, and continuous audit readiness. Drawing from her experience as a GRC executive and privacy advocate, she shares how modern GRC teams can reduce manual effort, improve visibility, and position compliance as a true business enabler. In this conversation, we cover: Why legacy GRC models can’t keep up with today’s threat landscape How AI agents streamline audits and compliance operations Continuous controls monitoring and real-time risk visibility Privacy-first approaches to enterprise AI adoption Third-party risk, regulatory change, and AI governance What CISOs and GRC leaders should expect heading into 2026 Whether you’re a CISO, GRC leader, risk professional, or security executive, this episode offers practical insight into the future of enterprise GRC and AI-driven risk management. About the Show Sponsor: Darkstack7 Darkstack7 is a cybersecurity and IT management firm based in Charlotte, NC, founded by Joshua R. Nicholson, a Marine Corps veteran and seasoned cybersecurity leader with experience at Northrop Grumman, EY, Wells Fargo, and Booz Allen Hamilton. The company delivers Fortune 500–level expertise to mid-sized and growing organizations—specializing in Security Engineering, Incident Response, vCISO advisory, Insider Threat programs, and IT Management consulting. Darkstack7 also provides proactive services such as tabletop exercises, cyber readiness assessments, and strategic security architecture, helping organizations build resilient defenses and align technology investments with business objectives. , #Cybersecurity #GRC #RiskManagement #Compliance #AI #AIinSecurity #EnterpriseSecurity #CISO #CyberRisk #Governance #Privacy #DataProtection #InfoSec#ThirdPartyRisk #DigitalRisk #CyberLeadership #Podcast
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/39422745
info_outline
Building the Future with Agentic-AI: Deep Dive with Ben Wilcox
12/05/2025
Building the Future with Agentic-AI: Deep Dive with Ben Wilcox
Episode 46: Building the Future with Agentic AI — Deep Dive with Ben Wilcox In this episode of Cybersecurity America, technologist and Proarch leader Ben Wilcox breaks down the biggest insights from Microsoft Ignite, including breakthroughs in agentic AI, emerging security trends, and what organizations must prepare for as AI-driven systems rapidly evolve. Ben reveals: • What’s really happening with Microsoft’s newest AI technology • How agentic systems are advancing faster than expected • Why data readiness is the foundation of future productivity • How companies should approach security, governance, and infrastructure in the AI era • His early entrepreneurial journey launching a hosting company at age 15 • The unexpected link between technology leadership and high-performance racing We also explore: • Data Security Posture Management (DSPM) • Identity-based attacks and real-world fraud cases • AI’s impact on compliance, audits, and supply-chain risk • The rise of agentic workflows, MCP, and automation • Why traditional SaaS may give way to agent-driven platforms This episode is packed with insights for CISOs, IT leaders, engineers, and anyone preparing for the future of enterprise AI. Connect with Ben Wilcox & Proarch: www.proarch.com LinkedIn: Ben Wilcox Sponsored by DarkStack7 – Cybersecurity leadership, vCISO services, incident response, and engineering. Agentic AI, Microsoft Ignite, Microsoft AI, Enterprise cybersecurity, Data security, AI agents, AI automation, CISO insights, Cloud security, AI in business, AIPosture management, Identity-based attacks, Fraud prevention, MCP (Model Context Protocol), AI workflows
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/39292555
info_outline
Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
10/28/2025
Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity security is reshaping cyber resilience. We dive deep into today’s identity-based attack landscape — from Russian threat campaigns and TLS fragility to how endpoint trust, hardware-backed credentials, and zero trust authentication are converging. Jasson also shares fascinating insights on securing AI agents, drones, and machine identities, and what it really means to make credential-based attacks “impossible.” Whether you’re a security leader, technologist, or curious about the intersection of identity, AI, and the future of cyber defense, this episode is packed with forward-thinking insights you won’t want to miss. 🔐 Key Topics: - The evolution of identity as the new cybersecurity perimeter - How attackers are exploiting TLS and credential sprawl - Why AI agents and drones demand new identity frameworks - TPMs, device-bound credentials, and the end of password-based trust The future of identity defense and zero trust authentication 🎧 Guest: Jasson Casey, CEO & Co-Founder, Beyond Identity 🔗 Learn more: 🎙 About the Show Sponsor: Darkstack7 Darkstack7 is a cybersecurity and IT management firm based in Charlotte, NC, founded by Joshua R. Nicholson, a Marine Corps veteran and seasoned cybersecurity leader with experience at Northrop Grumman, EY, Wells Fargo, and Booz Allen Hamilton. The company delivers Fortune 500–level expertise to mid-sized and growing organizations—specializing in Security Engineering, Incident Response, vCISO advisory, Insider Threat programs, and IT Management consulting. Darkstack7 also provides proactive services such as tabletop exercises, cyber readiness assessments, and strategic security architecture, helping organizations build resilient defenses and align technology investments with business objectives.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/38805040
info_outline
Surviving Ransomware: Strategies and Stories with Cybersecurity Expert Matthew Waddell
10/16/2025
Surviving Ransomware: Strategies and Stories with Cybersecurity Expert Matthew Waddell
In episode 44 of Cyber Security America, host Joshua Nicholson sits down with Matthew Waddell, a battle-tested cybersecurity leader with over 25 years of experience in digital forensics, incident response, and ransomware defense. From conducting “just-in-time forensics” under combat conditions in Iraq and Afghanistan to leading global ransomware investigations for Fortune 100 companies, Waddell shares unmatched real-world insight into how cyber threats have evolved—and what it takes to defend against them. Topics Covered: The evolution of ransomware and why it remains a billion-dollar business Real-world stories from digital forensics on the battlefield Practical strategies for preventing lateral movement and improving network segmentation How AI and large language models (LLMs) are changing cybersecurity and cybercrime Why advanced tools like EDR and XDR can fail if humans disable alerts or skip training The promise and peril of AI in security operations, hiring, and incident response Matthew also discusses his upcoming book, Survive Ransomware, a practical playbook for small and medium-sized businesses navigating today’s threat landscape. If you’re serious about defending your organization—or just curious about how cybersecurity, AI, and human error collide—this episode is packed with lessons, stories, and expert insights. If you are in need of cybersecurity services please visit our sponsor Darkstack7 Cyber Defense at 🎧 Listen, learn, Subscribe, like, and stay secure: Video podcast on Youtube: Host Info: Guest Info: Website: LinkedIn: Book: Hashtags: #cybersecurity #ransomware #ai #incidentresponse #digitalforensics #securityoperationscenter #cyberthreats #cyberdefense #infosec #networksecurity #MatthewWaddell #cybersecurityamerica #JoshuaNicholson #dataprotection #techpodcast #cyberawareness #aiinsecurity #SurviveRansomware #edraid #xdr #PowerShellSecurity #TacticallySecure #cyberpodcast #podcast
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/38601755
info_outline
Penetration Testing and Social Engineering: Insights from Steve Stasiukoni
09/22/2025
Penetration Testing and Social Engineering: Insights from Steve Stasiukoni
🎙 Inside the World of Cybersecurity with Steve Stasiukonis Tune in to the latest episode of Cyber Security America as we explore real-world solutions for defending against today's ever-evolving cyber threats. Our guest, Steve Stasiukonis, President of Secure Network Technologies, brings over 29 years of experience in penetration testing, information security, and incident response. In this episode, Steve dives deep into the rise of social engineering, AI-driven attacks, and the increasing sophistication of cybercriminals. He shares firsthand stories from the field, discusses the importance of continuous learning, and highlights why programmatic penetration testing is crucial for safeguarding your organization. 🔑 Key Topics: The Evolution of Cyber Threats Social Engineering Tactics AI’s Role in Cybersecurity Penetration Testing Insights & Challenges Insider Threats & Corporate Espionage Incident Response & Real-World Stories Don't miss out on Steve's invaluable insights and the lessons every cybersecurity professional (and enthusiast) can learn from the frontlines of the digital battlefield. 🎧 Listen now on Spotify! #CyberSecurity #PenetrationTesting #SocialEngineering #AIinCyberSecurity #CyberDefense #CyberSecurityAmerica 🔗
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/38301690
info_outline
Defense Contractors: CMMC Is Here — And the Clock Is Ticking
09/09/2025
Defense Contractors: CMMC Is Here — And the Clock Is Ticking
In our latest Cybersecurity America episode (42), I had the privilege of speaking with Jim Goepel, a true leader in cybersecurity and compliance — and someone who has helped shape the very ecosystem he now advises. Jim is the CEO of Fathom Cyber, a consulting firm in North Wales, PA specializing in: 🔹 CMMC assessment preparation 🔹 CUI education and compliance strategy 🔹 Expert witness services His unique background — lawyer, engineer, author, educator, and one of the architects behind the CMMC ecosystem — means he’s seen this challenge from every angle: technical, legal, business, and regulatory. Jim has not only helped companies prepare for and achieve some of the first-ever CMMC certifications, he literally helped create the framework, launch The Cyber AB, and build the financial and training models that sustain the program today. 💡 In our conversation, Jim and I covered: Why CMMC is less about stopping attacks — and more about building resilience The cultural and leadership challenges that make compliance harder than the tech How other governments are now looking to adopt CMMC-like frameworks What small and mid-size businesses must do now to turn compliance into a competitive advantage Whether you’re in manufacturing, defense, or any sector touching sensitive government data, this episode is a must-listen if you want to understand not just what’s coming, but how to strategically position your organization before the surge. 🎧 Listen here: [https://youtu.be/E0M61k5Z3KI] #CyberSecurity #CMMC #Compliance #RiskManagement #DefenseIndustry #DoD #CyberResilience Sponsored by, - Cyber Defense
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/38139530
info_outline
From Combat Boots to Cybersecurity - Nia Luckey on her journey
08/21/2025
From Combat Boots to Cybersecurity - Nia Luckey on her journey
In this episode of the Cybersecurity America Podcast, sponsored by , host sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from military to civilian life, while also unpacking the evolving challenges in today’s cybersecurity landscape. From the importance of attention to detail, to burnout among cyber leaders, to the risks and opportunities of AI in security and governance, this episode is packed with insight for both aspiring professionals and seasoned experts. Key Topics Covered: - Nia’s journey from Army communications to cybersecurity leadersh- ip - Building resilience and avoiding burnout in high-pressure environments - Specialization vs adaptability in cyber careers - AI, risk quantification, and governance in today’s security programs - The future of work in cybersecurity Whether you’re a veteran, a cybersecurity professional, or simply interested in how resilience and adaptability shape careers, this episode has something for you. 👉 Don’t forget to like, comment, and subscribe for more conversations with today’s cybersecurity leaders. #CyberSecurity #VeteransInTech #cyberresilience #leadership #cybercareers #aiincybersecurity #riskmanagement #ciso #cyberpodcast #NiaLuckey #cybersecurityamerica
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/37899965
info_outline
Cybersecurity’s Golden Rule: The Legal Blueprint No One Shares
08/15/2025
Cybersecurity’s Golden Rule: The Legal Blueprint No One Shares
In this episode, sponsored by Darkstack7, Joshua sits down with Chris Cronin, partner at Halock Security Labs and founding partner of Reasonable Risk, to explore the intersection of cybersecurity, risk management, and the legal principles behind “reasonable” safeguards. Chris unpacks the DoCRA Standard and CIS RAM, sharing how historical and legal frameworks can guide today’s cybersecurity strategies. From his journey in academia to his leadership in cyber risk, Chris offers practical insights on balancing risk, ensuring compliance, and applying reasonable security measures that stand up to regulatory and legal scrutiny. The discussion covers real-world risk assessments, notable legal cases, and emerging tools that automate and enhance risk management. Key Topics: - How the DoCRA Standard and CIS RAM shape practical risk analysis Applying “reasonableness” from legal precedent to cybersecurity Balancing regulatory specificity with operational flexibility The role of community and professional standards in defining reasonable safeguards Historical analogies, insurance considerations, and executive decision-making in risk management Timestamps: 00:00 Introduction to Cybersecurity Challenges 00:26 Meet Chris: A Cybersecurity Expert 01:25 Chris’s Journey into Cybersecurity 02:50 Where Law Meets Cybersecurity 04:37 Defining Reasonable Security Measures 06:37 Regulations and Compliance in Practice 08:24 The Legal Concept of Reasonableness 10:22 Translating Legal Standards into Cyber Practices 14:53 Practical Risk Analysis Steps 21:20 Balancing Flexibility and Specificity in Regulations 24:54 Professional Standards That Shape Reasonableness 25:49 Certifications and Industry Benchmarks 26:17 How Community Shapes Standards 26:34 Lessons from Aviation for Cybersecurity 28:29 The CIS RAM and Risk Assessment Methods 30:51 Legal Implications of Adopting Reasonableness 32:16 Insurance and Risk Management 34:38 Challenges in Incident Response Reporting 39:40 Risk Assessments for Executive Decision-Making 46:02 Closing Thoughts and Call to Action www.darkstack7.com
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/37832100
info_outline
Memory-Only Malware: The Threat You’re Probably Missing
07/16/2025
Memory-Only Malware: The Threat You’re Probably Missing
In episode 39, host Josh Nicholson is joined by memory forensics expert Andrew Case, co-developer of the Volatility framework and co-author of The Art of Memory Forensics. Together, they explore the critical role of memory analysis in modern incident response—uncovering hidden malware, insider threats, and ransomware techniques invisible to traditional disk forensics or EDR tools. Andrew breaks down what’s new in Volatility 3, how memory-only malware operates, and why CISA now recommends memory imaging in its emergency directives. Whether you're a responder, analyst, or just curious about advanced DFIR, this episode is packed with practical insight and real-world experience. 🎧 Stay secure—and subscribe for more expert cyber content.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/37423930
info_outline
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
06/24/2025
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like longer dwell times and SSH backdoors) 📨 Surging business email compromise tactics—attachments are the new attack vector 🔐 Why incident response retainers are more valuable than ever 🔥 Rapid resiliency: 5 key misconfigurations every business must address 🧠 How threat actors are using AI (and why they still don’t need it to win) 💬 Candid career advice for aspiring DFIR and intel pros Whether you’re a CISO, SOC leader, or cyber-curious professional, this episode gives you front-line insights from the experts handling these threats daily. 🎧 Listen now and secure your edge: [] #CyberSecurity #IncidentResponse #DFIR #ThreatIntelligence #Ransomware #BEC #SurefireCyber #CyberSecurityAmerica #Podcast #EDR #mfa #Resilience #digitalforensics
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/37129970
info_outline
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
06/02/2025
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Data X-ray, is revolutionizing data governance through advanced machine learning and natural language processing (NLP). We explore how Ohalo empowers major banks, governments, and enterprises to discover, classify, and protect sensitive data in a world of increasing complexity, compliance pressure, and security risks. From the rise of generative AI to the ethical implications of automation, this episode is packed with practical insights and future-facing perspectives. Whether you're a tech leader, data scientist, or simply curious about the future of AI and data, this conversation is a must-watch. 🕒 Chapter Timestamps 00:00 – Introduction to Kyle DuPont and Ohalo 01:44 – Kyle's Journey to Founding Ohalo 03:35 – Understanding Data X-ray and Its Applications 05:21 – Challenges in Data Security and AI Solutions 07:04 – The Role of AI in Data Management 13:31 – Cultural Insights and Personal Anecdotes 15:27 – Ideal Customers and Use Cases for Ohalo 17:56 – Future of AI and Data Management 20:56 – The Future of AI: Predictions and Implications 21:10 – Automation and Productivity: Embracing AI Tools 21:55 – The Evolution of Coding and Business Processes 24:36 – AI in Business: Real-World Applications 26:46 – Emerging AI Protocols and Security Concerns 29:53 – Ethical and Legal Implications of AI 36:22 – Advice for Aspiring AI Professionals 38:32 – Conclusion and Final Thoughts 📢 Don’t forget to like, comment, and subscribe for more expert-led conversations on data, AI, and the future of technology. For the show video versions and the Cyber Battlefield training series are available. #AI #ArtificialIntelligence #MachineLearning #DataScience #DataSecurity #CyberSecurity #NaturalLanguageProcessing #FinTech #BigData #DataGovernance #GenerativeAI #TechPodcast #StartupStories #Innovation #Automation #FutureOfWork #DigitalTransformation #UnstructuredData #Ohalo #KyleDuPont #DataPrivacy #AIethics #TechLeadership
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/36809730
info_outline
Telegram Exposed: The Super App Enabling Cyber Crime
04/24/2025
Telegram Exposed: The Super App Enabling Cyber Crime
In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to automated money laundering, dark web-style marketplaces, and human trafficking operations, Telegram's labyrinthine infrastructure is designed for scale, secrecy, and obfuscation. 🔍 What you'll learn: How Telegram morphed into a platform for organized cyber crime The shocking links to cryptocurrency laundering through games like Hamster Combat The automation of criminal finance using bots and wallets Real-world examples of Telegram-enabled fraud, crime, and digital exploitation What law enforcement is doing—and not doing—to combat it The ethical gray zone of Telegram’s elusive founder and the platform’s murky governance 📕 Featuring insights from Stephen Arnold’s upcoming book The Telegram Labyrinth—exclusive to law enforcement and intelligence professionals. 📢 Don’t miss this revealing backstage pass into one of the most sophisticated cybercrime infrastructures on the planet. 🔹 Listen now: 🔹 Follow the podcast: 🔹 Connect with Joshua Nicholson: 🔔 Subscribe, comment, and share if you’re ready to stay ahead in the cyber battlefield. #CyberSecurityAmerica #TelegramExposed #CyberCrime #DigitalUnderground #StephenArnold #JoshNicholson #InfoSec #CryptoCrime #TelegramLabyrinth #HamsterCombat #OpenSourceIntel #MDR #IncidentResponse #CyberIntel #clt #charlotte #CyberSecurityPodcast #DarkWeb #AML #DigitalThreats #CyberRisk #CISOInsights
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/36289995
info_outline
Cyber Battlefield Insights: Lessons in Incident Response and Dark Web Tour
04/02/2025
Cyber Battlefield Insights: Lessons in Incident Response and Dark Web Tour
Join host Joshua Nicholson, a seasoned cybersecurity veteran with over 24 years of frontline experience, as he dives deep into the high-stakes world of incident response and takes you on an exclusive dark web tour. In this power-packed episode, Joshua shares real-world lessons learned from handling hundreds of cyber incidents, breaking down the best practices, critical backup strategies, and common pitfalls that organizations face when responding to attacks. But that’s not all—this episode also unmasks the dark web, revealing its hidden layers, the tools and techniques used to navigate it, and the threats lurking in its shadows. From TOR networks, VPNs, and sock puppets to cybersecurity playbooks and business-aligned security strategies, this episode is a must-listen for IT professionals, CISOs, and business leaders alike. 🔹 Listen now: 🔹 Follow the podcast: 🔹 Connect with Joshua Nicholson: #CyberSecurity #IncidentResponse #DarkWeb #CyberThreats #CyberDefense #InfoSec #SOC #TOR #VPN #CyberRisk #ThreatIntel #DigitalForensics #EthicalHacking #CyberWar #DataBreach #CyberStrategy
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/35971720
info_outline
Job Hunting in 2025: Top 10 Tips to Land Your Next Cybersecurity Role
02/18/2025
Job Hunting in 2025: Top 10 Tips to Land Your Next Cybersecurity Role
🎙 Episode 34 - Job Hunting: Top 10 Tips to Land the Next One Looking for your next big career move? In this episode of Cyber Security America, we break down the Top 10 Tips to help you navigate the job market and secure your next role with confidence. Whether you're a seasoned cybersecurity professional or just starting out, we’ll cover essential strategies—from optimizing your resume and acing interviews to leveraging your network and standing out in a competitive field. 📺 Watch the full video version on YouTube: 📝 Read the full article on LinkedIn: 👤 Learn more about the host, Joshua Nicholson: 🔗 Website: 🔗 LinkedIn: 🎧 Listen now on your favorite podcast platform! Don’t miss this essential career guide—subscribe, watch, and read to stay ahead in your job search! 🚀
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/35325265
info_outline
Top 10 GRC Program Tooling for Success - (Build vs. Buy)
02/03/2025
Top 10 GRC Program Tooling for Success - (Build vs. Buy)
Top 10 GRC Program Tips – Build vs. Buy with an Amazon Leader! We’re back with another powerful episode featuring one of the top minds at Amazon. In this episode, we dive deep into Governance, Risk, and Compliance (GRC) and explore the Top 10 Tips for GRC Program Success. Should you build your own security governance tools or buy them off the shelf? Our guest shares expert insights on making the right call for your business! 🔴 Don’t miss this! Subscribe and hit the notification bell so you stay ahead in cybersecurity. 🔗 Follow for more cybersecurity insights: 🎧 Listen on your favorite podcast platform 📲 Share with your network #CyberSecurity #GRC #RiskManagement #CyberRisk #BuildVsBuy #Compliance #TechLeadership #Amazon #CyberPodcast #CyberSecurityAmerica #Infosec #DataSecurity #CISO #SecurityOperations #CyberAwareness #CloudSecurity #itsecurity (www.darkstack7.com https://www.linkedin.com/in/joshuanicholson/ https://x.com/nicholsonj7111)
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/35138995
info_outline
Zero Trust in the Middle East: Navigating Cybersecurity Challenges & Opportunities
12/31/2024
Zero Trust in the Middle East: Navigating Cybersecurity Challenges & Opportunities
Welcome to Episode 32 of our podcast, where we explore the evolving landscape of cybersecurity in the Middle East. In this installment, we delve into the complexities of implementing Zero Trust in the region, focusing on the challenges and opportunities foreign companies face while adopting this vital framework. Zero Trust is more than a buzzword—it's a multi-faceted journey that requires a deep dive into the five core pillars: identity, network, application, device, and data. These pillars form the foundation of the Zero Trust maturity model, and every organization looking to implement this framework must evaluate its maturity across these domains. Our guest, Kamel Tamimi, a visionary cybersecurity professional with over two decades of experience, joins us to discuss how the Middle East is embracing Zero Trust as a strategic defense against growing threats. Kamel explains that achieving Zero Trust maturity isn’t a single-department project or a one-time task—it’s a continuous improvement process that involves both technology and practices. As technologies like multi-factor authentication (MFA) become more accessible and affordable, organizations can integrate them into their Zero Trust models to better protect their data and assets. Kamel also highlights how AI and machine learning are revolutionizing Zero Trust, enabling dynamic, risk-based decisions based on a wealth of real-time data. AI’s role in Zero Trust is pivotal—processing vast amounts of data quickly to assess the risk of every request. With machine learning, Zero Trust systems can not only verify identities but also detect anomalies such as unusual login times or unfamiliar devices. This dynamic, data-driven approach helps companies better secure their networks, with the flexibility to take actions beyond simply allowing or blocking access. For instance, AI can divert suspicious traffic to deception systems or apply more rigorous security controls based on the risk profile of a user or device. Kamel also touches on the practical side of implementing Zero Trust in the Middle East. It’s not about ripping and replacing your infrastructure; it’s about re-architecting your security framework to align with the Zero Trust principles. The journey begins with evaluating your identity management system and ensuring it can support advanced features like MFA and single sign-on. The other pillars—network, application, device, and data—must also be addressed in a comprehensive strategy that evolves over time. As we explore these themes, we also discuss broader regional trends, such as the expansion of hyperscale data centers by global tech giants like Google, Oracle, Azure, and Alibaba in Saudi Arabia, UAE, and Qatar. The drive for data sovereignty, regulatory compliance, and job creation is reshaping the cybersecurity landscape in the region, making Zero Trust even more relevant. Join us for an insightful conversation with Kamel Tamimi as we unpack the complexities of adopting Zero Trust in the Middle East and explore the intersection of technology, strategy, and cybersecurity. Stay updated with the latest episodes of Cyber Security America by visiting our YouTube Channel and subscribing on . Connect with Joshua Nicholson on LinkedIn . #Cybersecurity #MiddleEast #ZeroTrust #AI #MachineLearning #ThreatIntelligence #DataSovereignty #TechAdvancements #DigitalTransformation #Podcast #CybersecurityChallenges #ForeignOperations
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/34666835
info_outline
Cyber Battlefield Insights: Identifying Critical Shifts & Errors Leading to Intrusions
06/10/2024
Cyber Battlefield Insights: Identifying Critical Shifts & Errors Leading to Intrusions
Episode 31, Welcome to season two of the Cyber Security America podcast. In this episode, we explore the evolving landscape of cloud security, focusing on critical considerations for organizations migrating to Office 365 and Azure AD. Stay tuned as we unravel essential strategies and insights to bolster your security posture in the cloud. In traditional on-prem environments, users authenticate to domain controllers within a network. However, replicating this infrastructure to Azure Cloud introduces significant changes. Now, users can authenticate from anywhere globally, leading to numerous failed authentications and increased MFA prompts. This new setup can cause account lockouts that do not synchronize back to the on-prem domain controller. Therefore, when moving to Office 365, it's crucial to consider Microsoft's Defender for Identity for enhanced security posture, compliance, threat detection, and vulnerability assessments. One of the most significant security concerns is PowerShell. It's frequently used in legitimate administrative actions and by malicious actors. Hardening PowerShell is essential, and this includes enabling transcription, which captures input and output of commands, and script block logging, which ensures Base64 encoded commands are logged and can be decoded for analysis. This helps to detect and respond to malicious activities without relying on external tools like CyberChef. Furthermore, enforcing script execution policies (restricted, bypass, remote signed, all signed) helps manage which scripts can run, though these policies are not foolproof security controls. The key is to use them as intended to prevent unintended script execution. Constrained language mode is another vital hardening measure, restricting access to commands that can invoke Windows APIs, which are often exploited to download malware. For example, commands like `Add-Type` can load arbitrary C# code and are frequently used in attacks. Additionally, integrating the Anti-Malware Scanning Interface (AMSI) into applications can help detect and prevent script-based threats by scanning unobfuscated scripts before execution. This is particularly useful in environments where PowerShell is heavily used, as it adds an extra layer of security. Effective cybersecurity requires technical depth and business alignment. Start by understanding your industry's regulations and standards. Align your cybersecurity strategy with business risks and integrate threat intelligence, incident response management, and continuous attack surface management. This strategic approach ensures a comprehensive security posture. Finally, as organizations migrate to Azure AD and other cloud services, several key security considerations must be addressed. This includes understanding architecture changes, monitoring data flow, and ensuring tool rationalization. Critical components often overlooked include proper deployment of MFA and firewall management. PowerShell security remains a top priority, requiring logging configurations that decode Base64 and using digital signatures to verify scripts. Emerging technology threats, such as AI model poisoning and DNS over HTTPS, also need attention. Monitoring DNS logs for threat hunting is crucial, but the shift to DNS over HTTPS complicates this. Additionally, remote access solutions like RDP should be used in just-in-time mode to prevent continuous exposure. In summary, moving to the cloud and adopting new technologies necessitates a robust cybersecurity framework that integrates traditional security measures with advanced threat detection and response capabilities. #Cybersecurity #PowerShell #AzureAD #CloudSecurity #Office365 #DefenderForIdentity #MFA #ThreatDetection #ITSecurity #CyberThreats #CloudMigration #PowerShellSecurity #DNSOverHTTPS #AIThreats #RemoteAccess #ITCompliance #SecurityBestPractices #IncidentResponse #ThreatIntelligence
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/31688942
info_outline
Governor Pat McCory: Cyber Challenges in Government
04/23/2024
Governor Pat McCory: Cyber Challenges in Government
Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local government. Discover how the decentralized nature of government at various levels is adapting to the ever-evolving digital landscape. Governor McCrory's extensive experience in public service provides a unique perspective on the challenges and opportunities in safeguarding our digital assets. Explore the real-world implications of cyber threats, with a particular focus on potential threats to the Department of Transportation (DOT). Gain a deeper understanding of how government agencies like DOT are addressing and mitigating these emerging challenges. We'll also delve into the recent Government Accountability Office (GAO) Report on Cyber, analyzing its key findings and recommendations. This report is a must-read for policymakers and cybersecurity professionals, and our discussion will provide valuable insights into our nation's cybersecurity readiness. But that's not all! Governor McCrory has an exciting announcement to share. He will provide insights into a potential Presidential candidacy from the No-Labels political group, offering a unique perspective on the evolving political landscape and the role of cybersecurity in national politics. Tune in to this exclusive episode and engage with Governor Pat McCrory's insights, questions, and the dynamic discussion surrounding critical issues at the intersection of cybersecurity, governance, and national politics. Don't miss this opportunity to gain a deeper understanding of the challenges and opportunities facing our digital world. Patrick Lloyd McCrory (born October 17, 1956) is an American politician, businessman, and radio host who served as the 74th governor of North Carolina from 2013 to 2017. A member of the Republican Party, he previously served as the 53rd Mayor of Charlotte from 1995 to 2009. While serving as mayor of Charlotte, McCrory served on the U.S. Homeland Security Advisory Council from 2002 to 2006 under President George W. Bush. He was the Republican nominee for governor of North Carolina in the 2008 general election. McCrory was again the Republican nominee in the 2012 gubernatorial election and won with 55 percent of the vote. McCrory became the first Mayor of Charlotte to win the state's highest office, as well as the first Republican to win the governorship of North Carolina since 1988.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/30946208
info_outline
Cybersecurity Training: A 101st Airborne Veteran's Journey
09/27/2023
Cybersecurity Training: A 101st Airborne Veteran's Journey
In episode 29, host Joshua Nicholson welcomes Dennis Kraft, a Penn State graduate and former United States Army Captain who served with the 101st Airborne Division Air Assault in Afghanistan from 2010 to 2011.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723463
info_outline
Securing E-Learning in a New World: Spoilage & Deepfakes
09/19/2023
Securing E-Learning in a New World: Spoilage & Deepfakes
Welcome to episode 28 of the Cyber Security America podcast with your host Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/). He is excited to welcome Dayle Alsbury (https://www.linkedin.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723468
info_outline
Measuring Cybersecurity Risks: The Relevance of GRC
09/12/2023
Measuring Cybersecurity Risks: The Relevance of GRC
Welcome to our latest podcast episode (Episode 27), where Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/) embarks on an insightful journey through the dynamic world of #cybersecurity.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723473
info_outline
Operational Threat Intelligence: How does that work?
08/30/2023
Operational Threat Intelligence: How does that work?
Welcome to the 26th episode of "How do you managed an operational threat intelligence program?" In this installment, Joshua Nicholson (https://www.linkedin.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723478
info_outline
Cybersecurity in the Middle East: Operations Challenges & Threats
08/22/2023
Cybersecurity in the Middle East: Operations Challenges & Threats
"Welcome to Episode 25 of the podcast, where we dive deep into the intriguing world of cybersecurity in the Middle East. In this installment, we're exploring the unique operational challenges faced by foreign companies operating in the region.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723483
info_outline
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities
08/15/2023
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities
Welcome to **Cyber Security America**, your ultimate hub for all things cybersecurity in the digital era. I'm your host, Joshua Nicholson (https://www.linkedin.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723488
info_outline
Building a Cybersecurity Career: The Journey to CISO, Part II
08/08/2023
Building a Cybersecurity Career: The Journey to CISO, Part II
Welcome to Episode 23 of Cyber Security America, where we delve deeper into the world of cybersecurity careers in part 2 of our special series, "Building a Cybersecurity Career: The Journey to CISO.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723493
info_outline
Cybersecurity Solutions: Innovative cutting edge problem-solving
06/27/2023
Cybersecurity Solutions: Innovative cutting edge problem-solving
Welcome to today's episode! In contrast to our previous discussions on #artificialintelligence, #cloudsecurity, and #burnout, we are taking a different approach today.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723518
info_outline
Artificial Intelligence: Automating SOC Workflows - Salem Cyber
06/20/2023
Artificial Intelligence: Automating SOC Workflows - Salem Cyber
Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723523
info_outline
Artificial Intelligence: Cyber AI is the new Tesla of Security
06/13/2023
Artificial Intelligence: Cyber AI is the new Tesla of Security
Welcome to our podcast, where we explore the fascinating world of generative AI and its profound impact on various fields.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723453
info_outline
Cloud Security: AWS Essentials, Challenges, Best Practices
06/06/2023
Cloud Security: AWS Essentials, Challenges, Best Practices
Welcome to another episode of Cyber Security America with your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/). In this episode, we delve into the world of cloud computing and its impact on cybersecurity.
/episode/index/show/40dd79c0-9f4f-4e25-89de-80a6711c1b0f/id/29723458