Podcasts
Strike Graph Podcasts
Whether you're new to cybersecurity or expanding an already robust security stance, we have resources to support your learning.
Recommended:
Search Podcasts
When Federal Agents Ignore Court Orders: What Happens to Democracy? | Secure Talk with Claire Finkelstein
What happens when federal law enforcement refuses to follow court orders? In Minneapolis, ICE agents denied state investigators access to crime scenes despite court-issued warrants—a breakdown that national security experts had been warning about for...
Podcast
Shared Wisdom: Why AI Should Enhance Human Judgment, Not Replace It | Secure Talk with Alex Pentland
Most AI discourse swings between paradise and doom—but the real question is how we architect these systems to enhance human understanding rather than replace decision-making. MIT Professor Alex "Sandy" Pentland reveals why treating AI as an informati...
Podcast
The 2026 Planning Episode: 5 key security imperatives.
While most organizations treat security as a cost center, a select group is using it to win enterprise deals, open new markets, and outpace competitors. The difference? They've stopped asking "how much does security cost?" and started asking "how muc...
Podcast
Secure Talk Special Episode: Building Secure Societies in the Age of Division: The Seven Lessons for Humanity Heading Into 2026
"In 20 years, we transformed food allergy awareness from nonexistent to universal—no law required. What if we could do the same for data security and AI governance?" This special episode reveals how grassroots cultural shifts create lasting change, a...
Podcast
Building a Thriving Future: AI Ethics & Security in Virtual Worlds | Dr. Paola Cecchi - Dimeglio
The mistakes we made building the internet don't have to be repeated in the metaverse—if we act now. Join SecureTalk host Justin Beals for an essential conversation with Dr. Paola Cecchi-Dimeglio about building secure, ethical virtual worlds. Dr. Cec...
Podcast
Keep up to date with Strike Graph.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
From Punk Rock Anarchist to Bank Security Leader: An Unlikely Journey in Threat Intelligence | SecureTalk with Joe Rossi
- Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank. In this episode, former punk rock kid turned thr...
Podcast
Inside CMMC Implementation: What November 10th Means for Defense Contractors | Secure Talk with Bob Kolasky
Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the nee...
Podcast
Beyond Big Cities: Understanding Cybersecurity in Mid-Sized Communities | Secure Talk with Lars Kruse
When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked q...
Podcast
Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens
Quantum computing represents one of the most significant advances in computer science we'll see in our lifetimes. We're watching error correction rates improve faster than predicted, with Google's Willow chip achieving benchmarks that compress develo...
Podcast
Breaking Cybersecurity's 12 Hidden Paradigms: A Futurist's Guide to Security Evolution with Heather Vescent
Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why br...
Podcast
AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal
In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and delive...
Podcast
The Invisible Majority: How Social Media Erases 90% of Voices | Dr. Claire Robertson
90% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extre...
Podcast
An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava
The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents...
Podcast
The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit with Bart Womack
The most dangerous threats don't break down the door - they already have the keys.
Podcast
Machines Running Amok: We've Created More Than We Can Secure | Oded Hareven
Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—con...
Podcast
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein
Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure...
Podcast
Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin
When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations ...
Podcast
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requ...
Podcast
The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel
🌙 THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY
Podcast
Can Cybersecurity be “Agile”? with Brian Wagner
In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. Wi...
Podcast
The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai
Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here!
Podcast
Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert
Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here!
Podcast
The Quantum Security Precipice: Why Michele Mosca is Building Cryptographic Resilience Before It's Too Late
Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here!
Podcast
National Security in Crisis: How Geopolitical Chaos Threatens Cybersecurity & Democracy with Mike LeFever
## Episode Description
Podcast
How Russian Disinformation Networks Are Poisoning AI Chatbots | SecureTalk with NewsGuard Experts
In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into ...
Podcast
The Future of APIs in the Age of AI Agents: A Conversation with Postman
In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies. Episode Insig...
Podcast
Beyond the Blinky Lights: Why Security Governance Drives Technology
In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept sho...
Podcast
From Burning Servers to Enterprise Resilience The Evolution of Internet Security With Akamai
In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection power...
Podcast
"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency
In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory sy ...
Podcast
Hijacking AI Memory: Inside Johann Rehberger's ChatGPT Security Breakthrough
In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory sys...
Podcast
Predicting Data Breach Risk: How Mathematical Privacy Is Revolutionizing Data Sharing with Simson Garfinkel
What if there was a way to precisely predict the risk of a major data breach when sharing information? In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who ...
Podcast
The Future of CMMC: Surviving the new Federal Security Landscape with Former NRMC Director Bob Kolasky
How do you secure a nation? Hint: look for the risks to the most critical infrastructure. In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS ...
Podcast
The AI wars and what DeepSeek means to AI and security
In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been ...
Podcast
What Matters Next: Decision Making in a Rapidly Changing World with Kate O'Neill
In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's books, “Tech Humanist” an...
Podcast
Unveiling the Secrets of Cryptography with Panos Louridas: Early Computing, Encryption, and Modern Challenges
In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called "Cryptography" that helps explain ...
Podcast
The Evolution of Identity Management with Eric Olden
In this episode of SecureTalk, we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growi...
Podcast
Fairy tales and firewalls: bridging myths with modern security with Luca Vigano
Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways?
Podcast
Application Security Management and the new SBOM with Idan Plotnik
In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computin...
Podcast
Privacy reforms we need now with James B.Rule
It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity?
Podcast
Is technology a religion? with Greg Epstein
Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, S...
Podcast
Enterprise security from healthcare to GE: accountability, strategy, and value creation with Bob Chaput
My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses...
Podcast
Forging the future of security with Rey Kirton at Forgepoint Capital
In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a ...
Podcast
Ethics and innovation in medical AI: a conversation with Dr. Paul Campbell.
"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly, the advent of AI has created some spectacular progress and failures. In the realm of patient care, AI tools can have a powerful impact, and there is litt...
Podcast
Cyber warfare and national cyber defense with Jason Healey
Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How d...
Podcast
Mastering Cyber Shadows: Alex Cox's take on LockBit's resilience and the role of threat intelligence
This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. The conve...
Podcast
Making Security a Part of Product Development with Naomi Buckwalter
I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever changing security environm...
Podcast
From Cryptography to Web 3 powered by Blockchain with David Holtzman
The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dime...
Podcast
The Human Toll of Jobs / Security with Danny Goodwin & Edward Schwarzschild
In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security'. They delve into the multifaceted world of security work, bridging personal experiences and professional ins...
Podcast
Hack to learn: integrating humanities into cybersecurity with Dr. Aaron Mauro
How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe human...
Podcast
The Algorithmic Mirror: Reflecting data's role in modern life
Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance" episode on Secure...
Podcast
Redefining cybersecurity strategies with Bruce Schneier
What does it take to stay ahead in the rapidly evolving cybersecurity landscape? In this episode of SecureTalk, Bruce Schneier dives deep into his latest book, “A Hacker's Mind: How The Powerful Bend Society's Rules and How to Bend Them Back”, and ex...
Podcast
Navigating cyber threats: FBI perspectives on protecting business and family with Scott Augenbaum
How safe is your digital footprint? In this episode, we interview Scott Augenbaum, a retired FBI agent turned cybercrime prevention expert and the author of “The Secret to Cybersecurity: A Simple Plan to Protect your Family and Business from Cybercri...
Podcast
Security threats from the Chrome Web Store with Sheryl Hsu
Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode, join us for a discussion with Sheryl Hsu, a brilliant researcher from Stanford Empirical Security Research Group, to uncover fascinating insights...
Podcast
Dynamic data safety: Purandar Das on encryption and beyond
If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk, we discuss encryption with Purandar Das, a deep expert in data encryption and CEO of Sotero. The conversation also explores early...
Podcast
A perfect fit: Using risk to get the right sized security with Christopher Hodson
Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson, author of "Cyber Risk Management", gives us a reality check on SecureTalk. Discover why understanding risk is the cornerstone of every security program and how his book g...
Podcast
Mastering the role of CISO with Todd Fitzgerald
What are the essential principles for successful CISO leadership? In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Comp...
Podcast
Unraveling the layers of HIPAA: A deep dive into data security with Iliana Peters
In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US He...
Podcast
Hacking a nation: Alejandro Caceres' bold attack on North Korea
From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. Tune in to hear his story and learn how a single individual can have an outsized i...
Podcast
Cyber threat intelligence: Getting to know the adversary
"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo
Podcast
The #1 vulnerability in cybersecurity is us
98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. 90% of data breach incidents target the human element to gain access to sensitive business information.
Podcast
Crisis fighting: How to plan a successful security incident
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last five years. What happens when your job is to operate in a ...
Podcast
Creating the dark web: How the TOR browser was invented
What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discuss...
Podcast
No Result Found!
Keep up to date with Strike Graph.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
.jpg?width=1448&height=726&name=Screen%20Shot%202023-02-09%20at%202.57.5-min%20(1).jpg)
