The Business of Cybersecurity
Technology
About
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in modern business. Each episode dives into how companies are responding to regulatory pressure, increasing complexity in cloud environments, and rising expectations from boards and customers. From AI-driven defense and zero trust to skills gaps and risk quantification, we go beyond technical jargon to explore what actually works—and what doesn’t—on the road to building resilient organisations. Whether you're leading a security team, sitting at the executive table, or simply want to understand the business impact of cybersecurity, this podcast offers honest, grounded perspectives designed to help you make better decisions in an environment that never stands still. Search Tech Talks Network to discover more shows covering the voices at the heart of enterprise technology.
Episodes
- The Internet Will Never Be This Secure Again, IIE's Kevin Curran on AI and Cybersecurity
In this episode, Kevin Curran, a cybersecurity educator and IEEE member, discusses the future of AI and cybersecurity with the host of The Business of Cybersecurity. He explores real-world risks and opportunities, the evolving threat lands…
- Commvault On Cyber Recovery Why Disaster Plans Fall Short
This episode features Mark Molyneux discussing the UK's Cyber Security and Resilience Bill and its impact on organizations. The conversation differentiates between disaster recovery and true cyber recovery, emphasizing resilience for busin…
- Why Digital Identity Is Broken And How Ditto Plans To Fix It
Gonzalo Alonso, CEO of Ditto, discusses the shift toward user-controlled digital identity and the move from system-based trust to cryptographic proof. The episode explores how these changes impact business models, compliance, and cybersecu…
- Why Non Human Identities Are The Next Cybersecurity Challenge With Torii CEO Uri Haramati
The increasing use of AI agents and non-human identities in business systems presents a significant cybersecurity challenge, as they often operate with high levels of access and are invisible to traditional governance models. Uri Haramati…
- AI Security Teams That Work 24/7 With Machine Speed
Shan Kulkarni, CEO of Nullify, joins the Business of Cybersecurity podcast to discuss the tension between AI-driven speed in software development and the risks faced by human security teams. The conversation explores the concept of autonom…
- AI, Social Engineering, And The New Browser Attack Surface
This episode discusses the browser as the new cybersecurity blind spot, featuring Adam Bateman of Push Security. They explore how modern attacks bypass traditional defenses, the rise of AI in social engineering, and new threats like Consen…
- How Booz Allen Hamilton Prepares Organizations For A Cyber Crisis
Booz Allen Hamilton's Andrew Carr explains that cyber crisis survival hinges more on preparation than attacker sophistication. He emphasizes the importance of understanding one's environment, effective incident response involving the entir…
- Why Object First Says Most Immutable Backups Are Not Truly Immutable
This episode discusses the reality of backup immutability with Anthony Cusimano from Object First, highlighting how attackers target backups and the importance of robust backup storage design for cyber resilience.
- Goldilock Secure On Cutting The Blast Radius In Overconnected Networks
Steven Brodie of Goldilock Secure argues that hyper-connectivity amplifies cybersecurity risks. He proposes "right-sized connectivity," where systems connect only when needed, and explains Goldilock
- How Kiteworks Is Preparing Enterprises For AI-Driven Risk In 2026
Tim Freestone of Kiteworks explores the 2026 Data Security & Compliance Risk Forecast, highlighting enterprise readiness for AI-driven risks. The discussion covers data control, third-party risks, social engineering, regulatory pressures,…
- Building Trust Through Cybersecurity in a Zero Trust World
This episode features Taylor Hersom discussing how cybersecurity can be leveraged for business growth and trust-building, especially in an AI-first world. Key topics include the impact of AI on the risk landscape, the importance of data pr…
- Avanade on Preparing Organizations for a World of Stronger Cybersecurity Expectations
This episode discusses the UK's Cyber Security and Resilience Bill, explaining its impact on mid-sized businesses and managed service providers. Jason Revill of Avanade highlights mandatory reporting, increased accountability, and the shif…
- When IT Meets OT, Can Endpoint Security Hold The Line
This episode features John Walsh of IGEL Technology discussing the challenges of securing operational technology (OT) in critical infrastructure by extending zero trust principles to the endpoint. The conversation covers prevention-first s…
- Why Endpoint Resilience Is the Missing Piece in Cybersecurity Strategy
This episode of The Business of Cybersecurity features Jason Mafera discussing endpoint resilience as a critical, yet overlooked, cybersecurity priority. The conversation highlights IGEL's prevention-first approach and its Business Continu…
- Corelight’s Brian Dye on Outsmarting AI-Powered Attackers
Brian Dye, CEO of Corelight, explains how AI has changed cyberattacks, emphasizing the need for network detection and response (NDR) as the new frontline of defense. The episode covers automation, threat response, and leadership lessons.
- Experian’s AI Fraud Report: SIM Swaps, Voice Cloning, and Smarter Countermeasures
Paul Weathersby of Experian explains how criminals use generative AI for fraud, including SIM swaps and synthetic identities. The episode covers defensive strategies like adaptive authentication, AI investigations, and industry collaborati…
- Qualys CEO Sumedh Thakar on Moving From SOC to ROC
Qualys CEO Sumedh Thakar explains the evolution of cyber risk management, highlighting the shift from Security Operations Centers (SOC) to Risk Operations Centers (ROC). He discusses managing cyber risk amid tight budgets and AI advancemen…
- CyberArk Explains Why Machine Identities Are the New Attack Surface
This episode discusses the profound implications of machine identities vastly outnumbering human ones in organizations. It covers evolving phishing tactics, the role of culture in security, and securing the new risks posed by agentic AI.
- How Abnormal AI Detects Threats Before They Hit the Inbox
Mike Britton, CIO at Abnormal AI, joins The Business of Cybersecurity to discuss the intersection of AI governance and cybersecurity. The episode covers Abnormal AI's use of behavioral AI to detect threats, the challenges of AI regulation,…
- Clari: Why RevOps Is the Hidden Weapon in Cybersecurity’s AI Arms Race
This episode features John Queally from Clari discussing the critical role of Revenue Operations (RevOps) in the cybersecurity industry
- From Complexity to Clarity: Cyber Resilience with Cloudflare’s Christian Reilly
Christian Reilly joins The Business of Cybersecurity to discuss real-world cyber resilience, the shift to zero trust, and the risks of AI and quantum computing. The episode covers strategies for improving cybersecurity preparedness, includ…
- Resilience Over Panic: Rethinking Ransomware with Trevor Dearing of Illumio
Trevor Dearing from Illumio shares insights from a ransomware report, highlighting operational halts, UK business reluctance to report, and the importance of containment strategies over pure prevention for cyber resilience.
- Zscaler on Building Cyber Resilience from the Ground Up
Mark Lluic of Zscaler argues that cybersecurity strategies must evolve beyond basic defenses to withstand major disruptions. He emphasizes a proactive, architecture-focused approach, advocating for Zero Trust principles to be applied unive…
- Immersive Labs’ Max Vetter on Closing the Skills Gap Across Cyber Teams
Max Vetter discusses findings that junior cybersecurity professionals are outperforming senior colleagues in readiness for modern threats due to issues with traditional training. He emphasizes the need for continuous, challenge-based learn…
- Legacy Tech Meets Modern Threats as Kyndryl Rethinks Cybersecurity
Paul Savill from Kyndryl explains the significant cybersecurity risks posed by legacy technology, especially with the rise of IoT and AI-powered attacks. He details Kyndryl's transformation to a cloud-first, zero trust model and emphasizes…
- Imperva on the Bot Surge Behind Half of Global Internet Activity
Bots now generate nearly half of internet traffic, with sophisticated actors targeting business logic and APIs rather than just technical vulnerabilities. Lynn Marks from Imperva explains the findings of the Bad Bot Report, highlighting ri…
- IGEL at the Edge of Cybersecurity Transformation
This episode features John Walsh, Field CTO for Critical Sectors at IGEL, discussing edge security transformation. The conversation covers zero trust strategies, the importance of endpoint protection, and how IGEL's immutable OS addresses…
- Fortinet on Making Cybersecurity a Business Priority
This episode contrasts the UK's proposed Cyber Security and Resilience Bill with the EU's NIS2 directive, highlighting the UK's lack of specificity in areas like supply chain security and board accountability. It explores how the UK could…
- The Shadow API Threat Explained by Akamai Technologies
Richard Meeus of Akamai Technologies discusses cybersecurity challenges facing financial institutions, including DDoS attacks and shadow APIs. The episode covers Zero Trust strategies, regulatory compliance like DORA, and Akamai's approach…
- Thales Data Threat Report Revals Risks to Critical Infrastructure
This episode features Tony Burton of Thales UK discussing the Thales Data Threat Report
- The Real Meaning of Zero Trust with Its Creator
John Kindervag, the creator of the Zero Trust cybersecurity model, joins Neil on The Business of Cybersecurity to explain its core principles, implementation, and evolution beyond a buzzword. They discuss its strategic framework, how it ap…