Cybersecurity Unplugged

A CyberTheory Original Podcast

As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.

Each episode is a digestible yet deep dive into key issues and responses to current cybersecurity risks and the expanding threat landscape through the day-to-day experiences of information security leaders and solution provider executives.

Eliminating the Threat of Ransomware

Janine Darling is the founder and CEO of STASH, a data compromise and ransomware protection solution. She is an award-winning CXO and technical strategist who has held prominent leadership roles…

Creating Pathways for Women in Tech

Sheryl Root is Program Director of Carnegie Mellon University’s Silicon Valley MSc in Technology Ventures program and an Associate Professor for the MSc in Software Management program. In her role…

Building Top-Notch Talent in Cybersecurity

Ibrahim “Abe” Baggili is an internationally recognized expert in cybersecurity and digital forensics. He is the founder and co-director of the University of New Haven’s Cyber Forensics Research and Education…

Implementing Security at a National Level

Andy Purdy is the Chief Security Officer for Huawei Technologies USA. Purdy oversees Huawei USA’s cybersecurity assurance strategy and system, and supports Huawei’s global security assurance program. Purdy was a…

Recognizing and Adapting to the New Reality

Morgan Wright is Chief Security Advisor at SentinelOne and an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark testimony before Congress on Healthcare.gov changed how…

Cyberspace: The Next Domain

Mika Devonshire is an internationally recognized cybercrime investigator and information security practitioner. Her technical specialization is in digital forensics and incident response and her understanding of the threat landscape and…

Guidance for every step of the marketing cycle.

Menu