The Cyber Business Podcast

Matthew Connor

Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.

  1. FEB 4

    Securing AI, Data, and Infrastructure at Government Scale with Steve Orrin

    Guest Introduction Steve Orrin serves as Chief Technology Officer and Senior Principal Engineer at Intel Federal, where he operates at the intersection of advanced computing, cybersecurity, and national security missions. In his role, Steve works closely with U.S. federal agencies and the Defense Industrial Base to translate mission requirements into hardware, firmware, and software capabilities that can operate at massive scale and under elevated security demands. He also feeds those real world requirements back into Intel's product and research teams, helping shape future platforms that support government, critical infrastructure, and highly regulated industries. His background places him in a unique position to explain how technologies pioneered for government use often become the next standards adopted across the commercial sector.   Here's a Glimpse of What You'll Learn Why federal government requirements often predict future commercial security standards How AI and cybersecurity must be addressed across the full lifecycle Where AI delivers real value in security operations versus where expectations fall short What confidential computing solves and why data in use is the next security frontier How post quantum cryptography timelines are being driven by government mandates Why hardware based security controls matter for cloud, edge, and mission systems How memory safe technologies can eliminate entire classes of cyber attacks   In This Episode Steve explains his role at Intel Federal as a three part function. He helps government agencies adopt the right technologies for their missions, translates those requirements back to Intel's internal product and engineering teams, and supports innovation where standard commercial solutions do not fully meet government needs. This two way translation ensures that future platforms align with real world mission and security demands. The discussion moves into AI and cybersecurity, which Steve frames across three dimensions. Organizations must secure AI systems themselves, use AI responsibly to improve cybersecurity operations, and defend against adversaries that are also leveraging AI. He emphasizes that AI cannot be treated like traditional software. It requires governance, validation, and continuous monitoring across data sourcing, training, tuning, and deployment. Steve outlines where AI is delivering tangible value today. Rather than detecting entirely new threats in isolation, AI excels at automating repetitive, high volume security tasks. By reducing the operational burden of routine alerts, patching, and triage, AI allows security teams to focus their expertise on higher impact risks and emerging threats. A key segment of the conversation focuses on confidential computing. Steve explains how protecting data in use closes a long standing security gap that encryption at rest and in transit cannot address. Through trusted execution environments, memory encryption, isolation, and attestation, organizations can protect sensitive workloads even from compromised operating systems or untrusted cloud environments. This capability is especially relevant for AI models, intellectual property, and mission critical workloads deployed across cloud, edge, and disconnected environments. The episode concludes with a forward looking discussion on post quantum cryptography and secure mission platforms. Steve explains why the threat is not limited to future quantum computers, but to data being harvested and stored today for later decryption. Government driven timelines are accelerating adoption, and commercial industries will benefit from following the same path as compliant products become broadly available.   Sponsor for this Episode This episode is brought to you by CyberLynx. CyberLynx is a complete technology solution provider to ensure your business has the most reliable and professional IT service. The bottom line is we help protect you from cyber attacks, malware attacks, and the dreaded Dark Web. Our professional support includes managed IT services, IT help desk services, cybersecurity services, data backup and recovery, and VoIP services. Our reputable and experienced team, quick response time, and hassle-free process ensures that clients are 100% satisfied. To learn more, visit https://cyberlynx.com, email us at help@cyberlynx.com, or give us a call at 202-996-6600.

    42 min
  2. JAN 29

    Building Security After a Ransomware Wake Up Call with Brett Talmadge

    Guest Introduction Brett Talmadge served as Chief Information Officer at Nisqually Red Wind Casino during one of the most critical periods in the organization's history. Brought in following a ransomware incident that disrupted operations and exposed long standing technology gaps, Brett was tasked with stabilizing systems, rebuilding trust, and creating a sustainable security and IT foundation. His background spans highly regulated and mission critical environments, including financial services in New York City and work tied to federal defense operations. That experience shaped his disciplined approach to cybersecurity, operational resilience, and leadership communication.   Here's a Glimpse of What You'll Learn How ransomware incidents expose deeper organizational and governance issues Why paying ransomware creates long term risk rather than resolution The importance of defining a clear IT end state before implementing tools How leadership misunderstanding of IT roles creates security blind spots Why cybersecurity is an ongoing process, not a finish line How AI driven security tools reduce noise but still require human oversight Why communication with executives matters as much as technical controls   In This Episode Brett walks through the reality of stepping into an organization that had recently paid ransomware and was still recovering from operational and cultural fallout. He explains how legacy systems, siloed ownership, and the absence of a long term IT vision created an environment where a single phishing click could cripple the business. Rather than focusing on surface level fixes, Brett prioritized rebuilding structure, visibility, and accountability across systems and teams. The conversation highlights a recurring challenge faced by many IT leaders: executive teams often view cybersecurity as a state that can be achieved and checked off. Brett pushes back on that assumption, emphasizing that security is an ongoing process shaped by constant threat evolution, user behavior, and organizational entropy. Tools like Darktrace and Varonis provided meaningful visibility and alert quality, but only when paired with trained staff and leadership engagement. A key theme throughout the episode is communication. Brett shares a pivotal moment when leadership questioned why IT staff needed desks, revealing a fundamental misunderstanding of modern IT roles. That moment underscored why many organizations struggle with security maturity. Without executive clarity on what IT actually does, even strong technical programs can be undervalued or dismantled prematurely.   Sponsor for This Episode This episode is brought to you by CyberLynx. CyberLynx is a complete technology solution provider to ensure your business has the most reliable and professional IT service. The bottom line is we help protect you from cyber attacks, malware attacks, and the dreaded Dark Web. Our professional support includes managed IT services, IT help desk services, cybersecurity services, data backup and recovery, and VoIP services. Our reputable and experienced team, quick response time, and hassle-free process ensures that clients are 100% satisfied. To learn more, visit https://cyberlynx.com, email us at help@cyberlynx.com, or give us a call at 202-996-6600.

    36 min
  3. JAN 27

    Building Resilient Security Programs Across Industries with Jess Vachon

    Guest Introduction Jess Vachon is a three time CISO, the founder of Vigilant Violet LLC, and the host of the Voices of the Vigilant Podcast. With a career spanning manufacturing, defense, robotics, software, healthcare, and global financial services, Jess brings a uniquely broad perspective to cybersecurity leadership. Her journey reflects a deep commitment to building security programs that balance technical rigor with human centered leadership. Across every role, Jess has focused on developing resilient teams, pragmatic security strategies, and leaders who understand both risk and responsibility.   Here's a Glimpse of What You'll Learn Why diverse industry experience strengthens security leadership How human centered leadership improves security outcomes Where AI helps security teams and where it creates new risk Why doing the basics well still matters more than new tools How AI can reduce user friction while improving protection What reasonable security looks like in an era of nation state threats Why investing in teams delivers better long term defense   In This Episode Jess Vachon explains how her path to becoming a CISO was shaped by working across multiple industries and building security programs from the ground up. She shares how creating a full security program at a defense manufacturer helped confirm that security leadership was where she could make the greatest impact. That experience also reinforced her belief that hard problems with visible outcomes are the most rewarding. The conversation explores the role of AI in modern security, with Jess emphasizing that productivity gains should not come at the expense of people. She challenges the idea that AI should simply replace staff and instead argues for using it to increase effectiveness, retain institutional knowledge, and reduce unnecessary friction for employees. Her perspective reframes AI as a tool that supports humans rather than one that sidelines them. Jess and Matthew also discuss why security tools must be purpose built rather than bolted on with buzzwords. Using real world examples, she explains how machine learning can quietly protect users by understanding behavior and stopping threats before employees even see them. This approach reduces blame, improves trust, and shifts security closer to being invisible but effective. The episode closes with a powerful leadership discussion shaped by Jess's Marine Corps experience. She shares how military service taught her to lead under pressure, maintain perspective during crises, and focus on outcomes without losing sight of people. That mindset continues to inform how she views risk, response, and the responsibility of modern security leaders.   Sponsor for this episode... This episode is brought to you by CyberLynx. CyberLynx is a complete technology solution provider to ensure your business has the most reliable and professional IT service. The bottom line is we help protect you from cyber attacks, malware attacks, and the dreaded Dark Web. Our professional support includes managed IT services, IT help desk services, cybersecurity services, data backup and recovery, and VoIP services. Our reputable and experienced team, quick response time, and hassle-free process ensures that clients are 100% satisfied. To learn more, visit https://cyberlynx.com, email us at help@cyberlynx.com, or give us a call at 202-996-6600.

    46 min
  4. JAN 23

    The Human Side of Cybersecurity Leadership with Kara Schlageter

    Guest Introduction Kara Schlageter is a cybersecurity executive with a career that bridges human resources, technology, and security leadership. Formerly Deputy CISO at First Citizens Bank, she brings a rare perspective shaped by early consulting experience, large scale transformation work at Bank of America, and deep exposure to identity and access management. Her path into cybersecurity began not with firewalls or endpoints, but with people, culture, and organizational change. Today, Kara is known for advocating a human centered approach to cybersecurity that treats leadership, empathy, and ethics as core security controls.   Here's a Glimpse of What You'll Learn Why cybersecurity failures are driven more by people than by technology How an HR background can strengthen security leadership Why culture and empathy are critical security enablers How AI should complement human judgment rather than replace it The ethical risks of AI adoption without governance Why risk tolerance and values must guide technology decisions How leadership roles like the CISO are evolving beyond technical expertise   In This Episode Kara Schlageter explains why cybersecurity must be demystified and understood as a human problem first. She challenges the common perception that security is primarily about tools, arguing instead that breaches happen because of human behavior, incentives, and culture. Her background in HR allows her to view cybersecurity through the lens of motivation, trust, and organizational design rather than purely technical controls. She shares how her career evolved through consulting, identity and access management, and large scale transformation at Bank of America. While helping organizations grow rapidly, Kara learned that hiring decisions, culture, and leadership alignment matter as much as technical skill. That experience shaped her belief that understanding people is a force multiplier in cybersecurity. The conversation also explores AI and its growing role in both security and leadership. Kara emphasizes that AI is a powerful tool, but one that must be governed carefully. She stresses the importance of transparency, ethical use, and intentional guardrails, especially as organizations rush to adopt AI driven capabilities without fully understanding long term risk. As the discussion turns toward leadership, Kara outlines how the CISO role is changing. Modern security leaders must communicate risk in business terms, define culture, and align technology decisions with organizational values. Technical expertise still matters, but it is no longer sufficient on its own. The future of cybersecurity leadership belongs to those who can balance innovation with humanity. Sponsor for this episode... This episode is brought to you by CyberLynx. CyberLynx is a complete technology solution provider to ensure your business has the most reliable and professional IT service. The bottom line is we help protect you from cyber attacks, malware attacks, and the dreaded Dark Web. Our professional support includes managed IT services, IT help desk services, cybersecurity services, data backup and recovery, and VoIP services. Our reputable and experienced team, quick response time, and hassle-free process ensures that clients are 100% satisfied. To learn more, visit https://cyberlynx.com, email us at help@cyberlynx.com, or give us a call at 202-996-6600.

    47 min
  5. JAN 21

    Zero Trust, AI, and Security Leadership in Healthcare with William O'Connell

    Guest Introduction William O'Connell serves as the Information Security Officer at VHC Health, a hospital system based in Arlington, Virginia, just outside Washington, DC. With more than seven years at the organization, O'Connell was brought in to help jump start and mature the healthcare system's cybersecurity program. His background spans network engineering, firewalls, VPNs, and early infrastructure security, giving him a practitioner's perspective on how security has evolved from perimeter defense to continuous risk management. Today, his work focuses on balancing patient care, operational access, and modern security controls in one of the most complex and regulated environments in IT.   Here's a Glimpse of What You'll Learn Why zero trust should be treated as an ongoing strategy rather than a finished project How hospital security mirrors physical access control in real world healthcare settings Where AI adds value in cybersecurity and where it introduces new risks Why agentic AI still requires strong human oversight How CISOs should evaluate AI tools in regulated environments like healthcare The importance of governance and third party risk assessment for AI adoption Why storytelling matters when communicating security metrics to executive leadership   In This Episode William O'Connell explains that zero trust is often misunderstood as a project with an end date, when in reality it is a guiding security concept that requires continuous improvement. He uses a healthcare analogy to clarify the idea, explaining that hospitals must allow access to many people while still protecting highly sensitive areas. This same principle applies to digital environments where access must be intentional, segmented, and constantly reviewed. The conversation also explores the role of AI in modern security operations. O'Connell shares how healthcare organizations must carefully assess AI tools to ensure patient data is not exposed or reused in unintended ways. While AI can dramatically improve visibility and response time, he cautions against blindly attaching large language models to every system without understanding the risks, including prompt injection and unintended data exposure. As the discussion turns to agentic AI, O'Connell highlights both the promise and the concern. Automation can reduce repetitive tasks and improve efficiency, but it also removes traditional learning paths for junior staff and introduces trust challenges when AI is given autonomy. He emphasizes the importance of maintaining a human in the loop and applying zero trust principles even to AI driven systems. The episode closes with practical leadership insight on reporting and communication. O'Connell stresses that security leaders must translate metrics into stories that resonate with executive teams. Data alone is not enough. Clear narratives tied to business outcomes are what drive understanding, alignment, and investment in cybersecurity initiatives.   Sponsor for this episode... This episode is brought to you by CyberLynx. CyberLynx is a complete technology solution provider to ensure your business has the most reliable and professional IT service. The bottom line is we help protect you from cyber attacks, malware attacks, and the dreaded Dark Web. Our professional support includes managed IT services, IT help desk services, cybersecurity services, data backup and recovery, and VoIP services. Our reputable and experienced team, quick response time, and hassle-free process ensures that clients are 100% satisfied. To learn more, visit https://cyberlynx.com, email us at help@cyberlynx.com, or give us a call at 202-996-6600.

    41 min
  6. JAN 19

    How Movie Studios Defend IP at Massive Scale with Dan Meacham

    Guest Introduction Dan Meacham serves as Vice President of Cyber and Content Security at Legendary Entertainment, a global film and television production company behind some of the most recognizable franchises in modern media. In his role, Dan is responsible for securing not only traditional enterprise systems, but also the creative content, intellectual property, and complex supply chains that power large scale movie and television production. His work spans cyber defense, digital forensics, vendor risk, and emerging AI driven security models in an industry where collaboration extends far beyond corporate boundaries.    Here's a Glimpse of What You'll Learn Why securing a movie studio is fundamentally different from securing a traditional enterprise How content production relies on thousands of external collaborators and temporary environments The role of digital forensics and watermarking in protecting unreleased media How sophisticated attackers target individuals through social engineering and custom applications Why AI driven analytics are essential for threat detection at massive scale How long term log retention enables rapid decision making during incidents What shared learning intelligence could mean for the future of security operations   In This Episode Dan Meacham explains how Legendary's business model reshapes cybersecurity strategy. Each film or television project operates like its own company, complete with a unique technology stack, vendor ecosystem, and lifecycle. Security must adapt quickly to environments that appear and disappear over months or years. He walks through the realities of protecting creative content across the production pipeline. From dailies and post production workflows to global distribution, large media files are constantly replicated, shared, and transformed. Watermarking, stenography, and forensic techniques play a critical role in tracing leaks back to their source. The conversation highlights how attackers exploit human behavior rather than systems alone. Dan shares real world examples where threat actors built targeted applications to extract photos from personal devices, demonstrating how deeply personal and contextual modern attacks have become. Dan also outlines how AI and machine learning have long existed in both filmmaking and cybersecurity. Today's challenge is not adopting AI, but governing it across devices, platforms, and supply chains. He introduces the concept of shared learning intelligence as a way to aggregate insights from multiple AI systems without centralizing sensitive data. The episode closes with a discussion on scale and speed. By retaining over a decade of security logs, Dan's team can quickly identify anomalous behavior and shut down access before damage spreads. AI accelerates analysis, but human accountability remains central to every decision.

    58 min
  7. JAN 16

    Securing Aviation, Education, and Innovation with David Mashburn

    Guest Introduction David Mashburn serves as Chief Information Security Officer at Embry-Riddle Aeronautical University, one of the world's leading institutions focused on aviation, aerospace, and applied engineering. With residential campuses in Florida and Arizona alongside a large global online population, Embry Riddle operates in a highly complex technology and security environment. David oversees cybersecurity across academic, research, and administrative systems, balancing innovation, safety, and operational resilience. His background spans enterprise security, incident response, and leadership roles in both higher education and large scale commercial environments, giving him a pragmatic perspective on how security must enable the mission it protects.    Here's a Glimpse of What You'll Learn Why higher education security resembles a large scale Zero Trust environment by design How AI in cybersecurity is an evolution of long standing machine learning practices The challenges of securing unmanaged student and faculty devices at scale Why governance and guardrails matter more than outright restriction How identity and behavior drive modern security decisions Where AI can accelerate analysts without replacing human accountability How leadership and coaching experience shapes effective security teams   In This Episode David Mashburn explains how Embry Riddle's aviation focused mission creates unique security requirements. With flight training, aerospace research, and global online education, systems must remain available and trusted at all times. Security exists to support learning and operations rather than slow them down. He shares why AI in cybersecurity should be viewed as a natural progression of existing analytics. From SIEM platforms to cloud security tools, machine learning has been embedded in security workflows for years. The current wave of AI expands scale and speed while introducing new governance considerations. The conversation dives deep into Zero Trust principles as a practical necessity. With thousands of unmanaged devices accessing university systems daily, security decisions rely on identity verification, behavior analysis, and continuous monitoring instead of network location. David also discusses the balance between automation and accountability. While AI can reduce analyst workload and surface insights faster, final decisions must remain human. Automation supports judgment but does not replace responsibility. The episode closes with David's career journey, from early exposure to technology through his family, to coaching athletics, to enterprise security leadership. He explains how coaching shaped his leadership philosophy and how those lessons translate directly into managing security teams under pressure.

    52 min
  8. JAN 12

    Blending Technology, Facilities, and Leadership in Hybrid Work with Chris McCay

    Guest Introduction Chris McCay serves as Vice President for Corporate Infrastructure at Brailsford and Dunlavey, a national program management and development advisory firm supporting higher education institutions, municipalities, sports organizations, and K 12 districts. In his role, Chris oversees IT, corporate real estate, facilities operations, and internal administration. His career path into technology leadership was nontraditional, beginning as a music major before moving through hardware, networking, and business operations. Over nearly two decades at Brailsford and Dunlavey, Chris progressed from IT manager to director and ultimately into an executive role that reflects how infrastructure leadership now spans people, technology, and physical space.   Here's a Glimpse of What You'll Learn How corporate infrastructure expanded beyond traditional IT after hybrid work became permanent Why facilities, real estate, and technology now operate as one system What it takes to transition from managing tasks to developing people How AI should function as an ideation and productivity tool rather than a replacement Why recognition and culture matter as much as compensation How career growth often requires leaving and sometimes returning Why startups may offer long term opportunity for early career technologists   In This Episode Chris McCay explains how hybrid work reshaped corporate infrastructure by forcing technology and physical operations to function together. With teams distributed across offices, homes, and client sites, systems must work consistently regardless of location. This reality led to the convergence of IT, facilities, and real estate under a single leadership model. He shares his unconventional career journey, moving from music and creative interests into defense contracting, IT support, and eventually executive leadership. Chris reflects on how early exposure to customer service and technical fundamentals shaped his management style and helped him guide others through non linear career paths. Leadership development emerges as a central theme. Chris discusses the challenge of helping team members grow, even when growth may lead them outside the organization. He emphasizes the importance of honest conversations about career direction, compensation, and long term fulfillment. The conversation closes with a practical discussion on AI adoption. Chris explains how Brailsford and Dunlavey uses AI as a starting point for learning, analysis, and internal tools while maintaining human accountability. He reinforces that AI works best as a companion that enhances judgment rather than replacing it.

    40 min
5
out of 5
4 Ratings

About

Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.