CYBER CONNECT PODCAST

Jay Adamson & Warren Atkinson

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every Sunday and Wednesday 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #CyberConnect #Recruitment #Cyber #InfoSec #AI #Strategy #Resilience #Security #Careers #Jobs #VC #StartUp #Leadership #Beginners

  1. DFIR, Deepfake & Ransomware Crisis: The Fight to Protect Our Families & Businesses

    15H AGO

    DFIR, Deepfake & Ransomware Crisis: The Fight to Protect Our Families & Businesses

    The barrier to entry for cyber criminals has officially collapsed. It no longer takes a technical genius to bankrupt your business or a sophisticated setup to steal your child’s identity. It takes a leaked password at 2:00 AM and just two photos from a public social media profile. In a world where "prevention" tools are failing, this is the brutal, uncensored reality of what actually happens after the hack. We are joined by Will Poole and Oli Fletcher, the Co-Founders of Strand Intelligence, a UK-based platform that is revolutionizing Digital Forensics and Incident Response. As the former Principal Cyber Investigation Officer for the ICO, Will has investigated the UK's most high-profile breaches, giving him a rare view into exactly what companies try to hide from regulators and why they always get caught. Together with Oli, they are fixing a broken industry where high-end forensics was previously a "luxury craft" reserved for billionaires. They are on a mission to ensure mid-sized businesses don't face an "Economic Death Sentence" when insurers refuse to pay, while simultaneously fighting the "Agentic AI" threats now targeting our families in their own homes. MORE INFO: if you're interested to know more about Strand, you can see the platform modules at https://strandintelligence.com/modules 🎁 EXCLUSIVE OFFER: Strand are offering a free Threat Intelligence Report - just get in contact here for a scan, to see CVEs, dark web references and leaked credentials https://strandintelligence.com/contact 🔥 WHAT YOU'LL DISCOVER: 💀 The 2:00 AM Panic: The single worst decision leadership teams make in the first hour of a hack (and why it dooms them for a month). 💸 The "Death Sentence": What actually happens to the bill when Cyber Insurance finds a loophole and refuses to pay the ransom? 📸 The "2-Photo" Rule: Why your "private" social media profile is no longer enough to stop AI identity theft of your children. Battling Deep Fakes. 🕵️‍♂️ Confessions of a Regulator: Will reveals what companies try to hide from the ICO during a breach and why they always get caught. 🤖 Shadow AI: Your employees are pasting company secrets into ChatGPT. Can you ever get that data back? (Spoiler: No). 📢 The AI Lie: How to cut through the noise of "Marketing AI" (that just writes summaries) vs. "Operational AI" (that actually stops a breach). 🏫 The "Silent Signal": How teachers can spot the subtle signs of "Algorithmic Grooming" in the classroom that parents almost always miss. 🎮 Roblox & Discord: How to teach a 10-year-old to spot a "Social Engineer" in a gaming lobby without ruining their fun. 👵 Grandparent Vishing: The "Safe Word" protocol every family must agree on tonight to stop AI voice scams cold. 📉 The Human Toll: Why the CISO tenure is shrinking and why this industry is so good at protecting data but so bad at protecting its people. 🧠 The "Human Moat": To the teenager asking "Why learn code if AI can do it?": The one future-proof skill a bot can never replicate. 👇 CHALLENGE In the comments below, we want to know: Does your family have a physical, non-tech "Safe Word" to verify identity against AI voice scams? If not, what is the one thing stopping you from setting that up tonight? 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week.

    1h 10m
  2. Scaling to $100M: From CISO to CEO to Investor (Pen Testing to CTEM)

    FEB 14

    Scaling to $100M: From CISO to CEO to Investor (Pen Testing to CTEM)

    Most technical experts hit a ceiling at the C-suite, but very few understand the blueprint to transcend from protector to builder and investor. In an era where "check-the-box" compliance is dead, this episode reveals the exact strategies used to scale cybersecurity services to $100M+ and what global private equity firms are actually looking for in the "irresistible" security assets of 2026. We are thrilled to be joined by Mark Carney, a U.S. cyber pioneer who has successfully navigated the rare path from technical practitioner to high-stakes CEO and Investor. Mark currently serves as the CEO of Evolve Security, a leading tech-enabled offensive security solution that delivers Continuous Penetration Testing through an optimal blend of AI and human expertise. He is also the CEO and Founder of DURO Advisors, where he collaborates with Global 100 private equity firms - managing a minimum of $20B AUM- to inspect cybersecurity platform assets entering the market. Mark previously led Coalfire’s revenue growth past the $100M+ mark as COO/Executive VP. With experience leading nine M&A transactions and holding executive roles at industry giants like FireMon and FishNet Security (now Optiv), Mark’s insights are the definitive guide for scaling cybersecurity into a high-valuation enterprise asset. 🎁 Exclusive Access For Our Community Members: Evolve Security's NEW Continuous Penetration Testing (CPT) Offering, Powered by the new Darwin Attck 3.0 platform: https://www.evolvesecurity.com/platform What You’ll Discover 🚀 The $100M Blueprint: Tactical leadership lessons from scaling service firms to nine-figure revenues and leading 9 successful M&A integrations. 🎯 The "4T" Investor Framework: What $20B PE firms look for: Tam, Timing, Team, and Tech. 🛡️ From Pen Testing to CTEM: Why compliance-driven audits are dead and why Continuous Threat Exposure Management is the new driver of enterprise value. 🤖 AI & Autonomous Agents: A look at the future where AI agents manage ransomware negotiations and automated red teaming. 🧠 The "Blue-Collar" Mindset: Why a "nose-down" work ethic and a 2026 Personal Vision Board are Mark's secrets to peak performance. ⚖️ Healthy vs. Toxic Pressure: How to manage high-pressure leadership without the "toxic load" that breaks modern CISOs. 📈 The 12 Key KPIs: Beyond ARR - why metrics like NRR, GRR, and Utilization are the true measures of a platform's worth. 👇 CHALLENGE In the comments below, share ONE non-business goal you are laser-focused on for 2026. Whether it’s hitting a new fitness PR or mastering a hobby, we want to hear how you're fueling your energy outside the office? 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1 hr
  3. Integrity-First AI: Precision Architecture for Real-World Trust

    FEB 7

    Integrity-First AI: Precision Architecture for Real-World Trust

    Searching for answers to "Why does my AI model hallucinate?", "Who owns AI risk in the enterprise?", or "How can I secure my AI?". Stop scrolling. This is the blueprint you haven't found yet. In the 2026 rush to "move fast and break things," we’ve ignored the silent killers of AI adoption. The reality is brutal: Trust breaks operationally, not ethically. We are thrilled to launch the Integrity-First AI Series to expose the brutal truth: speed is common, but integrity is rare, and the "Trust Gap" in enterprise AI is operational, not ethical. Joined by our new co-host Chiru Bhavansikar, this isn't a theoretical debate. Today we deliver a masterclass in Precision Architecture for leaders who are tired of "Demo-Ware" and ready to build critical infrastructure that survives the real world. We’re excited to be joined by Sam Sawalhi is the CEO of JSOC IT and a "wartime general" for critical infrastructure, where he operates with the mindset that failure has real, physical consequences. Grounded in execution rather than theory, Sam specializes in designing high-stakes systems that hold up under pressure, ensuring that AI deployments treat "trust" as an architectural requirement- complete with clear ownership, scoped autonomy, and real-time observability- rather than a vague compliance checkbox. Learn More: https://www.jsocit.com/ Chiru Bhavansikar, recognized as one of the most impactful Chief AI Officers of 2024, serves as the Chief AI Operating Officer at ARHASI, where he is focused on "Actualising Success Through Precision Architecture". With over two decades of experience pioneering cloud platforms and advising giants like Google, Chiru helps enterprises cross the chasm from "cool AI experiments" to Trusted Autonomous Systems, ensuring that governance and accountability never break during the handoff between data models and human workflows. Learn More: http://arhasi.ai/ What You’ll Learn (The Operational Playbook) 🛑 The Real Trust Gap: Why AI trust breaks operationally, not ethically—usually at the fragile handoffs between data modelling, workflows, and human decision-making. 🏗️ Precision Architecture: How to treat AI like Critical Infrastructure with defined failure paths, rollback mechanisms, and scoped autonomy. 💰 The Incentive Trap: Why organizations reward "Time-to-Demo" over "Time-to-Trust," and how to fix the broken incentives that lead to fragile code. 🔍 The "Black Box" Danger: Why Observability is the first thing to break (accuracy can drop from 95% to 60% unnoticed) and why you can't fix what you can't see. 📉 The Drift Trap: The massive risk of Model Drift, where systems anchor in past data (like 2019) to predict 2026 outcomes, silently destroying revenue. 🛡️ Surviving Executive Turnover: Sam’s strategy of "Radical Transparency"—how to document the "Why" to protect your architecture when new leadership tries to tear it down. 👑 The Authority Crisis: The hardest question for leaders: When the AI is wrong, who owns it, and who has the authority to override it?. 👇The Challenge: In the comments below, answer this: If your AI agent creates a financial loss or reputational damage tomorrow, can you name the specific HUMAN who is accountable? (If not, you don't have an AI system; you have a gambling problem) 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos

    53 min
  4. Cybersecurity: Small Teams, Big Impact. How to Reward, Retain & Recognise Your Team?

    FEB 4

    Cybersecurity: Small Teams, Big Impact. How to Reward, Retain & Recognise Your Team?

    To the Professionals: You only get noticed when things break. You’re the "Invisible Hero" keeping the world safe in total silence, until a headline makes you the villain. Is your career stuck in the "Silent Success" paradox? 🔓 To the Leaders: If you only recognize your team during a crisis, you aren't leading, you’re just reacting. Burnout is rising because your best people feel they only exist when there is a fire to put out. How do you inspire a team whose greatest successes are, by definition, silent? 📉 The "Invisible Hero" era is over. In this episode, Jay Adamson and Warren Atkinson take a sledgehammer to the status quo, joined by the inspiring Gary Hibberd for an unfiltered look at how we reward, recognise, and retain the talent that actually keeps the UK secure. 🔥 WHAT YOU’LL DISCOVER: -The 'Invisible Hero' Problem: Why the industry's "Silent Success" paradox is the leading cause of CISO Burnout and how to change the narrative. - Curing Expo Fatigue: Why traditional 8-hour sales pitches at massive trade shows are failing and how to find Authentic Networking that actually drives career growth. - The 'London Bubble' Reality: Why real business and innovation are migrating to regional hubs. We explore why the North West & Yorkshire is becoming a cornerstone for the UK's 2026 security strategy. - Imposter Syndrome & Career Barriers: Why brilliant SMEs rule themselves out of leadership roles. - Careers advice and guidance for breaking the "Technical Ceiling" at all levels. - Merit-Based Awards vs. Pay-to-Play: The exclusive reveal of the Real Cyber Conference & Awards 2026 an awards model where impact beats the size of your marketing budget. - Modern Leadership Culture: Practical advice for leaders on how to champion "Unsung Heroes" and build a resilient security culture before a breach happens. [EXCLUSIVE REVEAL] Real Cyber Evolved: The 2026 Vision Gary Hibberd pulls back the curtain on an event designed to excite, empower, and absolutely not be missed. This isn't just "another cyber conference." 🗓️ Date: Friday, 30th October 2026 🔗 Learn more & Enter: www.therealcyberawards.co.uk ⚠️ Deadline: The doors will be CLOSING on April 28th, so start your submission today. What to Expect: 1. A FULL DAY CONFERENCE: Inspiring speakers, immersive experiences, and incredible insights. 2. THE AWARDS: Honouring the individuals and organisations working tirelessly behind the scenes. 3. THE ATMOSPHERE: Exceptional food, exclusive networking, and moments that celebrate our incredible community in a powerful, meaningful way. 🚀 TAKE ACTION: Register, Nominate, Attend Whether you are a leader building a world-class culture, a business owner navigating the digital landscape, or a professional ready to step into the spotlight, Real Cyber 2026 is your stage. Don’t wait for others to notice your impact; we encourage you to nominate your team and perhaps yourself, especially if you are an individual contributor or solo expert who often works behind the scenes. Join us in York on October 30th to bridge the gap between hidden work and industry-wide recognition: register to attend, enter the awards, or nominate the people you know who deserve to be seen. 🔗 Claim your place & nominate now: www.therealcyberawards.co.uk 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos

    28 min
  5. Stop being an “expert”. Start being a Leader

    JAN 31

    Stop being an “expert”. Start being a Leader

    I’ve Learnt Why Great Cyber Experts Make Terrible Leaders (& How to Fix It). Are you the smartest person in the room… but the one with the least influence? 🔓 If you are still speaking "Vulnerabilities" while the Board is speaking "Revenue," your expertise hasn’t just peaked, it’s become your cage. You have the certifications and a six-figure salary, but when the big decisions are made, are you actually at the table, or are you just "the tech guy" waiting in the hallway? 👇 CHALLENGE: Have you ever been "right" about a risk but ignored by the Board? Tell us the one barrier stopping you from reaching the C-Suite in the comments. 🚀 ESCAPE THE TECHNICAL TRAP (50% OFF) Stop guessing and start leading. Fast-track your move to the C-Suite with Tamlynn’s Executive Coaching packages. 🎟️ Use Code: cyberconnect (Valid until Feb 28th) 👉 Claim Your Discount: https://empowerauthenticcoaching.co.uk/coaching-packages We’re excited to be joined by Tamlynn Deacon (Executive Coach & Former Cyber Director) and Marius Poskus (Fintech CISO & AI Governance Expert) to discuss the brutal reality of Executive Warfare. We’re breaking down why technical mastery is your biggest "Kryptonite" and how to stop being a "fixer" so you can finally lead the business. 🔹 Tamlynn is a Certified Business Coach & Former Cyber Security Director who helps Technical Professionals transition into Executive Leadership roles. With over 15 years in Cyber, and over a decade leading IT & Cyber Security Teams, she understands the unique challenges cyber professionals face when moving from technical expertise to strategic leadership. She's also the Founder of Empower Authentic Coaching, where she empowers leaders to show up authentically and make a lasting impact. Learn More: https://empowerauthenticcoaching.co.uk/ 🔹 Marius is Chief Information Security Officer at a Leading Fintech Organisation. A Distinguished Cyber Security Leader & Board Advisor….& is Renowned for his Expertise within AI Governance & Secure Technology Adoption.His Strategic Insights have Empowered Organisations to Strengthen their Security Posture whilst Effectively Navigating the Complexities of AI Integration…..& Marius’s Commitment to Advancing the Cyber Security Landscape….& Advising Vendors on Developing Innovative Products that Meet Industry Demand, is what sets him apart from many of his Peers! Learn more: https://www.mpcybersecurity.co.uk/ 🔥 WHAT YOU’LL DISCOVER: The £120k Salary Trap: Why "more certs" won't break the mid-management ceiling. 📉 Superpower vs. Kryptonite: Identify the traits secretly sabotaging your influence. 🛡️ The Boardroom Dialect: 3 language shifts to turn "Risk" into "Business Value." 🗣️ Leading Agentic AI: Managing "Human & Digital" teams in the 2026 workforce. 🤖 Influence Without Authority: Getting the Board to ask YOU for advice. 🤝 Hiring for Culture: Why Marius passes on "10/10" technical CVs. 🚀 STEM Reality Check: Honest advice for parents in a deepfake-heavy world. 👨‍👩‍👧‍👦 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1h 8m
  6. Why boards ignore you and how to fix it?

    JAN 24

    Why boards ignore you and how to fix it?

    If you are the most knowledgeable person in the room but have the least influence, you are falling into the "IT Crowd" trap. We know the emotional toll of shouting into the void - carrying the weight of the company's risk while being dismissed as a "blocker" by the very people you are trying to protect. In this episode, we sit down with Jessica Figueras - a leader who sits on both sides of the boardroom table - to uncover why Boards still treat Cyber Security as a "tech problem" instead of a business risk, and exactly how to change that narrative. From "survival tactics" used in the charity sector to the single diagram that beats a 50-page risk report, this is a masterclass in executive influence. 🔹 Jessica Figueras is the Co-Founder of CxB – Cyber governance for Boards, a non-profit dedicated to strengthening Board oversight of cyber security. A veteran technology strategist, she previously served as Vice Chair of the UK Cyber Security Council, CEO of Pionen, and Chair of NCT (the UK’s largest charity for parents). She bridges the gap between Government, Civil Society, and the C-Suite. Learn more about CxB here: https://www.cxb.org.uk/ 🔥 IN THIS EPISODE: The Influence Gap: Why the "IT Crowd" stigma is still killing CISO careers in 2026 (and the one non-tech skill to break it). The AI Threat: How Boards must govern a workforce of "Human & Digital" identities in the age of Agentic AI and Deepfakes. Visual Influence: Why a simple diagram wins more budget than a 50-page risk report. Zero Budget Warfare: "Survival tactics" from the Charity Sector that every corporate CISO should adopt today. Governance vs. Management: How to stop the Board from just "checking boxes" and make them accountable for resilience. Social Impact: Why your security strategy must extend beyond the balance sheet to protect civil society. The "Summit Effect": Why closed-door peer networking is more valuable than any vendor event. Parental Warning: A critical reality check on the digital mistakes parents are making right now. Career Truths: What to tell a 16-year-old who thinks they aren't "smart enough" for a career in tech. 📅 Join us at the upcoming Cyber Leaders’ Summit: ✅ The first open to Leaders from the Financial Services sector on 28th January, Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-financial-services ✅ The second open to leaders across all industries we invite you to join us on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1h 5m
  7. JAN 17

    No Budget, No Problem: How CISOs Lead, Win & Inspire in Cybersecurity

    Stop trying to buy security. Start building influence. If you think the reason you aren't getting budget is because the company "doesn't get it," you are part of the problem. Global CISO from a leading FinTech exposes the uncomfortable truth: technical leaders are failing in the C-Suite because they lack the soft skills to navigate rejection. We break down exactly how to secure high-growth Fintechs when the Board says "No Budget," and why your third-party risk spreadsheet is giving you a false sense of security. 🔹 Guillaume Ehny is the Chief Information Security Officer (CISO) at Kroo Bank, bringing over a decade of strategic experience to the high-stakes world of Fintech. Having secured rapid-growth companies like GoHenry and Cashflows, he specializes in aligning security with aggressive business goals without becoming a "blocker." He also serves as a Board Member for VigiTrust Global Advisory. 🔥 YOU'LL HEAR: - The "Soft Skills" Lie: Why highly technical leaders struggle to survive in the C-Suite and the specific leadership traits that actually drive career growth. - The "No Budget" Strategy: How to build a robust Fintech security program and demonstrate ROI when the Board denies your funding. - Compliance vs. Reality: Why checking regulatory boxes is not the same as being secure, and how to balance risk-based decision making with audit requirements. - Third-Party Risk Management (TPRM): 41% of breaches originate from vendors. We reveal why your current supply chain audit is failing to stop them. - Wasted Tech Spend: How to identify which security tools are draining your budget without reducing your risk exposure. - The "Summit Effect": Why closed-door peer networking shapes security strategy more than any vendor event or conference ever will. Perfect for: CISOs fighting for budget | Technical leaders transitioning to the Boardroom | Fintech professionals in high-growth startups | Risk managers handling third-party vendors 📅 Join us at the upcoming Cyber Leaders’ Summit: ✅ The first open to Leaders from the Financial Services sector on 28th January, Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-financial-services ✅ The second open to leaders across all industries we invite you to join us on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community: https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    55 min
  8. JAN 3

    Quantum Security vs. Hackers: The Keyless Blockchain Solution Is Here

    Your identity system is vulnerable to deepfake attacks. Your passwords can be hacked. Your audit logs can be deleted. And quantum computers will break traditional encryption within the next decade. What if there's a way to eliminate all of these vulnerabilities at once? In this episode, Hamid Pishdadian and Mike Goodwin reveal how rethinking cybersecurity from scratch led to something the industry said was impossible: unbreakable identity, encryption without keys, and security that actually scales. They explain why the solutions everyone's investing in (Post-Quantum Cryptography, better passwords, more monitoring) are all optimizing a broken system instead of fixing it. 🔹 Hamid Mokhlis | CEO, Founder & Chief Architect, SQE: is an award-winning design engineer, inventor, and technology executive with over 35 years of experience and more than 20 U.S. and international patents across computer science, electrical engineering, robotics, AI, and advanced algorithm design. His career includes developing the genetic algorithm behind the industry-leading Taco 0013 circulator, inventing a breakthrough 3D camera system referenced by Fortune 100 companies, and serving as CTO for multiple technology firms while earning additional patents in high-energy power switching and energy-reduction systems. He is the longtime president of General Sensors, CTO of Growgenics, and a mechanical engineering graduate of the University of Rhode Island. 🔹 Mike | COO & CFO, SQE: is an accomplished finance and operations professional with experience in emerging technologies at EMC and in global financial analysis at Boston Consulting Group, specializing in financial planning, detailed analysis, and competitor intelligence. Most recently, as General Manager of Cultivation and Processing at Sanctuary Medicinals, he led a team of 100+, developing effective structures, standard operating procedures, and streamlined production strategies. He holds a Bachelor of Business Administration in Finance with a minor in Information Technology from the Isenberg School of Management at the University of Massachusetts Amherst.. 🔥 What You'll Discover: - Why deepfake attacks bypass traditional security systems—and how unforgeable digital identity (SQid) stops them permanently - How keyless "digital particle" encryption works and why it's fundamentally different from traditional password-based security - Why experts say Post-Quantum Cryptography won't solve the quantum threat- here's the real solution - How Zero Trust security finally scales without slowing down your team (the blockchain breakthrough that makes it practical) - Why SQE uses 16,000x less energy than competing platforms and what that means for sustainable security - How immutable audit logs (records that can't be deleted or changed) save compliance teams thousands of hours - Why regulatory compliance (HIPAA, GDPR, PCI-DSS) becomes automatic instead of manual audits - How to shift security from a cost burden into a competitive advantage for your business - What roboticists and AI engineers know about building secure systems that cybersecurity teams are missing - The practical first step: how to migrate to unforgeable identity without disrupting your current operations Perfect for CISOs, security architects, CFOs measuring security ROI, DevSecOps teams, compliance officers, and founders building defensible infrastructure. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges.

    1h 19m

About

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every Sunday and Wednesday 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #CyberConnect #Recruitment #Cyber #InfoSec #AI #Strategy #Resilience #Security #Careers #Jobs #VC #StartUp #Leadership #Beginners