CYBER CONNECT PODCAST

Jay Adamson & Warren Atkinson

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology

  1. What Does it take to build the future: AI research, business analysis and cybersecurity

    4D AGO

    What Does it take to build the future: AI research, business analysis and cybersecurity

    Title: What Does it take to build the future: AI research, business analysis and cybersecurity Stop pretending that a flashy new AI tool will magically transform your business. If your vision for the future isn't anchored in real business analysis and secure foundations, you aren't innovating - you are just building a very expensive liability. Welcome back to another DTX Edition of the SECURE | CYBER CONNECT Podcast, recorded live on the floor of the Digital Transformation EXPO in Manchester. Our host Jay Adamson and Warren Atkinson are stripping away the vendor hype to look at the actual anatomy of a winning tech companies. They sit down with three visionary leaders operating at the bleeding edge of AI governance, applied data research, the intersection of business analysis and cybersecurity, the importance of special interest groups and regional tech growth to answer one massive question: What does it actually take to build the future? 🔥 WHAT YOU'LL DISCOVER: 🤖 The AI Bubble vs. Reality: Are we in an AI echo chamber? We cut through the boardroom hype to reveal what enterprises are actually building, and whether generative AI is a true revolution or a costly distraction. 🧠 The Invisible Data War: Forget what you know about traditional tech. Discover how elite applied research and 'graph tech' are quietly solving the most complex business problems on the planet. 🌉 The 'Death' of Good Ideas: Why the greatest technical innovations fail before they even launch. We explain why elite Business Analysis is the only bridge between a brilliant concept and commercial survival. ⚡ The 1% Leadership Paradox: The ultimate executive balancing act. How do you relentlessly push your teams for rapid innovation without collapsing the security that keeps your company alive? 📍 The UK's Hidden Tech Hubs: Breaking the London bubble. We expose the raw truth about scaling high-performing teams, driving regional growth, and building world-class infrastructure outside the capital. 🤝 Careers Advice and Guidance: For Information and cybersecurity, project management, business analysis and AI research. 🔹 Chiru Bhavansikar - As a Chief AI Officer at Arhasi, Chiru is at the absolute forefront of AI governance, ensuring that the next generation of enterprise AI is not just powerful, but ethical, compliant, and deeply trusted by the market. 🎁 Learn More About Arhasi: http://arhasi.ai 🔹 Andreas - Operating as the Director of Applied Research at Neo4j, Andreas explores how cutting-edge graph technology and deep data science are mapping the future of enterprise intelligence. Andreas is a technological humanist. Starting at NASA, Andreas designed systems from scratch to support science missions. Then in Zambia, he built medical informatics systems to apply technology for social good. Now with Neo4j, he is democratizing graph databases to validate and extend our intuitions about how the world works. Everything is connected. 🎁Learn More About Neo4J: https://neo4j.com/ 🔹 Mark Cross - Mark Cross is the founder and principal consultant of Envista Consulting, a York based business analysis practice that specializes in cybersecurity. He is also the founder and Regional chair (EMEA) for the IIBA's 🎁Learn More About Envista: http://envista.consulting/ 🎁Learn More About IIBA: http://www.iiba.org/ 📅 Join us on 14-15th October at Excel London for DTX London: https://www.dtxevents.io/london 👇 The Challenge: What is the biggest disconnect in your company right now? Is it between the visionaries driving AI and the IT teams trying to secure the network? ✅ Join the Ecosystem: Get FREE access to salary guides, career pathways, certs, resources, tools, and opportunities, as well as our new platform helping with both individual and organisational growth. Use the code “DTXM26” and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    57 min
  2. From military to cyber, from poverty to protected: Real stories, real impact

    MAY 13

    From military to cyber, from poverty to protected: Real stories, real impact

    Behind every firewall is a human being. Behind every policy is a story. We recently hit the road and attended the National Cyber Security Show (NCSS 2026) in Birmingham, we stopped looking at screens and started looking at people. In Part 2 of our NCSS Special Edition Series, Jay and Warren sit down with four extraordinary voices who are redefining what cybersecurity really means - and who it's really for. From a 21-year military career to the frontline of security culture. From digitally excluded children to the IT teams burning out to protect 30,000 UK schools. These are the stories the industry doesn't put on its keynote slides. 🔥 WHAT YOU'LL DISCOVER (The Unfiltered Truth): - 📉 The Frontline Reality Check: Raw market insights from the trenches. What is paralyzing leaders today, emerging trends, and why the future of defense is human-centric resilience. - 🛑 The Silent Burnout Epidemic: The extreme mental health toll on the exhausted, under-resourced IT teams tasked with defending the UK's 30,000 schools. - 🧸 The True Cost of Digital Poverty: The intersection of cybersecurity and child safety, proving why true digital defense means nothing if it leaves the digitally excluded behind. - 🚫 Toxic Culture vs. Human Defense: Why spending millions on AI and firewalls completely fails if your workplace is paralyzed by a culture of blame. - 🔮 The AI Threat & The Human Solution: As global threat actors weaponize AI, discover why your absolute ultimate defense will always be human connection. - 🚀 Breaking the "Coder-Only" Myth: The untapped, non-technical career pathways and why empathetic relationship builders are exactly what the market is starving for. 🔹 Liz Murray - Chief of Staff, SASIG Events Following a successful 21-year military career, Liz moved into the private sector in 2018. Despite having initially said “not a bank and not Cybersecurity.” her first role was in cyber at HSBC. Liz subsequently held impactful roles in financial services, cyber-vendor and retail enterprise organisations, deepening her cross-sector expertise in education, leadership behaviours, and humanfactorsled security. Liz now serves as Chief of Staff for the Security Awareness and Special Interest Group (the SASIG), driving resilience and risk discussions across cybersecurity best practice, mental health and wellbeing, cyberincident preparedness, safeguarding vulnerable people online, diversity and inclusion, and STEM career development. 🎁Learn More: https://www.thesasig.com/ 🔹 Michael Tarbard (Every Child Online) – CEO & Founder tackling digital poverty head-on. Michael's giving refurbished devices and online safety support to disadvantaged children and young people across the UK—while building national partnerships that connect families to education and opportunity. His challenge to transformation leaders? If your strategy doesn't reach the digitally excluded, you're building for a shrinking market. 🎁Learn More: Https://everychildonline.co.uk 🔹 Dolores Ruzafa - International Security Advisor - Xygeni Passionate about People, with nearly 40 years in the IT world - starting with Seagate, then Dell, Symantec, Kiuwan, Testrail, Ranorex, Preemptive and now the very best Xygeni. The one thing that she has seen constant is People – Dolores reminds us that “We all need the human touch” - and that is her strength. Dolores listens and connects so that you can share your concerns and together find a solution. 🎁Learn More: https://xygeni.io/ 🔹 Michael Coffer With over a decade of experience, Michael is a trusted strategic partner helping organizations drive security innovation and navigate emerging threats. While he and his team at Heimdal work relentlessly to keep threat actors out of enterprise environments, Michael’s primary mission is defending the UK Education Sector. He champions the critically under-resourced and under-staffed IT teams tasked with protecting the next generation across 30,000 schools.

    50 min
  3. 50 years of truth: The harsh realities of the cyber frontline

    MAY 9

    50 years of truth: The harsh realities of the cyber frontline

    If you work in tech, information and cyber security, there is a very good chance you are exhausted right now. You spend your weeks fighting invisible threats, fighting for budgets, and drowning in an endless sea of "next-gen" vendor pitches. When you are stuck in that grind, it is incredibly easy to lose sight of the point. If you’ve ever walked a trade show, you know exactly how loud the buzzwords and aggressive sales pitches can get. But every so often, you sit down with someone who cuts straight through the BS and completely grounds you. Recorded live from the floor of the National Cyber Security Show (NCSS) in Birmingham, the team sat down with industry legend Martin Smith MBE to celebrate a monumental legacy: 50 years on the frontline, the 22-year evolution of SASIG and their massive 1,000 Webinars. The National Cyber Security Show (NCSS) provides the absolute perfect backdrop for this conversation. As the lines between physical security and digital risk completely vanish, our industry cannot survive in silos. We desperately need these live, in-person spaces that facilitate physical and digital convergence - a room where defenders, vendors, and leaders can actually listen, learn, teach and exchange the raw ideas needed to outpace modern threats. 🔥 WHAT YOU'LL DISCOVER: 🌐 The NCSS Spotlight: Our thoughts on the National Cyber Security Show, the innovations showcased, and why these events are vital for industry unity. 🚨 Listening to the Frontline: A deep dive into the real-world frustrations and successes shared by security leaders in the SASIG and SECURE ecosystems. 🛡️ 50 Years in Tech and Cyber Security: The harsh realities, biggest shifts, and raw lessons from Martin’s half-century career fighting cybercrime and defending the industry. 🏛️ The SASIG History: How a bold idea in 2004 evolved into a subscription-free powerhouse of 12,000+ professionals across 4,500+ organisations. 🎯 Vision, Mission & Purpose: The blueprint for building a true "CISO safe space" where the frontline can share threat intelligence without commercial distraction under the Chatham House Rule. 🎙️ 1,000 Webinars: Celebrating the massive milestone of 1,000 live sessions and what it takes to consistently deliver unfiltered truth to the community. 🌐 The IT/OT Convergence: Why the barrier between physical and digital worlds has collapsed, and how live events like NCSS help us defend the hyper-connected landscape. 🤝 True Vendor Partnership: Moving past transactional sales pitches to build genuine "trust networks" between vendors and defenders. 🚀 Upcoming Opportunities & Exclusive Announcement: Make sure to listen to the stream to learn exactly what is coming up next in the partnership between SASIG and SECURE, and how you can get involved! 👇 The Challenge: What is the biggest "unspoken truth" in cybersecurity? Drop it in the comments! 🔹 Martin Smith MBE: With nearly 50 years’ experience in the security and crime prevention industries, Martin Smith is a highly respected personality in the cyber world. In 2004, he founded The Security Awareness Special Interest Group (SASIG) as a subscription-free networking forum. Its 11,000+ membership represents 4,500+ organisations drawn from CISOs, CTOs, and their staff. Martin is a Fellow of The Security Institute. In 2017, he received a lifetime achievement award, and in 2024, a Commendation from the City of London Police Commissioner and the National Police Chiefs’ Council for his lifetime’s work in combatting cybercrime. 🏢 About SASIG: We are the SASIG, a subscription-free thought-leadership forum for cyber professionals across all industries. Established by Martin Smith MBE, we have developed a supportive community to become a true ‘CISO safe space’. Becoming a member unlocks exclusive, free benefits including live webinars, in-person events, and the flagship Big SASIG conference. Every event follows the Chatham House Rule, ensuring open, honest discussion free from commercial distraction.

    31 min
  4. Building resilient trust QueChip, critical infrastructure and the future of secure devices

    MAY 2

    Building resilient trust QueChip, critical infrastructure and the future of secure devices

    The encryption key is officially dead. Are we wasting billions on "Post-Quantum" security while hackers walk right through the physical backdoor? And why are manufacturers actively leaving our digital world - from EVs to the National Grid -exposed by design just to save 50p? 🏆 $10,000 BOUNTY CHALLENGE: We’re challenging the world’s best hackers to break the QueChip. Do you have what it takes? 👉 REGISTER FOR THE QUEHACKATHON HERE: https://sqe.io/quehackathon/ Jay Adamson and Warren Atkinson are joined by Hamid Pishdadian and Mike Goodwin from SQE to have the exact conversation the industry is trying to dodge. We are cutting the corporate BS to expose an uncomfortable truth: you simply cannot software-patch your way out of a hardware crisis. Hamid and Mike aren't here to pitch another tool -they’re here to show us a physical microchip that mathematically kills the encryption key for good. Whether you are a CISO exhausted by "security theatre," a hacker looking for a real challenge, or a professional trapped by biased hiring algorithms, this is the reality check you need. 🔥 WHAT YOU'LL DISCOVER: - 🚨 The 50p Death Trap: Why tech companies are leaving medical devices and smart cities completely exposed to hackers, just to save 50p on a microchip. - 🕵️ The Quantum Scam: Why the industry is selling expensive "future-proof" software patches that don't actually work, and how fixing the hardware kills the threat completely. - 🔑 Killing the Encryption Key: How 35 years of engineering has led to a silicon chip that proves we no longer need hackable encryption keys to stay safe. - 🏛️ Fake Safety Laws: Why the UK's ban on default passwords is just "security theatre" that won't actually stop a real nation-state attack. - 🤖 Stopping Rogue AI: How to prevent advanced AI from faking machine identities and physically hijacking factories, cars, and power grids. - 📱 True Digital Ownership: How a new physical wallet stops crypto phishing dead in its tracks and ends our forced reliance on middlemen like banks and cloud servers. - 💼 The Broken Hiring Machine: Why the cyber industry is bleeding £20,000+ per hire while brilliant tech professionals get ghosted by biased HR algorithms. - 💰 The $10,000 Hackathon: Why SQE is ignoring corporate marketing and challenging the world's best developers to break their tech for a live cash bounty. 🔹 Hamid Pishdadian: Hamid is the visionary engineer behind the QueChip. Leveraging decades of physical engineering, he built a blockchain into the silicon itself, mathematically proving we no longer need to transmit encryption keys to be secure. 🔹 Mike Goodwin: Mike is driving the commercial integration of the QueChip. He bridges the gap between complex engineering and real-world applications, directly challenging the software-patch addiction of the modern tech world. 🎁 Break the Chip. Claim the Bounty: We are dropping the official REGISTRATION LINK to enter the $10,000 QueHackathon in the comments section below! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cybersecurity accessible to everyone. 🚀 Stop fighting a rigged system! We’ve partnered with SQE.io to drop something massive. Use code WTFISQUANTUM below to claim your spot before our network takes them all: 10 Companies: 90 days of free Enterprise access to consolidate hiring. 200 Professionals: 90 days of free Premium access to bypass gatekeepers. ✅ Claim Your Early Access Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to help us tear down the gatekeepers.

    55 min
  5. You don't "look the part"  Neurodiversity, AI and surviving tech

    APR 29

    You don't "look the part" Neurodiversity, AI and surviving tech

    Stop using 'cultural fit' as an excuse to hire the same people over and over again. When every person in your tech team thinks exactly the same, you haven't built a defence—you've built a massive, predictable blind spot. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, Kayla Vondy -a leader operating at the high-stakes intersection of government policy and cybersecurity- exposes why the industry’s obsession with 'standardised' talent is a national security risk. We are stripping away the red tape to look at the raw realities of 2026 public sector tech, from the 'Immigration Tax' to the danger of neurotypical-only threat modelling. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Bureaucratic Blind Spot: Why neurotypical-only teams are fundamentally incapable of effective threat modelling against non-linear attackers. - 🚨 The Immigration Tax: The silent, exhausting pressure of proving your worth in UK tech while navigating unwritten cultural rules and visa dynamics. - 🎭 The Weaponisation of 'Cultural Fit': How HR terminology is actively used as a gatekeeper to keep diverse, brilliant minds out of the room. - 🤖 AI for the Social Contract: Building 'human-first resilience' for vulnerable citizens who rely on government systems every day. - 📍 DTX Special- Purpose to Practice: How to move beyond policy checkboxes to actual citizen-facing delivery in 2026. - ⚡ The Risk Paradox: How neurodivergent leaders bridge the gap between 'fail fast' tech culture and 'never fail' government bureaucracy. - 🛒 Procurement Red Flags: The one question every government buyer must ask vendors to stop procuring 'exclusionary' tech. - 🛠️ The 2026 Playbook: Which 'unwritten rule' of government tech must be deleted to make the industry work for everyone. 🔹 Kayla Vondy - Kayla is an AI Project Manager at the Liverpool City Region Combined Authority, where she works across AI, cybersecurity, and public sector delivery. She brings deep expertise from the tech and cyber fields alongside her lived experience as a neurodiverse woman. A regular speaker on responsible AI and digital inclusion, Kayla is dedicated to building inclusive, resilient systems that work for real people. 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is the biggest outdated hiring 'rule' or corporate standard in tech that needs to be permanently retired? Name it in the comments below! ✅ Join the Ecosystem, use code ‘LOOKTHEPART’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    51 min
  6. The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    APR 22

    The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    The industry is obsessed with building artificial minds, but we are fundamentally failing the human ones. Forcing your most brilliant people to mask who they are just to fit a corporate mold isn't 'professionalism' -it's the fastest way to kill innovation. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning Data Scientist and TechJumpstart Hub Founder Wendy Amexo disrupts the narrative on what it truly takes to build trustworthy technology. We are stripping away the vendor hype to focus on the 'human operating system,' exploring how a career pivot from Law to Data Science can sharpen your technical lens and why ADHD is a secret weapon for solving the industry's most complex problems. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The 'Squiggly' Advantage: How a background in Law provides a superior holistic lens for AI regulation and governance. - 🕵️ Silent AI Failures: What every founder gets wrong about AI mistakes and why 'silent failures' should terrify your board. - 💻 The DevSecAI Framework: A deep dive into the infinity loop: Build, Scan, Fix, Scan Again -the only way to survive LLM deployment. - 🚨 The ADHD Tax: The unseen emotional and financial toll of navigating a tech industry built for neurotypical minds. - 📍 DTX Special - Sensory Survival: Practical strategies for neurodivergent professionals to successfully navigate overwhelming, high-pressure environments like DTX. - 🏛️ The Seat at the Table: Why diverse cognitive profiles are vital in the physical rooms where the future of tech is decided. - 👻 The Hyperfocus Trap: How to protect neurodivergent talent from their own drive rather than exploiting it for short-term gains. - 💰 Tearing Down the Gates: Wendy’s mission with TechJumpstart Hub CIC to empower women and underserved communities in the North-East. 🔹 Wendy Amexo - Wendy is an award-winning Data Scientist, Data & Analytics Manager at one of the world's largest FMCG brands, and the Founder of TechJumpstart Hub CIC. She brings a unique, holistic lens to tech, connecting raw technology to regulation and strategic value. Wendy is a regular speaker on responsible AI and digital inclusion, dedicated to building inclusive, resilient systems. 🎁Learn More About TechJumpStart Here: https://techjumpstarthub.co.uk/ 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is your 'squiggly' superpower? Have you pivoted from a non-tech background, or are you navigating tech as a neurodivergent professional? ✅ Join the Ecosystem, use code ‘TECHJUMP’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    50 min
  7. Cybersecurity Culture: Why behaviour, diversity, and system design matter

    APR 18

    Cybersecurity Culture: Why behaviour, diversity, and system design matter

    Are you tired of taking the blame for a broken system? Right now, 83% of tech professionals admit to bypassing corporate security controls… not because they are careless, but because they are exhausted and just trying to survive impossible workloads. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning cybersecurity executive and Founder of Seidea CIC, Stephanie Itimi, exposes the toxic culture of corporate security . We are turning off the vendor pitches to tackle the one vulnerability you cannot patch with software: human burnout. Why do companies spend billions on tools while treating human behavior like a software bug? What happens to your psychological safety when you are forced through 45-minute compliance videos just to be tricked and shamed by your own IT department ? Whether you are a SOC analyst exhausted by 2 a.m. wake-up calls , a professional trying to break through the industry's relentless gatekeeping , or a CISO trying to actually protect your team, this is the unfiltered reality check you need to hear. 🔥 WHAT YOU’LL DISCOVER: - The Burnout Crisis: Why smart people knowingly bypass controls, and how to shift security from a corporate "police function" into a business enabler . - The Training Trap: Why 45-minute phishing videos are just a tick-box exercise, and why micro-learning and role-play are the only things that actually work . - The "Shadow AI" Rebellion: Why blanket bans on AI push behavior to the "black market," and how employees are secretly feeding data into unapproved tools . - Ready for Digital Co-Workers?: We break down the terrifying leap from Generative AI to "Agentic AI," and why your culture isn't ready for AI agents executing tasks . - Shattering the Gatekeepers: Stephanie’s unfiltered advice on bypassing the "bro-culture" of tech, building your personal brand, and conquering imposter syndrome . - Diversity as a Tactical Defense: Why true representation isn't an HR issue—it's a hard, life-saving security imperative that stops global hackers . - Surviving Leadership: Why stepping into a CISO role is incredibly lonely, and the uncomfortable conversations leaders must have behind closed doors 🔹 About Stephanie Itimi: Stephanie is an award-winning cybersecurity executive, currently Director of Information Protection and Compliance at Age UK . Recognised by the World Economic Forum and NCSC , she is the author of Cybersecurity Culture. She is also the Founder of Seidea CIC, an organization that has trained and supported over 8,000 women from Black and Minority Ethnic backgrounds into cybersecurity and tech roles . 🎁 Learn More About Seidea CIC: https://www.seidea.org/ 📅 Join us at the Cyber Leaders’ Summit (London): https://www.cyber-leaderssummit.com/ 👇 The Challenge: Does your workplace reward secure behavior, or does the system make breaking the rules the easiest path to getting your job done? Let us know in the comments! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. 🚀 Stop fighting a broken system! If you are tired of the gatekeeping, the endless tool fatigue, and the "spray and pray" job applications , we are opening early access to a private, enterprise-grade career and hiring platform inside the SECURE ecosystem . Hit the link below and use the private access code EMPOWER to bypass the waitlist! ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1h 6m
  8. The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    APR 15

    The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    Stop worrying about quantum computing. Right now, up to 10% of your enterprise devices are completely undetected, and your multi-million-pound security stack is likely failing silently in the background. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, 25-year industry veteran and ThreatAware CEO Jon Abbott exposes the "Cybersecurity Sophistication Paradox." We are stripping away the vendor hype to look at the terrifying realities of 2026 enterprise security. Why is the industry obsessed with buying shiny new EDR tools while completely incapable of deploying them? What happens when developers rely on AI "Vibe Coding" to build fragile infrastructure? And why are Level 1 and Level 2 SOC analysts facing a mass extinction event? If you are a CISO battling the boardroom or a tech professional trying to survive the AI shift, this is the wake-up call you cannot afford to miss. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Founder’s Journey: How Jon overcame severe dyslexia, left school at 16, and eventually co-founded two major tech companies. - 🚨 The Sophistication Paradox: Why security teams love solving exotic problems while ignoring the boring, foundational IT hygiene that actually stops breaches. - 🕵️ Anatomy of a Disaster: How attackers bypassed M&S enterprise security with a simple phone call, the JRL cyber attack and the McDonald's hiring app that secured 65M users with the password "123456". - 👻 Shadow AI & Blind Spots: Why relying on Microsoft InTune is a trap, and how employees using AI at home are bypassing your security entirely. - 💻 "Vibe Coding" & Acceptable Outages: How AI prompts are creating a culture where catastrophic network outages are treated as acceptable collateral damage. - 📉 The Extinction of the SOC Analyst: Why Level 1 and 2 roles will disappear in 5 years, and how to become the "10x Engineer" that survives the purge. - 💰 The Founder Masterclass - Raising & Scaling: How to successfully build, scale, and get executive buy-in for solving "unsexy" foundational tech problems during a brutal economic downturn. Here’s how to engage with VC’s and Investors proactively. 🔹 Jon Abbott - With over 25 years of experience in the technology industry, Jon believes passionately in revolutionising the way businesses stay in control in the ever-evolving Cyber Landscape. Jon has leads Teams in Developing Cutting-Edge Solutions to transform Asset & Security Tool Management for organisations across the globe….& brings a fresh perspective on Security that is very much centred around Breach Prevention & Process. Previously, he Co-Founded Priority One, where he saw the critical need for Real-Time, Agentless Security Control Monitoring & its these experiences that have made Jon a Cyber Generalist with broad Technical Knowledge & Strong Commercial Awareness and have inspired him to Design & Build New & Intuitive Solutions to fill this crucial gap in the market. At ThreatAware, he’s committed to providing Innovative Cyber Asset Management Solutions that empower organisations to proactively keep their Cyber Assets safe from attack. Offering a Single Source of Truth, their Solution eliminates the burden of Asset Monitoring for IT Teams, ensuring they can instantly, reliably and accurately discover and protect every Cyber Asset. 🎁Learn More About ThreatAware: https://threataware.com/ 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the one 'un-automatable' skill you are building right now to survive the shift?" 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    1h 1m

About

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology