Secure Talk Podcast

Justin Beals
Secure Talk Podcast

Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.

  1. Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven

    15 JUL

    Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven

    Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and automated processes that spawn and disappear by the minute. We've created more computing power than we have the ability to secure, and the machines are running amok. In this episode of SecureTalk, we dive deep into the invisible crisis affecting 91% of organizations: machine identity breaches. Join host Justin Beals and cybersecurity expert Oded Hareven, CEO of Akeyless, as they explore why password rotation is dead, how ephemeral computing is breaking traditional security models, and what revolutionary approaches like distributed fragment cryptography mean for the future of cybersecurity. What You'll Learn: • Why 85% of identity breaches now come from compromised machines, not humans • The fundamental mismatch between static security and dynamic infrastructure • How military-grade cybersecurity innovations are transforming commercial applications • Why the AI-quantum computing convergence is forcing us to rethink encryption • Practical steps toward "SSO for machines" and ephemeral security models Key Topics: Machine identity management at scaleZero-knowledge cryptographyQuantum-resistant security architecturesThe evolution from static → rotation → ephemeral securityBuilding security that matches cloud-native infrastructure Guest: Oded Hareven, Co-founder & CEO of Akeyless. Timestamps:  00:00 Introduction to Cybersecurity and Machine Identities 04:37 The Evolution of Security Paradigms 09:30 Akeyless and Machine Identity Management 13:53 Zero Trust and Ephemeral Security 18:36 The Impact of AI and Quantum Computing on Security 23:19 Future Trends in Cybersecurity and Akeyless's Vision Resources: Akeyless: https://akeyless.ioSecureTalk Podcast: www.securetalkpodcast.com #Cybersecurity #CloudSecurity #MachineLearning #QuantumComputing #DevSecOps #IdentityManagement #ZeroTrust

    45 min
  2. Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein

    8 JUL

    Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein

    Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collaborative ecosystems, we all pay the price. But there's a profound irony: the more desperately these leaders chase absolute victory, the more they reveal themselves as losers of the most important game—building meaningful human communities. In this episode, Harvard and MIT Humanist Chaplain Greg Epstein explores how tech's false prophets have led us astray and, more importantly, how we might find our way back to building human-centered security that actually works. The strongest security has never come from building higher walls—it comes from creating ecosystems where everyone's success strengthens the whole. When we understand how to work together better, we all create better security. What You'll Learn: • How winner-take-all thinking creates systemic vulnerabilities • Why collaborative open-source principles build more resilient systems • The hidden security costs of commercial dominance • Practical strategies for building multi-stakeholder security • How to shift from competition to collaboration in your organization Watch this episode to discover how changing your approach to teamwork and partnerships can dramatically improve your security posture. About Greg M. Epstein: Greg serves as Humanist Chaplain at Harvard University and MIT, and spent 18 months at TechCrunch exploring the ethics of companies shifting our definition of humanity. He's the author of "Tech Agnostic: How Technology Became the World's Most Powerful Religion, and Why it Desperately Needs a Reformation." Timestamps: Chapters 00:00 The Corruption of Winning Culture02:39 The Role of Community in Security05:44 Navigating the Media Landscape08:20 The Algorithmic Influence on Information11:01 The Cult of Personality in Tech13:44 The Messianic Figures in Technology16:24 The Fall of Tech Prophets19:15 The Importance of Losing21:44 The Future of Technology and Humanity24:29 The Need for Ethical Technology26:56 The Role of Men in Modern Society29:39 The Impact of AI on Society32:15 The Cult-like Nature of Tech Culture34:54 The Importance of Human Connection37:43 The Future of Humanism in Tech40:11 The Path Forward for Technology and Humanity #TechEthics #CommunityBuilding #DigitalSecurity #TechCulture #HumanistChaplain #SiliconValley #TechReformation

    1 hr
  3. Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)

    24 JUN

    Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)

    SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enhanced Threats Advanced phishing detection in the AI eraVoice and video deepfake attack recognitionFinancial verification protocols to prevent fraudHealthcare data protection against social engineering Cloud Security & Infrastructure Common cloud misconfigurations and preventionSecure AI model development and deploymentFinancial data protection in cloud environmentsPackage dependency management and vulnerability scanning Supply Chain & Third-Party Risk Vendor security assessment frameworksZero Trust architecture implementationHIPAA compliance for business associatesAI vendor risk evaluation checklists Insider Threats & Hybrid Work Security Behavioral analytics for threat detectionEnvironment-adaptive security controlsData loss prevention in remote work settingsSegregation of duties in digital workflows Regulatory Compliance & Automation 2025-2026 regulatory calendar overviewControl-centric compliance approachContinuous monitoring and automation strategiesMulti-framework compliance alignment Building Security Culture Security mindset vs. rule-following approachPositive reinforcement security programsOrganizational security maturity modelsLeadership's role in security culture 💼 Compliance Frameworks This Training Addresses: SOC 2 Type I & IIISO 27001HIPAA & Healthcare SecurityPCI DSSCMMC (Cybersecurity Maturity Model Certification)GDPR & EU AI ActAI Accountability ActNIST Cybersecurity FrameworkState privacy laws (CCPA, CPRA, etc.) 🏆 Perfect For: Annual security awareness training requirementsCompliance audit preparationNew employee onboardingSecurity culture developmentMulti-framework compliance programs 🎓 Certification Available: Complete the training and receive a certification of completion for your compliance documentation.     https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA 📺 About SecureTalk: SecureTalk explores critical information security innovation and compliance topics. Hosted by Justin Beals, founder and CEO of StrikeGraph, featuring expert insights from cybersecurity professionals across finance, healthcare, engineering, and compliance. 🔔 Subscribe for more security insights and compliance guidance! Chapters: 0:00 Introduction & Training Overview 3:18 Social Engineering with Steven Ferrell (IT Compliance Expert) 15:00 Advanced Threats with Kenneth Webb (CISA, CISSP) 30:30 Cloud Security with Josh (Head of Engineering) 44:55 Insider Threats with Elmy Peralta (Assessments Manager) 49:09 Regulatory Compliance with Micah Spieler (Chief Product Officer) 1: 01:42 Security Culture with Juliett Eck (CFO) #CybersecurityTraining #SecurityAwareness #ComplianceTraining #SOC2 #HIPAA #ISO27001 #SecurityCulture #StrikeGraph #SecureTalk

    1h 11m
  4. The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel

    17 JUN

    The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel

    🌙 THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?" This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's most forward-thinking leaders, and why his journey from infrastructure skeptic to AI evangelist mirrors the entire industry's evolution. 📖 THE THREE-ACT TRANSFORMATION: Act I: The Infrastructure Skeptic's Awakening Watch Satyam's journey from traditional "firewall and load balancer guy" to realizing that employees can't be forced behind VPNs anymore. The moment he discovered that flexibility doesn't mean vulnerability—it means evolution. Learn how this mindset shift led him from protecting perimeters to protecting people. Act II: The Culture Shock That Changed Everything Picture this: After years of doing "security roadshows" and begging for budget, Satyam walks into Kandji and experiences reverse culture shock. Instead of chasing people for security buy-in, they come to HIM asking, "What does security think?" Witness the CEO moment that flipped his world: "It's not a request—it's a mandate to protect our company at ANY cost." Act III: The AI Prophet's Dilemma The heated boardroom debate that keeps CISOs awake: Replace human SOC analysts with AI, or keep the human element? Follow Satyam's internal struggle as he weighs 10,000 daily AI-analyzed calls against human intuition, leading to his bold prediction about "Minority Report" style predictive cybersecurity. 🎭 CHARACTER-DRIVEN MOMENTS: The Paranoid Father: Why Satyam forces his family to use alphanumeric passwords and what Tom Cruise's "Minority Report" taught him about threat prediction. The Reformed Skeptic: How a career infrastructure guy learned to embrace endpoint security and why he now believes MDM is the new perimeter. The Reluctant Prophet: His uncomfortable realization that automation will replace thousands of cybersecurity jobs—and why he's helping it happen. ⚡ PLOT TWISTS YOU WON'T SEE COMING: The university graduate's graduation post that led to complete identity theftWhy 99% security equals 100% vulnerability (and the math that proves it)The Signal app scandal that changed how he thinks about mobile security 🎬 THE SUPPORTING CAST: Adam (Kandji CEO): The leader who gave unlimited security budgetThe Development Team: Who learned to ask security questions firstThe 2 AM Security Team: Who actually appreciate the paranoid textsThe AI SOC Analyst: The non-human teammate changing everything 🚀 MEET THE PROTAGONIST: Satyam Patel isn't your typical CISO. He's the guy who went from customer to C-suite, from skeptic to believer, from infrastructure defender to AI advocate. With 25+ years of plot twists, failed budgets, successful breaches prevented, and one very understanding family who puts up with alphanumeric phone passwords. #CISOStory #CyberSecurityJourney #AIvsHuman #ZeroTrust #SecurityLeadership #ThreatDetection #Kandji #EndpointSecurity #ParanoidCISO #CyberStory #SecurityCulture #TechTransformation This isn't just another security interview—it's a cybersecurity thriller with real-world consequences. Subscribe for more stories from the digital frontlines! 🎬🔐

    42 min
  5. Can Cybersecurity be "Agile"? with Brian Wagner

    10 JUN

    Can Cybersecurity be "Agile"? with Brian Wagner

    Can Security be “Agile”? with Brian Wagner In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transformations across enterprise organizations, Wagner presents a practical framework for moving beyond reactive security models. About the Guest: Brian Wagner brings extensive C-suite experience from Amazon Web Services, Moody's RMS, Bulletproof, and Defense.com. Based in London, he speaks globally on cloud security, AI-driven solutions, and security transformation. His latest book "Redefining Information Security" introduces a three-level maturity framework that's gaining attention from security leaders worldwide. Key Discussion Points: The Security Maturity Framework: Wagner outlines his three-level approach—Reactive, Proactive, and Adaptive security—explaining how organizations can assess their current position and plan strategic improvements. He emphasizes that most companies remain stuck in reactive mode, responding to threats after damage occurs.From Cybersecurity to Information Safety: The conversation explores Wagner's concept of treating security as "information safety" rather than traditional cybersecurity. This cultural shift makes digital protection everyone's responsibility, transforming potential vulnerabilities into defensive assets.AI in Security Applications: Drawing from his work at Revenir, where the company handles sensitive financial and personal data across international borders, Wagner discusses practical AI implementations for pattern recognition, fraud detection, and compliance monitoring. He explains why AI excels at identifying normal versus abnormal patterns in security contexts.Security as Business Enabler: Wagner demonstrates how security can function as a competitive advantage rather than a cost center. He shares strategies for communicating security value to go-to-market teams and integrating security features into product development cycles.Compliance vs. Security Balance: The discussion addresses the relationship between regulatory compliance and actual security, with Wagner explaining how compliance represents minimum standards while effective security requires ongoing investment and adaptation.Open Source and Democratic Security: Wagner advocates for open source collaboration in cybersecurity, arguing that community-based approaches provide more transparent and accessible security solutions, especially important given recent changes in vulnerability disclosure programs. Practical Implementation:  The conversation includes real-world examples, from detecting sophisticated employment fraud schemes to integrating security practices into agile development workflows. Wagner emphasizes incremental improvements and measurable outcomes. Book Recommendation: "Redefining Information Security" offers a strategic approach to security leadership, focusing on cultural transformation and business alignment rather than purely technical solutions. The book provides frameworks for security professionals and business leaders looking to modernize their approach to digital protection. Link to the book: https://www.koganpage.com/risk-compliance/redefining-information-security-9781398620018 This interview provides valuable insights for cybersecurity professionals, technology leaders, and anyone interested in understanding how AI and modern approaches are reshaping enterprise security practices. #Cybersecurity #InformationSecurity #AI #SecurityMaturity #AWS #CloudSecurity #CTO #CISO #ThreatDetection #SecurityCulture #CyberThreats #SecurityLeadership

    46 min
  6. The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai

    3 JUN

    The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai

    What happens when you realize your life's work is being used to destroy what you hoped to create? Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pioneered to unite people was dividing humanity through social media algorithms. The Reality Check: We don't just have 8 billion humans anymore. We have 800 billion AI systems learning our behavior 24/7 - "digital children" growing up without parental guidance. 🎯 KEY INSIGHTS: • The Translation Paradox: How unity technology became division engines • The Blind Men & Elephant: Ancient parable explaining why we misunderstand AI • Digital Parenting Crisis: Why we're raising 800 billion unguided AI systems • The Psychology of Manipulation: How AI exploits cognitive weaknesses • Four Futures Scenario: Humanity's possible paths with AI 🧠 AI MANIPULATION TACTICS REVEALED: Anchoring attacks that shape your thinkingBelief perseverance traps that backfire fact-checkingHow algorithms turn gossip into social weapons📖 ABOUT "RAISING AI": De Kai's book explores the question we should be asking: Not "Will AI replace us?" but "How do we raise AI ethically?" Written by Google's AI Ethics Council founding member, it reveals why current AI needs 15 million times more data than human children and provides a framework for ethical AI development. 🔬 DE KAI'S CREDENTIALS: • AI pioneer & Founding Fellow in computational linguistics • Independent Director of AI ethics think tank The Future Society • One of 8 inaugural members of Google's AI Ethics Council • Joint appointment at HKUST Computer Science & Berkeley's International Computer Science Institute • Electronic musician exploring AI creativity 💭 QUESTIONS ANSWERED: How translation tech became social manipulation?What makes AI behave like "unparented teenagers"?How to be a good "AI parent" in organizations?Why human-AI merger might be our best survival strategy? The Timeline is Accelerating. 99% of people are "frozen like deer in headlights" facing humanity's most disruptive transformation. Organizations ignoring AI governance face competitive extinction within five years. This isn't academic theory - it's a confession and warning from someone who helped create the systems now shaping global culture. Book: Raising AI: An Essential Guide to Parenting Our Future #AIEthics #GoogleTranslate #ArtificialIntelligence #MachineLearning #RaisingAI #TechnologyLeadership #AIGovernance #DigitalTransformation #FutureOfWork #AIStrategy #Innovation #TechLeadership #AICompliance #BusinessStrategy

    44 min
  7. Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert

    27 MAY

    Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert

    Episode Description:   Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we never opted in. In this episode of SecureTalk, host Justin Beals sits down with Dr. Aram Sinnreich and Jesse Gilbert, co-authors of "The Secret Life of Data," to explore a revolutionary approach to digital security: data kindness. 🎯 KEY TOPICS COVERED: • Why our biggest security threat is social fragmentation, not just technical vulnerabilities • How tech companies profit from division (anger drives 5x more engagement than approval) • The food allergy transformation: how society changed practices organically in 20 years • Practical data kindness: simple actions that rebuild digital trust • Why cooperation is our best defense in an age of surveillance • How to reclaim agency over your digital life 🚨 CRITICAL INSIGHTS: We can't rely on tech companies (profit over people) or Congress (no data protection laws passed)Change must happen from the ground up through shared cultural practicesSimple acts like unplugging smart devices for guests or consulting family before DNA uploads matterDivided societies are vulnerable societies—cooperation is a security strategy👥 ABOUT THE GUESTS:  Dr. Aram Sinnreich serves as a Professor and Graduate Director within the Communication Studies department at American University’s School of Communication.  His research addresses the convergence of culture, law, and technology, focusing particularly on topics such as surveillance and privacy, intellectual property, digital rights, digital culture, democracy, governance, and music.  Sinnreich has authored five books: Mashed Up (2010), The Piracy Crusade (2013), The Essential Guide to Intellectual Property (2019), the science fiction novel A Second Chance for Yesterday (2023; coauthored with Rachel Hope Cleves as R.A. Sinn), and The Secret Life of Data (2024; coauthored with Jesse Gilbert).  Additionally, his writing has appeared in various publications including The New York Times, Billboard, Wired, The Daily Beast, and Rolling Stone. He is a core faculty member of the SOC doctoral program and the MA in Media, Technology & Democracy, regularly collaborating with SOC graduate students on research publications and projects.  Jesse Gilbert is an interdisciplinary artist focused on the convergence of visual art, sound, and software design through his firm, Dark Matter Media. He previously served as the founding Chair of the Media Technology department at Woodbury University and has taught interactive software design at CalArts and UC San Diego. Since 2010, Gilbert's work has revolved around his innovative software, SpectralGL, which is an interactive listening instrument that creates real-time visual landscapes in response to sound. Drawing on his background as a composer, sound designer, and lifelong technologist, his creative output investigates the phenomenological aspects of listening through improvisation and collaborative dialogue. His work has been showcased at numerous concert halls, festivals, and projection-mapped installations worldwide. In 2007, Gilbert co-founded Dark Matter Media LLC to facilitate his independent creative projects and provide consultancy on emerging technologies across various public and private environments. From 2011 to 2017, he held the founding Chair position in the Department of Media Technology at Woodbury University and taught interactive software design at both CalArts and UC San Diego. After documenting the problems in their first book, Aram and Jesse recently published insights in Time Magazine and are working on a new book about building cooperative societies with kindness embedded in technology design. 🔗 CONNECT WITH SECURETALK: • Subscribe for weekly cybersecurity insights • Follow Justin Beals on LinkedIn •  RESOURCES: Sinnreich, A., & Gilbert, J. (2025, April 3). How to be kind in a world that's always monitoring you. Time Magazine. https://time.com/7273469/data-monitoring-kindness-essay/ Sinnreich, A., & Gilbert, J. (2024). The secret life of data: Navigating hype and uncertainty in the age of algorithmic surveillance. MIT Press.  Beals, J. (Host). (2024, May 14) The Algorithmic Mirror: Reflecting on Data's Role in Modern Life. in Secure Talk Podcast, Ep 173 with Aram Sinnreich and Jesse Gilbert

    54 min

About

Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada