And Security For All

Kim Hakim

Cyber security is not only important to everyone, it is critical to the future of every American. Each show details specific points in history and provides guidance and insights of both a technical and societal nature to help you understand and address cyber security issues more effectively. Our approach makes the often misunderstood and highly technical jargon of cyber security advisories, and popular media digestible for anyone that listens.brbr Anyone that leverages or uses internet and cyber related services, which in today’s world is basically everyone, stands to benefit from the show. You’ll gain insight into the reality of the space around cyber security and learn more details and truths on what is actually necessary to operate and be more secure at both the business and personal levels in an ever-changing technology space. We can help you truly understand a vast technology space and be better prepared in a dynamic technology ecosystem.

  1. LockBit Changed Everything and Locked Up Tells Why

    -1 J

    LockBit Changed Everything and Locked Up Tells Why

    What really happens during a ransomware attack? In this powerful episode of And Security For All, host Kim Hakim sits down with Zach Lewis, CIO & CISO at the University of Health Sciences and Pharmacy in St. Louis, to break down the real-world story behind his new book Locked Up — a firsthand account of surviving a major ransomware incident. From negotiating with the notorious LockBit ransomware group to navigating board-level decisions about paying (or not paying) a ransom, Zach shares what most organizations never talk about publicly. 🔐 In this episode, we cover: What actually happens during a ransomware attack (pre, during & post-breach)How ransomware groups like LockBit operate as “ransomware-as-a-service”Why some organizations pay — and what happens after they doDouble extortion & the evolving tactics of cybercriminalsAI-powered phishing, deepfakes, and the new threat landscapeHow boards are responding to growing cyber riskPractical advice for small and mid-sized organizations with limited security budgetsLessons learned from real breach recoveryWith ransomware, AI-driven attacks, and data extortion on the rise in 2026, this conversation is essential listening for CISOs, IT leaders, board members, business owners, and anyone responsible for protecting sensitive data. 🎧 Whether you're in healthcare, education, finance, or enterprise security — this episode delivers actionable insight from someone who’s lived through it.

    49 min
  2. Securing Intelligence: AI’s Impact on Cyber Risk

    28 JANV.

    Securing Intelligence: AI’s Impact on Cyber Risk

    In this episode of And Security For All, host Kim Hakim is joined by Jessica Couto, VP of Channels & Alliances at Harmonic Security, for an in-depth conversation on Securing Intelligence: AI’s Impact on Cyber Risk. Together, they explore how generative AI has rapidly shifted from a productivity tool to a new source of organizational risk—and why blocking AI outright is no longer a viable strategy. Jessica shares real-world insights on how employees are using AI both inside and outside corporate environments, the growing risks of data exposure, phishing, deepfakes, and shadow AI usage, and what security leaders must do to regain visibility and control. The discussion also covers how organizations can safely enable AI without sacrificing productivity, the evolving role of the CISO, the rise of fractional CISOs, and how security teams can communicate AI risk in business terms that resonate with leadership. Topics include: How AI is changing the cyber threat landscapeWhy blocking generative AI puts organizations at risk of falling behindData leakage, shadow AI, and employee behaviorDeepfakes, phishing, and AI-driven social engineeringAI governance, visibility, and policy challengesThe future of the CISO role and cybersecurity careers This episode is a must-listen for CISOs, security leaders, IT professionals, and anyone navigating the fast-changing intersection of AI, cyber risk, governance, and workforce impact.

    45 min
  3. Inside The Lion’s Den: Part 2

    25/11/2025

    Inside The Lion’s Den: Part 2

    In this follow-up episode, guest host Jonathan Kimmitt sits down again with Matthew Maynard, Security Operations Specialist at BJC HealthCare and Dark Web Researcher, to take an even deeper dive into the inner workings of ransomware crews and the people behind them. Matthew takes listeners deeper into the “lion’s den,” revealing what he has learned from directly engaging with threat actors on the dark web—how they think, how they operate, and why the human element inside these criminal ecosystems matters more than most organizations realize. In this episode, they break down: What motivated Matthew to enter ransomware intelligence and begin infiltrating criminal groupsHow ransomware crews recruit, organize, and operate like legitimate businessesKey differences between the clear web and dark web, and common misconceptionsEssential OPSEC practices and how both researchers and criminals protect their identitiesHow personas are created and maintained when engaging directly with threat actorsHuman drivers of cybercrime—from financial incentive to desperation and coercionInsider risks, layoffs, and how human vulnerability contributes to modern breachesMajor intelligence wins and insights that help organizations make stronger security decisions This episode offers rare, firsthand insight into the techniques, mindset, and operational flow of active cybercriminals—paired with practical guidance for defenders. Whether you’re in security leadership, incident response, threat intel, or simply curious about the dark web, this conversation will challenge your assumptions and expand your understanding of today’s most dangerous threats. Listen now and hear why knowing your adversary is one of the most powerful defenses in cybersecurity.

    46 min
  4. Inside The Lion’s Den: Infiltrating Ransomware Groups

    18/11/2025

    Inside The Lion’s Den: Infiltrating Ransomware Groups

    In this eye-opening episode of And Security For All, host Kim Hakim sits down with Matthew Maynard, Information Security Operations Specialist at BJC HealthCare and dark web researcher who has spent the last year doing the unthinkable—infiltrating active ransomware groups from the inside. Matthew shares how he entered closed cybercriminal communities, built trust, gathered intelligence, and passed critical findings to government agencies—all while maintaining a full-time role protecting one of the largest healthcare systems in the Midwest. His research provides a rare, real-time window into ransomware crews, their structure, their onboarding process, their business platforms, and the tactics they use to select, study, and strike their victims. What You’ll Learn in This Episode How ransomware groups actually operate behind closed doorsWhat “initial access brokers” are and why they’re the real first step in most attacksHow threat actors select targets, test stolen credentials, and prepare for exploitationWhy holidays and long weekends remain prime attack windowsWhat defenders consistently overlook—and the fixes that matter mostHow Matthew manages OPSEC, safety, and reporting while undercoverWhy MFA gaps, vendor access, phishing, and unpatched systems remain the top entry pointsThe surprising internal rules, ethics, and boundaries some threat groups enforceHow organizations should rethink backups, insurance, and negotiating ransom demands Matthew also discusses the psychological side of this work—the fear, the risk, and the personal motivation that keeps him in the fight. His insights provide actionable takeaways for CISOs, SOC teams, and anyone responsible for protecting an enterprise today. This is a rare interview with someone who has seen ransomware operations from the inside. It’s a conversation every cybersecurity leader should hear.

    44 min

À propos

Cyber security is not only important to everyone, it is critical to the future of every American. Each show details specific points in history and provides guidance and insights of both a technical and societal nature to help you understand and address cyber security issues more effectively. Our approach makes the often misunderstood and highly technical jargon of cyber security advisories, and popular media digestible for anyone that listens.brbr Anyone that leverages or uses internet and cyber related services, which in today’s world is basically everyone, stands to benefit from the show. You’ll gain insight into the reality of the space around cyber security and learn more details and truths on what is actually necessary to operate and be more secure at both the business and personal levels in an ever-changing technology space. We can help you truly understand a vast technology space and be better prepared in a dynamic technology ecosystem.