Bytes & Brew Podcast

Cape Endeavors

The Bytes & Brew Podcast, brought to you by Cape Endeavors, delivers grounded, distilled, and unfiltered conversations on cybersecurity, national security, AI threats, and the people navigating them, all over a cup of coffee.Hosted by Terry McGraw, CEO of Cape Endeavors, the show dives deep into the realities facing today’s defense industrial base and cybersecurity leaders. Terry’s expertise in cyber security has been leveraged by G500 companies and counsels C-suites, Boards of Directors, and technical security staff thereof. Each episode features candid conversation

الحلقات

  1. Why Your Business Isn’t CMMC Ready (And How to Fix It Fast)

    قبل يوم واحد

    Why Your Business Isn’t CMMC Ready (And How to Fix It Fast)

    In this episode of Bytes & Brew (formerly Bourbon & Bytes), Terry McGraw of Cape Endeavors sits down with Koren Wise, founder of Wise Technical Innovations and a C3PAO with hands-on experience guiding defense contractors through CMMC.Koren shares how she got started in IT, why she became an early believer in CMMC, and the hard truths she sees every day when companies think they’re ready for an assessment but aren’t. From scoping mistakes to relying on the wrong MSP, she explains why so many defense contractors stumble — and what separates those who pass from those who don’t.If your business handles Controlled Unclassified Information (CUI) and you’re aiming for CMMC Level 2 compliance, this episode is packed with practical lessons you won’t want to miss.Practical Guidance for CMMC ReadinessBoundaries are EssentialCMMC is highly technical. You need real network and systems engineering expertise to build proper boundaries around CUI. Thinking “cloud replaces boundaries” is a major misconception.Scoping Mistakes are CommonMany contractors don’t understand how scoping really works. If a laptop is used to view CUI, it’s in scope unless protected by an authorized VDI. Failing to scope properly pulls in devices and networks you may not expect.Training MattersCompanies often show up for assessments without anyone who has been through training. Without someone who understands the 110 controls and 320 objectives, it’s challenging to be truly ready.Endpoints Can Sink ComplianceSome vendors claim their solutions make CMMC compliance easy while leaving endpoints in scope. If endpoints aren’t properly managed, attackers can harvest credentials and compromise CUI, no matter how strong your enclave is.Empty Enclaves = False Claims RiskBuilding a compliant enclave but leaving CUI scattered across old systems is not just a mistake — it could be seen as a false claim if you attest to compliance.CMMC is Both Protection and AdvantageBeyond DoD requirements, following NIST 800-171 and CMMC protects your business from ransomware and gives you a competitive edge in winning contracts.Continuous Compliance is NecessaryCompliance doesn’t end at assessment. Without ongoing monitoring and updating, companies risk slipping out of compliance and losing contract eligibility.Choose Compliance Partners CarefullyAn MSP or RPO that downplays CMMC or says “it will go away” is a red flag. Look for providers with CCP/CCA credentials and a record of helping companies pass.Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com#CMMC #CMMCCompliance #DefenseContractors #Cybersecurity #CUI #DFARS #NIST800171 #CMMCLevel2 #SecureEnclaves #DoD #dib #CyberAB #c3pao

    ٤٩ د
  2. Soldier to CISO: Mastering Cybersecurity Leadership

    قبل يوم واحد

    Soldier to CISO: Mastering Cybersecurity Leadership

    In this episode of Bytes & Brew(formerly Bourbon & Bytes), Terry McGraw, CEO of Cape Endeavors, for a compelling episode of Bourbon & Bytes featuring the Global Chief Information Security Officer (CISO) at Werfen and author of CyberBulleys: A CISO's Guide to Doing Cybersecurity. This episode dives into the journey from a 21-year U.S. Army career to leading cybersecurity for global multi-billion dollar companies. Explore the challenges of managing cyber threats, navigating compliance frameworks like NIST, ISO 27001, and SEC guidelines, and communicating risks to non-technical board members.Discover what keeps CISOs awake at night, from identity management to supply chain risks, and get practical advice for aspiring cybersecurity professionals, especially military veterans transitioning to civilian roles. Learn strategies for building high-performing teams, handling ransomware crises with a "bulldog mentality," and aligning security with business objectives. This episode is packed with insights on crisis management, professional reinvention, and thriving in the dynamic world of cybersecurity.🔑 Key Topics Covered:➡️ Transitioning from military service to cybersecurity leadership➡️ Managing global compliance and supply chain vulnerabilities➡️ Communicating cyber risks to executives effectively➡️ Building and leading high-performing cybersecurity teams➡️ Crisis management strategies for ransomware and data breaches➡️ Career tips for aspiring CISOs and those reinventing themselvesBe sure to check out Jody's book - https://www.amazon.com/CyberBulleys-CISOs-Guide-Doing-Cybersecurity/dp/B0DT7J63F6👉 *Like and subscribe to Bytes & Brew for more expert insights from cybersecurity leaders!*Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com#Cybersecurity #CISO #CyberBulleys #CyberDefense #MilitaryToCyber #CyberRisk #Leadership #SupplyChainSecurity #Ransomware #veterans #hireveterans

    ٣٣ د
  3. Navigating Supply Chain Risks in a World of Constant Disruption

    ٢٥ فبراير

    Navigating Supply Chain Risks in a World of Constant Disruption

    In this episode of Bytes & Brew, Cape Endeavors CEO Terry McGraw sits down with Jenna Wells, CEO of Supply Wisdom to explore the evolving landscape of business risk management in an increasingly volatile world.   From her early career as a Marine Corps officer and NSA-trained intelligence officer to leading a cutting-edge risk intelligence platform, Jenna shares insights on: ➡️ Identifying and managing location risk in global supply chains ➡️ Navigating regulatory requirements like DORA, GDPR, and forced labor prevention acts ➡️ Mitigating upstream and downstream vulnerabilities in today’s interconnected economy ➡️ Preparing for the next wave of AI regulations and responsible AI adoption Whether you’re a defense contractor, a supply chain leader, or an executive looking to strengthen your organization’s resilience, this conversation delivers actionable strategies to turn risk management from reactive to proactive. 📌 Learn how to protect your business from disruptions, avoid costly compliance failures, and make informed decisions in a complex global environment. Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com #RiskManagement #SupplyChainResilience #supplychainrisk #ContinuousMonitoring #Cybersecurity #RegulatoryCompliance #BusinessResilience #RiskIntelligence #TPRM #CapeEndeavors #SupplyWisdom

    ٥٣ د
  4. CMMC Compliance Without the BS – Real Talk from 3 Experts Who've Been There

    ٢٤ فبراير

    CMMC Compliance Without the BS – Real Talk from 3 Experts Who've Been There

    In this episode of Bytes & Brew, host Terry McGraw sits down with Dewayne Alford (COO) and Andy Paul (CTO & Lead CMMC Assessor) of Cape Endeavors to pour a glass of Blanton’s and break down what really matters when it comes to CMMC compliance. Forget the framework fluff, this is an unfiltered conversation packed with real-world insights from a team that’s successfully brought 23 companies through CMMC assessment with a perfect score of 110. 🧠 What you'll learn: Why “CUI is everywhere” is a myth that’s costing contractors time and money How skipping scoping leads to failed assessmentsand what to do instead. The three practical paths to CMMC compliance (hint: not everyone needs to lift their whole environment) What most “CMMC-ready” tools and vendors won’t tell you Why enclaves are often the fastest, cheapest, and most secure solution How false claims, overscoping, and poor tooling increase risk and burn budgets What to ask any RPO or assessor before you sign anything 💡 Plus: A deep dive into Teramis, a purpose-built CUI discovery tool born from real-world experience with post-breach response and assessment prep. Whether you’re just getting started with CMMC, already on the journey, or cleaning up someone else’s mess—this episode is a must-watch. 📥 Explore Teramis' CUI Discovery Solution at https://www.teramis.us 👉 Like, subscribe, and drop a comment to let us know what CMMC topics you'd like to see in future episodes. Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com   #CMMC #cmmcassessment #cmmccompliance #cmmclevel2 #nist800171 #cui #cui #dfars #c3pao #cybersecurity #cmmc2 #capeendeavors #DIB #CMMC2.0 #cmmcpractices

    ١ س ٨ د
  5. Cybersecurity in the Cloud: Navigating AI, Quantum Threats, and Supply Chain Risks

    ٢٤ فبراير

    Cybersecurity in the Cloud: Navigating AI, Quantum Threats, and Supply Chain Risks

    In this episode of Bytes & Brew (formerly Bourbon & Bytes), host Terry McGraw (CEO of Cape Endeavors) welcomes Chris Perry, Head of Cybersecurity Product Management at Google Cloud AI Compute Infrastructure. The conversation spans critical cybersecurity and infrastructure issues facing both cloud providers and regulated industries. Topics include: ➡️ Cybersecurity in Cloud Computing ➡️ AI’s Impact and Opportunities ➡️ Software Supply Chain Security ➡️ Quantum Computing and Encryption ➡️ Ransomware-as-a-Service and the Cyber Threat Landscape Perry also shares practical guidance for CFOs, CISOs, and technology leaders on where to focus now and what to demand from vendors as quantum and AI capabilities evolve. If you work in cybersecurity, cloud infrastructure, national defense, or critical infrastructure, this episode is packed with insight you won’t want to miss. Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com   #Cybersecurity #CloudSecurity #AIInfrastructure #QuantumComputing#GoogleCloud #CMMC #ThreatIntelligence #SharedResponsibilityModel #Ransomware #Compliance #NationalSecurity #CapeEndeavors #BourbonAndBytes #CloudSovereignty #AIandSecurity #PostQuantumEncryption

    ٤١ د
  6. AI Meets the Battlefield: Mike Weigand on the Future of AI, Cybersecurity and Defense Innovation

    ٢٤ فبراير

    AI Meets the Battlefield: Mike Weigand on the Future of AI, Cybersecurity and Defense Innovation

    Join Terry McGraw on Bytes & Brew as he sits down with Mike Weigand, a former Army Ranger, cyber officer, and defense-tech entrepreneur. In this compelling episode, Mike shares his journey from securing military systems at Shift5 to founding Aventra, a defense-tech startup tackling the future of long-range precision systems.   Weigand shares how his military roots as a West Point grad, Ranger, and cyber officer shaped his entrepreneurial approach to defense innovation. He discusses how today's battlefield is defined not by mass but by speed, autonomy, and software-driven advantage—and how tools like AI are shrinking OODA loops, enabling rapid prototyping, and completely changing what’s possible in modern conflict.   ▶️ Topics covered in this episode: Securing operational technology (OT) systems AI's Transformative Impact on Defense Innovation The Reindustrialization Imperative Speed as the New Competitive Advantage Whether you care about AI, defense innovation, or American industrial resilience, this is a conversation that connects dots few others can.   👉 Subscribe to Bourbon & Bytes for more conversations with top tech leaders—diving into cybersecurity, national security, AI threats, and the personal journeys behind the innovation.   Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com   #DefenseTech #Cybersecurity #AI #IndustrialBase #OODAloop #AutonomousWeapons #AmericanManufacturing #CapeEndeavors

    ٤٦ د
  7. Breaking Barriers & Battling Cybercrime: Wendy Thomas on Leadership and the Future of Security

    ١٨ فبراير

    Breaking Barriers & Battling Cybercrime: Wendy Thomas on Leadership and the Future of Security

    In this powerful episode of Bytes & Brew, host Terry McGraw, CEO of Cape Endeavors, sits down with Wendy Thomas, former CEO of Secureworks, for a wide-ranging conversation that explores the shifting frontlines of cybersecurity, artificial intelligence, and leadership.   Wendy unpacks how quantum and AI are reshaping the cyber landscape, including the opportunities (like democratized security and new AI forensics roles) and risks (from model drift to deepfakes). The two dive into the explosive growth of cybercrime—now topping $10.5 trillion—and discuss the need for new public-private accountability models, secure software mandates, and a "lifestyle approach" to legislation.   Beyond tech, Wendy reflects on the evolution of diversity in leadership, the limitations of traditional higher education, and what it really takes to lead a company through IPOs, acquisitions, and cultural change. Insightful, strategic, and deeply human—this is a conversation you don’t want to miss.   Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more: www.capeendeavors.com   ⁠#Cybersecurity⁠ ⁠#AI⁠ ⁠#QuantumComputing⁠ ⁠#Deepfakes⁠ ⁠#AICybersecurity⁠ ⁠#CyberRisk⁠ ⁠#ThreatLandscape⁠ ⁠#SecureSoftware⁠ ⁠#SecureWorks⁠ ⁠#WomenInTech⁠ ⁠#BoardLeadership⁠ ⁠#TechLeadership⁠ ⁠⁠#CapeEndeavors⁠

    ٥٦ د
  8. Mapping the Cyber Battlefield: Jason Kaplan on Attack Surfaces, CMMC, and the Startup Grind

    ١٧ فبراير

    Mapping the Cyber Battlefield: Jason Kaplan on Attack Surfaces, CMMC, and the Startup Grind

    In this episode of Bytes & Brew, host Terry McGraw sits down with Jason Kaplan, CEO of SixMap, for a spirited conversation that cuts across startup life, cybersecurity mandates, and the rapidly evolving threat landscape. Kaplan shares his unconventional journey from finance to fitness tech to cybersecurity, offering a founder’s-eye view of how SixMap is redefining External Attack Surface Management (EASM). The two dive deep into the cost-benefit debate around CMMC 2.0, the importance of secure-by-design infrastructure, and why "waiting" is the most expensive strategy of all. They also explore how SixMap uses AI to provide high-fidelity scans of enterprise exposure, mapping vulnerabilities across IPv4/IPv6, ports, and corporate hierarchies.From ransomware fallout to deepfake dangers, and from bourbon reviews to rapid-fire startup advice, this episode blends strategic insight with real-world urgency. Cape Endeavors is dedicated to providing top-tier Managed CMMC Secure Enclave services tailored to the defense industrial base. Our team of experts ensures that you can rapidly become compliant with NIST 800-171/CMMC 2.0 Lvl2 while focusing on your existing business with little interruptions to existing operations. Learn more https://www.capeendeavors.com #cybersecurity #cmmc #deepfake #startup #EASM #attacksurfacemanagement #sixmap #capeendeavors #techleadership #cyberresilience

    ٤١ د

حول

The Bytes & Brew Podcast, brought to you by Cape Endeavors, delivers grounded, distilled, and unfiltered conversations on cybersecurity, national security, AI threats, and the people navigating them, all over a cup of coffee.Hosted by Terry McGraw, CEO of Cape Endeavors, the show dives deep into the realities facing today’s defense industrial base and cybersecurity leaders. Terry’s expertise in cyber security has been leveraged by G500 companies and counsels C-suites, Boards of Directors, and technical security staff thereof. Each episode features candid conversation