CYBER CONNECT PODCAST

Jay Adamson & Warren Atkinson

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology

  1. The quantum scam. Why pqc is bs and the billion-pound security lie.

    2D AGO

    The quantum scam. Why pqc is bs and the billion-pound security lie.

    The encryption key is officially dead. Are we wasting billions on "Post-Quantum" security while hackers walk right through the physical backdoor? And why are manufacturers actively leaving our digital world - from EVs to the National Grid -exposed by design just to save 50p? 🏆 $10,000 BOUNTY CHALLENGE: We’re challenging the world’s best hackers to break the QueChip. Do you have what it takes? 👉 REGISTER FOR THE QUEHACKATHON HERE: https://sqe.io/quehackathon/ Jay Adamson and Warren Atkinson are joined by Hamid Pishdadian and Mike Goodwin from SQE to have the exact conversation the industry is trying to dodge. We are cutting the corporate BS to expose an uncomfortable truth: you simply cannot software-patch your way out of a hardware crisis. Hamid and Mike aren't here to pitch another tool -they’re here to show us a physical microchip that mathematically kills the encryption key for good. Whether you are a CISO exhausted by "security theatre," a hacker looking for a real challenge, or a professional trapped by biased hiring algorithms, this is the reality check you need. 🔥 WHAT YOU'LL DISCOVER: - 🚨 The 50p Death Trap: Why tech companies are leaving medical devices and smart cities completely exposed to hackers, just to save 50p on a microchip. - 🕵️ The Quantum Scam: Why the industry is selling expensive "future-proof" software patches that don't actually work, and how fixing the hardware kills the threat completely. - 🔑 Killing the Encryption Key: How 35 years of engineering has led to a silicon chip that proves we no longer need hackable encryption keys to stay safe. - 🏛️ Fake Safety Laws: Why the UK's ban on default passwords is just "security theatre" that won't actually stop a real nation-state attack. - 🤖 Stopping Rogue AI: How to prevent advanced AI from faking machine identities and physically hijacking factories, cars, and power grids. - 📱 True Digital Ownership: How a new physical wallet stops crypto phishing dead in its tracks and ends our forced reliance on middlemen like banks and cloud servers. - 💼 The Broken Hiring Machine: Why the cyber industry is bleeding £20,000+ per hire while brilliant tech professionals get ghosted by biased HR algorithms. - 💰 The $10,000 Hackathon: Why SQE is ignoring corporate marketing and challenging the world's best developers to break their tech for a live cash bounty. 🔹 Hamid Pishdadian: Hamid is the visionary engineer behind the QueChip. Leveraging decades of physical engineering, he built a blockchain into the silicon itself, mathematically proving we no longer need to transmit encryption keys to be secure. 🔹 Mike Goodwin: Mike is driving the commercial integration of the QueChip. He bridges the gap between complex engineering and real-world applications, directly challenging the software-patch addiction of the modern tech world. 🎁 Break the Chip. Claim the Bounty: We are dropping the official REGISTRATION LINK to enter the $10,000 QueHackathon in the comments section below! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cybersecurity accessible to everyone. 🚀 Stop fighting a rigged system! We’ve partnered with SQE.io to drop something massive. Use code WTFISQUANTUM below to claim your spot before our network takes them all: 10 Companies: 90 days of free Enterprise access to consolidate hiring. 200 Professionals: 90 days of free Premium access to bypass gatekeepers. ✅ Claim Your Early Access Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to help us tear down the gatekeepers.

    55 min
  2. You don't "look the part"  Neurodiversity, AI and surviving tech

    5D AGO

    You don't "look the part" Neurodiversity, AI and surviving tech

    Stop using 'cultural fit' as an excuse to hire the same people over and over again. When every person in your tech team thinks exactly the same, you haven't built a defence—you've built a massive, predictable blind spot. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, Kayla Vondy -a leader operating at the high-stakes intersection of government policy and cybersecurity- exposes why the industry’s obsession with 'standardised' talent is a national security risk. We are stripping away the red tape to look at the raw realities of 2026 public sector tech, from the 'Immigration Tax' to the danger of neurotypical-only threat modelling. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Bureaucratic Blind Spot: Why neurotypical-only teams are fundamentally incapable of effective threat modelling against non-linear attackers. - 🚨 The Immigration Tax: The silent, exhausting pressure of proving your worth in UK tech while navigating unwritten cultural rules and visa dynamics. - 🎭 The Weaponisation of 'Cultural Fit': How HR terminology is actively used as a gatekeeper to keep diverse, brilliant minds out of the room. - 🤖 AI for the Social Contract: Building 'human-first resilience' for vulnerable citizens who rely on government systems every day. - 📍 DTX Special- Purpose to Practice: How to move beyond policy checkboxes to actual citizen-facing delivery in 2026. - ⚡ The Risk Paradox: How neurodivergent leaders bridge the gap between 'fail fast' tech culture and 'never fail' government bureaucracy. - 🛒 Procurement Red Flags: The one question every government buyer must ask vendors to stop procuring 'exclusionary' tech. - 🛠️ The 2026 Playbook: Which 'unwritten rule' of government tech must be deleted to make the industry work for everyone. 🔹 Kayla Vondy - Kayla is an AI Project Manager at the Liverpool City Region Combined Authority, where she works across AI, cybersecurity, and public sector delivery. She brings deep expertise from the tech and cyber fields alongside her lived experience as a neurodiverse woman. A regular speaker on responsible AI and digital inclusion, Kayla is dedicated to building inclusive, resilient systems that work for real people. 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is the biggest outdated hiring 'rule' or corporate standard in tech that needs to be permanently retired? Name it in the comments below! ✅ Join the Ecosystem, use code ‘LOOKTHEPART’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    51 min
  3. The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    APR 22

    The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    The industry is obsessed with building artificial minds, but we are fundamentally failing the human ones. Forcing your most brilliant people to mask who they are just to fit a corporate mold isn't 'professionalism' -it's the fastest way to kill innovation. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning Data Scientist and TechJumpstart Hub Founder Wendy Amexo disrupts the narrative on what it truly takes to build trustworthy technology. We are stripping away the vendor hype to focus on the 'human operating system,' exploring how a career pivot from Law to Data Science can sharpen your technical lens and why ADHD is a secret weapon for solving the industry's most complex problems. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The 'Squiggly' Advantage: How a background in Law provides a superior holistic lens for AI regulation and governance. - 🕵️ Silent AI Failures: What every founder gets wrong about AI mistakes and why 'silent failures' should terrify your board. - 💻 The DevSecAI Framework: A deep dive into the infinity loop: Build, Scan, Fix, Scan Again -the only way to survive LLM deployment. - 🚨 The ADHD Tax: The unseen emotional and financial toll of navigating a tech industry built for neurotypical minds. - 📍 DTX Special - Sensory Survival: Practical strategies for neurodivergent professionals to successfully navigate overwhelming, high-pressure environments like DTX. - 🏛️ The Seat at the Table: Why diverse cognitive profiles are vital in the physical rooms where the future of tech is decided. - 👻 The Hyperfocus Trap: How to protect neurodivergent talent from their own drive rather than exploiting it for short-term gains. - 💰 Tearing Down the Gates: Wendy’s mission with TechJumpstart Hub CIC to empower women and underserved communities in the North-East. 🔹 Wendy Amexo - Wendy is an award-winning Data Scientist, Data & Analytics Manager at one of the world's largest FMCG brands, and the Founder of TechJumpstart Hub CIC. She brings a unique, holistic lens to tech, connecting raw technology to regulation and strategic value. Wendy is a regular speaker on responsible AI and digital inclusion, dedicated to building inclusive, resilient systems. 🎁Learn More About TechJumpStart Here: https://techjumpstarthub.co.uk/ 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is your 'squiggly' superpower? Have you pivoted from a non-tech background, or are you navigating tech as a neurodivergent professional? ✅ Join the Ecosystem, use code ‘TECHJUMP’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    50 min
  4. Cybersecurity Culture: Why behaviour, diversity, and system design matter

    APR 18

    Cybersecurity Culture: Why behaviour, diversity, and system design matter

    Are you tired of taking the blame for a broken system? Right now, 83% of tech professionals admit to bypassing corporate security controls… not because they are careless, but because they are exhausted and just trying to survive impossible workloads. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning cybersecurity executive and Founder of Seidea CIC, Stephanie Itimi, exposes the toxic culture of corporate security . We are turning off the vendor pitches to tackle the one vulnerability you cannot patch with software: human burnout. Why do companies spend billions on tools while treating human behavior like a software bug? What happens to your psychological safety when you are forced through 45-minute compliance videos just to be tricked and shamed by your own IT department ? Whether you are a SOC analyst exhausted by 2 a.m. wake-up calls , a professional trying to break through the industry's relentless gatekeeping , or a CISO trying to actually protect your team, this is the unfiltered reality check you need to hear. 🔥 WHAT YOU’LL DISCOVER: - The Burnout Crisis: Why smart people knowingly bypass controls, and how to shift security from a corporate "police function" into a business enabler . - The Training Trap: Why 45-minute phishing videos are just a tick-box exercise, and why micro-learning and role-play are the only things that actually work . - The "Shadow AI" Rebellion: Why blanket bans on AI push behavior to the "black market," and how employees are secretly feeding data into unapproved tools . - Ready for Digital Co-Workers?: We break down the terrifying leap from Generative AI to "Agentic AI," and why your culture isn't ready for AI agents executing tasks . - Shattering the Gatekeepers: Stephanie’s unfiltered advice on bypassing the "bro-culture" of tech, building your personal brand, and conquering imposter syndrome . - Diversity as a Tactical Defense: Why true representation isn't an HR issue—it's a hard, life-saving security imperative that stops global hackers . - Surviving Leadership: Why stepping into a CISO role is incredibly lonely, and the uncomfortable conversations leaders must have behind closed doors 🔹 About Stephanie Itimi: Stephanie is an award-winning cybersecurity executive, currently Director of Information Protection and Compliance at Age UK . Recognised by the World Economic Forum and NCSC , she is the author of Cybersecurity Culture. She is also the Founder of Seidea CIC, an organization that has trained and supported over 8,000 women from Black and Minority Ethnic backgrounds into cybersecurity and tech roles . 🎁 Learn More About Seidea CIC: https://www.seidea.org/ 📅 Join us at the Cyber Leaders’ Summit (London): https://www.cyber-leaderssummit.com/ 👇 The Challenge: Does your workplace reward secure behavior, or does the system make breaking the rules the easiest path to getting your job done? Let us know in the comments! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. 🚀 Stop fighting a broken system! If you are tired of the gatekeeping, the endless tool fatigue, and the "spray and pray" job applications , we are opening early access to a private, enterprise-grade career and hiring platform inside the SECURE ecosystem . Hit the link below and use the private access code EMPOWER to bypass the waitlist! ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1h 6m
  5. The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    APR 15

    The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    Stop worrying about quantum computing. Right now, up to 10% of your enterprise devices are completely undetected, and your multi-million-pound security stack is likely failing silently in the background. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, 25-year industry veteran and ThreatAware CEO Jon Abbott exposes the "Cybersecurity Sophistication Paradox." We are stripping away the vendor hype to look at the terrifying realities of 2026 enterprise security. Why is the industry obsessed with buying shiny new EDR tools while completely incapable of deploying them? What happens when developers rely on AI "Vibe Coding" to build fragile infrastructure? And why are Level 1 and Level 2 SOC analysts facing a mass extinction event? If you are a CISO battling the boardroom or a tech professional trying to survive the AI shift, this is the wake-up call you cannot afford to miss. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Founder’s Journey: How Jon overcame severe dyslexia, left school at 16, and eventually co-founded two major tech companies. - 🚨 The Sophistication Paradox: Why security teams love solving exotic problems while ignoring the boring, foundational IT hygiene that actually stops breaches. - 🕵️ Anatomy of a Disaster: How attackers bypassed M&S enterprise security with a simple phone call, the JRL cyber attack and the McDonald's hiring app that secured 65M users with the password "123456". - 👻 Shadow AI & Blind Spots: Why relying on Microsoft InTune is a trap, and how employees using AI at home are bypassing your security entirely. - 💻 "Vibe Coding" & Acceptable Outages: How AI prompts are creating a culture where catastrophic network outages are treated as acceptable collateral damage. - 📉 The Extinction of the SOC Analyst: Why Level 1 and 2 roles will disappear in 5 years, and how to become the "10x Engineer" that survives the purge. - 💰 The Founder Masterclass - Raising & Scaling: How to successfully build, scale, and get executive buy-in for solving "unsexy" foundational tech problems during a brutal economic downturn. Here’s how to engage with VC’s and Investors proactively. 🔹 Jon Abbott - With over 25 years of experience in the technology industry, Jon believes passionately in revolutionising the way businesses stay in control in the ever-evolving Cyber Landscape. Jon has leads Teams in Developing Cutting-Edge Solutions to transform Asset & Security Tool Management for organisations across the globe….& brings a fresh perspective on Security that is very much centred around Breach Prevention & Process. Previously, he Co-Founded Priority One, where he saw the critical need for Real-Time, Agentless Security Control Monitoring & its these experiences that have made Jon a Cyber Generalist with broad Technical Knowledge & Strong Commercial Awareness and have inspired him to Design & Build New & Intuitive Solutions to fill this crucial gap in the market. At ThreatAware, he’s committed to providing Innovative Cyber Asset Management Solutions that empower organisations to proactively keep their Cyber Assets safe from attack. Offering a Single Source of Truth, their Solution eliminates the burden of Asset Monitoring for IT Teams, ensuring they can instantly, reliably and accurately discover and protect every Cyber Asset. 🎁Learn More About ThreatAware: https://threataware.com/ 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the one 'un-automatable' skill you are building right now to survive the shift?" 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    1h 1m
  6. The Architecture of Survival: The human side of cyber security and crisis leadership

    APR 11

    The Architecture of Survival: The human side of cyber security and crisis leadership

    What happens when a digital hack threatens the physical safety of 80,000 people inside a stadium? We are no longer just fighting hackers over stolen emails - we are defending environments where a single computer failure can cause real-world panic and cost human lives. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, we are dismantling the "Illusion of Control" with Kam Karaji. As a globally recognised Director of Cyber Security & Risk Management and a former senior counter-terrorism commander, Kam bridges the gap between digital systems and extreme physical consequences. If you are exhausted by boardroom theatre, corporate buzzwords, and the constant anxiety that you are just one mistake away from a catastrophic failure, this is your reality check. Kam reveals why the multi-million-pound security industry is actually making us less safe, how "alert fatigue" is destroying the mental health of our analysts, and what surviving a stroke and Stage 3 cancer taught him about true human resilience. Whether you are a CEO managing a board, a tech professional fighting burnout, or simply someone fascinated by high-stakes crisis leadership, this episode will completely change how you view survival. 🔥 WHAT YOU'LL DISCOVER: 🤥 The Boardroom Lie & The Prevention Trap: Why spending millions on a "50-foot digital wall" actually makes your organization fundamentally less safe, and why CISOs are managing board anxiety instead of actual risk. 🩸 The "Where's Wally" Bloodbath: How vendors selling "more AI tools" are actively destroying the mental health of Tier 1 SOC analysts by drowning them in 10,000 meaningless alerts a day. 🏟️ When Hacks Turn Physical: We are no longer just protecting data. Who makes the call when shutting down a compromised digital system creates a physical panic in an 80,000-seat arena? 🧠 The Architecture of Survival: How surviving a stroke and Stage 3 cancer completely rewrote a former counter-terrorism commander's playbook for leading through a catastrophic corporate crisis. 🛑 The Hour-One Fracture: The single biggest difference between a leadership team that tears itself apart during hour one of a disaster, and one that executes a unified command. 🔄 The Final Mental Reboot: The exact psychological framework leaders must use to reboot their own minds after a catastrophic professional or physical failure. 📅 Inside the Cyber Leaders' Summit: Kam’s unfiltered, 60-second industry wake-up call on the collective delusions shared by executives, and the uncomfortable conversations leaders must initiate at this year's Summit. 🔹 Kam Karaji. He is Director of Cyber Security & Risk Management for the National Football League, responsible for protecting global, high-visibility operations and converged cyber-physical environments. A former senior counter-terrorism commander, he led in environments where decisions carry immediate, life-or-death stakes. Kam now speaks internationally on resilience, crisis leadership, and the human core of cyber security. His work bridges operational discipline with executive strategy in moments that demand composure 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the most ridiculous, soul-crushing task or alert you’ve had to chase this week while your real work suffered? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity - It’s Free. ✅ Join Here, using code OGMEMBER: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    59 min
  7. Integrity-First AI: From Automation to Accountability

    APR 4

    Integrity-First AI: From Automation to Accountability

    Searching for: "What is the difference between RPA and Agentic AI?", "Who is legally responsible when an autonomous agent goes rogue?", or "How do we move AI from a cool experiment to a trusted enterprise employee?" Stop scrolling. This is the reality check the industry has been avoiding. We aren't just talking about chatbots anymore. We are talking about Autonomous Agents that reason, plan, and execute complex business processes. But as we hand over the keys, one question remains: Is your AI acting with integrity, or is it a liability? Behind the polished keynotes lies a high-stakes transition. If an agent triggers a million-dollar error, who is actually accountable? Welcome to Episode 3 of the Integrity-First AI Series on the SECURE | CYBER CONNECT podcast. Jay, Warren and Chiru Bhavansikar (Chief AI Operating Officer at ARHASI) are joined by Manish Ballal & Sumit Wasuja to discuss “From Automation to Accountability”. Manish is a Senior Enterprise Technology Executive with over 15 years of experience in AI, Automation & Go-to-Market Strategy. A Founding Team Member of AWS Quick Automate, Amazon’s Agentic Automation Service, he has held senior roles at Automation Anywhere, Barclays & Infosys, building and scaling technology platforms across Financial Services, Healthcare & Life Sciences. Manish brings a rare combination of Product Depth & Commercial Acumen to the conversations defining the Future of AI within Enterprise. Sumit is a Principal Product Manager at AWS, focused on bringing Agentic AI into Real Enterprise Operations. He is the Founding Product Manager & Head of Product for Amazon Quick Automate, a service that helps organisations modernise complex business processes using AI Agents. Prior to this, Sumit has Led Large-Scale Enterprise Transformation Initiatives at both Amazon & Deloitte Consulting, helping Global Organisations redesign operations through Advanced Technology & Automation. 🎁 EXCLUSIVE OFFER: Learn more about Trust House: https://trusthouse.ai/ 🔥 WHAT YOU'LL DISCOVER: 🤖 The Agentic Evolution: What is Agentic AI, why RPA is dead and how "Agentic AI" actually reasons and plans under the hood. ⚖️ Integrity-First AI: Moving beyond the buzzwords to build a framework where decision provenance is non-negotiable. 🛠️ The 'Trust Layer': How AWS handles security guardrails and human-in-the-loop checkpoints in an autonomous world. 📉 The $1M Mistake: Who takes the fall when an AI fails? How to build audit trails that satisfy regulators and the board. 🔄 Multi-Agent Orchestration: Is it hype or reality? How agents are starting to collaborate and even debate each other. 🕵️ Cutting Through the 'Vaporware': The "Sales Lies" being told about AI right now and how to spot what's real. 🚀 AI Career Truths: The "un-automatable" skills needed to survive as a leader in the era of total automation. 🚨 Exclusive Announcement: Opportunity for you to join Chiru, Sumit, Manish, Jay and Warren in Manchester at the end of April. 📅 Join us at Digital Transformation Expo Manchester | 29th- 30th April, Manchester Central, Manchester. Digital Transformation Expo connects the people driving business change through technology. Get Your Free Tickets Here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: In a world of autonomous agents, what is the absolute worst thing that could go wrong on your watch? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    1 hr
  8. The Fight To Protect Our Health Services: How NHS Trusts Are Rethinking Cyber Resilience

    MAR 28

    The Fight To Protect Our Health Services: How NHS Trusts Are Rethinking Cyber Resilience

    A hospital’s heartbeat is no longer biological… it’s digital. When the network flatlines, the hospital stops breathing. The server room is now the most dangerous place in the building. Healthcare has been the #1 target for 15 years, costing an average of £8.4m per breach. But the real debt is paid in human life: 1,700 surgeries cancelled and permanent patient harm. "Stacking tools" is failing. We must move from compliance theater to Defensible Assurance. It’s time for operational control that protects lives, not just data. Welcome back to our new series: The Fight to Protect our Health Services, we expose the unspoken pressure NHS leaders carry and explore how to turn complex security expectations into defensible, operational control. We are joined by two powerhouse guests from Heimdal Security: Adam Pilton (Cyber Security Advisor | The Cyber Detective): Following 15 years in law enforcement, culminating as a Detective Sergeant leading Covert Operations and Cyber Crime. Since 2016, he has worked across cyber security roles, advising organisations, improving cyber maturity, and translating complex threats into clear guidance for leaders, end users, and global businesses. Frederik Seemann J. Razic is Head of Healthcare at Heimdal Security, where he works closely with NHS organisations and partners to strengthen cyber resilience across healthcare. Since mid-2022, Frederik has led the growth of Heimdal’s presence within the NHS from 3 to 30 NHS organisations, supporting them in improving endpoint security, automating patch and vulnerability management, and protecting critical clinical systems. His work focuses on helping NHS teams reduce operational complexity while maintaining strong security across increasingly demanding IT environments. 🔥 IN THIS EPISODE: • 🎥 Special Feature - Exclusive 2026 Keynote: A 20-minute live recording of Adam Pilton from the Convenzis stage, detailing how to move from "paper compliance" to measurable, defensible assurance. • 🚨 Beyond the IT Department: Why the recent £3.07m ICO fines and Synnovis leaks prove security is no longer a technical choice - it is a clinical and criminal liability. • 📋 Mastering CAF & DSPT: Pragmatic approaches to meeting the Cyber Assessment Framework without adding a single second of friction to a doctor’s shift. • 📈 The 3 to 30 Blueprint: Frederik Seemann reveals the exact 30-day strategy used to scale Heimdal’s footprint across 30 NHS Trusts. • ⚙️ Reducing Operational Burden: How to navigate ageing IT infrastructure and consolidate visibility to give IT teams their "operational oxygen" back. • 🌍 Global Lessons: What the NHS can learn from Denmark's healthcare transformation to engineer a more resilient, system-wide future. 🎁Learn More About HEIMDAL SECURITY: https://heimdalsecurity.com/request-a-demo 📹 Check out Heimdal’s upcoming Webinar series: https://heimdalsecurity.com/webinars 📅 Join us at the upcoming Convenzis Group: Digital Infrastructure & Security Events: https://www.convenzis.co.uk/events 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

    1h 9m

About

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology