CYBER CONNECT PODCAST

Jay Adamson & Warren Atkinson

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology

  1. The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    4D AGO

    The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    The industry is obsessed with building artificial minds, but we are fundamentally failing the human ones. Forcing your most brilliant people to mask who they are just to fit a corporate mold isn't 'professionalism' -it's the fastest way to kill innovation. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning Data Scientist and TechJumpstart Hub Founder Wendy Amexo disrupts the narrative on what it truly takes to build trustworthy technology. We are stripping away the vendor hype to focus on the 'human operating system,' exploring how a career pivot from Law to Data Science can sharpen your technical lens and why ADHD is a secret weapon for solving the industry's most complex problems. 🔥 WHAT YOU'LL DISCOVER: 🧠 The 'Squiggly' Advantage: How a background in Law provides a superior holistic lens for AI regulation and governance. 🕵️ Silent AI Failures: What every founder gets wrong about AI mistakes and why 'silent failures' should terrify your board. 💻 The DevSecAI Framework: A deep dive into the infinity loop: Build, Scan, Fix, Scan Again -the only way to survive LLM deployment. 🚨 The ADHD Tax: The unseen emotional and financial toll of navigating a tech industry built for neurotypical minds. 📍 DTX Special - Sensory Survival: Practical strategies for neurodivergent professionals to successfully navigate overwhelming, high-pressure environments like DTX. 🏛️ The Seat at the Table: Why diverse cognitive profiles are vital in the physical rooms where the future of tech is decided. 👻 The Hyperfocus Trap: How to protect neurodivergent talent from their own drive rather than exploiting it for short-term gains. 💰 Tearing Down the Gates: Wendy’s mission with TechJumpstart Hub CIC to empower women and underserved communities in the North-East. 🔹 Wendy Amexo - Wendy is an award-winning Data Scientist, Data & Analytics Manager at one of the world's largest FMCG brands, and the Founder of TechJumpstart Hub CIC. She brings a unique, holistic lens to tech, connecting raw technology to regulation and strategic value. Wendy is a regular speaker on responsible AI and digital inclusion, dedicated to building inclusive, resilient systems. 🎁Learn More About TechJumpStart Here: https://techjumpstarthub.co.uk/ 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is your 'squiggly' superpower? Have you pivoted from a non-tech background, or are you navigating tech as a neurodivergent professional? ✅ Join the Ecosystem, use code ‘TECHJUMP’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    50 min
  2. Cybersecurity Culture: Why behaviour, diversity, and system design matter

    APR 18

    Cybersecurity Culture: Why behaviour, diversity, and system design matter

    Are you tired of taking the blame for a broken system? Right now, 83% of tech professionals admit to bypassing corporate security controls… not because they are careless, but because they are exhausted and just trying to survive impossible workloads. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning cybersecurity executive and Founder of Seidea CIC, Stephanie Itimi, exposes the toxic culture of corporate security . We are turning off the vendor pitches to tackle the one vulnerability you cannot patch with software: human burnout. Why do companies spend billions on tools while treating human behavior like a software bug? What happens to your psychological safety when you are forced through 45-minute compliance videos just to be tricked and shamed by your own IT department ? Whether you are a SOC analyst exhausted by 2 a.m. wake-up calls , a professional trying to break through the industry's relentless gatekeeping , or a CISO trying to actually protect your team, this is the unfiltered reality check you need to hear. 🔥 WHAT YOU’LL DISCOVER: The Burnout Crisis: Why smart people knowingly bypass controls, and how to shift security from a corporate "police function" into a business enabler . The Training Trap: Why 45-minute phishing videos are just a tick-box exercise, and why micro-learning and role-play are the only things that actually work . The "Shadow AI" Rebellion: Why blanket bans on AI push behavior to the "black market," and how employees are secretly feeding data into unapproved tools . Ready for Digital Co-Workers?: We break down the terrifying leap from Generative AI to "Agentic AI," and why your culture isn't ready for AI agents executing tasks . Shattering the Gatekeepers: Stephanie’s unfiltered advice on bypassing the "bro-culture" of tech, building your personal brand, and conquering imposter syndrome . Diversity as a Tactical Defense: Why true representation isn't an HR issue—it's a hard, life-saving security imperative that stops global hackers . Surviving Leadership: Why stepping into a CISO role is incredibly lonely, and the uncomfortable conversations leaders must have behind closed doors 🔹 About Stephanie Itimi: Stephanie is an award-winning cybersecurity executive, currently Director of Information Protection and Compliance at Age UK . Recognised by the World Economic Forum and NCSC , she is the author of Cybersecurity Culture. She is also the Founder of Seidea CIC, an organization that has trained and supported over 8,000 women from Black and Minority Ethnic backgrounds into cybersecurity and tech roles . 🎁 Learn More About Seidea CIC: https://www.seidea.org/ 📅 Join us at the Cyber Leaders’ Summit (London): https://www.cyber-leaderssummit.com/ 👇 The Challenge: Does your workplace reward secure behavior, or does the system make breaking the rules the easiest path to getting your job done? Let us know in the comments! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. 🚀 Stop fighting a broken system! If you are tired of the gatekeeping, the endless tool fatigue, and the "spray and pray" job applications , we are opening early access to a private, enterprise-grade career and hiring platform inside the SECURE ecosystem . Hit the link below and use the private access code EMPOWER to bypass the waitlist! ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    1h 6m
  3. The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    APR 15

    The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    Stop worrying about quantum computing. Right now, up to 10% of your enterprise devices are completely undetected, and your multi-million-pound security stack is likely failing silently in the background. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, 25-year industry veteran and ThreatAware CEO Jon Abbott exposes the "Cybersecurity Sophistication Paradox." We are stripping away the vendor hype to look at the terrifying realities of 2026 enterprise security. Why is the industry obsessed with buying shiny new EDR tools while completely incapable of deploying them? What happens when developers rely on AI "Vibe Coding" to build fragile infrastructure? And why are Level 1 and Level 2 SOC analysts facing a mass extinction event? If you are a CISO battling the boardroom or a tech professional trying to survive the AI shift, this is the wake-up call you cannot afford to miss. 🔥 WHAT YOU'LL DISCOVER: 🧠 The Founder’s Journey: How Jon overcame severe dyslexia, left school at 16, and eventually co-founded two major tech companies. 🚨 The Sophistication Paradox: Why security teams love solving exotic problems while ignoring the boring, foundational IT hygiene that actually stops breaches. 🕵️ Anatomy of a Disaster: How attackers bypassed M&S enterprise security with a simple phone call, the JRL cyber attack and the McDonald's hiring app that secured 65M users with the password "123456". 👻 Shadow AI & Blind Spots: Why relying on Microsoft InTune is a trap, and how employees using AI at home are bypassing your security entirely. 💻 "Vibe Coding" & Acceptable Outages: How AI prompts are creating a culture where catastrophic network outages are treated as acceptable collateral damage. 📉 The Extinction of the SOC Analyst: Why Level 1 and 2 roles will disappear in 5 years, and how to become the "10x Engineer" that survives the purge. 💰 The Founder Masterclass - Raising & Scaling: How to successfully build, scale, and get executive buy-in for solving "unsexy" foundational tech problems during a brutal economic downturn. Here’s how to engage with VC’s and Investors proactively. 🔹 Jon Abbott - With over 25 years of experience in the technology industry, Jon believes passionately in revolutionising the way businesses stay in control in the ever-evolving Cyber Landscape. Jon has leads Teams in Developing Cutting-Edge Solutions to transform Asset & Security Tool Management for organisations across the globe….& brings a fresh perspective on Security that is very much centred around Breach Prevention & Process. Previously, he Co-Founded Priority One, where he saw the critical need for Real-Time, Agentless Security Control Monitoring & its these experiences that have made Jon a Cyber Generalist with broad Technical Knowledge & Strong Commercial Awareness and have inspired him to Design & Build New & Intuitive Solutions to fill this crucial gap in the market. At ThreatAware, he’s committed to providing Innovative Cyber Asset Management Solutions that empower organisations to proactively keep their Cyber Assets safe from attack. Offering a Single Source of Truth, their Solution eliminates the burden of Asset Monitoring for IT Teams, ensuring they can instantly, reliably and accurately discover and protect every Cyber Asset. 🎁Learn More About ThreatAware: https://threataware.com/ 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the one 'un-automatable' skill you are building right now to survive the shift?" 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    1h 1m
  4. The Architecture of Survival: The human side of cyber security and crisis leadership

    APR 11

    The Architecture of Survival: The human side of cyber security and crisis leadership

    What happens when a digital hack threatens the physical safety of 80,000 people inside a stadium? We are no longer just fighting hackers over stolen emails - we are defending environments where a single computer failure can cause real-world panic and cost human lives. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, we are dismantling the "Illusion of Control" with Kam Karaji. As a globally recognised Director of Cyber Security & Risk Management and a former senior counter-terrorism commander, Kam bridges the gap between digital systems and extreme physical consequences. If you are exhausted by boardroom theatre, corporate buzzwords, and the constant anxiety that you are just one mistake away from a catastrophic failure, this is your reality check. Kam reveals why the multi-million-pound security industry is actually making us less safe, how "alert fatigue" is destroying the mental health of our analysts, and what surviving a stroke and Stage 3 cancer taught him about true human resilience. Whether you are a CEO managing a board, a tech professional fighting burnout, or simply someone fascinated by high-stakes crisis leadership, this episode will completely change how you view survival. 🔥 WHAT YOU'LL DISCOVER: 🤥 The Boardroom Lie & The Prevention Trap: Why spending millions on a "50-foot digital wall" actually makes your organization fundamentally less safe, and why CISOs are managing board anxiety instead of actual risk. 🩸 The "Where's Wally" Bloodbath: How vendors selling "more AI tools" are actively destroying the mental health of Tier 1 SOC analysts by drowning them in 10,000 meaningless alerts a day. 🏟️ When Hacks Turn Physical: We are no longer just protecting data. Who makes the call when shutting down a compromised digital system creates a physical panic in an 80,000-seat arena? 🧠 The Architecture of Survival: How surviving a stroke and Stage 3 cancer completely rewrote a former counter-terrorism commander's playbook for leading through a catastrophic corporate crisis. 🛑 The Hour-One Fracture: The single biggest difference between a leadership team that tears itself apart during hour one of a disaster, and one that executes a unified command. 🔄 The Final Mental Reboot: The exact psychological framework leaders must use to reboot their own minds after a catastrophic professional or physical failure. 📅 Inside the Cyber Leaders' Summit: Kam’s unfiltered, 60-second industry wake-up call on the collective delusions shared by executives, and the uncomfortable conversations leaders must initiate at this year's Summit. 🔹 Kam Karaji. He is Director of Cyber Security & Risk Management for the National Football League, responsible for protecting global, high-visibility operations and converged cyber-physical environments. A former senior counter-terrorism commander, he led in environments where decisions carry immediate, life-or-death stakes. Kam now speaks internationally on resilience, crisis leadership, and the human core of cyber security. His work bridges operational discipline with executive strategy in moments that demand composure 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the most ridiculous, soul-crushing task or alert you’ve had to chase this week while your real work suffered? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity - It’s Free. ✅ Join Here, using code OGMEMBER: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

    59 min
  5. Integrity-First AI: From Automation to Accountability

    APR 4

    Integrity-First AI: From Automation to Accountability

    Searching for: "What is the difference between RPA and Agentic AI?", "Who is legally responsible when an autonomous agent goes rogue?", or "How do we move AI from a cool experiment to a trusted enterprise employee?" Stop scrolling. This is the reality check the industry has been avoiding. We aren't just talking about chatbots anymore. We are talking about Autonomous Agents that reason, plan, and execute complex business processes. But as we hand over the keys, one question remains: Is your AI acting with integrity, or is it a liability? Behind the polished keynotes lies a high-stakes transition. If an agent triggers a million-dollar error, who is actually accountable? Welcome to Episode 3 of the Integrity-First AI Series on the SECURE | CYBER CONNECT podcast. Jay, Warren and Chiru Bhavansikar (Chief AI Operating Officer at ARHASI) are joined by Manish Ballal & Sumit Wasuja to discuss “From Automation to Accountability”. Manish is a Senior Enterprise Technology Executive with over 15 years of experience in AI, Automation & Go-to-Market Strategy. A Founding Team Member of AWS Quick Automate, Amazon’s Agentic Automation Service, he has held senior roles at Automation Anywhere, Barclays & Infosys, building and scaling technology platforms across Financial Services, Healthcare & Life Sciences. Manish brings a rare combination of Product Depth & Commercial Acumen to the conversations defining the Future of AI within Enterprise. Sumit is a Principal Product Manager at AWS, focused on bringing Agentic AI into Real Enterprise Operations. He is the Founding Product Manager & Head of Product for Amazon Quick Automate, a service that helps organisations modernise complex business processes using AI Agents. Prior to this, Sumit has Led Large-Scale Enterprise Transformation Initiatives at both Amazon & Deloitte Consulting, helping Global Organisations redesign operations through Advanced Technology & Automation. 🎁 EXCLUSIVE OFFER: Learn more about Trust House: https://trusthouse.ai/ 🔥 WHAT YOU'LL DISCOVER: 🤖 The Agentic Evolution: What is Agentic AI, why RPA is dead and how "Agentic AI" actually reasons and plans under the hood. ⚖️ Integrity-First AI: Moving beyond the buzzwords to build a framework where decision provenance is non-negotiable. 🛠️ The 'Trust Layer': How AWS handles security guardrails and human-in-the-loop checkpoints in an autonomous world. 📉 The $1M Mistake: Who takes the fall when an AI fails? How to build audit trails that satisfy regulators and the board. 🔄 Multi-Agent Orchestration: Is it hype or reality? How agents are starting to collaborate and even debate each other. 🕵️ Cutting Through the 'Vaporware': The "Sales Lies" being told about AI right now and how to spot what's real. 🚀 AI Career Truths: The "un-automatable" skills needed to survive as a leader in the era of total automation. 🚨 Exclusive Announcement: Opportunity for you to join Chiru, Sumit, Manish, Jay and Warren in Manchester at the end of April. 📅 Join us at Digital Transformation Expo Manchester | 29th- 30th April, Manchester Central, Manchester. Digital Transformation Expo connects the people driving business change through technology. Get Your Free Tickets Here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: In a world of autonomous agents, what is the absolute worst thing that could go wrong on your watch? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

    1 hr
  6. The Fight To Protect Our Health Services: How NHS Trusts Are Rethinking Cyber Resilience

    MAR 28

    The Fight To Protect Our Health Services: How NHS Trusts Are Rethinking Cyber Resilience

    A hospital’s heartbeat is no longer biological… it’s digital. When the network flatlines, the hospital stops breathing. The server room is now the most dangerous place in the building. Healthcare has been the #1 target for 15 years, costing an average of £8.4m per breach. But the real debt is paid in human life: 1,700 surgeries cancelled and permanent patient harm. "Stacking tools" is failing. We must move from compliance theater to Defensible Assurance. It’s time for operational control that protects lives, not just data. Welcome back to our new series: The Fight to Protect our Health Services, we expose the unspoken pressure NHS leaders carry and explore how to turn complex security expectations into defensible, operational control. We are joined by two powerhouse guests from Heimdal Security: Adam Pilton (Cyber Security Advisor | The Cyber Detective): Following 15 years in law enforcement, culminating as a Detective Sergeant leading Covert Operations and Cyber Crime. Since 2016, he has worked across cyber security roles, advising organisations, improving cyber maturity, and translating complex threats into clear guidance for leaders, end users, and global businesses. Frederik Seemann J. Razic is Head of Healthcare at Heimdal Security, where he works closely with NHS organisations and partners to strengthen cyber resilience across healthcare. Since mid-2022, Frederik has led the growth of Heimdal’s presence within the NHS from 3 to 30 NHS organisations, supporting them in improving endpoint security, automating patch and vulnerability management, and protecting critical clinical systems. His work focuses on helping NHS teams reduce operational complexity while maintaining strong security across increasingly demanding IT environments. 🔥 IN THIS EPISODE: • 🎥 Special Feature - Exclusive 2026 Keynote: A 20-minute live recording of Adam Pilton from the Convenzis stage, detailing how to move from "paper compliance" to measurable, defensible assurance. • 🚨 Beyond the IT Department: Why the recent £3.07m ICO fines and Synnovis leaks prove security is no longer a technical choice - it is a clinical and criminal liability. • 📋 Mastering CAF & DSPT: Pragmatic approaches to meeting the Cyber Assessment Framework without adding a single second of friction to a doctor’s shift. • 📈 The 3 to 30 Blueprint: Frederik Seemann reveals the exact 30-day strategy used to scale Heimdal’s footprint across 30 NHS Trusts. • ⚙️ Reducing Operational Burden: How to navigate ageing IT infrastructure and consolidate visibility to give IT teams their "operational oxygen" back. • 🌍 Global Lessons: What the NHS can learn from Denmark's healthcare transformation to engineer a more resilient, system-wide future. 🎁Learn More About HEIMDAL SECURITY: https://heimdalsecurity.com/request-a-demo 📹 Check out Heimdal’s upcoming Webinar series: https://heimdalsecurity.com/webinars 📅 Join us at the upcoming Convenzis Group: Digital Infrastructure & Security Events: https://www.convenzis.co.uk/events 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

    1h 9m
  7. The Fight To Protect Our Health Services Zero Trust Everywhere & Deception Tech

    MAR 21

    The Fight To Protect Our Health Services Zero Trust Everywhere & Deception Tech

    When we think of hospital heroes, we picture doctors and nurses, but there is an invisible frontline of cyber defenders working around the clock to keep every life-saving machine running. We are exploring how the latest breakthroughs in Zero Trust and deception technology are flipping the script on cyber threats, ensuring our healthcare professionals are never stopped from saving lives. Welcome to our new special-edition series: The Fight to Protect our Health Services. In partnership with Convenzis Group, we’re bringing you raw, frontline conversations live from Cybersecure 2026: The NHS Cyber Security Conference, featuring exclusive keynote insights and behind-the-scenes interviews with the leaders securing the future of digital healthcare. In this inaugural episode, we are joined by the inspiring Mike Culshaw, a true healthcare IT disruptor who has spent nearly two decades in the NHS trenches. From managing regional service desks to serving as Chief Technology Officer at Pennine Care NHS Foundation Trust, Mike understands the heavy reality of defending hospital networks from the inside out. Driven by his core belief that "Tech + Humans is where the magic happens," he earned the prestigious 2024 NHS Cyber Innovator Award for relentlessly challenging the legacy IT status quo. Today, as a Healthcare Solution Consultant and Security Specialist at Zscaler, Mike brings that invaluable frontline perspective to the broader industry, championing Zero Trust transformation to secure the cloud, empower clinical staff, and ensure our health services can safely and securely operate from anywhere. 🔥 IN THIS EPISODE: • 🎥 Exclusive 2026 Conference Insights: Groundbreaking takeaways and raw footage directly from the floor of the NHS Cyber Security Conference. • 🚨 The Evolving Cyber Landscape: The biggest challenges Zscaler is seeing on the frontlines today, how AI-driven ransomware is shifting, and what healthcare IT must do to stay ahead. • 🔒 Zero Trust Everywhere: From users to things, and data to AI - how the principle of least-privileged access is transforming NHS security and compliance. • 🪤 Deception Technology: A look at the "digital decoys" and traps being set to outsmart attackers and stop ransomware before it deploys. • 🛡️ The Invisible Shield: How IT teams are modernizing infrastructure so frontline workers can focus entirely on patient care. • 💙 The Human Element: Why protecting our health services means protecting the mental resilience and wellbeing of the cybersecurity professionals in the trenches. Zscaler operates the world’s largest security cloud, the Zscaler Zero Trust Exchange™. This platform is designed to replace traditional legacy network security, such as VPNs and firewalls, by securely connecting any user, device, or application over any network, regardless of location. The platform's architecture is built on the principle of least-privileged access, ensuring that users are only connected to the specific applications they need. For more info visit www.zscaler.com 📅 Join us at the upcoming Convenzis Group: Digital Infrastructure & Security Events: https://www.convenzis.co.uk/events 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

    1h 8m
  8. Integrity-First AI: Cloud, Governance and Responsible Innovation

    MAR 14

    Integrity-First AI: Cloud, Governance and Responsible Innovation

    Searching for answers to "Is AI going to replace software engineers?", "Who is legally accountable when an autonomous AI makes a mistake?", or "How do we stop the hidden Shadow AI epidemic?" Stop scrolling. This is the unfiltered reality check the tech industry has been avoiding. We are rushing to let Artificial Intelligence run our businesses, our infrastructure, and our daily lives. But who is actually accountable when the machine breaks? Behind the corporate PR statements and "AI Ethics" boards lies a chaotic reality. Burnt-out employees are secretly feeding sensitive data into unsanctioned "Shadow AI" tools. Tech giants are making brutal, hidden trade-offs between system performance and massive global energy consumption. And as models become highly complex "Black Boxes" that even their creators don't fully understand, the ultimate legal question is looming: When an AI hallucination causes a catastrophic financial disaster or an algorithm ruins a family's life, who goes to jail? Welcome to Episode 2 of the Integrity-First AI Series on the SECURE | CYBER CONNECT podcast. This week, hosts Jay Adamson, Warren Atkinson, and special guest co-host Chiru Bhavansikar bring you a massive reality check. We are joined by James Anderson, Cloud Instructor and former Senior Director of Enterprise Architecture at Sabre Corporation. With over 20 years of experience designing the massive, highly regulated cloud systems that power global travel, James bridges the gap between complex cloud architecture and urgent, real-world human consequences. Learn More about GDG Cloud Southlake: https://gdg.community.dev/gdg-cloud-southlake/ Chiru Bhavansikar, recognized as one of the most impactful Chief AI Officers of 2024, serves as the Chief AI Operating Officer at ARHASI, with over two decades of experience pioneering cloud platforms and advising giants like Google, Chiru helps enterprises cross the chasm from "cool AI experiments" to Trusted Autonomous Systems, ensuring that governance and accountability never break during the handoff between data models and human workflows. Learn More: https://arhasi.ai/ 🎁 EXCLUSIVE OFFER: Learn more about Trust House solution exclusively for our community members: https://trusthouse.ai/ 🔥 WHAT YOU'LL DISCOVER: • 🚨 The 'Shadow AI' Epidemic: Why your own employees are your biggest cybersecurity blind spot, and how to engineer multi-million-dollar cloud infrastructure to survive internal human sabotage. • ⬛ Governing the 'Black Box': Can we actually govern an AI model we don't fully understand? The biggest blind spots in measuring AI trustworthiness. • 🏗️ Trust Architecture & CI/CD: How to stop bolting "ethics" on at the end of a project, and instead bake Data Governance directly into your Infrastructure as Code (IaC) and fast-moving AI workflows. • ⚖️ The AI Liability Crisis: If an enterprise AI system fails, who takes the legal fall? The Vendor, the Developer, or the Chief AI Officer? • 🌍 The Carbon Footprint Trade-Off: The brutal choices Cloud Architects must make right now between building high-performance AI and preventing a global energy crisis. • 💔 Algorithmic Bias & The Human Toll: The psychological weight of managing AI governance, knowing a single failure could destroy a real person's livelihood. • ⚙️ Legacy Modernization Friction: The most common governance challenges organizations face when bridging legacy cloud systems with unpredictable new AI capabilities. • 🎭 Corporate 'Governance Washing': How to tell if a company is actually protecting consumers, or just faking AI safety to beat their competitors to market. • ✈️ The 'Invisible Concierge' & Zero-Touch Travel: Drawing on his Sabre expertise, James reveals the future of AI in travel - where the cloud instantly fixes flight delays, rebooks your connection, and adjusts your hotel while you are still 30,000 feet in the air.

    53 min

About

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance. SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect 🗓️ NEW EPISODES available every week 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You #InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology