Detonation Point

Matt O'Neill

Hosted by Matt O'Neill, retired U.S. Secret Service Special Agent Detonation Point is where powerful conversations spark. Each episode brings you into the room with fascinating guests as they share their stories, dive into cutting-edge technology, and tackle the challenges of fighting crime in the 21st century. Along the way, expect insider insights from a career spent protecting leaders and confronting threats, plus a few detours into Philadelphia Eagles football. Go Birds. 🦅

  1. 19H AGO

    Episode 36 - Military Leadership Lessons for High-Performance Teams with Chris Hallberg

    Chris Hallberg, former Army National Guard Staff Sergeant and founder of Business Sergeant, joins host Matt O’Neill to explore how military leadership principles translate into high-performing business teams. In this episode of Detonation Point presented by Elastio, Chris shares how commitment, accountability, and structured systems drive results, and why most organizations struggle with execution. He breaks down the importance of hiring the right people, empowering middle leadership (the “sergeants” of business), and creating a culture where truth and accountability thrive. Key Takeaways Leadership commitment drives accountability and resultsStrong teams require trust, honesty, and healthy conflictMiddle managers are critical to executionHiring right and firing fast when needed is essentialKeeping the wrong people hurts everyoneVeterans bring proven leadership and resilienceSystems and structure outperform motivation alone Resources Chris Hallberg LinkedIn: https://www.linkedin.com/in/chris-hallberg-01516315/Business Sergeant: https://bizsgt.com/ GoExpand Software: https://goexpand.comEOS Worldwide (Chris Hallberg): eosworldwide/chrishallberg Chapters 00:00 Intro & Misconceptions about Military Leadership 05:22 Commitment, Systems, & Building High-Performance Teams 07:47 Why Accountability Fails in Most Companies 13:21 The Missing “Sergeant” Role in Business 21:16 Translating Military Experience to the Private Sector 26:57 Hiring Mistakes and Keeping the Wrong People Too Long 35:00 Fixing a Struggling Organization: Where to Start About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    36 min
  2. MAY 4

    Episode 35 - How to Build Cybersecurity That Actually Works with CISO Elliott Franklin

    Elliott Franklin, cybersecurity leader and CISO at Fortitude Re, joins host Matt O’Neill to share insights on building effective security programs, avoiding vendor fatigue, and focusing on fundamentals over shiny tools.  In this episode of Detonation Point presented by Elastio, discover practical advice for CISOs and security teams to prioritize risk management, streamline security stacks, and foster a security culture grounded in discipline. Takeaways Most breaches come from failing the basics, not lacking advanced toolsVendor fatigue is real. Frameworks and risk should drive decisions, not hypeMore security spending doesn’t always mean better securityPeople and process must come before technologyTrue risk prioritization means not securing everything equallyStrong security culture depends on leadership support and structureAI adoption should be enabled thoughtfully, not blocked outright Chapters 00:00 Elliott Franklin’s Path into Cybersecurity 03:31 Vendor Fatigue & Tool Overload 06:34 Building Security Programs: Basics over Budget 12:59 Risk, Culture & Leadership Realities 20:23 Practical Security Leadership & The Future About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    31 min
  3. APR 27

    Episode 34 - Leaving Government: How to Succeed in the Private Sector with Mike Burnett

    Mike Burnett, former Secret Service agent and current COO of Stratoscope, joins host Matt O’Neill to discuss his transition into the private sector, how to reframe your skillset for business, and why many professionals underestimate their value. They also explore the evolving security landscape, including AI, robotics, and global threat shifts, and debate whether the Secret Service needs structural reform. This episode of Detonation Point presented by Elastio  navigates career transitions, modern security challenges, and how to think differently about workforce and mission demands. Takeaways Career pivots require reframing your skillsGovernment experience translates strongly to businessNetworking and self-awareness are keySecurity threats and technology are rapidly evolvingAI and robotics will shape the future of securityThe Secret Service may need structural reform Chapters 00:00 Mike Burnett Intro & Background 02:20 Career Pivot: Leaving the Secret Service 07:06 Career Advice: Translating Government Skills to Business 23:42 Modern Security Threats & Event Security 28:49 Future of Security: AI, Robotics & Humanoids 32:57 Drone Threats & Mitigation Strategies 36:13 Secret Service Reform Debate About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    51 min
  4. APR 21

    Episode 33 - Global Fraud Investigation, IC3 Report, and Eagles Draft Preview with Stephen Dougherty

    Stephen Dougherty, CEO of Rexxfield and returning guest, joins host Matt O’Neill to unpack the latest IC3 report, a major international fraud investigation, and how today’s scam networks impact victims, before shifting into Eagles draft strategy, Flyers hockey, and Philly sports. From global cybercrime to whether the Birds should go offensive line at 23, it’s a mix of serious insight and classic Philly sports debate. Takeaways Cybercrime losses continue to rise, driven by both better reporting and more effective scamsLarge international cases can take years to investigate and prosecuteVictim psychology, especially in crypto scams, plays a major role in continued lossesThe Eagles may prioritize offensive line depth in the draftPhilly sports remain unpredictable, but physical play and depth will be key for the Flyers Chapters 00:28 Intro to Stephen Dougherty 00:55 IC3 Report & Rising Fraud Trends 04:07 Sunk Cost Fallacy in Crypto Scams 06:14 Case Study: Albanky Case 15:55 Human Impact of Cybercrime 19:07 Sports Segment: NFL Draft & Philly Teams About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    27 min
  5. APR 13

    Episode 32 - Drone Security Explained: Detection, Defense, and Evolving Threats with Logan Harris

    Drones are evolving faster than defenses, and the gap is becoming a serious security risk. Logan Harris, founder of Spotter Global, joins Matt O’Neill to explain how drone threats have shifted from RF-controlled systems to autonomous and fiber optic “dark drones” that are difficult to stop. With decades of experience in radar and defense technology, Logan shares how compact surveillance radar became a new category and why it is now critical for protecting infrastructure. In this episode of Detonation Point presented by Elastio, you will learn how drone threats are changing, why traditional detection methods are falling short, and what the future of counter-drone defense looks like as AI and automation continue to advance. Takeaways Drone threats are evolving faster than defensive technologies“Dark drones” cannot be stopped with RF jammingRadar is one of the most reliable ways to detect dronesEffective defense requires a layered approachLow-cost drones create a cost imbalance for defendersAI and automation will shape future defense systems Chapters 00:00 Origins of Compact Surveillance Radar 05:05 Evolving Threat Landscape: Drones and Surveillance 11:07 Understanding Dark Drones and Regulatory Challenges 15:27 Countermeasures: Jamming, Kinetic Responses, and Legalities 27:49 Future of Drone Technology: Automation and AI in Defense About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    36 min
  6. APR 6

    Episode 31 - Fixing Cybersecurity Training: From Punishment to Results with Craig Taylor

    Most cybersecurity training doesn’t work… and it may actually be making your organization less secure. Craig Taylor of CyberHoot joins Matt O’Neill to break down why phishing tests, punishment-based training, and compliance checklists fail to change employee behavior. With 30+ years in cybersecurity and a background in psychology, Craig shares a different approach focused on engagement, reinforcement, and real-world outcomes. In this episode of Detonation Point presented by Elastio, you’ll learn how to build a security-first culture, why positive reinforcement beats punishment, and the simple controls like password managers and MFA that help prevent real-world breaches. Resources Learn more about CyberHoot or request a demo: https://cyberhoot.comUse referral code DETONATION POINT to receive 20% off your first year when you sign up for a free trial. Takeaways Most cybersecurity training fails because it doesn’t change behaviorPunishment-based approaches reduce engagement and create riskPositive reinforcement and gamification drive better security habitsPassword managers and MFA are critical to preventing real-world breachesCompliance doesn’t equal security - culture and behavior matter most Chapters 00:00 Intro to Cybersecurity Expert Craig Taylor 01:55 The Human Element in Cybersecurity 03:15 Why Security Training Fails 06:09 The Psychology Behind User Mistakes 07:32 Real Phishing Attack Example 08:35 Fixing Security Culture (Reward vs Punish) 11:29 Gamification and Engagement in Cyber Training 13:38 Work vs Personal Email Security Habits 16:19 Advanced Phishing, AI & Social Engineering 21:00 Preventing Fraud (Safe Words & Verification) 25:21 SMB Risks, Passwords & MFA 30:35 Compliance vs Security in Cyber Practices 35:57 Outro & More Information About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    37 min
  7. MAR 30

    Episode 30 - How to Protect Yourself from Cybercriminals with Rivka Tadjer

    Your phone is the easiest way for hackers to access your data… and most people don’t realize how exposed they are. Rivka Tadjer joins Matt O’Neill to break down how cybercrime really works: from SIM swapping and account takeovers to data breaches and the dark web economy. With decades of experience in cybersecurity and fintech, Rivka explains how cybercriminals target individuals and the practical steps you can take to protect your data, secure your phone, and prevent financial fraud. In this episode of Detonation Point presented by Elastio, you’ll learn how to prevent SIM swapping, why encrypted email is critical, how cybercriminals use stolen data to access your accounts, and crypto to move money. Key Takeaways Use an encrypted email (like Proton Mail) for financial accountsLock down your Apple ID / Google account (enable Screen Time restrictions on iPhone)Set a SIM PIN to prevent SIM swappingUse a VPN to hide your IP address and protect your networkTurn off Bluetooth, AirDrop & location services when not in useUse an authenticator app instead of SMS for 2FAEnable fraud alerts on bank and financial accountsLog out of apps when you’re not using themLimit sharing sensitive data (SSN, IDs, etc.) Resources How to Lock Your Apple ID (Screen Time Settings): Go to Settings → Screen TimeTap Content & Privacy Restrictions → ONUnder Allow Changes To, set:Passcode & Face ID → Don’t AllowAccount Changes → Don’t AllowTap Use Screen Time Passcode and set a PIN (different from your phone PIN) How to Set Up a SIM PIN: Go to Settings → CellularTap SIM PIN → ONEnter your carrier’s default PIN (if prompted)AT&T / Verizon: 1111T-Mobile: 1234Tap Change PIN and create your own Chapters 00:00 Introduction to Cybersecurity Expert Rivka Tadjer 2:03 From Journalism to Cybercrime & Fraud Prevention 4:30 How Cybercrime Actually Works (And Why It Pays) 10:04 The Dark Web Explained: How Your Data Gets Sold 15:12 How Hackers Move Money Using Crypto 17:51 Why You Need an Encrypted Email (And What to Use) 21:19 Paying Ransom Makes You a Bigger Target 27:11 How to Make Your iPhone More Secure (Apple ID + Settings) 30:08 How to Set Up a SIM PIN to Prevent SIM Swapping 35:46 The Risks of Location Services, Bluetooth, and Social Media 40:28 Essential Security Practices for Everyone: A Summary 42:58 Navigating Third Party Risk 48:31 The Future of Voice and Identity Security About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    55 min
  8. MAR 23

    Episode 29 - Why Security Training Is Failing and What Actually Works with Robert Siciliano

    Award winning author and keynote speaker Robert Siciliano joins Matt O’Neill to discuss cybersecurity, identity theft, and why human behavior remains the weakest link in security. This episode of Detonation Point presented by Elastio explores Robert’s journey into security, the failures of traditional awareness training, and practical ways individuals can better protect themselves in a data-driven world. The conversation covers identity theft vs. fraud, credit freezes, social engineering, the risks of oversharing online, and why security must be personal before it becomes organizational. Takeaways Most security training fails because it’s compliance-driven, not behavior-driven.Human-centric security conversations are more effective than technical or one-way training.Simple cybersecurity tools like password managers, MFA, and credit freezes dramatically reduce risk.Identity theft is different from simple credit card fraud.Most personal data is already compromised. Security is about making it useless to attackers.Social media oversharing fuels social engineering and identity-based attacks.People often mistake security for paranoia, which creates resistance to adopting best practices.Security starts with personal responsibility and awareness. Chapters 0:00 Introduction 01:29 Personal Experiences Shaping Security Awareness 04:38 The Evolution of Cyber Threats 07:59 Challenges in Cybersecurity Education 09:48 Understanding Security: What It Is and What It Isn’t 13:35 Changing Perceptions of Security 16:51 Practical Steps for Enhanced Security 20:08 Empowering Employees Through Personal Security 24:31 Understanding Identity Theft and Protection Strategies 26:50 Making Data Useless to Thieves 31:52 The Role of Social Media in Security Risks 35:17 Situational Awareness and Risk Management 39:11 Humanizing Security Awareness Training About Our Founding Sponsor, Elastio  This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: www.elastio.com

    41 min
5
out of 5
9 Ratings

About

Hosted by Matt O'Neill, retired U.S. Secret Service Special Agent Detonation Point is where powerful conversations spark. Each episode brings you into the room with fascinating guests as they share their stories, dive into cutting-edge technology, and tackle the challenges of fighting crime in the 21st century. Along the way, expect insider insights from a career spent protecting leaders and confronting threats, plus a few detours into Philadelphia Eagles football. Go Birds. 🦅

You Might Also Like