Full Metal Packet

Control D

Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world. Season 1 features CISOs, DFIR commanders, and security architects from SaaS, healthcare, government, and hospitality. Each episode dives into: - Breach Incidents → the first 72 hours that define an outcome (de-identified and NDA-safe). - SecOps Therapy → the frictions nobody talks about: burnout, broken workflows, and the fixes that matter. - Security Futures → fresh perspectives on what’s underrated, overhyped, and coming next in a world reshaped by AI. No vendor fluff - just operator-grade conversations that security professionals can apply immediately.

Episodes

  1. Incident Response: EU vs. US Policy Gaps

    4D AGO

    Incident Response: EU vs. US Policy Gaps

    Alejandro Rivas Vazquez has spent nearly two decades running DFIR services and now advises on preparedness through his boutique consultancy, VeraBeam. He’s sat in boardrooms, testified as an expert witness, and been on the phone at 1am when OFAC changed the rules mid-ransomware negotiation. In this episode, Alejandro breaks down why the EU and US approach cyber incidents from fundamentally different starting points, and what happens when those worlds collide inside a real investigation. He explains: Why lawyers belong in the room (and exactly when they don't)How the EU's hyper-regulation actively hinders incident responseWhy business email compromise costs more than ransomware — and gets less attentionWhat preparation actually means before an incident hitsHow DFIR is professionalizing, and where AI fits into its future Timestamps (00:00) Alejandro's path from Big Four IT risk to DFIR(07:45) How Operation Night Dragon changed the industry(16:20) Boardrooms, expert witnesses, and CISO liability(25:35) EU vs. US: regulation-first vs national security-first(32:15) When Europe's privacy laws block your own investigation(41:48) CISO personal liability: insurance, risk acceptance, and burnout(54:18) War story: business email compromise and the board member who went rogue(01:01:45) The single decision that separates contained from catastrophic(01:09:26) Midnight OFAC call during an active ransomware response(01:14:00) Why DFIR merged and where the profession is heading(01:20:09) AI as force multiplier: threat, opportunity, and the hallucination danger zone(01:33:53) Practical advice: what EU and North American CISOs should do this quarter Connect with Alejandro on LinkedIn Powered by Control D

    1h 30m
  2. How CISOs Should Rationalize the Security Stack

    FEB 24

    How CISOs Should Rationalize the Security Stack

    Ralph Chammah, Co-Founder & CEO of Blacklight AI, shares a builder’s perspective shaped by years in cybersecurity analytics—what breaks in real SOC environments, and what it takes to make detection actually usable at scale. In this episode, Ralph explains why “AI-first” security isn’t a label—it’s an operating model for reducing alert noise, improving context, and helping teams detect behavior that rule-based systems routinely miss. He explains: Why security stacks get noisy (and what “AI-first” should actually mean)How to cut through acronyms like XDR/MDR and evaluate real valueHow to use context + behavior patterns to catch insider risk and compromiseWhy privacy/trust decisions (local vs external processing) matter in AI securityHow replay/simulation helps validate detections and reduce false positives Episode Timeline: (01:46) Meet Ralph + what Blacklight AI does(06:45) Why he left the Big 4 to build a product(12:26) Tool overload, acronyms, and differentiation (XDR/MDR)(18:10) Why AI belongs in detection (and how to avoid bad signals)(21:44) Trust & privacy: where the data goes (and why)(23:16) “Battle scars” from SIEM life: parsers, missing fields, manual grind(29:32) Selective ingestion vs. “pipe everything” into the magic box(31:32) Validation: replaying history + simulation to prove detections(35:35) Biggest high-risk wins: insider threat + slow-burn intrusions(39:13) Jaguar Land Rover breach story + business impact(47:27) Quickest wins: what to connect first by maturity level(49:55) What tools he’d remove first (and why)(59:39) Platform vs point solutions: the real trade-off Connect with Ralph on LinkedIn Powered by controld.com

    1h 6m
  3. “I Was the Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study

    JAN 28

    “I Was the Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study

    Matt Lee, now Senior Director of Security & Compliance at Pax8, reveals how a ransomware blast at his former MSP triggered a multi-million-dollar fallout, 26 client disruptions, and a complete redefinition of what security leadership really means in today’s world. Matt is a battle-tested cybersecurity leader known for translating complex technical crises into practical security transformation. In this raw, revealing episode, he opens up about the breach that changed everything - and how it helped shape the philosophy behind Secure by Demand. He explains: How a hidden ransomware infection derailed a multi-company mergerWhat most MSPs get dangerously wrong about security riskThe real cost of reactive security: layoffs, lawsuits, and insurance gapsWhat “Secure by Demand” really means (and why it’s missing from most strategies)Why security maturity is the new battleground (not just tooling)How to lead through cyber chaos without losing your sanity Episode Timeline: (00:00) Intro: Who is Matt Lee and why this episode matters(02:42) Matt’s origin story - from hacker kid to MSP tech(06:19) Falling into security: “I just added ‘and Security’ to my badge”(11:30) The merger that hid a ticking ransomware time bomb(17:04) Voldemort incident discovery: “We bought a company mid-breach”(20:47) The day it hit: Ransomware spreads to 26 client businesses(25:15) What went wrong: due diligence gaps, supply chain blindness(30:22) Incident response chaos and internal suspicion(36:48) Fallout: 18-month recovery, insurance battles, FBI involvement(41:35) Live Compromised: The philosophy Matt built from the wreckage(47:10) The birth of “Secure by Demand” - a challenge to the industry(53:01) Software design flaws: why vendors ship insecure defaults(56:20) Advice for CISOs and MSPs: mindset, tooling, and where to start(59:40) Real-world examples: empathy, leadership, and rebuilding trust(01:03:15) Final reflections: Why the industry needs hard conversations Connect With Matt on LinkedIn Powered by Control D

    1h 19m

About

Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world. Season 1 features CISOs, DFIR commanders, and security architects from SaaS, healthcare, government, and hospitality. Each episode dives into: - Breach Incidents → the first 72 hours that define an outcome (de-identified and NDA-safe). - SecOps Therapy → the frictions nobody talks about: burnout, broken workflows, and the fixes that matter. - Security Futures → fresh perspectives on what’s underrated, overhyped, and coming next in a world reshaped by AI. No vendor fluff - just operator-grade conversations that security professionals can apply immediately.