Reimagining Cyber - real world perspectives on cybersecurity

Reimagining Cyber

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on MillionPodcasts'  Best 100 Cybersecurity Podcasts https://www.millionpodcasts.com/cyber-security-podcasts/ Top 50 Chief Information Security Officer CISO Podcasts https://www.millionpodcasts.com/ciso-podcasts/ Top 70 Security Hacking Podcasts https://www.millionpodcasts.com/security-hacking-podcasts/

  1. The Quiet Collapse of Trust in Identity - #195

    3D AGO

    The Quiet Collapse of Trust in Identity - #195

    Identity has long been the foundation of cybersecurity—but what if that foundation is starting to crack? In this episode of Reimagining Cyber, Tyler Moffitt unpacks a major shift happening right now: attackers aren’t breaking in anymore—they’re logging in. As AI accelerates phishing, fuels hyper-personalized social engineering, and powers a growing underground market for stolen credentials, traditional defenses like passwords and even MFA are being quietly bypassed. Tyler explains how identity has become the new primary attack surface, why concepts like “trusted users” no longer hold up, and how session hijacking, info-stealer malware, and token theft are changing the rules of the game. From help desk impersonation attacks to the rise of deepfake-enabled fraud, this conversation reveals just how far attackers have evolved. Most importantly, the episode explores what organizations are getting wrong—and what they need to do differently. From shortening trust windows and monitoring behavior to embracing layered defenses and a true zero trust mindset, this is a wake-up call for anyone relying on identity as a security perimeter. If you’re still treating identity as proof of trust, it’s time to rethink everything. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    16 min
  2. Luck is not a Strategy- #194

    MAR 25

    Luck is not a Strategy- #194

    In this episode of Re-Imagining Cyber, host Tyler Moffitt sits down with senior threat research analyst Kelvin Murray to unpack a hard truth: luck has nothing to do with surviving a cyber attack. From the rise of AI-powered cybercrime to the persistence of old attack methods like RDP, the conversation explores why ransomware gangs continue to thrive in an increasingly industrialized underground economy. The duo breaks down how cybercrime now operates more like a business—complete with subscription models, affiliate programs, and even “ransomware-as-a-service.” They also dive into: How AI is lowering the barrier to entry for cybercriminalsWhy legitimate tools are being repurposed for malicious useThe ongoing risks of poorly secured remote access systemsThe shift from data encryption to data theft and extortionThe hidden dangers of AI agents with excessive permissionsThe key takeaway? Technology alone isn’t the ultimate defense—preparation, training, and strong security fundamentals are. If you think cyber resilience comes down to luck, think again. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    22 min
  3. Fighting the Water Hackers  - #193

    MAR 18

    Fighting the Water Hackers - #193

    What if the next cyberattack doesn’t just steal your data—but turns off your water, power, or access to healthcare? In this eye-opening episode, Josh Corman (I Am The Cavalry Dot Org) returns to unpack a rapidly evolving threat landscape where cyberattacks are no longer just about information theft—they’re about real-world disruption and destruction. From nation-state actors pre-positioning inside critical infrastructure to the chilling reality of “digital time bombs” lying dormant in water and power systems, Josh explains why the rules of cybersecurity are changing—and why we’re not ready. The conversation dives into the rise of campaigns like Volt Typhoon, the strategic implications of a potential Taiwan conflict, and how adversaries are targeting civilian infrastructure to sow chaos and weaken response efforts. Josh also shares insights from his “Undisruptable 27” initiative, focused on protecting the most critical lifeline systems before it’s too late. But this isn’t just about global conflict—it’s personal. Listeners will walk away with practical steps to protect their households, challenge assumptions about resilience and insurance, and rethink what preparedness really means in a world where cyber and physical risks collide. This is a candid, sobering, and essential discussion on the future of cyber warfare—and what you can do about it today. Relevant links: I Am the Cavalry Dot Org Undisruptable27 Institute for Security and Technology Unrestricted Warfare - China's Master Plan to Destroy America  As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    26 min
  4. AI Security and the Future of the SOC - #192

    MAR 11

    AI Security and the Future of the SOC - #192

    AI is transforming every corner of technology—but it’s also creating an entirely new frontier for cybersecurity. In just a few short years, AI security has exploded into one of the fastest-growing segments in the industry. New startups are emerging almost weekly, regulators are racing to keep up, and security leaders are grappling with a fundamental question: how do you secure systems that are learning, evolving, and increasingly making decisions on their own? Today’s guest has been tracking the cybersecurity industry longer—and more closely—than almost anyone. Richard Stiennon is a renowned cybersecurity analyst, industry historian, and author of The Security Yearbook, widely regarded as the most comprehensive desk reference for the cybersecurity market. Now he’s turning his attention to the next era of digital risk. His new book, Guardians of the Machine Age: Why AI Security Will Define the Future of Digital, is released this Wednesday, March 11—the same day this episode drops. In this conversation, we explore why AI security has exploded so quickly, the forces driving this new market—from regulation to real-world attacks—and why Richard believes the standalone category of “AI security” may disappear entirely within the next year as AI becomes embedded in every security product. We also dig into the rise of AI-driven SOC automation, what it means when machines begin triaging—and even responding to—threats autonomously, and the biggest misconceptions CISOs still have about securing AI systems. If you want to understand where cybersecurity is heading in the age of intelligent machines, this is a conversation you won’t want to miss. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    19 min
  5. Inside the Momentum Cyber Almanac - #191

    MAR 4

    Inside the Momentum Cyber Almanac - #191

    In this episode of Reimagining Cyber, host Rob Aragao sits down with Eric McAlpine, Founder and CEO of Momentum Cyber, to break down what’s really happening inside today’s cybersecurity market. Drawing from insights in the latest Momentum Cyber Almanac, Eric shares a behind-the-numbers look at: The rise of a two-tier cybersecurity market — the “haves” and the “have-nots”Why we may be in the middle of a cybersecurity supercycleHow AI-native startups are reshaping funding, innovation, and deal activityThe surge in M&A and what it signals for the futureWhat vendor consolidation means for security leaders and enterprise buyersWhy hyperscalers and frontier AI companies could be the next major power playersWith record capital flows, accelerating innovation cycles, and trillion-dollar companies eyeing security, the stakes have never been higher. If you want to understand where the cybersecurity market is headed in 2026 — and how to navigate the transformation — this episode delivers the strategic context you need. Contact Eric McAlpine at  Eric@momentumcyber.com. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    31 min
  6. Agentic AI: From Chokepoint to Crisis - #190

    FEB 25

    Agentic AI: From Chokepoint to Crisis - #190

    Two weeks ago on Reimagining Cyber, we explored how agentic AI could become the next major security choke point. Since then, things have escalated. Enterprises are restricting — even banning — AI agents. Security teams are scrambling to regain visibility. Vendors are rushing out “agent security” features. And early warning signs are already surfacing. In this episode, Tyler Moffitt answers the critical question: Did agentic AI just move from innovation to crisis? What changed in just a matter of weeks? This discussion breaks down: Why AI agents are fundamentally different from traditional automation and service accountsHow autonomous reasoning + persistent system access creates a new attack paradigmThe identity and API sprawl problem most organizations didn’t realize they hadWhy compromised agents could give attackers automation at scaleThe growing wave of enterprise bans — and what they signalWhether regulation or a high-profile incident is likely to come firstTyler explains how agents don’t just generate responses — they take action. They hold API keys, access internal systems, modify code repositories, interact with cloud infrastructure, and execute workflows. When deployed without guardrails, logging, or least-privilege controls, they can quietly multiply an organization’s attack surface overnight. The core issue isn’t that AI is malicious — it’s that AI has become an acceleration layer. And when autonomy meets overprivileged access, traditional security models break. You’ll also hear practical, immediate steps security teams should be taking now — from credential rotation and agent inventories to sandboxing and behavioral monitoring. This isn’t an anti-AI episode. It’s a maturity wake-up call. Because the organizations that build guardrails now will move faster and safer. The ones that don’t may learn the hard way. If you’re a CISO, security architect, developer experimenting with agents in production, or executive evaluating AI adoption — this is a conversation you can’t afford to miss. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    14 min
  7. DORA's First Year: What Happened? - #189

    FEB 18

    DORA's First Year: What Happened? - #189

    One year after the Digital Operational Resilience Act (DORA) came into force, what has actually changed? In this follow-up episode of Reimagining Cyber, Rob Aragao welcomes back Dominic Brown of Graveslight Consulting to assess the reality of DORA in practice. Last time, the regulation was looming. Now, firms across the EU — and global financial institutions operating within it — have been living with it. The conversation explores: Why DORA was designed as a systemic risk regulation — not just a compliance exerciseWhere firms struggled during year one, from immature ICT governance to gaps between policy and practiceHow regulators have responded — and why patience may be running outThe impact of Level 2 Technical Standards, including threat-led penetration testing under the TIBER-EU methodologyWhat ICT third-party risk management really means for cloud providers and subcontracting chainsWhy resilience is becoming both a supervisory priority and a competitive differentiatorWhy DORA may set a precedent for future resilience regulation worldwideThe impact on organisations with a global footprintWith enforcement expectations rising and supervisory scrutiny intensifying, year two marks the shift from preparation to proof. Boards, CISOs, and technology providers alike will need to demonstrate that operational resilience works in practice — not just on paper. If year one was about Europe adapting to DORA, year two is about the world responding to it. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    20 min
  8. Agentic AI and the New Security Choke Point - #188

    FEB 11

    Agentic AI and the New Security Choke Point - #188

    Agentic AI is moving fast — and it’s changing how risk shows up inside modern organizations. Autonomous AI agents are no longer just answering questions. They’re wired into cloud consoles, internal tools, ticketing systems, and finance platforms, acting on our behalf with real permissions and real consequences. And in the rush to automate, many teams are quietly centralizing access in ways security models were never designed to handle. In this episode, Ben sits down with Tyler Moffitt to break down what’s actually happening with agentic AI, why security teams are raising red flags, and how incentives around speed, automation, and scale are reshaping risk. They explore over-permissioned agents, token hygiene failures, broken separation of duties, and why AI agents are becoming the new security choke point. The conversation also looks at how attackers are already using agentic AI to operate at machine speed — and what defenders can do now to design systems that assume compromise rather than perfection. If you’re building, deploying, or securing AI agents, this is a conversation you can’t afford to miss. As featured on Million Podcasts'  Best 100 Cybersecurity Podcasts   Top 50 Chief Information Security Officer CISO Podcasts  Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com

    15 min
5
out of 5
19 Ratings

About

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on MillionPodcasts'  Best 100 Cybersecurity Podcasts https://www.millionpodcasts.com/cyber-security-podcasts/ Top 50 Chief Information Security Officer CISO Podcasts https://www.millionpodcasts.com/ciso-podcasts/ Top 70 Security Hacking Podcasts https://www.millionpodcasts.com/security-hacking-podcasts/

You Might Also Like