Simplifying Cyber

Aaron Pritz, Cody Rivers

This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.

  1. AI & Cybersecurity: Balancing Risk & Innovation

    DEC 17

    AI & Cybersecurity: Balancing Risk & Innovation

    This week on Simplifying Cyber, Aaron Pritz and Cody Rivers sit down with Jax Scott — combat veteran, podcast host (Two Cyber Chicks), and VP of Cybersecurity at Pearson — for a conversation that’s equal parts leadership, risk reality, and “why is everyone still confused about BISOs?” Jax shares her unconventional path into cybersecurity (perfume sales → special operations → NATO cyber strategy → Mandiant → Capital One → consulting → Pearson), then breaks down what BISOs/CISOs do when done right: The “single point of contact” that connects business teams to security outcomesWhy risk management is the glueWhy the best security leaders aren’t always the most technical (and how technical instincts can backfire)Then we go headfirst into the AI debate: Where automation helps most in compliance (evidence collection, mapping, reducing manual slog)Where humans stay essential (judgment calls, accountability, trust-building)The uncomfortable truth: if we outsource all thinking to AI, we may literally get worse at thinkingWe wrap with practical guidance on: Handling volatile regulatory changes (like DR/IR requirements) with flexible plans + frequent testingThe reality of CMMC: why it’s not “new,” why enforcement matters, and why last-minute scrambles burn everyone outHow to lead teams through chaos with transparency, empathy, and real talkAnd finally: Jax drops a fun fact that honestly explains a lot about her calm energy. Listen now wherever you get your podcasts. Key topics covered What a BISO/VISO is (and how to explain it to non-security leaders)Critical thinking + EQ as security superpowersAI in compliance/GRC: automate the boring, keep the human judgmentIR/DR planning for shifting rules and requirementsCMMC realities for the defense industrial baseLeadership during change fatigue🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    44 min
  2. Cybersecurity and Food Systems

    NOV 25

    Cybersecurity and Food Systems

    Cyber attacks don’t just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply.  We sat down with Kristin (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adversaries increasingly target. From GPS-guided tractors to sensor-packed dairy parlors, the farm has become an edge-compute environment where ransomware and misconfigurations have real-world consequences you feel at the store and at the table. Kristin traces her journey from IT into plant floors and incident response, revealing why security wasn’t designed into most food and ag systems and what that means for resilience. We explore the most common attacks—phishing, ransomware, and DDoS—and why they hit harder here than in other sectors. She shares a clear-eyed look at co-op breaches, invoice scams that exploit older operators, and thorny questions about who owns farm-generated data. We also step into underreported territory: radical activism and agroterrorism tactics like doxxing, deepfakes, and drone footage that act like insider threats and can devastate small producers. You’ll hear practical, low-cost steps that make a difference fast: fold digital checks into safety routines, change default passwords, map critical assets, plan for backup and recovery, and vet vendors with a security-by-design lens. Kristin previews her upcoming Wiley book, "Securing What Feeds Us," which blends systems thinking, OT realities, and grounded business guidance to help leaders connect incidents to food safety and supply outcomes. If you care about cybersecurity, food safety, or just want your groceries to show up reliably, this conversation connects the dots. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    36 min
  3. Who’s That CISO? Allan Alford vs. Himself on Simplifying Cyber

    OCT 1

    Who’s That CISO? Allan Alford vs. Himself on Simplifying Cyber

    How does a CISO react to a live deepfake? In this eye-opening conversation with Alan Alford, CISO at NTT Global Data Centers, we kick off with a live deepfake demonstration that showcases the capabilities and limitations of this emerging technology. The demonstration serves as a springboard into a crucial discussion about the genuine threat deepfakes pose to organizations. While video deepfakes capture headlines, Alan reveals why audio deepfakes currently present the more dangerous and immediate risk vector for businesses. From CEO impersonation for fraudulent wire transfers to political misinformation campaigns, these technologies are already being weaponized in ways many security teams haven't prepared for. Our conversation takes an unexpected turn as Alan challenges one of cybersecurity's most persistent myths: that humans represent the "weakest link" in security. Instead, he champions the workforce as our strongest allies, sharing how simple recognition programs created security champions throughout his organization. His approach connects workplace security to employees' personal lives, dramatically increasing engagement and effectiveness. Alan offers a masterclass in balancing innovation with security, explaining how his organization approaches AI adoption through mandatory training programs and a top-down commitment from leadership. His race car analogy perfectly captures this balance: good security controls are like high-performance brakes that don't just slow you down—they enable you to take corners faster. For security leaders feeling overwhelmed by AI, Alan provides practical starting points that any organization can implement today. From experimenting with AI for personal hobbies to creating automated security reports through carefully crafted prompts, these small steps can build confidence and competence before tackling larger initiatives. Whether you're concerned about deepfake threats, searching for more effective security awareness approaches, or looking to safely implement AI in your organization, this conversation delivers actionable insights from a CISO who's successfully navigating these challenges daily. Listen now to transform how you think about humans, technology, and security in our rapidly evolving digital landscape. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    41 min
  4. Crocodiles in the Board Room! With Andy Ellis

    SEP 23

    Crocodiles in the Board Room! With Andy Ellis

    What makes a truly effective security leader in today's complex threat landscape? In this enlightening conversation with Andy Ellis, former CISO of Akamai Technologies and author of "1% Leadership," we explore how the role of the security executive has transformed from a technical specialist to a strategic business enabler. Andy shares his remarkable journey from Air Force information warfare specialist to becoming Akamai's first security hire, where he spent 20 years building a multi-billion dollar security business within the infrastructure company. His unique perspective challenges conventional thinking about security leadership, organizational structure, and how security teams should communicate risk to the broader business. "Your job as a security professional is really to enable the business to make wiser risk choices," Andy explains, reframing the security function away from being the department of "no" to becoming a trusted advisor that helps organizations understand and navigate risks effectively. Using colorful analogies about crocodiles in the boardroom, he illustrates why security leaders should focus on making relevant risks believable rather than raising alarms about threats that don't align with business priorities. We dive deep into the evolution of the CISO role, discussing why the traditional reporting structures may be outdated and how smaller companies are blending security leadership with IT functions as traditional infrastructure moves to SaaS. Andy challenges security professionals to understand why controls exist rather than just implementing them, asking three critical questions: "What is the real reason you do this? Could we stop? What should we do differently?" Whether you're an aspiring security leader or a seasoned CISO, this conversation offers valuable insights on leadership, communication, and how to deliver real security value in an increasingly complex digital landscape. Listen now to learn how small, incremental improvements in your leadership approach can transform your security program's effectiveness and business impact. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    38 min
  5. Cybersecurity and User Experience

    SEP 9

    Cybersecurity and User Experience

    WATCH this episode on our YouTube channel!  Ever wondered why employees keep finding ways around your security controls? The answer might lie in how those controls are designed and implemented. In this thought-provoking episode, we're joined by Matt Belanger, CIO of Republic Airways, to tackle one of cybersecurity's most persistent challenges: the friction between security requirements and user experience. When security measures become obstacles rather than enablers, "cyber erosion" occurs – users find workarounds that often create more risk than what you were trying to prevent in the first place. Through candid stories from the corporate trenches, we explore common friction points: problematic MFA rollouts, alert fatigue, vague policies, and the blocking of useful tools like cloud storage and AI platforms. Matt shares how communication breakdowns during technology transitions led to adoption failures, while host Todd recalls field workers deliberately damaging devices they believed were tracking them – powerful examples of what happens when security ignores human factors. The conversation shifts from problem to solution as we examine how design thinking principles can transform security implementations. Matt advocates for extending expectations of cyber professionals beyond technical expertise to include empathy and communication skills. As he powerfully states: "So often you hear about the trade-off... Do we want to make this secure or do we want to make this easy to use? And the answer is yes – it is a requirement to both be secure and easy to use." Ready to build security that people actually want to use? Listen now and discover why sometimes you need to slow down to ultimately secure your organization faster. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    36 min
  6. Third-Party Risk Management in Healthcare

    AUG 25

    Third-Party Risk Management in Healthcare

    Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a pioneering third-party risk management platform offers a fascinating perspective on cybersecurity evolution. He shares how his side project—identifying indicators of vendor cyber health through internet-accessible information—grew from 30,000 lines of weekend code into a successful enterprise now providing crucial breach insights. The data tells a compelling story: organizations with good cybersecurity hygiene experience breach events at rates four to six times lower than those with poor practices. Yet many companies still chase sophisticated security solutions while neglecting fundamentals like secure remote access, proper network filtering, and effective identity management. As Kelly puts it, "If you don't have those foundations in place, you don't have much to build on." We explore AI's emerging role in third-party risk management, where it shows tremendous promise in automating questionnaire reviews and helping security professionals focus on meaningful risk treatment rather than administrative tasks. Kelly's advice for security leaders rings especially true: "Don't try to script your career so tightly that you're not open to opportunities," and remember that "growth begins where comfort ends." Whether you're a healthcare security professional, a CISO working with limited resources, or someone interested in the intersection of risk management and emerging technologies, this conversation offers invaluable insights from someone who's successfully navigated the cybersecurity landscape from practitioner to entrepreneur. Listen now to transform how you think about security fundamentals and third-party risk! 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    22 min
  7. Meet the Security Awareness Apologist

    AUG 18

    Meet the Security Awareness Apologist

    What happens after an employee clicks on a phishing link? Jason Hoenich (hey-nick), the self-proclaimed "Security Awareness Apologist," believes that's where the real education begins. Drawing from his experiences at major entertainment companies like Disney and Sony, Jason shares how live hacking demonstrations where employees witness real-time compromises create powerful, unforgettable learning moments. The conversation dives deep into why traditional security awareness approaches fall short. While phishing simulations and generic training modules check compliance boxes, they rarely drive meaningful behavior change. The most effective programs go beyond making people aware of threats—they make secure behaviors easy and intuitive while building a security-conscious culture from the ground up. One of Jason's most compelling insights revolves around relationship-building. Security awareness professionals who form strategic partnerships with HR, Legal, and Corporate Communications unlock unprecedented program potential. These connections transform potential roadblocks into champions who help tailor messaging and navigate brand considerations when creating engaging content. Security champion programs emerge as another powerful strategy for organizations with global or diverse workforces. By identifying influencers throughout different business units and locations, security teams can extend their reach and ensure messaging resonates across various cultures and job functions. These champions provide invaluable feedback while translating technical concepts into language that connects with their colleagues. The future of human risk management lies in personalization and actionable insights. Rather than just identifying risky behaviors, advanced tools should offer immediate remediation options—imagine a system that not only alerts an employee to unsecured files but offers a one-click solution to fix the vulnerability instantly. Ready to transform your security awareness program? Start by assessing your program's maturity and developing a comprehensive strategy that goes beyond basic tools. Remember Jason's advice: "Strategy, strategy, strategy. If you don't have one, work on it." Your journey toward meaningful security awareness begins with this episode. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    40 min
  8. Cybersecurity Mergers & Acquisitions - Crown Jewels and Red Flags

    AUG 11

    Cybersecurity Mergers & Acquisitions - Crown Jewels and Red Flags

    Ever wonder what lurks beneath the surface of that shiny acquisition target? Our expert panel, featuring M&A Expert Brandon Kern, pulls back the curtain on the hidden cyber risks that can make or break your next deal. When companies merge or acquire, cybersecurity considerations often take a backseat to financial projections and market synergies. Yet overlooking digital vulnerabilities can transform a strategic investment into a costly liability. In this revealing conversation, corporate veterans and M&A specialists share battle-tested strategies for conducting effective cyber due diligence without derailing deal momentum. The discussion kicks off with a practical comparison: cyber due diligence functions much like a home inspection when purchasing property. Just as you wouldn't commit to buying a house without checking for structural damage, acquiring a business without assessing its cybersecurity posture can lead to expensive remediation costs or even devaluation of critical assets. Our experts emphasize focusing on the "crown jewels" – the specific intellectual property, customer data, or technology capabilities that motivated the acquisition in the first place. Timing emerges as a crucial factor throughout the conversation. Bringing in cybersecurity professionals early provides opportunity to identify risks that might affect valuation or negotiation terms. However, the panel acknowledges the delicate balance between thorough assessment and maintaining deal momentum. They share practical approaches for prioritizing critical issues while deferring less immediate concerns to post-close planning – allowing security to enable rather than impede business objectives. The conversation also addresses often-overlooked aspects of M&A cybersecurity, including third-party relationships that come with the acquisition, organizational change management to reduce resistance, and strategies for maintaining business continuity during integration. With firsthand experience from both corporate and consulting perspectives, our experts provide a comprehensive playbook for protecting deal value through strategic cybersecurity planning. Whether you're a corporate development executive, private equity investor, or security leader supporting M&A activities, this episode delivers actionable insights for your next transaction. Listen now to learn how proper cyber due diligence can safeguard your investments and accelerate post-merger integration. 🔗 Connect with Us & Get in Touch Tune in to Simplifying Cyber wherever you get your podcasts, or watch exclusive video content right here on the channel. Subscribe for hot takes on emerging technologies, tips and tricks for everyone looking to stay secure, and in-depth conversations about complex cybersecurity topics. No gatekeeping and no BS. We’re here to simplify. Official Website: www.revealrisk.com LinkedIn: https://www.linkedin.com/company/reveal-risk 🤘 Stay Secure with Us If this content helped you understand cybersecurity better, please give it a thumbs up, subscribe to our channel for more expert insights, and hit the notification bell so you don't miss our latest updates. Reveal Risk delivers cybersecurity results, not just reports.

    27 min
5
out of 5
17 Ratings

About

This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.