Discover
Security Cocktail Hour

Security Cocktail Hour
Author: Joe Patti and Adam Roth
Subscribed: 3Played: 9Subscribe
Share
© Joe Patti and Adam Roth
Description
Security veterans Joe Patti and Adam Roth welcome a diverse lineup of cybersecurity and information security experts to share their insights at the virtual bar. From cutting edge topics like AI and Operational Technology (OT) to the realities of careers and mental health, you'll get the inside view of what's happening across the industry and what it's really like to work in these fields, from the people who do it every day.
Reach us at feedback@securitycocktailhour.com or @SecCocktailHour on Twitter.
63 Episodes
Reverse
Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals.In this episode:🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese hackers created "Villager" - the AI version of Cobalt Strike 🔹 Why traditional cybersecurity is failing against AI attacks 🔹 How attackers weaponize your own AI against you 🔹 The dark web's "AI as a Service" marketplace 🔹 Real-time deep fakes so realistic they fool security experts 🔹 AI governance frameworks 🔹 Why every organization needs agentic AI for defense 🔹 The future of cybersecurity careers (spoiler: humans aren't going away)Guest info: Karin LagzielLinkedIn: https://www.linkedin.com/in/karinlags/ Sygnia: https://sygnia.coHow are you preparing for AI-enabled cyber attacks? Tell us in the comments. 👇
Forbes 30 Under 30 cybersecurity expert Yevheniia Broshevan discusses crypto security challenges, bug bounty programs, and the reality that 95% of Bitcoin has been mined while 11-18% is lost forever.🔥 What You'll Learn:The concerning trend in crypto losses hitting $3 billion this year aloneHow bug bounties in Web3 can reach up to $10 million for critical vulnerabilitiesHow operational security failures cause more crypto thefts than code vulnerabilitiesWhy diversification is critical when storing digital assetsThe reality behind crypto kidnappingsReal-world asset tokenization and the future of digital assetsKey management best practices🎯 Guest Spotlight:Yevheniia Broshevan – Co-Founder and CEO of Hacken, Forbes 30 Under 30 honoree, and Web3 security pioneer who has been active in crypto since 2014. Hacken, an end-to-end security and compliance partner for digital assets, has conducted security assessments for over 2,000 clients and operates a community of 50,000+ ethical hackers who have identified vulnerabilities worth millions.💡 Key Takeaways:Access control issues and private key leakage cause majority of crypto hacksBug bounties in crypto can reach 5-10% of potential losses (millions in payouts)Hardware wallets, diversification, and proper key management are essentialThe industry lost $2.5 billion last year, $3 billion this year - trend is acceleratingPhishing and social engineering remain the weakest links in crypto security🚨 Critical Security Insights:From penetration testing blockchain protocols to smart contract audits, Yev reveals the hidden vulnerabilities that put billions at risk. Whether you're a crypto investor, security professional, or curious about Web3 technology, this conversation delivers actionable intelligence you can't afford to miss.💬 Comment: What's your biggest crypto security concern?Follow the Security Cocktail Hour podcast:Website: https://securitycocktailhour.comLinkedIn: https://www.linkedin.com/company/security-cocktail-hour/Twitter/X: @SecCocktailHourInstagram: https://www.instagram.com/seccocktailhour/Guest Links:Yevheniia Broshevan LinkedIn: https://www.linkedin.com/in/broshevan/Hacken: https://hacken.io#CryptoSecurity #Web3Security #Blockchain #Cybersecurity #DigitalAssets #SmartContracts #CryptoHacking #BugBounty #Web3 #SecurityPodcast #Forbes30Under30 #EthicalHacking #PenetrationTesting #CryptoWallet #KeyManagement #SecurityAudit #DeFi #Cryptocurrency
Ever wondered what that mysterious "WiFi Pineapple" device from hacker movies actually does? Today we're unboxing the Hak5 WiFi Pineapple Mark 7 - the real penetration testing tool that's been featured in countless TV shows and movies!🔥 What We Cover:Complete unboxing of the WiFi Pineapple Mark 7How hackers use this for man-in-the-middle attackWhy you should be worried about fake WiFi hotspotsReal-world scenarios where this could be deployedEthical penetration testing applications⚠️ STAY SAFE: This video is for educational and ethical penetration testing purposes only. Always use these tools responsibly and only on networks you own or have explicit permission to test.For a discussion on these tools and the ethics of using them, listen to Episode 6: https://creators.spotify.com/pod/profile/security-cocktail-hour-po/episodes/Ep--6-Flipper-Zero-and-Other-Totally-Legit-Hacking-Tools-e2bsa4iFor more unboxing videos of hacking and cybersecurity devices, check out this episode:https://creators.spotify.com/pod/profile/security-cocktail-hour-po/episodes/Ep--58-Travel-Router-Unboxing-Dont-Get-Hacked-on-Vacation-e36dgrf#WiFiPineapple #Hak5 #CyberSecurity #PenetrationTesting #Unboxing #InfoSec #EthicalHacking #SecurityCocktailHour
Back in Episode 54 we talked about vacation cybersecurity, including the dangers of hotel WiFi and public networks. Today we're unboxing the travel router that could save your digital life while traveling (or at least save you a lot of grief).🚨 Why You NEED This:Hotel WiFi is a hacker's playground. From man-in-the-middle attacks to data theft, public networks are incredibly dangerous. This tiny device creates your own secure network bubble wherever you go!🏨 Real Vacation Scenarios:Hotel room internet securityAirport lounge protectionCoffee shop safetyAirbnb and rental property networksInternational travel considerations
It takes an advanced degree to understand the psychology behind why users hate security controls, so we got someone with two: Dr. Nikki Robinson, DSc Cybersecurity, PhD Human Factors. Nikki joins us to break down the real reasons security implementations fail—and how to fix them.What You'll Learn:🔹Why vulnerability scoring goes wrong (hint: it's not the tech)🔹How to get 99% patching rates through automation🔹The psychology behind user resistance to security controls🔹Why developers say "I can't implement secure code" (and what to do about it)🔹Human factors engineering for cybersecurity practitionersReal-World Insights:♦️From 60% to 99% vulnerability remediation in 6 months♦️Why 600-page security policies guarantee failure♦️The empathy approach to security policy enforcement♦️API sprawl and agentic AI risks keeping security pros awakeDr. Robinson combines IT operations experience with advanced degrees in cybersecurity and human factors psychology. Her research reveals why traditional security approaches create resistance—and practical frameworks that actually work.She also schools us in how to make a tequila sunrise (technique matters!)
Why would a hacker at the top of his game who found dozens of zero-days switch to defense? The answer is a lot more complicated than you think. In this fascinating episode, we sit down with Cody Pierce, co-founder and CEO of Neon Cyber and former Zero Day Initiative researcher. Cody gives us an insider view into the exploit marketplace, and tells us why he went from offense to defense.🎯 WHAT YOU'LL DISCOVER:✅ The REAL difference between vulnerabilities and exploits (most people get this wrong)✅ Why attackers "bank" zero-days instead of using them immediately✅ The shocking economics behind exploit marketplaces ($50K to nearly worthless in seconds)✅ How nation-state attacks actually work (it's not what you think)✅ What happened with Cody's own USB hacking tool✅ What motivated Cody to change his approach to ecruityPerfect for: Cybersecurity professionals, ethical hackers, IT managers, security researchers, students, and anyone curious about the real world of cyber warfare#Cybersecurity #Podcast #ZeroDay #EthicalHacking #InfoSec #InformationSecurity #CyberWarfare #SecurityResearch #Vulnerabilities #Exploits #CyberDefense #ZeroDayInitiative #CyberEthics
Join us for a special episode of the Security Cocktail Hour as co-hosts Joe Patti and Adam Roth sit down with cybersecurity legend Paul Asadoorian—founder of Security Weekly and Principal Security Evangelist at Eclypsium. With more than two decades of experience, Paul brings his unique mix of deep technical knowledge and podcasting charisma to discuss firmware vulnerabilities, supply chain risks, and the overlooked attack surfaces hiding in your hardware. And he literally--and we do mean literally--brings fire to the show.🎙️ In This Episode:• Paul’s journey to becoming a leading voice in cybersecurity—and how he found a career he truly loves• Why firmware and supply chain security are the hidden battlegrounds of modern cyber defense• This might finally be the Year of the Linux Desktop.Paul's podcasts:Paul's Security Weekly: https://www.scworld.com/podcast-show/pauls-security-weeklyBelow the Surface Podcast: https://eclypsium.com/podcasts/
Got big travel plans this summer? Remember to pack some protection against cyber threats. In this episode of the Security Cocktail Hour podcast, hosts Joe Patti and Adam Roth break down the real cybersecurity threats you face when using hotel Wi-Fi, airport chargers, and public networks—and what you can do to stay safe.Learn about:• Why public Wi-Fi is more dangerous than you think• The truth about VPNs—and what they don’t protect• USB “condoms,” OMG cables, and travel routersWhether you’re a casual traveler or a frequent flyer, join us to learn how to keep your long-awaited vacation free from cyber headaches. 💬 Comment and follow us for the latest on cybersecurity from industry experts. 📌 Got a question or topic idea? Drop it in the comments—we just might feature it in an upcoming episode.#Podcast #Cybersecurity #InformationSecurity #Infosec #TravelTips #VPN #WiFiSecurity #USBCondom #DigitalSafety #PublicWiFi
In this episode of Security Cocktail Hour, we go deep into the high-stakes world of modern cyber incident response (IR) with Lisa Landau and Tim Shipp of ThreatLight—two top-tier experts redefining how breaches are handled today.Discover how IR has evolved—and why the old playbook no longer works.What you’ll learn:• Why speed is everything in breach response• Why incident response isn’t about flying on-site anymore• How top teams manage the intense stress of IR• Why cybercriminals operate like businesses—and how to outsmart them• Why tools alone aren’t enough—and what your team really needsWhether you’re defending a Fortune 500 company or just want to understand how real cyber incidents unfold, you’ll hear directly from the professionals who lead real-world breach responses under pressure.📎 Learn more about ThreatLight: https://www.threatlight.com
Selling six-figure security solutions isn’t about flashy demos or steak dinners—it’s about trust, relationships, and delivering real value. In this episode of the Security Cocktail Hour, we go inside the world of cybersecurity sales with Trevor Marcotte, founder of TnK Tech and a longtime industry insider.Trevor reveals how deals actually get done in the high-stakes world of cybersecurity—from building trust with IT buyers and CISOs to navigating complex vendor relationships and solving real problems for clients. Alongside co-hosts Joe Patti and Adam Roth, Trevor shares why people matter more than products, and how trust beats tools every time.Visit TnK Tech at https://tnkgoattech.com💬 Tell us in the comments about the good and bad relationships you've had with sales people.#Cybersecurity #InfoSec #InformationSecurity #Podcast #TechSales
Agentic AI is changing the game—but is it a security nightmare in the making? In this episode of the Security Cocktail Hour, co-hosts Joe Patti and Adam Roth sit down with Kevin O’Connor to dive into one of the hottest (and most misunderstood) topics in cybersecurity: Agentic AI Security.Join us to learn:✔️ What agentic AI actually is—and why it’s exploding in popularity✔️ The real security risks that come with AI agents running wild in business environments✔️ How cybercriminals can hijack AI agents for fraud, misinformation, and even weaponizing data✔️ Why agentic AI could be the new Shadow IT, operating outside security teams’ control✔️ How companies can secure AI-powered automations before they become the next major attack vectorAs businesses rush to adopt AI-driven assistants, chatbots, and automation tools, are they unknowingly opening the floodgates to massive security risks? And can we actually defend against it?Watch now to get ahead of the next AI security challenge!Kevin joins us from ZenityLearn more about Securing Agentic AI from Zenity Labs - No Sales, No Marketing, Just the Researchhttps://labs.zenity.io/Get in on the conversation - The Industry’s First Agentic AI Security Summithttps://www.zenity.io/resources/events/ai-agent-security-summit-2025/Do you think AI agents will turn everyone into a software developer? Tell us in the comments.
Ever wondered what it's like to lead cybersecurity on the front lines? In this episode of Security Cocktail Hour, we sit down with Keren de Via, a former IDF officer and trailblazing Chief Information Security Officer (CISO), who shares her extraordinary journey from military leadership to navigating the complex world of corporate cybersecurity.Join hosts Joe Patti and Adam Roth as they dive deep into Keren's experiences leading cybersecurity for front line units, where security decisions carry the highest stakes. From adapting military strategies to the boardroom to redefining leadership in the cybersecurity landscape, Keren's insights are a masterclass in resilience, agility, and innovation.Tell us about some of the toughest decisions you've made in the comments!#Cybersecurity #Leadership #CISO #InformationSecurity #RiskManagement #Podcast #CyberLeadership #Innovation #HighStakesDecisions #CyberResilience
If you thought the tech industry only wanted your money, think again -- they're coming after your mind. Guest Winn Schwartau describes how in his new book "The Art and Science of Metawar: How to Coexist With AI-Driven Reality Distortion, Disinformation, & Addiction". Join us to learn what Metawar is, how we can protect ourselves with cognitive defenses and why immediate action is crucial, because it's already begun.To get right into the discussion of Winn's book, jump to 6:03Buy the book at Amazon https://a.co/d/5JEA9LuVisit Winn at his website and follow him on social mediaWeb: https://www.winnschwartau.com/LinkedIn: https://www.linkedin.com/in/winnschwartau/Instagram: https://www.instagram.com/winnschwartau/X: https://x.com/winnschwartauTikTok: https://www.tiktok.com/@officialwinnschwartauAnd follow us too!LinkedIn: https://www.linkedin.com/company/security-cocktail-hourInstagram: https://www.instagram.com/seccocktailhour/Web: https://securitycocktailhour.comDrop us a comment and tell us if you want to see more authors talking about their books!#informationsecurity #infosec #podcast #cybersecurity #metawar #books
Previous guest Jennifer Gold returns for another episode, and this time she's brought friends: cyber and intelligence veterans Patrick Arvidson and Roger Hockenberry. Together, they delve into the evolving world of cybersecurity, sharing insider perspectives from the CIA, NSA, and the private sector. Hear about:🕶 Why Fridays and holidays are prime time for ransomware attacks💡 The commoditization of intelligence🎯 Practical strategies to prevent, detect, and respond to cyber threatsLearn how attackers exploit weekends, discover the real cost of third-party risks, and uncover why “intelligence” might not always mean what you think. Plus, hear about the creative side of coding, retro hacking nostalgia, and the challenges of managing risk in a hyperconnected world.If you’re ready for a blend of expert advice, engaging banter, colorful drinks and Hawaiian shirts, be sure to join us. And don’t forget to drop us a comment and follow the podcast.#informationsecurity #infosec #cybersecurity #podcast #ransomware #threatintelligence #hacking
You need experience to get even an entry level job, but how to do you get a job if you don't have experience? For years this classic dilemma didn't apply to cybersecurity, but times have changed. Newly minted security consultant Jerry Sinayuk of NukuDo tells us how he got trained and is lining up his first consulting engagements -- all while getting paid. Join us to learn about this new approach to breaking into a high-tech industry that's actually centuries old.And if that isn't enough to hit a lot of keyword searches, Jerry also shares his passion for blockchain technology and gives his unvarnished opinion on NFT's.Put your questions on cyber security hiring in the comments, and Joe and Adam will respond with the wisdom of their many years in the field. And don't forget to share and tell your friends.Check out NukuDo, Jerry's company, and their program at https://nukudo.com.Show your support for the podcast with official Security Cocktail Hour merch: Shirts, mugs and more at https://securitycocktailhour.com/store#informationsecurity #infosecurity #cybersecurity #podcast #cyberjobs #securityjobs #blockchain #nft #bitcoin #cybercurrency #training
Artificial intelligence is revolutionizing industries, and cybersecurity experts are navigating uncharted territory to keep pace. In this episode of the Security Cocktail Hour podcast, Alec Crawford, Founder and CEO of AI Risk, Inc., joins co-hosts Joe Patti and Adam Roth for a dive into the practical, technical, and ethical challenges of AI - including some surprises nobody saw coming, as well as what an adversary can do with a drone. From early work with neural networks to cutting edge large language models, Alec shares the challenges he's taking on to secure today’s generative AI models.Highlights include:🔒 Vulnerabilities AI introduces to corporate environments🔒 Creative and unexpected ways hackers are manipulating AI systems🔒 Why regulating AI is so challenging—and what might work betterFor more insights from Alec, tune into his podcast, AI Risk-Reward or visit AI Risk, Inc..#InformationSecurity #Infosec #Cybersecurity #Podcast #ArtificialIntelligence #AI #GenAI #GenerativeAI #Hacking #TechInnovation #Regulation #TechRegulation #Drone
This holiday season, don’t let scams ruin the festive spirit! In this special holiday episode of the Security Cocktail Hour, co-hosts Joe Patti and Adam Roth break down the most common holiday scams, from the classics to the sneaky new ones you’ve never heard of. From fake gift card requests to sophisticated AI-driven scams, we’ll teach you how to stay one step ahead of the scammers.🎄 What you’ll learn: How scammers exploit holiday stress and generosity The latest tricks using AI and malware Real-life examples of scams and how to avoid themWhether you’re buying gifts, traveling, or just enjoying the holidays with family, these practical tips will help you protect yourself and your loved ones.And to really up your security game, check out our new store for Security Cocktail Hour clothing and gear at https://securitycocktailhour.com/store.Leave a comment with your experiences or questions about scams!Stay safe, stay smart, and have a happy holiday season! 🎁#informationsecurity #infosec #cybersecurity #podcast #ai #artificialintelligence #giftcardscam #HolidayScams #StaySafe
Are your organization's security gaps leaving the door wide open for attackers? In this episode of the Security Cocktail Hour podcast, co-hosts Joe Patti and Adam Roth sit down with seasoned penetration tester and identity security expert Jason Luttrell.Jason shares fascinating stories from his days of hacking banks, infiltrating data centers, and even dumpster diving, all legitimate work for his customers, to expose the vulnerabilities they never knew existed. Discover why physical security is just as critical as digital defenses and how attackers exploit overlooked entry points.Later, the discussion shifts to the evolving landscape of identity management and why protecting access credentials is the cornerstone of modern cybersecurity. Learn about the latest best practices for managing passwords, including the use of password managers, multi-factor authentication (MFA), and techniques to avoid common pitfalls you may be using. Plus, hear Jason's take on emerging alternatives like passkeys and why they might still be a long way from replacing passwords entirely.Topics Covered: Real-life hacking stories from the frontlines of cybersecurity. The terrifying ease of bypassing weak physical security. Why "passwords must die" and what might replace them. How identity security can make or break your defenses. Practical tips for protecting your organization today.💡 Ready to level up your cybersecurity game? Follow us, and join the conversation in the comments. What’s your take on Jason’s bold claim about the future of identity security? Let us know!
In this episode, leadership trainer, EMT, and former NYPD officer Mike Chanat joins us for a dive into the unique cybersecurity challenges facing EMTs and other first responders. Mike flips the script on hosts Adam Roth and Joe Patti, asking them to share realistic cybersecurity tips that protect both medical responders and their patients. And Mike shows us how the focus on communication, mindset and empathy he brings to his students will also make a difference in cybersecurity.Whether you’re in emergency services or want to see us demystify another corner of cybersecurity, tune in to see how security pros adapt solutions to real-world challenges.👉 What do you think is the biggest cyber risk for first responders? Drop your thoughts in the comments!👉 Follow us for more insights into cybersecurity across diverse fields.#informationsecurity #infosec #cybersecurity #podcast #emt #emtsecurity #healthcarecybersecurity #patientdataprotection
Organized retail crime is more complex than you might think—it's not small-time shoplifting, it's big business run by bad people. In this episode, Doug Horsting, a loss prevention expert from a major retail chain, and Dean Takacs, CEO of Detective Analytics, join hosts Joe and Adam to reveal how they're using technology to enhance traditional investigation techniques to keep up with increasingly bold and sophisticated criminals. Discover how AI, data, and most importantly, trust and collaboration with law enforcement are transforming retail loss prevention, and what cybersecurity experts in the digital world can learn from their success.🔗 NYPD Neighborhood Policing: https://www.nyc.gov/site/nypd/bureaus/patrol/neighborhood-coordination-officers.page🔗 NYC Retail Theft Task Force: https://www.nyc.gov/assets/home/downloads/pdf/office-of-the-mayor/2023/combating-retail-theft-report-may-17-2023.pdf🔗 Data Analytics: https://www.detectiveanalytics.com/👉 Follow us for more expert insights from the front lines of cybersecurity.#informationsecurity #infosec #cybersecurity #podcast #ai #artificialintelligence #retailcrime #organizedretailcrime #lossprevention #lawenforcement #crimeanalytics #retailsecurity #crimetech #datasecurity #communitysafety