Discover
Security Confidential
Security Confidential
Author: Dark Rhiino Security
Subscribed: 17Played: 377Subscribe
Share
© Dark Rhiino Security
Description
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
238 Episodes
Reverse
#SecurityConfidential #DarkRhiinoSecurityTiffini Smith is a strategic legal executive and board advisor with over 20 years of experience in privacy, cybersecurity, and AI governance. A U.S. Patent Attorney with bar admissions in the U.S. and England & Wales, she helps organizations navigate everything from breach preparedness to the EU AI Act. Tiffini has led global legal teams and provided global cybersecurity legal advice, including addressing issues such as incident response readiness, vendor risk programs, AI model risk reviews, and board-level briefings, and is known for translating complex legal and cyber risk into actionable guidance for executives. She also authors a newsletter.00:00 Intro02:28 Our Guest05:48 Regulation across states and countries09:48 Cybersecurity regulation culturally14:00 Employee training and teaching them the Why 23:07 How do you mitigate against AI?25:00 CISOs don’t understand how the business works29:11 Does being compliant actually reduce your exposure? 34:00 Regulations on AI in your business50:10 More about Tiffini----------------------------------------------------------------------To learn more about Tiffini visit https://www.linkedin.com/in/tiffini-smith/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
Filip Verloy is a technology leader with over 25 years of experience across enterprise IT, consulting, and global vendors. Currently working on securing Agentic AI for the enterprise, he brings deep expertise in API security, infrastructure, and large-scale complex environments. Before joining Rubrik, Filip served as Global Field CTO at API security startup Noname Security and held senior architecture and solutions roles at Citrix, Dell, Riverbed, and VMware. Known for his curiosity and commitment to understanding the fundamentals behind technology, Filip challenges the “illusion of knowledge” and focuses on building secure, resilient systems from first principles.00:00 Intro02:30 Our Guest05:06 Illusion of Knowledge 07:04 Unknown-Unknowns in AI09:57 Increasing the Attack Surface12:58 Risk in the Age of Agentic AI 17:56 How do you secure that data?25:00 How do we deal with IAM in this world of Agentic AI?31:22 API Security and API Access in Agentic AI39:02 How is the model of consuming surfaces over the internet going to change? 43:00 Agentic AI Governance49:25 More about Filip
#SecurityConfidential #DarkRhiinoSecurityRobert Siciliano is a cybersecurity and identity theft expert, private investigator, and CEO of Protect Now LLC, with over 30 years of experience protecting people and organizations from fraud, social engineering, and cybercrime. Known for closing the “Human Blindspot,” Robert developed the Strategic Human Firewall™ to help individuals and employees recognize and stop manipulation before technology ever fails. A Certified Speaking Professional and #1 bestselling author of multiple books on identity theft and privacy, he is a frequent media expert on CNN, Fox News, and The Today Show. Robert works at the intersection of physical and digital security, helping organizations defend against AI-driven fraud by strengthening the human layer of security.00:00 Intro01:35 Our Guest02:36 Protecting others for an early age05:48 I got hacked in the 90’s09:26 Social Security Numbers on the Dark Web11:00 A Psychological form of denial19:04 The “Human Blindspot”21:00 The Criminals know more about us than we do23:20 Regulatory Compliance25:14 Going through Security with a guide30:03 The Strategic Human Firewall36:00 Change Minds = Change Hearts41:00 Social Engineering: What works?53:31 More about Robert----------------------------------------------------------------------To learn more about Robert visit https://www.linkedin.com/in/robertsiciliano/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityRobert Siciliano is a cybersecurity and identity theft expert, private investigator, and CEO of Protect Now LLC, with over 30 years of experience protecting people and organizations from fraud, social engineering, and cybercrime. Known for closing the “Human Blindspot,” Robert developed the Strategic Human Firewall™ to help individuals and employees recognize and stop manipulation before technology ever fails. A Certified Speaking Professional and #1 bestselling author of multiple books on identity theft and privacy, he is a frequent media expert on CNN, Fox News, and The Today Show. Robert works at the intersection of physical and digital security, helping organizations defend against AI-driven fraud by strengthening the human layer of security.00:00 Intro01:35 Our Guest02:36 Protecting others for an early age05:48 I got hacked in the 90’s09:26 Social Security Numbers on the Dark Web11:00 A Psychological form of denial19:04 The “Human Blindspot”21:00 The Criminals know more about us than we do23:20 Regulatory Compliance25:14 Going through Security with a guide30:03 The Strategic Human Firewall36:00 Change Minds = Change Hearts41:00 Social Engineering: What works?53:31 More about Robert----------------------------------------------------------------------To learn more about Robert visit https://www.linkedin.com/in/robertsiciliano/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMatthew Waddell is an incident response and digital forensics expert with over 25 years of experience helping governments, global enterprises, and small businesses. He has also supported U.S. government counter-intelligence investigations and frontline operations overseas. Today, he’s distilling decades of real-world experience into practical guidance and a new book designed to help organizations survive ransomware with clarity and confidence.00:00 Intro1:25 Our Guest02:02 Working for NASA09:30 Password hygiene is the key 11:38 Passkeys: Good or bad?18:00 If you collect any finances, you’re a target23:30 Bad Actors are practicing on Small businesses27:18 Is A.I accelerating the Ransomware process?29:22 Employee Education Mindset34:23 Physical Security42:57 Calming down the executive team50:11 Survive Ransomware----------------------------------------------------------------------To learn more about Matthew visit https://tacticallysecure.com/survive/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMatthew Waddell is an incident response and digital forensics expert with over 25 years of experience helping governments, global enterprises, and small businesses. He has also supported U.S. government counter-intelligence investigations and frontline operations overseas. Today, he’s distilling decades of real-world experience into practical guidance and a new book designed to help organizations survive ransomware with clarity and confidence.----------------------------------------------------------------------To learn more about Matthew visit https://tacticallysecure.com/survive/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#SecurityConfidential #DarkRhiinoSecurityGrant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board 49:05 More about Grant----------------------------------------------------------------------To learn more about Grant visit https://www.linkedin.com/in/grantasplund/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
Grant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board 49:05 More about Grant
#SecurityConfidential #DarkRhiinoSecurity Daniel Lowrie is a longtime IT and cybersecurity professional with over 20 years of hands-on experience, starting from workstation support and evolving into ethical hacking and security training. Inspired early on by hacker and spy movies, he turned that curiosity into a career focused on popping shells, breaking into systems ethically, and teaching others how it all works. Today, he spends his time learning everything he can about cybersecurity, creating training content, and helping the next generation of cyber professionals grow through speaking, mentoring, and community involvement.00:00 Intro02:20 Our Guest04:40 Getting started in Cyber09:20 Taking inspiration from movies09:40 War Games13:35 First hack18:07 The Path to a Cyber career26:27 Finding bugs early32:36 Secure or Cheap?38:53 The downside of AI in Tech48:32 More about Daniel ----------------------------------------------------------------------To learn more about Daniel visit https://www.linkedin.com/in/daniellowrie/Check out his classes: https://youtube.com/@daniellowrie?si=ExQHOcMTKlE4E51G To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ----------------------------------------------------------------------#darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday
#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He’s the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.00:00 Intro02:20 What’s new in Cybersecurity?04:05 Companies in the news04:56 How does your data get leaked?17:10 Do you have to list all your processes?22:37 Technology is changing29:00 The Life span of a CISO31:50 The CISO, the CEO, and the CIO34:40 Penetration testing36:40 The Digital Forensics procedure44:00 More about Husam----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMatthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthew has held key leadership roles at iDefense, iSIGHT Partners, Total Intel, SDI, Tulco Holdings, and Technical Defense, making him a trusted voice in cyber threat intelligence and critical infrastructure protection. 00:00 Introduction02:03 The Evolution of Cybersecurity and National Security Risks06:16 Understanding Cyber Threats and Strategies for Defense11:19 The Role of Private Sector in Cybersecurity14:40 Addressing Cybersecurity Challenges and Failures of Imagination17:16 Overcoming Inertia in Cybersecurity Leadership20:42 The Importance of Red Teaming and Realistic Simulations24:44 The Impact of AI on Cybersecurity29:31 Future of Cybersecurity and Emerging Technologies36:56 Overview of OODA and DevSec Ventures----------------------------------------------------------------------To learn more about Matthew visit https://www.devost.net/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#SecurityConfidential #DarkRhiinoSecurityMaman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across industries like pharma, manufacturing, and business services, saving companies over £150 million through risk management and third-party oversight. A contributor to initiatives like the OWASP Top 10 Agentic AI Risks and the World Economic Forum’s Cyber Resilience Compass, Maman is deeply involved in global cybersecurity organizations, including ISACA, CIISec, and the UK Cyber Security Council. Known for his facilitation-first approach, he helps executives align leadership and strategy to build cultures of cyber resilience. 00:00 Introduction to Cybersecurity and Mamon Ibrahim02:38 Maman's Journey11:29 Transforming Cybersecurity: Compliance to Strategic Advantage16:12 Understanding Risks in Cybersecurity18:46 Making Cybersecurity a Competitive Advantage22:07 The Role of the CISO in Modern Organizations27:12 The Importance of Asset Protection in Organizations29:10 Navigating Third-Party Risks in Cybersecurity32:48 The Role of Procurement in Cyber Resilience38:41 Understanding Agentic AI Risks47:48 Knowledge Sharing and Mentorship in Cybersecurity-----------------------------------------------------------------To learn more about Maman visit https://www.linkedin.com/in/mamane/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com-----------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMaman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across industries like pharma, manufacturing, and business services, saving companies over £150 million through risk management and third-party oversight. A contributor to initiatives like the OWASP Top 10 Agentic AI Risks and the World Economic Forum’s Cyber Resilience Compass, Maman is deeply involved in global cybersecurity organizations, including ISACA, CIISec, and the UK Cyber Security Council. Known for his facilitation-first approach, he helps executives align leadership and strategy to build cultures of cyber resilience. 00:00 Introduction to Cybersecurity and Mamon Ibrahim02:38 Maman's Journey11:29 Transforming Cybersecurity: Compliance to Strategic Advantage16:12 Understanding Risks in Cybersecurity18:46 Making Cybersecurity a Competitive Advantage22:07 The Role of the CISO in Modern Organizations27:12 The Importance of Asset Protection in Organizations29:10 Navigating Third-Party Risks in Cybersecurity32:48 The Role of Procurement in Cyber Resilience38:41 Understanding Agentic AI Risks47:48 Knowledge Sharing and Mentorship in Cybersecurity----------------------------------------------------------------To learn more about Maman visit https://www.linkedin.com/in/mamane/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It’s all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There’s no way AI can unlearn what you taught them40:00 There’s no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Bob visit https://www.linkedin.com/in/bob-burke-4293712/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------





