DiscoverSecurity Confidential
Security Confidential
Claim Ownership

Security Confidential

Author: Dark Rhiino Security

Subscribed: 17Played: 377
Share

Description

Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
234 Episodes
Reverse
#SecurityConfidential #DarkRhiinoSecurityMatthew Waddell is an incident response and digital forensics expert with over 25 years of experience helping governments, global enterprises, and small businesses. He has also supported U.S. government counter-intelligence investigations and frontline operations overseas. Today, he’s distilling decades of real-world experience into practical guidance and a new book designed to help organizations survive ransomware with clarity and confidence.00:00 Intro1:25 Our Guest02:02 Working for NASA09:30 Password hygiene is the key 11:38 Passkeys: Good or bad?18:00 If you collect any finances, you’re a target23:30 Bad Actors are practicing on Small businesses27:18 Is A.I accelerating the Ransomware process?29:22 Employee Education Mindset34:23 Physical Security42:57 Calming down the executive team50:11 Survive Ransomware----------------------------------------------------------------------To learn more about Matthew visit https://tacticallysecure.com/survive/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMatthew Waddell is an incident response and digital forensics expert with over 25 years of experience helping governments, global enterprises, and small businesses. He has also supported U.S. government counter-intelligence investigations and frontline operations overseas. Today, he’s distilling decades of real-world experience into practical guidance and a new book designed to help organizations survive ransomware with clarity and confidence.----------------------------------------------------------------------To learn more about Matthew visit https://tacticallysecure.com/survive/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#SecurityConfidential #DarkRhiinoSecurityGrant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board 49:05 More about Grant----------------------------------------------------------------------To learn more about Grant visit https://www.linkedin.com/in/grantasplund/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
Grant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board  49:05 More about Grant
#SecurityConfidential #DarkRhiinoSecurity Daniel Lowrie is a longtime IT and cybersecurity professional with over 20 years of hands-on experience, starting from workstation support and evolving into ethical hacking and security training. Inspired early on by hacker and spy movies, he turned that curiosity into a career focused on popping shells, breaking into systems ethically, and teaching others how it all works. Today, he spends his time learning everything he can about cybersecurity, creating training content, and helping the next generation of cyber professionals grow through speaking, mentoring, and community involvement.00:00 Intro02:20 Our Guest04:40 Getting started in Cyber09:20 Taking inspiration from movies09:40 War Games13:35 First hack18:07 The Path to a Cyber career26:27 Finding bugs early32:36 Secure or Cheap?38:53 The downside of AI in Tech48:32 More about Daniel ----------------------------------------------------------------------To learn more about Daniel visit https://www.linkedin.com/in/daniellowrie/Check out his classes: https://youtube.com/@daniellowrie?si=ExQHOcMTKlE4E51G To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​----------------------------------------------------------------------#darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday
#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He’s the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.00:00 Intro02:20 What’s new in Cybersecurity?04:05 Companies in the news04:56 How does your data get leaked?17:10 Do you have to list all your processes?22:37 Technology is changing29:00 The Life span of a CISO31:50 The CISO, the CEO, and the CIO34:40 Penetration testing36:40 The Digital Forensics procedure44:00 More about Husam----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityMatthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthew has held key leadership roles at iDefense, iSIGHT Partners, Total Intel, SDI, Tulco Holdings, and Technical Defense, making him a trusted voice in cyber threat intelligence and critical infrastructure protection. 00:00 Introduction02:03 The Evolution of Cybersecurity and National Security Risks06:16 Understanding Cyber Threats and Strategies for Defense11:19 The Role of Private Sector in Cybersecurity14:40 Addressing Cybersecurity Challenges and Failures of Imagination17:16 Overcoming Inertia in Cybersecurity Leadership20:42 The Importance of Red Teaming and Realistic Simulations24:44 The Impact of AI on Cybersecurity29:31 Future of Cybersecurity and Emerging Technologies36:56 Overview of OODA and DevSec Ventures----------------------------------------------------------------------To learn more about Matthew visit https://www.devost.net/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#SecurityConfidential #DarkRhiinoSecurityMaman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across industries like pharma, manufacturing, and business services, saving companies over £150 million through risk management and third-party oversight. A contributor to initiatives like the OWASP Top 10 Agentic AI Risks and the World Economic Forum’s Cyber Resilience Compass, Maman is deeply involved in global cybersecurity organizations, including ISACA, CIISec, and the UK Cyber Security Council. Known for his facilitation-first approach, he helps executives align leadership and strategy to build cultures of cyber resilience. 00:00 Introduction to Cybersecurity and Mamon Ibrahim02:38 Maman's Journey11:29 Transforming Cybersecurity: Compliance to Strategic Advantage16:12 Understanding Risks in Cybersecurity18:46 Making Cybersecurity a Competitive Advantage22:07 The Role of the CISO in Modern Organizations27:12 The Importance of Asset Protection in Organizations29:10 Navigating Third-Party Risks in Cybersecurity32:48 The Role of Procurement in Cyber Resilience38:41 Understanding Agentic AI Risks47:48 Knowledge Sharing and Mentorship in Cybersecurity-----------------------------------------------------------------To learn more about Maman visit https://www.linkedin.com/in/mamane/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com-----------------------------------------------------------------
S18 E0 Data Poisoning

S18 E0 Data Poisoning

2025-10-0855:38

#SecurityConfidential #DarkRhiinoSecurityMaman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across industries like pharma, manufacturing, and business services, saving companies over £150 million through risk management and third-party oversight. A contributor to initiatives like the OWASP Top 10 Agentic AI Risks and the World Economic Forum’s Cyber Resilience Compass, Maman is deeply involved in global cybersecurity organizations, including ISACA, CIISec, and the UK Cyber Security Council. Known for his facilitation-first approach, he helps executives align leadership and strategy to build cultures of cyber resilience. 00:00 Introduction to Cybersecurity and Mamon Ibrahim02:38 Maman's Journey11:29 Transforming Cybersecurity: Compliance to Strategic Advantage16:12 Understanding Risks in Cybersecurity18:46 Making Cybersecurity a Competitive Advantage22:07 The Role of the CISO in Modern Organizations27:12 The Importance of Asset Protection in Organizations29:10 Navigating Third-Party Risks in Cybersecurity32:48 The Role of Procurement in Cyber Resilience38:41 Understanding Agentic AI Risks47:48 Knowledge Sharing and Mentorship in Cybersecurity----------------------------------------------------------------To learn more about Maman visit https://www.linkedin.com/in/mamane/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It’s all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There’s no way AI can unlearn what you taught them40:00 There’s no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Bob visit https://www.linkedin.com/in/bob-burke-4293712/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40 The best investment we can make18:44 AI Models Collapse23:00 Training AI Models for malicious intent----------------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40 The best investment we can make18:44 AI Models Collapse23:00 Training AI Models for malicious intent----------------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, industry, and academia. With decades of experience shaping cyber policy, risk management, and innovation, he’s a trusted voice in cybersecurity, homeland security, and emerging tech.--------------------------------------------------------------To learn more about Chuck visit https://www.linkedin.com/in/chuckbrooks/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​
#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets, he bridges the worlds of business, cyber, and governance to build stronger organizations and better lives.00:00 Introduction11:00 Machine Learning back in the days of LISP Processing15:00 The man who knows how and the man who knows why23:03 Jobs getting replaced by AI25:57 Do I need a large SOC anymore?35:56 LOCK YOUR CAR38:48 60% of Backups fail to restore45:27 Connecting with Alex-------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
loading
Comments