Discover
Security Confidential

Security Confidential
Author: Dark Rhiino Security
Subscribed: 17Played: 377Subscribe
Share
© Dark Rhiino Security
Description
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
220 Episodes
Reverse
#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It’s all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There’s no way AI can unlearn what you taught them40:00 There’s no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren’t bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren’t using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Bob visit https://www.linkedin.com/in/bob-burke-4293712/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mission-critical SaaS systems.00:00 Intro10:07 What the main threat back then?13:30 Finding a Security Architect15:24 What gaps cause MFA to go down?18:00 You don’t know you’ve been breached22:36 Should CISOs be part of IT?30:31 Phishing Resistant Attacks33:42 Beyond Identity37:42 If your identity is compromised…41:19 Hardware supply chain47:45 More about Bob------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in manufacturing process improvement, mentoring, and consulting00:00 Intro03:48 Protect what matters the most12:32 Talking to the client. What is worth protecting24:27 Proarch29:30 The Cultural fit with acquisition 36:40 Disaster Recovery39:50 What do you think AI is going to do?43:55 Im too small to get attacked--------------------------------------------------------------To learn more about Santosh visit https://www.linkedin.com/in/santoshkaveti/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40 The best investment we can make18:44 AI Models Collapse23:00 Training AI Models for malicious intent----------------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40 The best investment we can make18:44 AI Models Collapse23:00 Training AI Models for malicious intent----------------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, industry, and academia. With decades of experience shaping cyber policy, risk management, and innovation, he’s a trusted voice in cybersecurity, homeland security, and emerging tech.--------------------------------------------------------------To learn more about Chuck visit https://www.linkedin.com/in/chuckbrooks/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets, he bridges the worlds of business, cyber, and governance to build stronger organizations and better lives.00:00 Introduction11:00 Machine Learning back in the days of LISP Processing15:00 The man who knows how and the man who knows why23:03 Jobs getting replaced by AI25:57 Do I need a large SOC anymore?35:56 LOCK YOUR CAR38:48 60% of Backups fail to restore45:27 Connecting with Alex-------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets, he bridges the worlds of business, cyber, and governance to build stronger organizations and better lives.#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets, he bridges the worlds of business, cyber, and governance to build stronger organizations and better lives.00:00 Introduction11:00 Machine Learning back in the days of LISP Processing15:00 The man who knows how and the man who knows why23:03 Jobs getting replaced by AI25:57 Do I need a large SOC anymore?35:56 LOCK YOUR CAR38:48 60% of Backups fail to restore45:27 Connecting with Alex--------------------------------------------------------------To learn more about Alex visit https://www.linkedin.com/in/alex-sharpe-3rd/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com--------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. He holds multiple cloud security patents and is currently helping develop the industry’s first Browser Detection and Response (BDR) solution. With hands-on expertise and a global perspective from roles in the U.S., Japan, Singapore, Bahrain, and Europe, John is passionate about tackling emerging threats and sharing real-world insights that blend innovation with practical defense. 00:00 Introduction03:00 Protecting Intellectual Property 10:37 Understand the business, then look at the controls14:18 How different is cybersecurity across the country22:16 Browser Detection Response32:19 Does BDR replace other tools?36:10 What about virtual environments?39:30 More from John---------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com---------------------------------------------------------------
John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. He holds multiple cloud security patents and is currently helping develop the industry’s first Browser Detection and Response (BDR) solution. With hands-on expertise and a global perspective from roles in the U.S., Japan, Singapore, Bahrain, and Europe, John is passionate about tackling emerging threats and sharing real-world insights that blend innovation with practical defense.
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don’t need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon’s new book--------------------------------------------------------------To learn more about Jon visit https://www.linkedin.com/in/jondimaggio/https://www.amazon.com/Art-Cyberwarfare-Investigators-Ransomware-Cybercrime-ebook/dp/B09BKLRH8P?ref_=ast_author_dpTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don’t need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon’s new book
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have watched over 1 million hours of his content. Chris really enjoys helping people advance in their careers through training and personal development.00:00 Introduction05:20 What were some of the cybercrimes you came across?10:30 Deep fake stress13:49 What is the strategy to break up the back up?17:17 Method and Approach for understanding risk24:31 Interactive labs29:57 Will AI change training methods? Will it replace SOC Jobs?38:40 Elevate your career41:00 Check out his Pluralsight courses----------------------------------------------------------------------To learn more about Chris visit https://www.pluralsight.com/authors/chris-reesTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have watched over 1 million hours of his content. Chris really enjoys helping people advance in their careers through training and personal development. 00:00 Introduction05:20 What were some of the cybercrimes you came across?10:30 Deep fake stress13:49 What is the strategy to break up the back up?17:17 Method and Approach for understanding risk24:31 Interactive labs29:57 Will AI change training methods? Will it replace SOC Jobs?38:40 Elevate your career41:00 Check out his Pluralsight courses
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a positive cybersecurity culture. With a background in psychology and extensive experience leading security programs at Chase Paymentech, Vistaprint, and DXC Technology, Craig specializes in incident response, governance, and compliance. A CISSP-certified professional since 2001, he is a recognized thought leader, public speaker, and advocate for making cybersecurity training engaging, fun, and effective. 00:00 Introduction01:16 Our guest08:40 There are two types of companies10:00 We taught them how to Phish12:12 Business Email compromise13:50 Go back to the way your parents ran security16:19 What do I do first?26:12 Changing your passwords is not good for you29:00 Encryption31:30 What to look for in a Password Manager35:17 “Unsubscribe” button mishap46:15 Cyberhoot49:05 Free Training from Cyberhoot-----------------------------------------------------------------To learn more about Cyberhoot visit https://cyberhoot.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a positive cybersecurity culture. With a background in psychology and extensive experience leading security programs at Chase Paymentech, Vistaprint, and DXC Technology, Craig specializes in incident response, governance, and compliance. A CISSP-certified professional since 2001, he is a recognized thought leader, public speaker, and advocate for making cybersecurity training engaging, fun, and effective. 00:00 Introduction01:16 Our guest08:40 There are two types of companies10:00 We taught them how to Phish12:12 Business Email compromise13:50 Go back to the way your parents ran security16:19 What do I do first?26:12 Changing your passwords is not good for you29:00 Encryption31:30 What to look for in a Password Manager35:17 “Unsubscribe” button mishap46:15 Cyberhoot49:05 Free Training from Cyberhoot-----------------------------------------------------------------To learn more about Cyberhoot visit https://cyberhoot.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com