DiscoverThe Business of Cybersecurity
The Business of Cybersecurity
Claim Ownership

The Business of Cybersecurity

Author: Neil C. Hughes

Subscribed: 0Played: 3
Share

Description

The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge.

Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in modern business.

Each episode dives into how companies are responding to regulatory pressure, increasing complexity in cloud environments, and rising expectations from boards and customers. From AI-driven defense and zero trust to skills gaps and risk quantification, we go beyond technical jargon to explore what actually works—and what doesn’t—on the road to building resilient organisations.

Whether you're leading a security team, sitting at the executive table, or simply want to understand the business impact of cybersecurity, this podcast offers honest, grounded perspectives designed to help you make better decisions in an environment that never stands still.

Search Tech Talks Network to discover more shows covering the voices at the heart of enterprise technology.

15 Episodes
Reverse
Qualys CEO Sumedh Thakar joins me to unpack what cyber risk management really looks like when budgets are tight, signals are noisy, and AI is changing the game. Sumedh’s journey started in Pune with parents who prized education above everything. He arrived in the US with one hundred dollars, joined Qualys as one of its first software engineers, and two decades later is leading a global platform that helps banks, governments, and enterprises protect their digital infrastructure.We dig into why compliance keeps tripping companies up, why the impact of digital crime now dwarfs many physical crimes, and how leaders can talk about cyber in a language boards actually understand. Sumedh explains the shift from counting exposures to quantifying business risk, and why the Security Operations Center is giving way to a Risk Operations Center that prioritizes what truly matters, accepts what must be accepted, and transfers the rest through insurance.We also explore the cloud security market’s next phase as AI workloads pour into public and private clouds, why “attack surface” is not the same as “risk surface,” and how to weigh AI opportunity against model and data uncertainty. Sumedh closes with hard-won leadership lessons on time, teams, and defining success, and recommends Marshall Rosenberg’s Nonviolent Communication for anyone who wants to communicate beyond the words and lead with clarity.Visit the Sponsor of Tech Talks Network:Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careeristhttps://crst.co/OGCLA
What happens when there are 100 machine identities for every human one in your organisation? This is not a prediction for the future. It is the world we are already operating in, and the implications are profound.In this episode of Business of Cybersecurity, I speak with David Higgins, Senior Director at CyberArk, about how AI agents, autonomous systems, and the sheer scale of machine credentials in the enterprise are reshaping identity security. We discuss why password reuse, unsecured personal devices, and skipped updates remain stubbornly common even though awareness training has been around for decades. David explains that the issue is rarely laziness. Instead, it is often a lack of secure and practical alternatives that still fit the way people work.We dig into how phishing and social engineering tactics have evolved, with AI enabling deepfake audio and video that can pass casual inspection, and how attackers are increasingly bypassing tech-savvy users entirely by targeting helpdesks and third-party support teams. We also look at the commoditisation of stolen credentials and why buying access on the dark web can now be easier than running a phishing campaign.A major theme in our conversation is the role of culture in security. David challenges the outdated idea that humans are always the weakest link, arguing instead for a more collaborative approach that blends security objectives with user experience. We explore strategies like adaptive authentication, behavioural context analysis, and just-in-time privilege models that reduce risk without slowing down legitimate work.The discussion then turns to the identity challenges created by agentic AI. These are AI-driven systems that can interpret goals, adapt, and communicate directly with other AI agents and human colleagues. Unlike traditional machine identities, their behaviour changes over time, creating an entirely new category of security risk. David outlines how organisations can begin to secure these identities now, rather than deferring the problem until it becomes unmanageable.By the end of this episode, you will have a clear view of why identity-first security is essential in a machine-dominated environment, what practical steps can be taken to close gaps without adding unnecessary friction, and why aligning identity strategy with your organisation’s digital roadmap is no longer optional.
In this episode, I sat down with Mike Britton, CIO at Abnormal AI to explore the increasingly urgent overlap between AI governance and cybersecurity. With AI accelerating faster than regulation, and attackers already using these tools for harm, Mike offers a pragmatic take on what needs to happen next.We dig into the realities of regulating AI in a fragmented world, drawing comparisons between Europe’s application-based approach and the US’s patchwork of state-level initiatives. Mike shares why he believes regulation should focus on context and application, not just model size, and why human oversight must stay part of the loop.We also cover:How Abnormal uses behavioral AI to catch phishing and email attacks before they hit inboxesWhy sandboxes and risk-based regulation can protect innovation without losing controlThe threat of over-regulation pushing innovation toward regimes with fewer ethical safeguardsThe challenge of navigating AI vendors at security events, where almost everyone claims AI capabilitiesThe real-world risks of AI bias, misuse, and geopolitical influence in open-source modelsMike also shares practical guidance for CIOs and CISOs on model validation, audit trails, kill switches, and how to distinguish genuine AI value from marketing spin.🧠 One key takeaway: Attackers are already using AI. If security teams don’t fight fire with fire, they’re at risk of falling behind.🔗 For more, check out abnormal.ai or connect with Mike on LinkedIn.
In this episode of The Business of Cybersecurity, I’m joined by John Queally, Senior Director of Revenue Operations at Clari, for a conversation that goes far beyond spreadsheets and pipeline forecasts. We explore why RevOps has become mission-critical for cybersecurity firms facing escalating threats, intense market pressure, and growing expectations around AI.John unpacks how cybersecurity leaders from Okta to Fortinet are rethinking the entire revenue engine to fund innovation, reduce friction, and stay ahead of attackers. We discuss the growing gap between AI ambition and data reality, and why 67% of revenue leaders are not trusting their data should be a wake-up call for anyone betting big on automation.From real-time prospecting and clean data infrastructure to unified cross-departmental collaboration, this is a masterclass in how operational strategy, not just security tooling, is shaping the future of cyber resilience.John also shares what it really takes to unify go-to-market teams, how RevOps is shifting from reactive reporting to proactive insight, and why the most powerful transformation starts with the "unsexy" work of cleaning up your data stack.If you’ve ever underestimated the role of RevOps in a tech-driven industry or dismissed data hygiene as someone else’s problem, this conversation will change your mind.🎧 Listen in to learn:Why AI can’t fix broken dataHow cybersecurity firms are aligning ops, sales, and customer success in real timeWhat separates high-growth companies from those stuck debating dashboardsVisit Clari.com to learn more about the work John and his team are doing, or connect with him directly on LinkedIn.Ask ChatGPT
In this episode of The Business of Cybersecurity, I’m joined by Christian Reilly, Field CTO for EMEA at Cloudflare, to unpack what real-world cyber resilience looks like across industries and what’s holding many organisations back. From legacy systems in healthcare and education to cloud-native agility in gaming and fintech, Christian explains why some sectors are better prepared for modern cyber threats and what the rest can learn from them.We explore the power of simplicity in cybersecurity strategy, the shift toward zero trust, and the cultural importance of treating employee training as a relentless, personal mission rather than a compliance checkbox. Christian also shares sharp insights on the growing risks posed by AI and quantum computing, the need for post-quantum cryptography, and how data protection is fast becoming the cornerstone of competitive advantage.If your boardroom still treats security as an IT issue or your workforce sees it as a blocker, this conversation will change how you think about cyber preparedness. We discuss Cloudflare’s latest research findings, the future of AI-powered SecOps, and how organisations can move from passive defence to proactive, strategic resilience.Listen now to learn how forward-thinking businesses are simplifying their stacks, mobilising end-user education, and building security into the core of their operations rather than bolting it on after the fact.
In this episode of The Business of Cybersecurity, I speak with Trevor Dearing, Director of Critical Infrastructure at Illumio, to unpack some eye-opening truths from their latest ransomware report.We explore why more than half of global companies still have to halt operations when ransomware strikes and why so many UK businesses remain reluctant to report incidents. Trevor shares candid insights into what is working, what is not, and why shifting focus from prevention to containment could be the real key to resilience.He explains how modern containment tactics like advanced obfuscation and one-click ringfencing can limit damage and keep critical operations running, even when attackers break through. We also discuss why only 13 percent of companies believe their cyber resilience is strong enough and what it will take to close that gap as regulations tighten worldwide.If you want a grounded take on how to prepare for the attacks that will inevitably come, rather than just hoping they never do, this conversation is for you.Search Tech Talks Network for more episodes that connect cybersecurity and real-world business strategy.
When I spoke with Mark Lluic, CEO in Residence at Zscaler, on the Business of Cybersecurity podcast, we didn't spend time rehashing the basics. We looked at how leadership thinking must evolve. If your security posture is still built for light rain, what happens when a hurricane hits?Mark has spent years helping organizations rethink security from the ground up. Instead of chasing alerts or layering new tools onto outdated systems, he advocates for a proactive, systems-first approach. One that prioritizes architecture and continuity over quick fixes.Zero Trust Isn't Just for Remote WorkZero Trust started as a security fix for remote access, but that's just one piece of the puzzle. Mark made a sharp observation: many companies still trust users more when they're sitting in the office. That's a dangerous assumption.Modern Zero Trust means treating all traffic with the same level of scrutiny, regardless of its origin. Every access request should be evaluated based on its context: who is making the request, what device they're using, what they're trying to do, and whether that behavior fits a known pattern.The Problem with the Patch-and-Pray ModelSecurity teams often react to new threats by throwing more tools into the mix. Over time, this patchwork creates more problems than it solves. Complexity grows, visibility shrinks, and attackers exploit the gaps.Mark pointed to research showing that many teams are overwhelmed by the tools they already have in place. Others are held back by outdated systems or a lack of staff with the right skills. That creates a situation where attackers need to succeed once, while defenders must stop everything every time.A Better Way Forward: Resilient by DesignSo, what does a stronger strategy look like? Mark recommends starting with architecture. Build systems that expect disruption. Apply continuous risk assessment. Incorporate business continuity from the start rather than as an afterthought. And don't limit Zero Trust to a single use case. Make it your foundation.For leaders looking to take action, Mark laid out some clear first steps:Start by reviewing where Trust is currently assumed. Challenge those defaults. Apply the same standards inside your network as you do for external traffic. Think about context every time you evaluate access.Ensure that your legacy systems are also included in this effort. But remember, you don't need to replace everything overnight.Resilience is about ensuring your organization remains standing, regardless of what challenges it faces. That means planning, testing your response, and building security into your infrastructure not bolting it on later.Listen to the full episode to hear why this shift is a leadership decision that defines how your organization faces tomorrow's threats.
Are junior cybersecurity professionals outpacing their senior colleagues in readiness for modern threats?In this episode of The Business of Cybersecurity, Neil C. Hughes sits down with Max Vetter, Vice President of Cyber at Immersive Labs, to examine a surprising trend: less experienced team members are consistently completing more difficult training content than veterans with eight or more years in the field. It’s a data point that challenges assumptions and raises urgent questions about how organizations approach skills development in cybersecurity.Max shares findings from recent research that expose worrying gaps in readiness, especially at the senior level, and outlines a practical checklist for building resilient, threat-ready teams. He makes a compelling case for continuous, challenge-based learning across all levels of expertise, not just for new hires, but for seasoned professionals who may risk falling behind.Together, Neil and Max explore:Why traditional training approaches might be failing senior professionalsHow complacency and lack of tailored development can erode cyber resilienceThe cultural shifts needed to make continuous learning a team-wide priorityWhat boards and business leaders should know about workforce readiness gapsWhether you're leading a SOC, managing risk at the executive level, or shaping your organization's cyber strategy, this episode offers real-world insight into the human dynamics behind technical defenses.Are we doing enough to upskill cybersecurity veterans before the next threat hits? Tune in and join the conversation.
Legacy systems are everywhere, quietly powering core operations in some of the world’s largest enterprises. But behind that familiarity is risk. In this episode of The Business of Cybersecurity, Paul Savill, Global Practice Leader of Networking and Edge Compute at Kyndryl, joins me to break down why aging infrastructure is becoming a major liability in today’s security posture.We talk candidly about the security implications of 44 percent of enterprise technology being “out of life” and unsupported. Paul shares how that vulnerability becomes even more exposed as IoT devices proliferate and AI-powered attacks grow more sophisticated. It’s no longer a question of whether legacy tech is a problem, but how long organizations can afford to ignore it.This conversation moves beyond the buzzwords and straight into the operational reality. Paul explains how Kyndryl’s post-IBM spin-off transformation included shifting to a cloud-first, zero trust model—and why that decision was just as much about improving agility and cost control as it was about reducing risk.We also explore the human side of cybersecurity. Paul outlines how Kyndryl’s internal phishing simulations and scenario-based training have led to a measurable increase in employee-reported incidents. It’s a compelling argument for why building a cybersecurity culture beats any off-the-shelf solution.From AI-enhanced social engineering threats to the disconnect between IT and OT teams, this episode highlights the practical steps business leaders can take to modernize without compromising day-to-day operations. If your cybersecurity strategy still depends on outdated tools and last year’s training modules, it might be time to rethink the foundation.For more insight, check out the Kyndryl Readiness Report at kyndryl.com,
Nearly half of all internet traffic is now generated by non-human sources, and a growing share of that activity is driven by increasingly sophisticated bots. In this episode of The Business of Cybersecurity, Neil is joined by Lynn Marks, Senior Product Manager at Imperva, to break down the findings from the latest Bad Bot Report and explore what businesses need to know as these threats accelerate.Lynn explains why the shift in bot activity is no longer about brute force or exploiting technical vulnerabilities. Today’s attackers are targeting business logic itself. From automated purchasing of high-demand items to manipulating pricing and availability data in the travel sector, bots are now bypassing traditional security tools by taking advantage of how platforms are designed to function.APIs are particularly vulnerable. Nearly 50 percent of account takeover attacks now target APIs directly, largely because they are abundant, consistently structured, and often poorly monitored. Shadow APIs and lack of cross-functional visibility create significant blind spots for security teams.Some industries are facing an outsized share of these attacks. Gaming platforms are targeted for their in-game currencies and experience systems, while travel providers contend with constant scraping of flight data and availability. In both cases, attackers are capitalizing on high user demand and competitive pressure to exploit weaknesses in systems that were never built with these threats in mind.Lynn also discusses the rise of residential proxies and mobile user agents, which make it increasingly difficult to distinguish real users from bad actors. And with a surge in global AI regulation expected in 2025, she outlines what organizations can do to prepare. From understanding internal AI use to implementing layered protection across APIs and mobile applications, Lynn provides practical advice for teams looking to get ahead of the threat curve.In a digital world where nearly half of all traffic is now synthetic, how confident are you in your ability to spot the difference?
Recorded live at IGEL Now & Next 2025 in Miami, this conversation with John Walsh, Field CTO for Critical Sectors at IGEL, explores how organizations can rethink edge security through a preventative lens. With decades of experience in high-assurance environments, John shares how zero trust is moving from theory into applied strategy and why endpoint protection is still ground zero in the modern threat landscape. From hybrid work challenges to AI-powered threats, this episode breaks down how IGEL’s immutable OS and collaborative approach are helping secure some of the most sensitive sectors in the world. Are your endpoints ready for what’s next?
What happens when a country aims to carve its own cybersecurity regulatory path post-Brexit while the rest of the region moves toward harmonized frameworks like the EU’s NIS2 directive? In this episode of The Business of Cybersecurity Podcast, we unpack the evolving conversation around the UK’s Cyber Security and Resilience Bill with Ricardo Ferreira, Field CISO at Fortinet.Ricardo offers a sharp, comparative analysis between the UK's proposed bill and the EU's more prescriptive NIS2 directive. He explains why the UK's current approach lacks the specificity needed to tackle critical issues like supply chain security, board-level accountability, and sector-specific risk frameworks. While the UK’s legislative draft includes promising buzzwords and broad commitments, Ricardo notes that it falls short on actionable guidance and enforcement mechanisms—areas where NIS2 has already set a clearer precedent.But amid these gaps lies a strategic opportunity. Ricardo discusses how the UK can leverage its regulatory independence to selectively adopt the most effective elements from NIS2, crafting a more agile and industry-friendly cybersecurity framework. He highlights the importance of involving diverse stakeholders—from industry bodies to international partners—in shaping regulation that’s both resilient and responsive to evolving threats.The conversation also explores:The importance of making board members directly accountable for cybersecurity riskWhy workforce training must be mandated alongside technical requirementsLessons from NIS2 on post-breach response and business continuity planningThe need for advisory committees and continuous legislative updates to keep regulation relevant in an AI-driven threat environmentRicardo closes the episode with a personal story about how visionary leadership early in his career helped shape his trajectory—reminding us that real resilience is built not just through technology or regulation, but through people who see potential and invest in it.If you're navigating cybersecurity compliance, policy development, or executive accountability, this episode is a timely and thought-provoking listen.
What does it take to protect financial institutions when they're the number one global target for DDoS attacks? In this episode of The Business of Cybersecurity, Neil C. Hughes welcomes Richard Meeus, Director of Security Technology and Strategy EMEA at Akamai Technologies, to explore insights from Akamai's latest State of the Internet (SOTI) report focusing on cybersecurity trends in the financial services sector.Richard shares a decade's worth of threat intelligence backed by trillions of daily DNS requests and billions of cyberattack observations, offering a data-rich perspective on why financial organizations are squarely in the crosshairs. From a 24-hour DDoS attack on Israel peaking at 800 Gbps to the rise of politically motivated hacktivism, Richard outlines why the Middle East and North Africa (MENA) region has become a hotspot for these digital assaults—and what financial firms can do about it.The conversation also covers the emerging risk of shadow APIs—forgotten, unmanaged, or defunct APIs that can unintentionally expose sensitive personal or financial data. Richard explains how many businesses still underestimate their API footprint and shares practical steps for regaining visibility and control.Zero Trust is another central theme. Instead of positioning it as an overwhelming overhaul, Richard suggests organizations reframe it as a modern VPN replacement, focusing first on core business systems and micro-segmentation to restrict lateral movement. With a strategic approach, implementing Zero Trust becomes feasible and a key step in limiting breach impact.Richard also offers a candid look at balancing proactive and reactive DDoS defense, emphasizing the importance of both automatic mitigation and human-led response to more sophisticated, multi-vector attacks. He highlights how Akamai supports both fronts, including working with global authorities to help take down threat actors like Anonymous Sudan.Finally, the conversation turns to the future. With EU regulations like the Digital Operational Resilience Act (DORA) on the horizon, financial institutions must invest in real-time visibility, intuitive data access, and actionable threat insights to stay compliant and resilient.Whether you're in the C-suite, on the frontlines of your SOC, or guiding your enterprise's security roadmap, this episode delivers an honest and data-driven view of what it takes to defend the financial sector in a time of growing complexity and geopolitical tension.
What happens when the digital systems powering our national energy, water, and healthcare services become the next frontline in cybersecurity? As smart grids, connected utilities, and cloud-first operations rapidly reshape critical infrastructure, the threats facing these systems are evolving just as quickly. In this episode, Tony Burton, Managing Director of Cyber Security & Trust at Thales UK, joins the podcast to unpack the findings from the Thales Data Threat Report and explore what it really takes to secure the backbone of modern society.With over two decades in national security and resilience, Tony brings sharp insight into the pressing risks that critical infrastructure faces—from rising ransomware attacks and insider threats to human error and the expanded digital attack surface introduced by cloud adoption and smart technologies. He explains why over 42% of critical infrastructure organizations have already reported data breaches and why 93% are seeing an uptick in cyberattacks. The conversation doesn’t stop at the threats—it goes deep into the real-world consequences, such as cascading failures across sectors, widespread outages, and compromised public safety.We also explore how organizations can take action now. Tony outlines the importance of adopting zero trust architecture, designing systems with human behavior in mind, and implementing detection and response capabilities that reflect the physical realities of operational technology. He also shares powerful insights from Thales’ Cyber Resilience Lab in Ebbw Vale, a cutting-edge environment where real smart grid systems are tested under simulated attacks to strengthen resilience.From preparing for quantum computing to managing complex hybrid cloud environments, Tony offers a playbook for leaders who are serious about protecting national infrastructure in a high-stakes environment. Whether you’re a CISO, infrastructure leader, or tech strategist, this episode will provide a roadmap for mitigating risk, increasing awareness, and planning ahead.What role should technology—and leadership—play in protecting the systems that power society? Join the conversation and share your thoughts on building resilience in a connected world.
What does it really mean to trust nothing and verify everything? In this first episode of The Business of Cybersecurity, Neil is joined by John Kindervag—the creator of the Zero Trust cybersecurity model for a conversation that redefines how we think about protecting digital systems.John shares the untold story behind the creation of Zero Trust, from challenging traditional perimeter-based models to watching the concept grow into a global movement now embedded in national cybersecurity mandates. Far from being a buzzword, Zero Trust is presented here as a strategic framework that begins with a single protect surface and scales without disruption.Together, Neil and John explore how Zero Trust is misunderstood, often mistaken for a product, and too often reduced to identity management. They break down the core five-step process for implementation, the importance of context over blind trust, and how cloud environments and AI are reshaping cybersecurity expectations.But this conversation also carries a personal weight, as both Neil and John reflect on deeply moving experiences with childhood cancer—and how those journeys informed a new way to think about managing risk, or as John reframes it, managing danger.This isn’t just a technical talk. It’s a story about questioning the status quo, staying adaptable in a rapidly evolving threat environment, and using strategy not assumptions to secure the systems businesses depend on.Is your organization still relying on outdated models of trust? And what would it look like to build something truly resilient?
Comments 
loading