DiscoverReimagining Cyber - real world perspectives on cybersecurity
Reimagining Cyber - real world perspectives on cybersecurity
Claim Ownership

Reimagining Cyber - real world perspectives on cybersecurity

Author: Reimagining Cyber

Subscribed: 35Played: 226
Share

Description

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.


As featured on MillionPodcasts' 

Best 100 Cybersecurity Podcasts

https://www.millionpodcasts.com/cyber-security-podcasts/


Top 50 Chief Information Security Officer CISO Podcasts

https://www.millionpodcasts.com/ciso-podcasts/


Top 70 Security Hacking Podcasts

https://www.millionpodcasts.com/security-hacking-podcasts/





187 Episodes
Reverse
In this episode of Reimagining Cyber, host Rob welcomes Tony Gonzalez, Principal at Inner Vision Services LLC and former CISO for QBE North America. They delve into the topic of third-party risk management, exploring its evolution from a checkbox approach to a comprehensive part of an organization's risk posture. They discuss the challenges and responsibilities involving third, fourth, and even fifth-party risks, especially within large organizations across various sectors like financial serv...
In part two of the 'Best of 2025' series of Reimagining Cyber, hosted by Rob Aragao, the focus is on the human elements influencing cybersecurity. The episode explores the challenges of burnout in the cybersecurity workforce as explained by Dr. Andrew Reeves, a cyber psychology expert. Betsy Cooper of the Aspen Policy Academy emphasizes the importance of integrating personal experiences and community voices in shaping cybersecurity policy. Lynn Dohm, Executive Director of Women in Cybersecuri...
AI has officially moved from experimentation to execution—and regulation is racing to catch up. In this episode of Reimagining Cyber, Tyler Moffitt is joined by Matt Aldridge to unpack what the rapidly evolving AI regulatory landscape means for security teams, businesses, and managed service providers heading into 2026. From the EU AI Act and GDPR to California’s CPRA and emerging rules around automated decision-making, they explore how governments are trying to balance innovation with safety...
Microsoft Defender is often treated as “good enough” security—built in, always on, and quietly doing its job. But what happens when malware convinces Windows to turn it off without triggering alarms? In this episode, cybersecurity expert Tyler Mofitt breaks down a real-world Windows malware campaign that disables Defender before anything else happens. No zero-days. No flashy exploits. Just a quiet abuse of built-in trust that causes Windows to step aside its own protection. He walks through h...
In this episode, Rob Aragao sits down with Theresa Lanowitz for a deep dive into the evolving meaning of cyber resilience and why it has become a true business imperative. Moving beyond traditional cybersecurity, the conversation explores how organizations must unite leadership, technology, and operations to withstand and recover from today’s most disruptive cyber events. Theresa shares insights on the defining attacks of 2025, including the rise of AI-driven social engineering, software supp...
Low effort cybercrime continues to dominate the threat landscape as attackers rely on misconfigurations, exposed databases, stolen credentials, and extortion tactics—not advanced exploits—to cause real damage. In this episode of Reimagining Cyber, cyber expert Tyler Moffitt breaks down recent stories including ShinyHunters extortion of Pornhub user activity data and widespread MongoDB database exposure to explain why fundamentals like asset visibility, identity controls, and incident re...
Quantum computing is coming—but what does that actually mean for cybersecurity leaders today? In this episode, Rob Aragao is joined by Morgan Adamski to break down key insights from PwC’s 2026 Global Digital Trust Insights Report and explore why quantum risk belongs on every CISO’s strategic roadmap. From geopolitical uncertainty to the shift from reactive to proactive cyber defense, the conversation cuts through the hype to explain what’s real, what’s next, and what leaders should be doing n...
Christmas holiday cybercrime is back in focus—but this time, Reimagining Cyber goes deeper than scams and suspicious messages. In a previous episode, we explored the holiday threat landscape from the victim’s point of view: phishing emails, fake delivery notices, and gift-card fraud. In this episode, cybersecurity expert Tyler Moffitt shift perspectives to what most people never see—the malware and criminal infrastructure that make those scams possible in the first place. The conversation div...
AI is evolving faster than most organizations can keep up with — and the truth is, very few companies are prepared for what’s coming in 2026. In this episode of Reimagining Cyber, Rob Aragao speaks with Ken Johnston, VP of Data, Analytics and AI at Envorso, about the uncomfortable reality: autonomous AI systems are accelerating, regulations are tightening, and most businesses have no idea how much risk they’re carrying. Ken explains why companies have fallen behind, how “AI governance debt” h...
Operation Endgame didn’t just disrupt a single ransomware group — it shook the entire cybercrime economy. In this episode, we break down how the world’s largest coordinated cyber takedown dismantled the loaders, botnets, and access brokers that ransomware groups relied on… and what criminals are building in their place. Cybersecurity expert Tyler Moffitt unpacks: How Endgame crippled the cyber underground’s supply chainWhy ransomware groups are collapsing, splintering, or turning sloppy...
In this episode, Rob Aragao welcomes back cybersecurity expert and author Michael Echols to unpack the urgent realities behind his new book, AI Chaos. Michael explains how AI is rapidly entering operational technology (OT) systems—the infrastructure that runs our power grids, water systems, transportation, satellites, and more. But with this transformation comes a critical problem: leaders don’t truly understand where AI is operating, how it behaves, or how to control it. Together, Rob and Mi...
Tis the season… for cybercrime. In this episode of Reimagining Cyber, senior security analyst Tyler Moffitt breaks down how cybercriminals exploit the Christmas and holiday season to launch phishing attacks, ransomware, smishing scams, and gift card fraud. From AI-powered fake delivery emails to cloned charity pages, learn how attackers are getting more sophisticated than ever—and what you can do to protect yourself, your business, and your customers during the busiest shopping months o...
Your devices may be giving away more than you think. In this episode of Reimagining Cyber, security expert Tyler Moffitt explores the hidden world of side-channel attacks — where everyday sensors reveal information you never intended to share. From Android apps that can infer your two-factor codes without screenshots, to gaming mice that “hear” speech through micro-vibrations, to Wi-Fi routers that detect motion inside your home, Tyler breaks down the cutting-edge research that blurs th...
Former FBI operative and cybersecurity strategist Eric O’Neill returns to Reimagining Cyber to discuss his new book Spies, Lies, and Cybercrime. Eric introduces his D.I.C.E.D. model—a spy-inspired framework for understanding how deception and espionage fuel today’s cyberattacks. He and host Rob Aragao dive into how AI is transforming impersonation scams, what the coming quantum era means for encryption and digital trust, and how CISOs can prepare for the evolving threat landscape. As featured...
In this chilling Halloween special of Reimagining Cyber, cybersecurity expert Tyler Moffitt counts down the nastiest pieces of malware that defined 2025 — and the identity-driven attacks reshaping the threat landscape. From AI-powered social engineering to ransomware “lawyer buttons”, this year’s cybercriminals blurred the line between hacking networks and hacking people. Tyler breaks down how attacks moved inside the perimeter — exploiting trust, voice, and identity — and what that means for...
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work on the future of money, digital identity, and how that naturally led her into cybersecurity. Together, they dive into topics such as spiral dynamic...
LockBit is back—and stronger than ever. After multiple takedowns and sanctions, the ransomware-as-a-service giant has resurfaced with LockBit 5.0, a version designed to hit harder, spread faster, and target virtualization at scale. In this episode of Reimagining Cyber, Tyler Moffitt unpacks what’s changed, why LockBit 5.0 matters, and what organizations should be doing now to reduce risk. From hypervisor attacks and cross-platform payloads to cartel-style alliances among cybercriminal crews, ...
Why do cyber attackers always seem one step ahead — and how can defenders take back control? In this episode of Reimagining Cyber, host Tyler Moffitt (Senior Analyst, OpenText) sits down with longtime colleagues Grayson Milbourne (Security Intelligence Director) and Troy Gill (Senior Manager, Threat Research) to explore how the cybersecurity battlefield is evolving — and what it takes to shift the balance toward defenders. They break down: Why attackers appear to “make the rules” in cybersecu...
In this episode of Reimagining Cyber, cybersecurity expert Tyler Moffitt unpacks one of the most shocking cybercrime stories in recent years—the rise and supposed shutdown of Scattered Spider. From social engineering mastery and high-profile breaches to teenage ringleaders and sudden “retirements,” this group has rewritten the playbook on digital extortion. Tyler walks us through: Who Scattered Spider really is and how they operated as elite access brokersThe group’s role in major incidents l...
Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown from a single conference into a global nonprofit supporting 11,000+ members across 100 countries. She highlights groundbreaking research on the barri...
loading
Comments (1)

Thomas Brown

Reimagining cybersecurity through real-world perspectives is essential for staying ahead of evolving threats. Leveraging cybersecurity professional services https://oteemo.com/ can provide invaluable insights and strategies tailored to your specific needs. These services help address current challenges and future-proof your security measures, ensuring comprehensive protection in an ever-changing landscape.

Sep 5th
Reply