DiscoverCybernomics: Where Business Meets Tech
Cybernomics: Where Business Meets Tech
Claim Ownership

Cybernomics: Where Business Meets Tech

Author: Bruyning Media

Subscribed: 1Played: 2
Share

Description

Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy.


We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives.


Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you make confident, high-impact choices without needing a computer science degree.


New episodes drop every Wednesday.

Follow us on LinkedIn and YouTube for bonus content and real-time updates.

58 Episodes
Reverse
In this conversation, Joshua Bruyning engages with DataTribe Managing Directors Rob Ackerman and Leo Scott to explore the intricate dynamics of cybersecurity startups and venture capital. They discuss the essential qualities of successful founders, the importance of coachability, and the unique challenges faced in the cybersecurity landscape. The conversation delves into the investment process, the significance of building trust with CISOs, and the mission-driven nature of cybersecurity innov...
In this episode of Cybernomics, Al Kennickell joins me to discuss the importance of embracing AI in small and medium businesses, addressing common misconceptions and hesitations surrounding its use. We emphasize that many negative opinions about AI stem from a lack of understanding and experience. Our discussion highlights practical applications of AI, its role as a revenue driver, and the necessity for individuals and businesses to adapt to this technology to remain competitive. Al encourage...
Kyle and I dive into the reality of the RSA Conference experience, exploring how the security industry's biggest event has transformed into a vendor-dominated spectacle with declining CISO attendance. • The conference atmosphere is overwhelmingly loud with vendors everywhere and marketing materials covering every available surface • San Francisco completely transforms during RSA, with security company logos plastered on restaurant windows and hotels taken over for exclusive events • CISOs ar...
Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide. Beyond just modernizing paperwork, Dean reveals why attorneys have become prime targets for sophisticated hackers and nation-states. "Law firms are data aggregators of some of the most valuable information on the planet," he explains, detailing how insider knowledge of M&A d...
In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027. • SOC automation represents the most immediate and profound application of AI in cybersecurity • Approximately 15 startups are developing AI solutions to replace tier-one SOC analysts • A...
Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires both leadership commitment and proper resource allocation to overcome the natural friction between IT and security teams. • Moving security activities earlier in the development lifecycle is crucial for effectiveness • DevSecOps implementation remains r...
Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than just a cost center. • Most companies don't need to hire a full security team – outsourcing cybersecurity makes sense just like outsourcing HR or payroll • Even with the best security training, 3% of employees will still click on malicious links, so pr...
Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagnosed using a medical device, Christian dedicated his career to ensuring these life-saving technologies remain secure from increasingly sophisticated cyber threats. • Average hospital bed connected to 14 medical devices, creating numerous attack vectors...
We explore the emergence of a new AI-driven economy that's creating unprecedented opportunities for entrepreneurs and businesses of all sizes to compete at enterprise levels with minimal resources. • AI represents the most significant technological advancement since the wheel, democratizing powerful capabilities previously available only to large corporations • Small and medium businesses can move quickly to adopt AI while enterprises struggle with implementation, creating a competitive adva...
Google makes a monumental $32 billion acquisition of cloud security leader Wiz, marking one of the largest cybersecurity acquisitions in history after previously attempting to purchase the company for $23 billion last year. • Wiz offers simple cloud security deployment that provides immediate visibility into cloud environments • Founded by a team that previously sold their startup Adallom to Microsoft • Achieved unprecedented growth, reaching $100 million ARR faster than most enterprise soft...
In this episode, we explore the intricate relationship between risk management and business objectives, specifically tailored for small and medium-sized businesses. Chad Boeckmann discusses strategies to elevate cybersecurity risk awareness among executive leadership, the role of cyber insurance, and the importance of bridging the gap between security teams and business leaders. 00:00 The Changing Landscape of Risk Management 03:07 Understanding the Nuances of Risk Management 06:11 The...
In this episode of Cybernomics, Josh Bruyning and Kyle Bhiro discuss the hidden costs associated with vulnerability management in cybersecurity. They explore the importance of understanding these costs, the role of AI in improving efficiency, and the necessity of human oversight in security operations. The conversation also touches on the concept of security debt, compliance, and the future of vulnerability management as organizations adapt to new technologies. • Understanding what vulnerabi...
On this episode of Cybernomics, Josh explores the Hidden Costs of Cybersecurity Regulations and conducts a cost-benefit analysis with Michael Nouguier, CISO at Richey May, and our guest co-host, Igor Volovich, former CISO at Invensys and Schneider Electric. Hidden Costs of Regulating Cybersecurity: Compliance costs (audits, certifications, and technology upgrades).Administrative overhead (documentation, employee training, and legal fees).Reduced innovation due to diverted resources.Compet...
Greg and Josh pull back the curtain on the pitfalls and strategic voids left by frequent CISO transitions, which can leave companies vulnerable and scrambling for continuity. We shed light on the arduous onboarding process new CISOs face, taking months to assess existing security frameworks and the ripple effects this delay has on strategic initiatives. Our conversation also addresses the growing legal responsibilities that lie with corporate leaders and the potential fallout from negligence ...
Authenticity emerges as a vital theme in our latest episode, showcasing how being true to oneself can create more genuine connections in cybersecurity and beyond. Mel "Fireball" Reyes shares his personal journey of embracing authenticity and its significant impact on audience engagement, trust, and organizational culture. • Discussion on the need for authenticity in a curated digital landscape • Mel's transformative story of presenting authentically in Chicago • The audience's powerful res...
This episode explores the transformative role of automation in cybersecurity through Cyngular Security's innovative approach. By focusing on Cloud Investigation and Response Automation (CIRA), we discuss how this technology alleviates alert fatigue, reduces burnout among analysts, and empowers teams to enhance their security efforts. • Cyngular Security introduces Cloud Investigation and Response Automation (CIRA) • High alert volumes lead to analyst burnout • Automation in inves...
Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independent publishing to a partnership with Wiley and previews the much-anticipated 2025 edition of his yearbook series. Our discussion highlights the rol...
Unlock the secrets of API security with our esteemed guest, Randolph Barr, the new Chief Information Security Officer at Cequence Security. With a stellar career spanning companies like Zoom, Qualys, Cisco, and Webex, Randy is the perfect guide to navigate the complexities of the digital world. We explore the innovative strategies Sequence Security employs to combat the escalating threats posed by AI-driven technologies. Randy shares his expert insights on the pivotal role of APIs in digital ...
In this episode of Cybernomics (formerly Security Market Watch), host Josh Bruyning engages with Ian Poynter, founder of Kalahari Security, to explore the economics of cybersecurity. They discuss the challenges of selling security solutions, the importance of understanding business needs, and the inadequacy of mere sympathy in the face of security breaches. Ian emphasizes the need for security to be appropriate to the business context and the necessity of building trust and relationships in s...
Buchi Reddy, CEO and founder of Levo AI, shares his unique immigrant story and the journey that led him to start his own cybersecurity company. Levo AI focuses on API security and helps enterprises protect their digital footprint and applications using AI. Buchi discusses the challenges he faced as an immigrant and the importance of mentors and skill development. He emphasizes the need to work hard, work smart, and keep making progress. Buchi also highlights the achievements of Levo AI and th...
loading
Comments