DiscoverReimagining Cyber - real world perspectives on cybersecurity
Reimagining Cyber - real world perspectives on cybersecurity
Claim Ownership

Reimagining Cyber - real world perspectives on cybersecurity

Author: Reimagining Cyber

Subscribed: 35Played: 206
Share

Description

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.


As featured on MillionPodcasts' 'Best 100 Cybersecurity Podcast'  and Best 70 Chief Information Security Officer CISO Podcasts' rankings.



172 Episodes
Reverse
In this episode of Reimagining Cyber, host Rob welcomes Tony Gonzalez, Principal at Inner Vision Services LLC and former CISO for QBE North America. They delve into the topic of third-party risk management, exploring its evolution from a checkbox approach to a comprehensive part of an organization's risk posture. They discuss the challenges and responsibilities involving third, fourth, and even fifth-party risks, especially within large organizations across various sectors like financial serv...
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work on the future of money, digital identity, and how that naturally led her into cybersecurity. Together, they dive into topics such as spiral dynamic...
LockBit is back—and stronger than ever. After multiple takedowns and sanctions, the ransomware-as-a-service giant has resurfaced with LockBit 5.0, a version designed to hit harder, spread faster, and target virtualization at scale. In this episode of Reimagining Cyber, Tyler Moffitt unpacks what’s changed, why LockBit 5.0 matters, and what organizations should be doing now to reduce risk. From hypervisor attacks and cross-platform payloads to cartel-style alliances among cybercriminal crews, ...
Why do cyber attackers always seem one step ahead — and how can defenders take back control? In this episode of Reimagining Cyber, host Tyler Moffitt (Senior Analyst, OpenText) sits down with longtime colleagues Grayson Milbourne (Security Intelligence Director) and Troy Gill (Senior Manager, Threat Research) to explore how the cybersecurity battlefield is evolving — and what it takes to shift the balance toward defenders. They break down: Why attackers appear to “make the rules” in cybersecu...
In this episode of Reimagining Cyber, cybersecurity expert Tyler Moffitt unpacks one of the most shocking cybercrime stories in recent years—the rise and supposed shutdown of Scattered Spider. From social engineering mastery and high-profile breaches to teenage ringleaders and sudden “retirements,” this group has rewritten the playbook on digital extortion. Tyler walks us through: Who Scattered Spider really is and how they operated as elite access brokersThe group’s role in major incidents l...
Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown from a single conference into a global nonprofit supporting 11,000+ members across 100 countries. She highlights groundbreaking research on the barri...
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who’s most at risk, and the practical steps every developer and security leader should take right now. Follow or subscribe to the show on your preferred podcast platform. Share the sh...
Headlines claimed that 2.5 billion Gmail accounts were hacked—but what really happened? In this episode of Reimagining Cyber, Ben and threat intelligence expert Tyler Moffitt break down the facts behind the so called Gmail hack You’ll hear how cybercrime group ShinyHunters exploited a Salesforce system linked to Google—not Gmail itself—and why misleading headlines fueled unnecessary panic. We explore: How attackers tricked a Google employee through social engineeringWhy verified contact data ...
Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersecurity to resilience. Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. G...
A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cyber...
In this episode of Reimagining Cyber, host Rob Aragao sits down with Betsy Cooper, Director of the Aspen Policy Academy. Betsy shares how the Academy is helping to train cybersecurity professionals to effectively engage with and influence public policy. They discuss the importance of civic engagement, the need for technical voices in policymaking, and how the Academy fills a critical gap by offering accessible, actionable training for both experts and everyday citizens. Real-world succe...
At Black Hat USA, cybersecurity experts revealed an eye-opening case of billion-dollar scams hiding in plain sight. In this episode, Ben is joined by cyber threat expert Tyler Moffitt to unpack the world of malicious ad tech, where criminal networks run like Fortune 500 companies. From the VexTrio traffic distribution system to its flashy partner network Los Pollos, discover how cybercriminals hijack legitimate ad frameworks to push fake apps, push notification scams, and credit card traps—wh...
In this episode of Reimagining Cyber, host Rob Aragao sits down with cybersecurity executive and domain security expert Ihab Shraim to spotlight one of the most overlooked yet critical areas of cyber risk—fraudulent domain registrations and DNS hijacking. As the digital attack surface expands, bad actors are exploiting unmonitored domain portfolios and exposed DNS infrastructure to launch phishing campaigns, malware distribution, and business email compromise—all while flying under the radar ...
“It's got a [vulnerability] score of a 9.8, and this is on a scale of 10 and I've really never seen 10. So 9.8 is basically just as bad as it gets.” This episode is inspired by an ongoing global cybersecurity incident. In mid‑July attackers began actively exploiting Microsoft SharePoint vulnerabilities in what’s now known as the “ToolShell” exploit chain. This flaw is classified as a remote code execution vulnerability with an extremely high CVSS (Common Vulnerability Scoring System ) score o...
In this episode of Reimagining Cyber, host Rob Aragao talks with Richard Stiennon, author of the legendary 'Security Yearbook'. Stiennonn discusses his career as an industry analyst and his recent focus on mergers and acquisitions within cybersecurity. The conversation dives into the meticulous process behind the Security Yearbook, AI's growing role in cybersecurity, and the state of M&A activities in 2025. Stiennon also offers predictions for the cybersecurity landscape in 2026 and beyon...
Welcome back to Re-Imagining Cyber! In this episode, Tyler Moffitt, (Senior Security Analyst at OpenText) explores the emerging threat of generative AI in the hands of cyber criminals. Discover how AI models like ChatGPT, WormGPT, and FraudGPT have drastically lowered the skill floor for launching sophisticated attacks. Tyler breaks down the four major use cases: hyper-personalized phishing, real-time social engineering, AI-generated malware, and deep fakes. Learn the impact of this technolog...
In this episode of Reimagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) speaks with Ed Gaudet, CEO and founder of Censinet, about the high-stakes intersection of cybersecurity and healthcare. With hospitals increasingly reliant on connected medical devices and legacy systems, the risks extend beyond data breaches—they directly impact patient safety. Ed shares insights into the unique cybersecurity challenges healthcare organizations face, including outdated systems, siloed risk...
Welcome to Reimagining Cyber! In this episode, Tyler Moffitt (Senior Security Strategist, OpenText) , dissects one of the hottest—and most misunderstood—topics in tech: the AI bubble in cybersecurity. Is AI revolutionizing threat detection and response, or are we falling for another overhyped tech trend? Tyler draws parallels to the blockchain frenzy of 2017, warning of “AI-washing,” overblown marketing claims, and venture capital-fueled hype that may be outpacing real-world results. The conv...
In this episode of Re-Imagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) revisits the impactful role of AI and AI governance in cybersecurity. Highlighting findings from a recent survey indicating that only 25% of CISOs believe their organizations have strong AI risk frameworks, Rob discusses the significance of AI in enhancing operational efficiency, security measures, and compliance efforts. Key themes include the strategic positioning of security practices, collaboration bet...
What if everything we’ve been doing in cybersecurity awareness training is not just outdated — but harmful? In this episode of Reimagining Cyber, Rob Aragao, Chief Security Strategist at OpenText, talks with Craig Taylor, co-founder and CISO at CyberHoot, who makes a bold claim: punishment-based training is not only ineffective — it’s counterproductive. Drawing from his background in psychology and years of cybersecurity leadership, Craig explains why we need to ditch outdated tactics a...
loading
Comments (1)

Thomas Brown

Reimagining cybersecurity through real-world perspectives is essential for staying ahead of evolving threats. Leveraging cybersecurity professional services https://oteemo.com/ can provide invaluable insights and strategies tailored to your specific needs. These services help address current challenges and future-proof your security measures, ensuring comprehensive protection in an ever-changing landscape.

Sep 5th
Reply