DiscoverReimagining Cyber - real world perspectives on cybersecurity
Reimagining Cyber - real world perspectives on cybersecurity
Claim Ownership

Reimagining Cyber - real world perspectives on cybersecurity

Author: Reimagining Cyber

Subscribed: 34Played: 208
Share

Description

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.


As featured on MillionPodcasts' 

Best 100 Cybersecurity Podcasts

https://www.millionpodcasts.com/cyber-security-podcasts/


Top 50 Chief Information Security Officer CISO Podcasts

https://www.millionpodcasts.com/ciso-podcasts/


Top 70 Security Hacking Podcasts

https://www.millionpodcasts.com/security-hacking-podcasts/





181 Episodes
Reverse
In this episode of Reimagining Cyber, host Rob welcomes Tony Gonzalez, Principal at Inner Vision Services LLC and former CISO for QBE North America. They delve into the topic of third-party risk management, exploring its evolution from a checkbox approach to a comprehensive part of an organization's risk posture. They discuss the challenges and responsibilities involving third, fourth, and even fifth-party risks, especially within large organizations across various sectors like financial serv...
Christmas holiday cybercrime is back in focus—but this time, Reimagining Cyber goes deeper than scams and suspicious messages. In a previous episode, we explored the holiday threat landscape from the victim’s point of view: phishing emails, fake delivery notices, and gift-card fraud. In this episode, cybersecurity expert Tyler Moffitt shift perspectives to what most people never see—the malware and criminal infrastructure that make those scams possible in the first place. The conversation div...
AI is evolving faster than most organizations can keep up with — and the truth is, very few companies are prepared for what’s coming in 2026. In this episode of Reimagining Cyber, Rob Aragao speaks with Ken Johnston, VP of Data, Analytics and AI at Envorso, about the uncomfortable reality: autonomous AI systems are accelerating, regulations are tightening, and most businesses have no idea how much risk they’re carrying. Ken explains why companies have fallen behind, how “AI governance debt” h...
Operation Endgame didn’t just disrupt a single ransomware group — it shook the entire cybercrime economy. In this episode, we break down how the world’s largest coordinated cyber takedown dismantled the loaders, botnets, and access brokers that ransomware groups relied on… and what criminals are building in their place. Cybersecurity expert Tyler Moffitt unpacks: How Endgame crippled the cyber underground’s supply chainWhy ransomware groups are collapsing, splintering, or turning sloppy...
In this episode, Rob Aragao welcomes back cybersecurity expert and author Michael Echols to unpack the urgent realities behind his new book, AI Chaos. Michael explains how AI is rapidly entering operational technology (OT) systems—the infrastructure that runs our power grids, water systems, transportation, satellites, and more. But with this transformation comes a critical problem: leaders don’t truly understand where AI is operating, how it behaves, or how to control it. Together, Rob and Mi...
Tis the season… for cybercrime. In this episode of Reimagining Cyber, senior security analyst Tyler Moffitt breaks down how cybercriminals exploit the Christmas and holiday season to launch phishing attacks, ransomware, smishing scams, and gift card fraud. From AI-powered fake delivery emails to cloned charity pages, learn how attackers are getting more sophisticated than ever—and what you can do to protect yourself, your business, and your customers during the busiest shopping months o...
Your devices may be giving away more than you think. In this episode of Reimagining Cyber, security expert Tyler Moffitt explores the hidden world of side-channel attacks — where everyday sensors reveal information you never intended to share. From Android apps that can infer your two-factor codes without screenshots, to gaming mice that “hear” speech through micro-vibrations, to Wi-Fi routers that detect motion inside your home, Tyler breaks down the cutting-edge research that blurs th...
Former FBI operative and cybersecurity strategist Eric O’Neill returns to Reimagining Cyber to discuss his new book Spies, Lies, and Cybercrime. Eric introduces his D.I.C.E.D. model—a spy-inspired framework for understanding how deception and espionage fuel today’s cyberattacks. He and host Rob Aragao dive into how AI is transforming impersonation scams, what the coming quantum era means for encryption and digital trust, and how CISOs can prepare for the evolving threat landscape. It's 5 year...
In this chilling Halloween special of Reimagining Cyber, cybersecurity expert Tyler Moffitt counts down the nastiest pieces of malware that defined 2025 — and the identity-driven attacks reshaping the threat landscape. From AI-powered social engineering to ransomware “lawyer buttons”, this year’s cybercriminals blurred the line between hacking networks and hacking people. Tyler breaks down how attacks moved inside the perimeter — exploiting trust, voice, and identity — and what that means for...
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work on the future of money, digital identity, and how that naturally led her into cybersecurity. Together, they dive into topics such as spiral dynamic...
LockBit is back—and stronger than ever. After multiple takedowns and sanctions, the ransomware-as-a-service giant has resurfaced with LockBit 5.0, a version designed to hit harder, spread faster, and target virtualization at scale. In this episode of Reimagining Cyber, Tyler Moffitt unpacks what’s changed, why LockBit 5.0 matters, and what organizations should be doing now to reduce risk. From hypervisor attacks and cross-platform payloads to cartel-style alliances among cybercriminal crews, ...
Why do cyber attackers always seem one step ahead — and how can defenders take back control? In this episode of Reimagining Cyber, host Tyler Moffitt (Senior Analyst, OpenText) sits down with longtime colleagues Grayson Milbourne (Security Intelligence Director) and Troy Gill (Senior Manager, Threat Research) to explore how the cybersecurity battlefield is evolving — and what it takes to shift the balance toward defenders. They break down: Why attackers appear to “make the rules” in cybersecu...
In this episode of Reimagining Cyber, cybersecurity expert Tyler Moffitt unpacks one of the most shocking cybercrime stories in recent years—the rise and supposed shutdown of Scattered Spider. From social engineering mastery and high-profile breaches to teenage ringleaders and sudden “retirements,” this group has rewritten the playbook on digital extortion. Tyler walks us through: Who Scattered Spider really is and how they operated as elite access brokersThe group’s role in major incidents l...
Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown from a single conference into a global nonprofit supporting 11,000+ members across 100 countries. She highlights groundbreaking research on the barri...
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who’s most at risk, and the practical steps every developer and security leader should take right now. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners...
Headlines claimed that 2.5 billion Gmail accounts were hacked—but what really happened? In this episode of Reimagining Cyber, Ben and threat intelligence expert Tyler Moffitt break down the facts behind the so called Gmail hack You’ll hear how cybercrime group ShinyHunters exploited a Salesforce system linked to Google—not Gmail itself—and why misleading headlines fueled unnecessary panic. We explore: How attackers tricked a Google employee through social engineeringWhy verified contact data ...
Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersecurity to resilience. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 10...
A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 7...
In this episode of Reimagining Cyber, host Rob Aragao sits down with Betsy Cooper, Director of the Aspen Policy Academy. Betsy shares how the Academy is helping to train cybersecurity professionals to effectively engage with and influence public policy. They discuss the importance of civic engagement, the need for technical voices in policymaking, and how the Academy fills a critical gap by offering accessible, actionable training for both experts and everyday citizens. Real-world succe...
At Black Hat USA, cybersecurity experts revealed an eye-opening case of billion-dollar scams hiding in plain sight. In this episode, Ben is joined by cyber threat expert Tyler Moffitt to unpack the world of malicious ad tech, where criminal networks run like Fortune 500 companies. From the VexTrio traffic distribution system to its flashy partner network Los Pollos, discover how cybercriminals hijack legitimate ad frameworks to push fake apps, push notification scams, and credit card traps—wh...
loading
Comments (1)

Thomas Brown

Reimagining cybersecurity through real-world perspectives is essential for staying ahead of evolving threats. Leveraging cybersecurity professional services https://oteemo.com/ can provide invaluable insights and strategies tailored to your specific needs. These services help address current challenges and future-proof your security measures, ensuring comprehensive protection in an ever-changing landscape.

Sep 5th
Reply