Chef Shuai Wang was the runner-up on the 22nd season of Bravo’s Top Chef and is the force behind two standout restaurants in Charleston, South Carolina—Jackrabbit Filly and King BBQ—where he brings together the flavors of his childhood in Beijing and the spirit of the South in some pretty unforgettable ways. He grew up just a short walk from Tiananmen Square, in a tiny home with no electricity or running water, where his grandmother often cooked over charcoal. Later, in Queens, New York, his mom taught herself to cook—her first dishes were a little salty, but they were always made with love. And somewhere along the way, Shuai learned that cooking wasn’t just about food—it was about taking care of people. After years working in New York kitchens, he made his way to Charleston and started building something that feels entirely his own. Today, we’re talking about how all those experiences come together on the plate, the family stories behind his cooking, and what it’s been like to share that journey on national TV. For more info visit: southernliving.com/biscuitsandjam Learn more about your ad choices. Visit podcastchoices.com/adchoices…
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
The AI & Security Podcast introduces listeners to the most cutting edge technology and artificial intelligence (AI) that is impacting the security industry today. Listen to interviews, hosted by Dennis Crowley, with the leaders in the robotics, video detection, situational intelligence and users of the latest technology today.
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

Partially Redacted brings together leaders in engineering, data, AI, security, and privacy to share knowledge, best practices, and real world experiences. Each episode provides an in-depth conversation with an industry expert who dives into their background and experience. They’ll share practical advice and insights about the techniques, tools, and technologies that every company – and every technology professional – should know about. Learn from an amazing array of founders, engineers, arch ...
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

1
Cyber Sentries: AI Insight to Cloud Security
TruStory FM
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to The Cyber Security AI Agents Show — your daily dose of everything shaping the future of cyber defense, automation, and intelligent security operations. Every day, we break down how Security AI Agents are transforming Cyber Defense.
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

1
(CS)²AI Podcast Show: Control System Cyber Security
Derek Harp
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
In this episode of The AI Security Edge, host Caroline Wong welcomes Laz for a lively conversation on the evolving role of AI in cybersecurity. From his early research to defending against AI-powered attacks, Laz shares insights, industry experiences, and even a charming tale about his fictitious Aunt Shirley. Together, they explore how AI is resha…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

AI-Powered Identity Verification: Beyond Passwords and into the Future In this episode of Cyber Sentries, host John Richards sits down with Michael Engle, co-founder and CSO of 1Kosmos, to explore how AI is revolutionizing identity verification and authentication in cybersecurity. Mike brings decades of experience from Wall Street to modern startup…
…
continue reading
T
The AI Security Edge

Gilles Walbrou joins Caroline Wong for an insightful discussion on the game changing nature of AI enabled malicious bots and the end of rule-based detection as we know it. They discuss the clever use AI for coding in the experimentation phase, personal experiences getting frustrated trying to pass CAPTCHAs (as real humans!), and the complex multi-s…
…
continue reading
Izar Tarandach joins Caroline Wong for an optimistic discussion about defense in depth and the role of secure design in business processes that leverage AI. They explore the impact of prompt injection, which is the first item on the OWASP Top 10 for LLMs. Izar promotes the use of AI by cybersecurity professionals in enhancing and improving communic…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

AI's Evolution in Security Operations: From Support to Collaboration Doron Davidson, Managing Director of Security Operations at Cyberproof, joins John Richards to explore how AI is transforming security operations and pushing SOC maturity models into new territory. With extensive experience from telecom security to founding SecBI, Doron brings uni…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

AI, Investment, and Security: A Venture Capitalist's Perspective Sherman Williams, managing partner at AI and Ventures, joins John Richards to explore the intersection of artificial intelligence, cloud security, and venture capital. As a Naval Academy graduate turned investor, Sherman brings unique insights from both military and commercial technol…
…
continue reading
T
The Cyber Security AI Agents Show

The Cyber Security AI Agents Show is the go-to podcast for security professionals, innovators, and curious minds exploring how AI-powered agents are revolutionizing modern cybersecurity. Hosted by the creators of secAgents, this show uncovers how specialized Security AI Agents are transforming how we detect threats, respond to incidents, analyze in…
…
continue reading
T
The Cyber Security AI Agents Show

Security AI Agents will transform Security Operation Center (SOCs) Big moves from Microsoft: Agent2Agent (A2A) is here. And it’s about to change the AI game in cybersecurity — forever. Last week, Microsoft quietly dropped a power move: 🔗 Agent2Agent (A2A) — an open protocol for AI agents to communicate, collaborate, and coordinate actions autonomou…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Transforming Cloud Security Through AI and Data Fabric Daniel Deeney, CEO and co-founder of Paladin Cloud, joins John Richards to explore how artificial intelligence is revolutionizing cloud security. With extensive experience as an enterprise software CEO and venture capitalist, Deeney brings unique insights from his successful track record of bui…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

In this insightful episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Gignac, Vice President of Sales at FoxGuard Solutions, (CS)²AI Fellow and a passionate OT cybersecurity evangelist. The conversation centers around some of the most pressing challenges in the control systems industry—asset visibility, patch management, and community col…
…
continue reading
T
The AI Security Edge

Vanessa Sauter and Brennan Lodge join Caroline Wong for an intense discussion of red (offensive) and blue (defensive) capabilities and how artificial intelligence is changing each. Vanessa ponders the ability for artificial intelligence to generate more secure code than a human can, and stresses the importance of red teaming and manual penetration …
…
continue reading
Caroline Wong and Daniel Miessler discuss reconstruction of productivity stacks as an example of artificial intelligence in practice. They consider the role of attacker capabilities in today's cybersecurity landscape and how power dynamics are shifting due to AI enablement and augmentation. In a real-time race between attacker and defender to be th…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Lucian Niemeyer, Chief Executive Officer of Building Cyber Security and former Assistant Secretary of Defense, joins Derek Harp to discuss the growing cyber risks to operational technology (OT) systems and the urgent need for proactive frameworks to protect public safety. Recorded live at Hack the Capitol 7.0, this episode delves into the vulnerabi…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Diving into the Rise of On-Prem AI and Cloud Security In this episode of Cyber Sentries, host John Richards is joined by Doron Caspin, a Senior Manager of Product Management at Red Hat, and Christopher Nuland, a Technical Marketing Manager at Red Hat. They explore the growing trend of on-premise open source models for running AI and the unique bene…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Roya Gordon, previously the Executive Industry Consultant - Operational Technology (OT) Cybersecurity at Hexagon Asset Lifecycle Intelligence and currently, is the Deputy CISO at ENGIE North America Inc., joins Derek Harp live from Hack the Capitol 7.0 to explore the evolving landscape of asset inventory in operational technology (OT). Roya breaks …
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

In this episode of the (CS)²AI Podcast, host Derek Harp welcomes Mehdi Tarrit Mirakhorli, Associate Professor at the University of Hawaii and a Cybersecurity Expert, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&D exp…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Derek Harp welcomes Kyle McMillian, Product Security Officer at Siemens, to discuss the evolving landscape of software bill of materials (SBOMs) and their role in modern cybersecurity. Recorded live at Hack the Capitol 7.0, this conversation unpacks the challenges and opportunities posed by SBOMs in an industry grappling with legacy systems and mod…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Derek Harp sits down with Kenneth Warren, Staff OT and Offensive Security Engineer at GRIMM Cyber, to discuss how gamification and Capture the Flag (CTF) competitions are revolutionizing cybersecurity training. Recorded live at Hack the Capitol 7.0, this conversation explores how CTFs and cyber ranges create safe, hands-on environments for learning…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Derek Harp hosts Jeff Hahn, Project Manager at Idaho National Laboratory (INL), to discuss innovative approaches to training in the ICS and OT cybersecurity space. Recorded live at Hack the Capitol 7.0, Jeff shares insights into how INL’s escape rooms provide hands-on, immersive learning experiences for professionals and students alike. The escape …
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Navigating AI Adoption: From Exploration to Implementation In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Derek Harp welcomes Rob Shaughnessy, President & CEO, Director of Psymetis, Inc., to discuss critical issues in the world of ICS and OT security, recorded live at Hack the Capitol 7.0. Rob dives into the vulnerabilities surrounding the development of innovative technologies, supply chain risks, and the evolving threat landscape posed by nation-stat…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

The intersection of cybersecurity and the food industry takes center stage as Kristin Demoranville, founder and CEO of Anson Sage and host of Bytes and Bites, joins Derek Harp at Hack the Capitol 7.0. This compelling conversation reveals how digital systems impact every aspect of the food supply chain, from farming and production to transportation …
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

In this episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Warne, co-founder of ResetCon, to discuss the intersection of cybersecurity research, critical infrastructure, and collaborative defense strategies. Recorded live at Hack the Capitol 7.0, this conversation highlights the pressing need to close gaps between academia, offensive rese…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Our host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research. Listeners will hear about …
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

1
AI's Identity Revolution: Securing Disconnected Apps and Eliminating Human Error with Bel Lepe
25:52
Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative poten…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

1
118: Preparing for Cyber Threats: A Strategic Discussion with Mark Montgomery on Securing Our Future
13:26
In this episode of the CS2AI Podcast, host Derek Harp dives deep into the evolving threats to national security and critical infrastructure with Mark Montgomery, Senior Fellow at the Foundation for Defense of Democracies. Recorded live at the Hack the Capitol 7.0 conference in Washington D.C., this episode sheds light on the increasing cyber vulner…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Join Derek Harp and his guests from Rapid7—Lonnie Best, William Price, and Nicholas Butcher—as they delve into the critical challenges and exciting opportunities within the Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity landscape. Recorded live at Hack the Capitol 7.0, this episode highlights the growing demand for O…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

In this episode of the CS²AI Podcast, host Derek Harp is joined by Lucian Niemeyer, CEO of Building Cybersecurity, for an enlightening discussion on the critical importance of protecting operational technology (OT) systems. Recorded at the Hack the Capitol 7.0 conference, Lucian emphasizes the increasing threats to critical infrastructure posed by …
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

Derek Harp hosts Virginia "Ginger" Wright, a program manager at Idaho National Laboratory, known for her pioneering work in cybersecurity for critical infrastructure. Ginger shares the history and importance of Cyber Informed Engineering (CIE) and how this engineering philosophy integrates safety protocols directly into the design of industrial sys…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Astrix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insights…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

1
114: Hack the Capitol 7.0: Building Cybersecurity Connections with Bryson Bort & Tom Van Norman
17:08
In this episode, host Derek Harp sits down with Bryson Bort and Tom Van Norman, co-founders of ICS Village and creators of Hack the Capitol. They discuss the origins and evolution of Hack the Capitol, now in its seventh year, and the conference’s unique focus on bridging cybersecurity professionals with policy makers and industry leaders. They dive…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

In this episode, the conversation centers on the critical role of operational technology (OT) security and the unique contributions of the S4 Conference. Dale Peterson shares his journey and insights into the challenges of underrepresentation in cybersecurity, especially for women and other groups, and highlights innovative scholarship initiatives …
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Open Source AI: Transparency, Sovereignty, and Who Controls the Data In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Decoding Zero Trust Security for Cloud Native Environments In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practi…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, Sean sat down with Jack Godau to dive deep into the world of pseudoanonymization. They started by discussing Jack's career trajectory working with highly sensitive data and how that experience shapes his engineering mindset. Jack shared how pseudoanonymization differs from anonymization, explaining its value for maintaining data ut…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, Sean sits down with Ben Burkert, Co-founder and CTO of Anchor, to dive into the world of certificate management and internal TLS. We explore how certificates and TLS function, the inherent difficulties in managing internal TLS certificates, and why nearly every engineer has a horror story related to it. Ben also shares insights int…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

1
Decoding Machine Language: The Next Phase of the AI Cloud Security Revolution with Murali Balcha
27:00
Decoding the Language of Machines: AI's Potential to Revolutionize Cloud Security In this episode of Cyber Sentries, host John Richards is joined by Murali Balcha, founder and CTO at Trilio, to explore how AI could transform cloud security by understanding the unique language of machines. Balcha brings over 20 years of experience in IT, particularl…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, we sit down with Ori Rafael, CEO and Co-founder of Upsolver, to explore the rise of the lakehouse architecture and its significance in modern data management. Ori breaks down the origins of the lakehouse and how it leverages S3 to provide scalable and cost-effective storage. We discuss the critical role of open table formats like A…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, Sean Falconer is joined by Aubrey King, solutions architect and community evangelist at F5, to discuss the top 10 security issues for LLM applications. They explore critical threats such as prompt injections, insecure output handling, and training data poisoning, among others. Aubrey provides insights into why these issues arise, t…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, host Sean Falconer sits down with Eric Flaningam, a researcher at Felicis Ventures, to explore the fascinating world of data warehouses. They dive into the history, evolution, and future trends of data warehousing, shedding light on its importance. Key topics discussed include an overview of the article "A Primer on Data Warehouses…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

1
Navigating the AI Revolution in AppSec: Ori Bendet's Insights on the Future of Application Security
31:50
Ori Bendet Shares Insights on AppSec and Managing AI Risks In this episode of Cyber Sentries, John Richards is joined by Ori Bendet, VP of Product Management at Checkmarx, a leader in application security. They explore the critical role of application security in today's digital landscape and discuss strategies for managing the risks and opportunit…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

Join us as we chat with Tim Jensen, a privacy enthusiast, about personal online security. Tim shares his journey to becoming a privacy advocate and teacher and provides insights into the common mistakes people make with passwords. We discuss why passwords have persisted for over 60 years, the issues with current password creation methods, and the b…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode Sean welcomes Brian Vallelunga, CEO and founder of Doppler, to discuss secrets management. Brian shares the journey of founding Doppler, a company dedicated to securing sensitive data such as API keys and credentials. Sean and Brian discuss the nuances of secrets management, its distinction from password management, and the importan…
…
continue reading
C
Cyber Sentries: AI Insight to Cloud Security

Kubernetes, AI, and Edge Computing: A Powerful Combination In this episode of Cyber Sentries, John Richards is joined by Saad Malik, CTO and co-founder of SpectroCloud, to explore the intersection of Kubernetes, AI, and edge computing. Saad shares his insights on how these technologies are transforming various industries and the challenges organiza…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, Sean is joined by Eric Dodds, Head of Product Marketing at RudderStack, to dive into the world of data management, data pipelines, and common data mistakes. Eric shares his insights on when organizations should transition from basic tools like spreadsheets to a more sophisticated data stack, including data warehouses and modern too…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

1
112: Breaking Barriers in Cybersecurity: Roya Gordon’s Transformative Journey and Expert Advice for Veterans
46:51
Today, we are thrilled to welcome Roya Gordon as our guest. Roya is an executive industry consultant specializing in operational technology, cybersecurity, and Hexagon. She is a military veteran, an accomplished technologist, and a prolific speaker in our industry. Her creativity knows no bounds, encompassing her passion for the arts and her love o…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

We are thrilled to have Max Aulakh, the Founder and CEO of Ignyte Assurance Platform, joining us today. Max is a military veteran and motorcycle enthusiast who enjoys doing voluntary work. He is a prolific contributor to the cybersecurity community, always willing to be of service to others. When Max was three, his father applied for American citiz…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

We are delighted to have Mike Holcomb joining us on the show today. Mike is both a fellow and a cybersecurity director, and he currently serves as the ICS OT Cybersecurity Global Lead at Fluor, a massive multinational engineering and construction firm with over 40,000 employees. He has participated in many major building projects, and we are excite…
…
continue reading
P
Partially Redacted: Data, AI, Security, and Privacy

In this episode, Kirk Marple, CEO and Co-founder of Graphlit, joins the show. Sean and Kirk dive into the world of unstructured data management, discussing the evolution and current challenges in the field. While structured data has been well-handled since the 1970s, 80-90% of the world’s data remains unstructured, with predictions of 175 billion t…
…
continue reading
(
(CS)²AI Podcast Show: Control System Cyber Security

We are delighted to have Chase Richardson, the VP of Consulting at Bridewell, back on the show today. Bridewell boasts a rich history in industrials, offering comprehensive cybersecurity services across the entire cybersecurity spectrum, including operating technology. Recently, Bridewell came up with an insightful report on cybersecurity within th…
…
continue reading