Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally.
Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever-evolving threat landscape, including innovative approaches to data protection and insider threat mitigation.
Each episode features thought leaders and influencers who share their expertise and experiences, providing valuable perspectives on how to tackle cybersecurity challenges effectively. Whether you are a business leader, a government official, or simply interested in cybersecurity, "To the Point Cybersecurity" delivers the knowledge you need to stay informed and protected.
Rachael Lyon hosts the podcast, bringing over 20 years of experience in technology and work with global industry leaders and innovative start-ups. Co-host Jonathan Knepher serves as the Vice President of Site Reliability Engineering at Forcepoint. With nearly two decades of experience in cybersecurity and strategic leadership, Jonathan is focused on enhancing system reliability and performance.
Tune in on Apple Podcasts, Spotify, and other major platforms to keep up with the latest in cybersecurity.
Richard shares what he thinks a successful SASE architecture looks like and why it will lead us to secure Cloud. For links and resources discussed in this episode, please visit our show notes at http…
RSA's theme this year: Human Element--very telling of what's important to the industry, we are moving away from point, event solutions to holistic, human centric solutions. Guests: Rachael Lyon, Forc…
Randall (Randy) Sandone, CCISO, CIRI Executive Director a Department of Homeland Security Center of Excellence discusses how CIRI is helping improve the security and resilience of our Nation’s critic…
The state of the adversary. The who, the what, the why they do what they do.
2020 Final Three Predictions, Part 2 of 2: Cloud smart not dumb, Mature approach to data and privacy, Indicators of Compromise IoC to Indicators of Behavior IoB. Nicolas Fischbach, Forcepoint's CTO, …
2020 Predictions, Part 1 of 2: On Deepfakes and 5G. Nicolas Fischbach, Forcepoint's CTO, Phil Goldstein of FedTech and Mike Gruss of Fifth Domain weigh in on how Deepfakes and 5G will affect Governme…
Katherine “Katie” Arrington, Chief Information Security Officer for Assistant Secretary for Defense Acquisition, gets down to the nitty gritty of CMMC, Part 2 of 2 episodes. For links and resources d…
Katherine “Katie” Arrington, Chief Information Security Officer for Assistant Secretary for Defense Acquisition, gets down to the nitty gritty of CMMC, Part 1 of 2 episodes. For links and resources d…
Richard C. Schaeffer, Jr. is a former Senior Executive with the National Security Agency (NSA), with over 40 years total U. S. Government service, including 15 years as a member of the Defense Intell…
Richard C. Schaeffer, Jr. is a former Senior Executive with the National Security Agency (NSA), with over 40 years total U. S. Government service, including 15 years as a member of the Defense Intell…
Michael C. Theis uses his 25+ years as a Counterintelligence Special Agent supporting the US Intelligence Community along with his 30+ years of concurrent computer systems engineering experience to a…
For organizations, managing threats is a journey, as they steadily build up their capabilities to effectively mitigate risk. Toby Ryan, VP of Analytics Engineering at Forcepoint, discusses how to dev…
Dave Egts, Chief Technologist for Red Hat, discusses the power of open source security automation. Dive into the benefits of removing human error and slowness to respond to the advent of short-lived …
The Cybersecurity Maturity Model Certification, or CMMC, is the next stage in the Department of Defense's (DoD) efforts to properly secure the Defense Industrial Base (DIB). In the simplest of terms,…
The Cybersecurity Maturity Model Certification, or CMMC, is the next stage in the Department of Defense's (DoD) efforts to properly secure the Defense Industrial Base (DIB). In the simplest of terms,…
Phil Goldstein, Senior Editor of FedTech and StateTech joins the podcast this week to discuss government cybersecurity challenges including election security, artificial intelligence and ransomware a…
Mikel Gruss, Editor of Fifth Domain and C4ISRNET joins Eric and Arika this week to discusses how cybersecurity messaging gets lost, the impact of fake twitter account on national security and shamroc…
In celebration of our 52nd episode Eric and Arika recap some of their favorite episodes over the past year.
This week Army Strategist and Lt. Colonel Arnel David joins us from the UK to discuss the intersections between people, connectivity and cybersecurity.
Dr. Zero Trust Chase Cunningham joins the podcast this week to discuss how after 30 years organizations are finally approaching cybersecurity strategy the right way.