This site uses cookies to ensure you get the best experience. Learn more

Sign up or log in to follow your favorite podcasts and listen to episodes!

To The Point - Cybersecurity

Kristina Dettweiler, Forcepoint | Global Cybersecurity Leader | Protecting the Human Point
100 episodes
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government.

Disclaimer: the content and artwork of this podcast are the property of its owner and are not affiliated with nor endorsed by Audiotrails.

Deciphering Cyber's Rhetorical Catchphrases Part 2 - Mariam Baksh

Part 2 of our two-part series with Mariam Baksh, Cybersecurity Policy Reporter at NextGov. As a reporter on the front lines of security policy as it happens Mariam shares perspective on how cyber picked her, rhetorical catchphrases shaping global perception and cyber responses, gaining clarity on i…

Deciphering Cyber's Rhetorical Catchphrases - Mariam Baksh

This week we kick off a two-part series with Mariam Baksh, Cybersecurity Policy Reporter at NextGov. As a reporter on the front lines of security policy as it happens Mariam shares perspective on how cyber picked her, rhetorical catchphrases shaping global perception and cyber responses, gaining cl…

A Focus on Resiliency with CISA’s Eric Goldstein

This week we discuss the importance of a focus on assuring resiliency of critical functions as the cybersecurity path ahead with Eric Goldstein, Executive Assistant Director for Cybersecurity for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Eric als…

Who’s Got The Stick for the Cyber Moonshot?

This week we catch up with Lisa Donnan, Partner at Option3 Ventures to discuss the world of cyber venture capital and private equity and the importance of disruptive technology and commercialization for breaking through the white noise of the more than 3,500 cyber start-ups today. And she shares in…

Security's Golden Ticket

This week we sit down with Charlene Mowery, Director of Strategic Initiatives at Red Hat who shares insights and lessons learned on leadership and moving forward seemingly impossible and incredibly complex multi-stakeholder initiatives to success, such as the Ford Island Master Development Agreemen…

The Prescience Challenge in Cybersecurity [PART 2]

The next two weeks we catch up with SC Media Editor-in-Chief Jill Aitoro for a two-part discussion on the latest hot cybersecurity news drivers such as the continuing Microsoft Exchange hacker feeding frenzy and continuing discoveries from the SolarWinds supply chain attack. Both of which raise mor…

The Prescience Challenge in Cybersecurity [PART 1]

The next two weeks we catch up with SC Media Editor-in-Chief Jill Aitoro for a two-part discussion on the latest hot cybersecurity news drivers such as the continuing Microsoft Exchange hacker feeding frenzy and continuing discoveries from the SolarWinds supply chain attack. Both of which raise mor…

Here Come the Cyber Cartels

This week we catch up with Tom Kellermann, Head of Cybersecurity Strategy at VMWare to discuss the explosion in, and growing aggression of, cyber cartels and the differences in attack motives across nation-state attackers and the offer that just can’t be refused by the “untouchables”. We also dive …

Optimism For The Cyber Path Ahead?!

Hacker turned lawyer. Professor. Geologist. Policy influencer. Just a few words to describe this week’s guest Evan Wolff, partner in Crowell & Moring’s D.C. office and Co-Chair for the firm’s Privacy and Cybersecurity Group. After a career spent in cyber risk management and helping organizations th…

The Picasso of Cyberattacks Has Only Just Begun [Part2], With Travis Howerton

We pick up part two of our discussion with C2 Labs Co-Founder and CTO Travis Howerton looking at how the best laid plans start with the truth. And we explore the security path forward in a hyper-connected world where we move more heavily into IoT and everything is connected, dying air gaps and dist…

The Picasso of Cyberattacks Has Only Just Begun [Part1], With Travis Howerton

The Picasso of Cyberattacks Has Only Just Begun – Part I Travis Howerton of C2 Labs joins the podcast for an insightful discussion on the global threat landscape through the lens of his more than 20+ years working on the front lines of national security with organizations such as National Nuclear S…

Understanding the "Who" in Cyber with Dr. Margaret Cunningham

In this episode we explore the intersection of cybersecurity and human behavior with returning guest, Dr. Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint X-Labs. For public and private sector organizations, cybersecurity has always been addressed as a technology-f…

Insights From The Cyber Front Line with CTA's Michael Daniel

Michael Daniel, President and CEO of the Cyber Threat Alliance (CTA) and former Special Assistant to President Obama and Cyber Coordinator on the National Security Council staff shares insights from his front row seat on the federal government cyber frontline from 2012 to 2017, perspective on the n…

Cloud Is Great - Until It Isn't

In this episode we dive into the complex world of cloud security with Chris Hughes, Managing Cybersecurity Consultant, Oteemo. For organizations in both the public sector and the enterprise, navigating the needed cloud acceleration the last year in the midst of mass remote work has created both sig…

Dr. Chase Cunningham and the Impact and Future of Zero Trust

Dr. Chase Cunningham, previously with Forrester Research and now with Ericom, discusses Zero Trust and how COVID-19 was the nail in the coffin of the defensible perimeter. He shares his view on the importance of multi-factor authentication and user monitoring, and how Zero Trust can be applied to t…

Inside the Mind of the #Sunburst Adversary

Marco Figueroa Cyber Threat Hunter takes us inside the mind of the #Sunburst adversary. The timeline and what he would be doing were he the adversary. For links and resources discussed in this episode, please visit our show notes at  https://www.forcepoint.com/govpodcast/e117 Have a guest you thi…

Disruptionware: The 21st Century Weapon

Jason Retired FBI Supervisory Special Agent and digital laboratory director Jason G. Weiss is counsel in the Los Angeles office of the law firm Faegre Drinker, Biddle and Reath's cybersecurity and incident response group.has been doing cybersecurity his entire career, he pioneered a cybersecurity c…

Insider Threat And Privileged Users

Elements of an Insider threat programs, the role Privileged users play, and how #Sunburst has affected insider threat programs with Mike Crouse, Director Insider Threat Strategies, Forcepoint, and Jared Quance, US Gov Insider Threat Program Manager. For links and resources discussed in this episode…

2020 Podcast Round Up — Carolyn and Eric's Top 10

What a fantastic year of guests, Eric and Carolyn review their top 10 guests. Be one of the first 10 to share this episode to receive your choice of one of these books (Spoiler alert): Cyber Nation, David Sanger Burn-in, Peter Singer Ghost Fleet, Peter Singer LikeWar, Peter Singer Thi…

2021 Insights And Predictions, Part 2

We continue our review of 2020's top Government cybersecurity trends like how to deal with the insider threat and baked in AI Bias. Mike Gruss, Executive Editor, Defense News, and C4ISRNET & Phil Goldstein Sr. editor for FedTech and StateTech share their 2021 cybersecurity predictions. For links an…

2021 Insights And Predictions, Part I

We review 2020's top Government cybersecurity trends, starting with Cozy Bear. We then look forward to what we think the big trends for 2021 will be with Mike Gruss, Executive Editor, Defense News, and C4ISRNET & Phil Goldstein Sr. editor for FedTech and StateTech. For links and resources discussed…

Special Episode: Sunburst Breach, With Dmitri Alperovitch, Co-Founder of CrowdStrike

Dmitri Alperovitch, Co-Founder and former CTO of CrowdStrike, joins us to discuss recent breaches in over 18,000 organizations, known by many names: Sunburst, Solorgate, Dark Halo, UNC2452. Dmitri is a renowned computer security visionary and has served as a special advisor to the Department of Def…

Dave McDonald The Crisis CIO, Marathon Mode Part 2

Part 2 Shortly after the US went into COVID 19 Quarantine David McDonald, Navy Telecommunications, Information Technology and Cyber Operations, joined us to discuss what we have learned from the COVID19 crisis and how it will better prepare us for future crisis. 8 months later we touch base.For lin…

Dave McDonald The Crisis CIO, Marathon Mode Part 1

Shortly after the US went into COVID 19 Quarantine David McDonald, Navy Telecommunications, Information Technology and Cyber Operations, joined us to discuss what we have learned from the COVID19 crisis and how it will better prepare us for future crisis. 8 months later we touch base. For links and…

Confessions of a Financial CISO with Ross Young, CISO Caterpillar Financial

Confessions of a Financial CISO. Ross Young shares his journey starting when he first discovered he wanted a career in cyber, to his exciting "pirate" days at the CIA and now as a financial CISO. He also reveals the top three things that will make the biggest impact for your organization's cybersec…

The Cloud, is it Really Secure?

Trish Cagliostro, Head of Business Development for security - Worldwide Public Sector for Security Services at Amazon Web Services (AWS) explains Cloud security, how Threat Intelligence factors in and her Cloud wish for the future. For links and resources discussed in this episode, please visit our…

Dr. Z, Former CIO of DHS, Navy and DoD talks Zero Trust

Former CIO of DHS, Navy and DoD, Dr. John Zangardi, or Dr Z (listen to hear how he got that handle) shares his perspective on the zero trust concept, the benefits and where the government is with implementation. He also provides valuable insight for advocates of zero trust, in a nutshell: more stea…

Habeas Data: Privacy Vs. the Rise of Surveillance Tech, With Cyrus Faviar

NBC News investigative tech reporter CYRUS FARIVAR and of Author "Habeas Data: Privacy Vs. the Rise of Surveillance Tech. The book explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy. For links and resources discussed in this e…

The State Of The Software Supply Chain, And What It Tells Us About The Adversary

Derek Weeks is a huge advocate of applying proven supply chain management principles into DevOps practices to improve efficiencies, reduce security risks, and sustain long-lasting competitive advantages. He reviews the State of Software Supply Chain report https://www.sonatype.com/2020ssc For li…

What is Resiliency?

Resiliency is a word that has been kicked around government for years, but what does it really mean? former Chief Security Strategist for DoD / Intelligence Community and current Forcepoint Commercial Products CTO Petko Stoyanov shares his perspectives. For links and resources discussed in this epi…