The Cybersecurity Readiness Podcast Series

The Cybersecurity Readiness Podcast Series provides a reflective, thought-provoking, and jargon-free discussion on how to enhance the state of cybersecurity at an individual, organizational, and national level. The overall goal is to socialize the cybersecurity conversation and make it mainstream. The guests appearing on the different episodes are subject matter experts, business and technology leaders, educators, and members of user communities.

The podcast series is in its third year, has produced over 70 episodes, been downloaded over 10K times and has listeners in 105 countries.

The podcast episodes are used in classrooms, for corporate training, and serve as insight sources in research and publications.

Published Episodes

2024
# Date Episode Title Guest
78 Dec 31, 2024 Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025 Shrav Mehta, Founder, and CEO at Secureframe
77 Dec 14, 2024 Stopping Deepfake Threats Through Identity Verification Aaron Painter, CEO at Nametag,
76 Nov 20, 2024

From reactive to proactive: How behavioral psychology is transforming enterprise security

 

Lynsey Wolf, Team Lead and Insider Threat Analyst at DTEX Systems
75 Nov 1, 2024 Compliance in the Cloud: Challenges and Best Practices Dale Hoak, Director of Information Security at RegScale
74 Oct 20, 2024 Reducing the Risk of Social Engineering to Exploit IT Help Desk

Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education

Ori Eisen, the Founder and CEO of Trusona

73 Oct 7, 2024 Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber Education Laurie Salvail, Ph.D., Executive Director of CYBER.ORG
72 Sept 23, 2024 Large Language Model (LLM) Risks and Mitigation Strategies Rohan Sathe, Co-founder & CTO/Head of R&D at Nightfall.ai
71 Sept 2, 2024 Identity Continuity in Multi-Cloud Environments Eric Olden, Co-Founder, Chairman, and Chief Executive Officer of Strata Identity
70 Aug 21, 2024 Securing SMBs serving Defense Industrial Base and U.S. Critical Infrastructure Chris Peterson, Co-Founder and CEO of RADICL
69 July 31, 2024 2024 Cyber Trends and Predictions: Global IT Outage and More John Funge, Managing Director at DataTribe
68 June 25, 2024 Fortifying Healthcare Data: Proactive Defense Strategies Amer Deeba, CEO and Co-founder at Normalyze
67 June 5, 2024 Quantum Computing and Cybersecurity – Examining Trends and Implications Duncan Jones, Head of Cybersecurity, at Quantinuum
66 May 22, 2024 Creating a Security-Minded Culture Chirag Shah, Model N’s Global Information Security Officer and Data Privacy Office
65 May 7, 2024 Securing the Future: Inside Student-Led Cybersecurity Clinics Sarah Powazek, Program Director – Public Interest Cybersecurity at the University of California, Berkeley Center for Long Term Cybersecurity (CLTC)
64 April 24, 2024 Developing Resilient and Secure Mission Critical Facilities (Data Centers) Spiros Liolis, Chief Technologist and Managing Consultant, EYP Mission Critical Facilities, Part of Ramboll
63 April 10, 2024 Securing Application Programming Interfaces (APIs) Jeremy Snyder, Founder & CEO of Firetail.io
62 March 27, 2024 The Last Line of Defense Against a Ransomware Attack Gabe Gambill, VP of Product and Technical Operations at Quorum
61 March 13, 2024 Overcoming the Stale Nature of Tabletop Exercises Navroop Mitter, the CEO of ArmorText
60 Feb 28, 2024 Securing Artificial Intelligence (AI) Applications Chris Sestito (Tito), Co-Founder and CEO of Hidden Layer
59 Feb 14, 2024 Building a Resilient Disaster Recovery Infrastructure Sagi Brody, Co-Founder and CTO at Opti9
2023
# Date Episode Title Guest
58 Nov 22, 2023 Unraveling the Positive and Negative Impacts of Generative AI Tony Hoang, Ph.D., Host of Artificial Intelligence Podcast
57 Nov 1, 2023 Best Practices for Overcoming Troublesome Vulnerability Management Trends Ashley Leonard, CEO at Syxsense
56 Oct 18, 2023 Streamlining and Improving Security by Standardizing Identity Management Gerry Gebel, Head of Standards at Strata Identity
55 Oct 3, 2023 How Informed is the Board of Directors on Cybersecurity Risks? Kayne McGladrey, Field CISO at Hyperproof and a senior IEEE member
54 Sept 6, 2023 Enhancing Incident Response Effectiveness Markus Lassfolk, VP of Incident Response, Truesec, and Morten von Seelen, Vice President of the Truesec Group
53 July 12, 2023 Cybersecurity in the Age of AI Ian L. Paterson, CEO, Plurilock
52 June 28, 2023 Identity Orchestration Strategies and Best Practices Eric Olden, Co-founder and CEO at Strata Identity
51 June 14, 2023 Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage Ashley Podhradsky, Vice President of Research and Economic Development at Dakota State University

Kriti Arora, Security Global black belt, Threat Intelligence and External Attack Surface Management, Microsoft, North America

50 April 26, 2023 Countering Insider Threats: Seven Science-Based Commandments Dr. Eric Lang, Ph.D., Director, Personnel and Security Research Center (PERSEREC), United States Department of Defense
49 April 14, 2023 Mitigating Risks from Unmonitored Communication Channels Garth Landers, Director of Global Product Marketing at Theta Lake
48 March 30, 2023 Implementing Secure and Fast Authentication Processes Slavik Markovich, Co-founder and CEO, Descope
47 March 15, 2023 Proactive Resilient Approach to Cybersecurity Kriti Arora, Security Global Black Belt, Threat Intelligence and Enterprise Attack Surface Management, Microsoft
46 March 1, 2023 The Challenges and Best Practices of Cyber Security in Emerging Markets Andre Keartland, Solutions Architect at Netsurit, Johannesburg, South Africa,
45 February 15, 2023 Cybersecurity Perspectives of a Community College President Pamela Senegal, President, Piedmont Community College

Charle LaMonica, the Director of University of North Carolina’s World View Program

44 February 1, 2023 From Law Enforcement Officer to Chief Information Security Officer Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School
43 January 18, 2023 To trust or not to trust: the overwhelming challenge Beatrice Cadet, Scientist Integrator at Netherland’s Organization for Applied Scientific Research (TNO)
42 January 4, 2023 Useful Technology Should Be Attack Agnostic Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency
2022
# Date Episode Title Guest
41 December 22, 2022 Do you see what attackers see? Threat modeling done right Marcos Lira, Lead Solutions Engineer at Halo Security
40 December 7, 2022 Implementing Phishing Resistant Multifactor Authentication George Gerchow, Chief Security Officer and Senior Vice President of IT, Sumo Logic
39 November 23, 2022 How do SMBs protect themselves from ransomware attacks? Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions
38 November 9, 2022 Cybersecurity As A Strategic Opportunity Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist
37 October 26, 2022 Comprehensive Asset Discovery Huxley Barbee, Security Evangelist at runZero and former Cybersecurity Practice Lead at Cisco
36 October 12, 2022 Is Cybersecurity A Moving Target at Academic Institutions? Tej Patel, Vice President, and CIO at Stevens Institute of Technology
35 September 28, 2022 Securely Migrating to the Cloud — Insights from the American Cancer Society Experience Keith Weller, former Vice President, Enterprise Technology Services, American Cancer Society (ACS)
34 September 14, 2022 Detecting Malicious Insider Threats by Monitoring User Journeys Doron Hendler, CEO, and Co-Founder at RevealSecurity
33 August 31, 2022 Skilling Up for Security Operations Center Roles

James Risler, Senior Manager, Cisco Learning and Certifications

 

32 August 17, 2022

Bridging the Gap Between Intentions and Practicality in Cybersecurity

 

Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka

 

31 August 3, 2022 Preparing for the Future of Device Management

Mike McNeill, CEO, Fleet Device Management,

 

30 July 20, 2022 The State of Attack Surface Management David Monnier, Team Cymru Fellow
29 July 6, 2022 Global Security and Post Breach Management Best Practices

Tim Callahan, Senior Vice President, and Global Chief Information Security Officer, Aflac

 

28 June 22, 2022 How to Tackle Burnout in Cybersecurity

Thomas Kinsella, Co-Founder & Chief Operating Officer at Tines

 

27 June 8, 2022 Actionable Threat Intelligence and the Dark Web

Victoria Kivilevich, Director of Threat Research at KELA Group

 

26 May 25, 2022 Reducing the Disconnect Between Security and Development Teams

Harshil Parikh, CEO and Co-Founder Tromzo

 

25 May 11, 2022 Perspectives of a Global Chief Information Security Officer (CISO) Vishal Salvi, CISO & Head of Cyber Practice at Infosys,
24 April 27, 2022 Thinking Like A Hacker Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators
23 April 13, 2022 Is Cybersecurity Regulatory Compliance Good Enough? Dixon Wright, Vice President, Vice President, Compliance Management and Automation Platform, Coalfire
22 March 30, 2022 Is Cyber Insurance Necessary? Erica Davis, Global Co-Head of Cyber, Guy Carpenter & Co
21 March 16, 2022 Dealing with Cyber Trauma Patrick Wheeler, a Luxembourg-based cybersecurity practitioner and Director of the Cyber Wayfinder Program,
20 March 2, 2022 A Deep Dive into Ransomware Attacks and Negotiations  Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent
19 Feb 16, 2022 Making Cybersecurity Communication Effective Marcin Ganclerz, Cybersecurity Awareness and Training Expert
18 Feb 2, 2022 Securing the Smart Supply Chain Alan Mihalic, President IoT Security Institute
17 Jan 19, 2022 Reducing the Carbon Footprint Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance
16 Jan 5, 2022 Role of Emotional Intelligence in Creating a Healthy Information Security Culture Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive
2021
# Date Episode Title Guest
15 Dec 22, 2021 Significance of the Human Element in Cybersecurity Prof. Missy Cummings, Pratt School of Engineering, Duke University
14 Dec 8, 2021

Enhancing Organizational Readiness by Simulating Cyber Attacks 

 

Robert Austin, Professor, Ivey Business School, London, Ontario, Canada
13 Nov 24, 2021 Cybersecurity is Patient Safety Stoddard Mannikin, Chief Information Security Officer, Children’s Healthcare of Atlanta
12 Nov 10, 2021 Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management

Anne Leslie, Threat Management Consultant, IBM Security

 

11 Oct 27, 2021 Fly the Plane: A CIOs Approach to Cybersecurity Readiness Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia
10 Oct 13, 2021 Passwordless Authentication: Myths and Realities Ori Eisen, Founder and CEO of Trusona
9 Sept 29, 2021 Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs) Mike Benz, Partner | Fractional CIO at Fortium Partners
8 Sept 15, 2021 What Does Good Cyber Governance Look Like? A Legal Perspective Rois Ni Thuama, Ph.D. (Doctor of Law), Head of Cyber Governance, Red Sift
7 Sept 1, 2021 Multidisciplinary and Integrative Approach to Cybersecurity Education Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duke University’s Pratt School of Engineering
6 Aug 18, 2021 Holistic Approach to Cybersecurity Readiness Ram R. Kumar, Executive Director, AT&T Business
5 Aug 4, 2021 Being An Effective Chief Information Security Officer (CISO) Richard Biever, Chief Information Security Officer, Duke University
4 July 21, 2021 The Human Vulnerability Factor Jenny Radcliffe, also known as “The People Hacker,” a world-renowned Social Engineer
3 July 7, 2021 Going Above and Beyond the Mandated Checklist Tushar Sachdev, Executive Vice President, and Chief Technology Officer, KORE Wireless
2 June 23, 2021 Protecting Academic Institutions from Ransomware and Other Forms of Attacks Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburg
1 June 8, 2021 Role of Top Management in Cybersecurity Governance Rohit Verma, CEO of Crawford and Company

PRESS REPORTS/NEWS ARTICLES

 

Audience and Exposure

  • The audience for the podcast series is global, comprising practitioner and academic communities.
  • The following are representative of the platforms used to share the podcast episode.
    • Dave Chatterjee’s LinkedIn network
    • Dave Chatterjee’s podcast distribution list
    • Several major cybersecurity groups on LinkedIn
    • The global Association for Information Systems listserv
    • Summary of each podcast episode is posted on ResearchGate, a professional network for scientists and researcher

Representative Testimonials

The Cybersecurity Readiness Podcast by Prof. Chatterjee is a great source of inspiration and learning. As someone who teaches in the field of cybersecurity, this podcast is an absolute go-to for me; not only do I hear first-hand from executives what keeps them awake, I also learn many down-to-earth, applied and impressive examples about what organizations are doing to increase their level of cybersecurity maturity. The balance between technical know-how presented and strategic implications is just right, and this makes the podcast accessible to everyone who is interested in learning more about cybersecurity.
Öykü Işık

Professor of Digital Strategy and Cybersecurity, Institute for Management Development, Lausanne, Switzerland

If you are interested in proactive cybersecurity, Dr. Dave Chatterjee, Ph.D., hosts a wonderful podcast that’s well worth a listen.
Leandra Jordaan

Central University of Technology, Free State, South Africa

The Cybersecurity Readiness Podcast is a terrific resource for practitioners of all levels. It brings together a carefully curated selection of domain experts representing a diverse cross-section of perspectives across the full scope of cybersecurity disciplines. I personally find the depth of pragmatic advice and actionable insight in every episode immensely valuable.
Anne Leslie

Cloud Risk & Controls Leader, IBM Europe

I was a former student of yours in MIS at the University of Georgia and I am an avid listener of your cybersecurity readiness podcast and have had an opportunity to read your book that you published. I really enjoy the topics that you cover and the guest speakers that you have had on the show. They are very applicable and useful to our everyday work experiences within the industry.
Rawley Lind

Manager Cyber Security Advisory, West Monroe

The Cybersecurity Readiness podcast is one of the most comprehensive podcasts on the subject. Dave invites guests from a wide variety of backgrounds and covers a wide range of topics on Cybersecurity. There are practitioners to forensic experts, corporate executives to professionals with government experiences. Dave makes the conversations interesting and insightful, and I am sure he spends a lot of time preparing for these. The episodes cover the macro to the micro of cybersecurity, and I would highly recommend it to everyone; whether you are a student, cyber professional, executive or simply someone trying to get familiar with the different facets of cybersecurity.
Tushar Sachdev

Chief Technology Officer, KORE Wireless

I have had the pleasure of regularly tuning into Dr. Dave Chatterjee’s Cybersecurity Readiness Podcast Series, which has been instrumental in enhancing my understanding of cybersecurity, particularly in the realm of large language models (LLMs). Dr. Chatterjee’s insightful discussion on LLM security risks and mitigation strategies provided me with valuable guidance that directly impacted my work. Thanks to his expertise, I successfully implemented critical safeguards in my projects, including mechanisms to halt the execution of vulnerable SQL and Python code generated by LLMs. His ability to distill complex concepts into actionable advice is truly commendable and has made a significant difference in my approach to securing LLM applications. I am immensely grateful for Dr. Chatterjee’s contributions to the cybersecurity community and eagerly anticipate future episodes.
Rahul Sharma

Ph.D., Informatics Architect, Department of Biomedical Informatics and Data Science, University of Alabama at Birmingham.

Applause are in order to Dr. Dave Chatterjee for his enlightening book, “Cyber security Readiness” , and his educational Cybersecurity Readiness Podcast series, showing that Cybersecurity is not just of importance to practitioners, but also of importance to everyone concerned with protecting their personal data.

Jon D. Jividen

MBA, retired Financial Advisor, Raleigh, NC.

COPYRIGHT © 2024 | Debabroto ‘Dave’ Chatterjee, PH.D. | ALL RIGHTS RESERVED.