
inglés
Negocios
$99 / mes después de la prueba.Cancela cuando quieras.
Acerca de Reimagining Cyber - real world perspectives on cybersecurity
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.As featured on MillionPodcasts' Best 100 Cybersecurity Podcastshttps://www.millionpodcasts.com/cyber-security-podcasts/Top 50 Chief Information Security Officer CISO Podcastshttps://www.millionpodcasts.com/ciso-podcasts/Top 70 Security Hacking Podcastshttps://www.millionpodcasts.com/security-hacking-podcasts/
AI Compliance : New Rules, But Are You Ready?
AI is evolving faster than most organizations can keep up with — and the truth is, very few companies are prepared for what’s coming in 2026. In this episode of Reimagining Cyber, Rob Aragao speaks with Ken Johnston, VP of Data, Analytics and AI at Envorso, about the uncomfortable reality: autonomous AI systems are accelerating, regulations are tightening, and most businesses have no idea how much risk they’re carrying. Ken explains why companies have fallen behind, how “AI governance debt” has quietly piled up, and why leaders must take action now before the EU AI Act and Colorado’s 2026 regulation bring real financial consequences. From AI bias and data provenance to agentic AI guardrails, observability, audits, and model versioning — Ken lays out the essential steps organizations must take to catch up before it’s too late. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts [https://www.millionpodcasts.com/cyber-security-podcasts/] Top 50 Chief Information Security Officer CISO Podcasts [https://www.millionpodcasts.com/ciso-podcasts/] Top 70 Security Hacking Podcasts [https://www.millionpodcasts.com/security-hacking-podcasts/] This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com
Cybercrime Reset - Life After Operation Endgame - Ep 178
Operation Endgame didn’t just disrupt a single ransomware group — it shook the entire cybercrime economy. In this episode, we break down how the world’s largest coordinated cyber takedown dismantled the loaders, botnets, and access brokers that ransomware groups relied on… and what criminals are building in their place. Cybersecurity expert Tyler Moffitt unpacks: * How Endgame crippled the cyber underground’s supply chain * Why ransomware groups are collapsing, splintering, or turning sloppy * The rise of micro-crews, info-stealers, and cloud-session takeovers * How AI is accelerating criminal tactics * What defenders must prioritize heading into 2026 The threat landscape has changed dramatically — here’s what you need to know to stay ahead. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts [https://www.millionpodcasts.com/cyber-security-podcasts/] Top 50 Chief Information Security Officer CISO Podcasts [https://www.millionpodcasts.com/ciso-podcasts/] Top 70 Security Hacking Podcasts [https://www.millionpodcasts.com/security-hacking-podcasts/] This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com
AI in OT: A Wake Up Call - Ep 177
In this episode, Rob Aragao welcomes back cybersecurity expert and author Michael Echols to unpack the urgent realities behind his new book, AI Chaos. Michael explains how AI is rapidly entering operational technology (OT) systems—the infrastructure that runs our power grids, water systems, transportation, satellites, and more. But with this transformation comes a critical problem: leaders don’t truly understand where AI is operating, how it behaves, or how to control it. Together, Rob and Michael explore: * How AI-driven OT systems are reshaping today’s critical infrastructure threat landscape * Why future failures may not come from hackers—but from AI-enabled automation that organizations can’t see or shut off * The hidden vulnerabilities created by interconnected sensors, ML models, and autonomous decision loops * How organizations should rethink resilience, governance, and risk in an AI-powered world * Michael’s AIM Frame maturity model and how leaders can assess their readiness for AI incidents * Practical steps security and technology leaders should take now to map AI usage, increase visibility, and prepare for inevitable model drift or autonomous system failures If your organization relies on OT, automation, or AI-driven systems, this conversation is a must-listen wake-up call. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts [https://www.millionpodcasts.com/cyber-security-podcasts/] Top 50 Chief Information Security Officer CISO Podcasts [https://www.millionpodcasts.com/ciso-podcasts/] Top 70 Security Hacking Podcasts [https://www.millionpodcasts.com/security-hacking-podcasts/] This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com
Beware, The Christmas Shopping Cyber Scams - Ep 176
Tis the season… for cybercrime. In this episode of Reimagining Cyber, senior security analyst Tyler Moffitt breaks down how cybercriminals exploit the Christmas and holiday season to launch phishing attacks, ransomware, smishing scams, and gift card fraud. From AI-powered fake delivery emails to cloned charity pages, learn how attackers are getting more sophisticated than ever—and what you can do to protect yourself, your business, and your customers during the busiest shopping months of the year. Key Takeaways: * Why peak shopping season equals peak cybercrime * The latest holiday scams targeting retailers and consumers * AI, voice cloning, and automated gift card fraud * Practical tips to secure accounts, vendor payments, and distribution centers It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts [https://www.millionpodcasts.com/cyber-security-podcasts/] Top 50 Chief Information Security Officer CISO Podcasts [https://www.millionpodcasts.com/ciso-podcasts/] Top 70 Security Hacking Podcasts [https://www.millionpodcasts.com/security-hacking-podcasts/] This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com
The Sensors Are Listening - Ep 175
Your devices may be giving away more than you think. In this episode of Reimagining Cyber, security expert Tyler Moffitt explores the hidden world of side-channel attacks — where everyday sensors reveal information you never intended to share. From Android apps that can infer your two-factor codes without screenshots, to gaming mice that “hear” speech through micro-vibrations, to Wi-Fi routers that detect motion inside your home, Tyler breaks down the cutting-edge research that blurs the line between science fiction and reality. He unpacks how these attacks work, what’s real versus proof-of-concept, and—most importantly—how to stay secure. Expect practical takeaways about permissions, firmware updates, passkeys, and a healthy dose of cybersecurity paranoia. Key Topics: * How Android’s display timing leaks on-screen secrets * Why gaming mice might act like tiny microphones * The evolution of Wi-Fi motion sensing from hacker demos to home features * Practical privacy steps for everyday users Bottom Line: If it hums, blinks, or vibrates—it could be talking. It's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners! As featured on Million Podcasts' Best 100 Cybersecurity Podcasts [https://www.millionpodcasts.com/cyber-security-podcasts/] Top 50 Chief Information Security Officer CISO Podcasts [https://www.millionpodcasts.com/ciso-podcasts/] Top 70 Security Hacking Podcasts [https://www.millionpodcasts.com/security-hacking-podcasts/] This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via reimaginingcyber@gmail.com
Elige tu suscripción
Premium
20 horas de audiolibros
Podcasts solo en Podimo
Podcast gratuitos
Cancela cuando quieras
Empieza 7 días de prueba
Después $99 / month
Empieza 7 días de prueba. $99 / mes después de la prueba. Cancela cuando quieras.