
Reimagining Cyber - real world perspectives on cybersecurity
Reimagining Cyber
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
As featured on MillionPodcasts' 'Best 100 Cybersecurity Podcast' and Best 70 Chief Information Security Officer CISO Podcasts' rankings.
All episodes
Best episodes
Seasons
Top 10 Reimagining Cyber - real world perspectives on cybersecurity Episodes
Goodpods has curated a list of the 10 best Reimagining Cyber - real world perspectives on cybersecurity episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Reimagining Cyber - real world perspectives on cybersecurity for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Reimagining Cyber - real world perspectives on cybersecurity episode by adding your comments to the episode page.

Protecting Your Business and Wallet from Cybersecurity Risks on Black Friday and Cyber Monday
Reimagining Cyber - real world perspectives on cybersecurity
11/22/23 • 13 min
Welcome to another compelling episode of the Reimagining Cyber podcast, where your knowledgeable hosts, Rob and Stan, explore the intricate landscape of Black Friday and Cyber Monday and the associated cybersecurity challenges that intensify during this festive shopping season.
Stan sheds light on the colossal scale of holiday spending, revealing that last year's Black Friday soared to an impressive 9 billion, while Cyber Monday skyrocketed to nearly 11 billion. With an astounding 197 million U.S. shoppers in the mix, the stakes are undeniably high, and the threats are alarmingly real.
The hosts pivot to the consumer side of the equation, drawing attention to the escalating sophistication of phishing emails. They caution listeners against succumbing to alluring offers that appear too good to be true and stress the paramount importance of verifying the authenticity of retail websites before divulging sensitive information.
Rob offers valuable insights into potential pitfalls for businesses, citing the recent Adobe update that addressed nine security vulnerabilities. The conversation delves into the multifaceted risks of payment fraud, ransomware attacks, and distributed denial of service (DDoS) attacks capable of disrupting e-commerce operations during this pivotal sales period.
Practical tips emerge as the hosts advocate for the crucial use of multi-factor authentication for online shopping accounts. They underscore the necessity of secure transactions facilitated by HTTPS protocols. Furthermore, Rob and Stan caution against using debit cards for online purchases and highlight the heightened risks associated with public Wi-Fi.
In summary, this episode provides not only a comprehensive understanding of the cybersecurity challenges during the holiday season but also actionable advice to navigate these threats successfully. Tune in for expert insights and safeguard your online experience during this bustling shopping period.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

LockBit: The Unstoppable Ransomware? - Ep 140
Reimagining Cyber - real world perspectives on cybersecurity
03/11/25 • 23 min
In this episode, we’re diving into the world of LockBit, one of the most notorious ransomware groups out there, and how it’s keeping law enforcement on its toes. We’ll break down their latest moves, the battle between hackers and agencies like the FBI, and what it means for cybersecurity moving forward.
Here’s what we cover:
The Kash Patel Incident: Recently, LockBit took a jab at Kash Patel, the FBI Director, in a post on their leak site. The group congratulated him on his appointment and dropped a hint that they had info that could embarrass the FBI. It’s all part of LockBit’s strategy to keep itself in the headlines and make sure it stays relevant, even as law enforcement gets serious about shutting them down.
LockBit’s Operations: LockBit operates on a ransomware-as-a-service model. What does that mean? Well, they provide the tools and infrastructure for affiliates to carry out attacks. And those affiliates don’t hold back—LockBit has gone after hospitals, government agencies, and businesses, demanding huge ransoms in the process.
Takedowns and Law Enforcement’s Response: The FBI has had some wins, like taking down LockBit’s leak site during Operation Kronos. But LockBit? It’s not exactly slowing down. They’ve bounced back with new infrastructure and continued to wreak havoc. The group seems to enjoy the back-and-forth with law enforcement, using it to attract more affiliates and keep their operation growing.
LockBit’s Evolution: The group just dropped version 4.0 of their ransomware, and they’re still advertising on their site, offering affiliates big payouts and even luxury cars for successful attacks. Now, they’ve even started to position themselves as a kind of twisted “pen-testing” service—after they ransom someone, they’ll help them find security flaws in their systems.
Law Enforcement Struggles: Despite efforts from the FBI and other agencies, ransomware groups like LockBit keep adapting. The Russia-Ukraine conflict has only made things worse, and LockBit has shown no signs of slowing down. While law enforcement is certainly stepping up, the fact remains: no major figures have been caught yet.
Practical Tips for Organizations: We’ve got some actionable advice for businesses to stay ahead of these ransomware gangs. First off, enable two-factor authentication (2FA) wherever you can. Also, don’t ignore your software updates—many attacks exploit outdated systems. And if you can, hire a professional red team to conduct penetration testing and find the holes before the hackers do..
LockBit may not be invincible, but they’re still a huge threat. The group’s persistence and ability to evolve mean that ransomware operations are going to be around for a while. The battle between cybercriminals and law enforcement is far from over, and it’s only going to escalate as these groups get more sophisticated and resilient.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Governing an AppSec Program by Empowering Dev Teams - Ep 30
Reimagining Cyber - real world perspectives on cybersecurity
03/08/22 • 18 min
While organizations need to gain visibility into application security risks, it can be challenging to build and mature an effective application security program. In this episode of Reimagining Cyber, Kristen Bell, a Senior Manager of Application Security Engineering at GuidePoint Security, shares some the best practices that she’s used to help organizations overcome common obstacles to success. Bell uses a collaborative approach between AppSec team and developers that can create a positive security-aware development culture.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

IAM, CIAM, and ZTA, The Trifecta of Access Management - Ep 24
Reimagining Cyber - real world perspectives on cybersecurity
11/29/21 • 23 min
Gary Phillips, Vice President of Customer Identity Access Management (CIAM) with E-trade, now part of Morgan Stanley, shares his expertise in the IAM and CIAM space, how it has evolved, and why it matters, in the latest Reimagining Cyber Episode, “IAM, CIAM, and ZTA: The trifecta of access management.”
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Progress Over Perfection: Implementing the Executive Order - Ep 18
Reimagining Cyber - real world perspectives on cybersecurity
08/27/21 • 26 min
Nick Ward, CISO for the Department of Justice with the U.S. Government and recent Cybersecurity Leader of the Year award winner, shares his views on the Executive Order and the key ways to make the changes outlined in the EO.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Connected Vehicles and the Cyber Equivalent of Seatbelts and Airbags - Ep 14
Reimagining Cyber - real world perspectives on cybersecurity
06/16/21 • 22 min
Ikjot Saini, Assistant Professor at the University of Windsor in Windsor, Ontario and connected and autonomous vehicle cybersecurity expert joins Rob Aragao and Stan Wisseman in this week’s Reimagining Cyber episode, “Connected Vehicles and the Cyber Equivalent of Seatbelts and Airbags“ to speak about the cybersecurity intricacies of autonomous cars, the importance of standards and regulations, working as a team, and thinking outside the box when it comes to automotive security.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Rationalizing Your Cybersecurity Budget | Security Control Degradation - EP 70
Reimagining Cyber - real world perspectives on cybersecurity
11/08/23 • 28 min
Explore the fast-paced realm of cybersecurity with this Reimagining Cyber episode featuring insights from Tim Rohrbaugh, former global CISO of JetBlue. The conversation delves into the challenges of security control degradation and the risks associated with rapid changes. Rohrbaugh emphasizes the importance of strategic planning over relying on hope, stating, "Hope is not a strategy." The discussion also ventures into the delicate balance of cybersecurity budgets, where overspending can inadvertently support criminal activities.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

The CISO: Guardian of the Digital Realm (SPECIAL EPISODE) - Ep 74
Reimagining Cyber - real world perspectives on cybersecurity
12/06/23 • 20 min
Welcome to Reimagining Cyber, where we explore the evolving role of the Chief Information Security Officer (CISO). In this special episode, Stan and Rob present a compilation of insightful clips from previous episodes.
First up, Parham Eftekhari, Executive Vice President of the Cyber Risk Alliance, discusses the transformation of the CISO role into that of a business leader. He emphasizes the importance of understanding the business side of the organization and acting as a liaison between security priorities and business leaders.
Next, Tim Rohrbaugh, former CISO of JetBlue, shares his perspective on the budgeting process for information security organizations. He emphasizes the need for the CISO to have face time with the audit committee and stakeholders, suggesting that the budget should be tied to IT metrics.
Moving to the federal sector, Nick Ward, former CISO for the Department of Justice, discusses the executive order focused on enhancing cybersecurity. He delves into supply chain risk management and the tools provided by the executive order to prioritize and secure critical software.
Roland Cloutier, former TikTok CISO, explores the challenges of securing artificial intelligence implementations. He emphasizes the importance of understanding AI infrastructure, data stores, and API connections while highlighting the need for effective network protection.
Jeff Brown, CISO of the state of Connecticut, contrasts the role of a CISO in state government with that in the private sector. He emphasizes the benefits of information sharing and collaboration among state CISOs.
Taylor Hersom explores the concept of virtual CISOs, discussing the value of leveraging external expertise, especially for startups and scale-ups. He suggests that smaller companies can benefit from third-party resources before considering a full-time CISO.
In a special segment featuring female leaders in information security, Phyllis Woodruff, Tammy Schuring, and Lori Sussman share their experiences and insights. They highlight the importance of women owning their skills, embracing their unique attributes, and creating new pictures of leadership.
This episode provides a comprehensive overview of the evolving CISO role, covering topics such as business alignment, budgeting, federal cybersecurity initiatives, AI security, virtual CISOs, and the contributions of female leaders in the field. Join us as we continue to reimagine cyber in the ever-changing landscape of information security.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Open-Source Software: Unlocking Efficiency and Innovation - Ep 88
Reimagining Cyber - real world perspectives on cybersecurity
03/13/24 • 17 min
What is the impact of open-source software (OSS) on modern software development?
This episode delves into the findings of a recent study commissioned by Open Text and conducted by Forrester called "Unlock Resources With Automated Open-Source Discovery And Intake". Stan and Rob unpack the evolving role of OSS, shedding light on both its opportunities and challenges.
With 70% of organizations reporting that over half of their coding efforts involve OSS, it's evident that OSS plays a pivotal role in accelerating innovation and reducing costs in software development. However, as the hosts discuss, this rapid adoption isn't without its hurdles.
From ensuring security and compliance to navigating through the complexities of OSS licensing, organizations face a myriad of challenges. Stan and Rob examine the ramifications of overlooking security vulnerabilities, compliance standards, and licensing terms, drawing from real-world examples to underscore the importance of diligent management practices.
But amidst the challenges lies a beacon of hope: automation. The hosts explore how automation is revolutionizing the discovery and integration of OSS components, paving the way for more secure and compliant software development processes. From streamlining discovery to prioritizing security early in the development cycle, automation holds the key to enhancing productivity and mitigating risks.
Looking ahead, Stan and Rob speculate on future directions in OSS management, emphasizing the need for collaboration, early detection of security issues, and continued innovation in the space. Whether you're a developer, a legal expert, or a cybersecurity enthusiast, this episode offers valuable insights into the ever-evolving landscape of open source software.
Tune in to gain a deeper understanding of the opportunities and challenges presented by open source software, and discover how organizations can navigate the open source seas with confidence and agility.
Report:
https://www.microfocus.com/en-us/assets/cyberres/automating-open-source-compliance
Debricked Open Source Select - a search engine where you can find, filter for and evaluate open source packages and repositories.
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.

Energizing Cybersecurity - Ep 60
Reimagining Cyber - real world perspectives on cybersecurity
03/22/23 • 25 min
Virginia “Ginger” Wright is the Energy Cybersecurity Portfolio Manager for Idaho National Laboratory’s Cybercore division within its National and Homeland Security directorate. She leads programs focused on cybersecurity and resilience of critical infrastructure for the Department of Energy, DARPA [Defense Advanced Research Projects Agency] and other government agencies.
Her recent research areas include cyber supply chain for operational technology components, instant response, critical infrastructure modeling and simulation and nuclear cybersecurity.
Some quotes from this episode:
"Idaho National Laboratory is the only national laboratory that is focused on nuclear energy. Part of that legacy was in testing what are today normal commercial nuclear installations and understanding where the boundaries of either operational resilience were, or the boundaries of particular material and installation methods that would cause that infrastructure to fail. We have, of course, taken that ability to turn things into failure and use that to develop our own adversary guided thinking about defensive cybersecurity."
"In the energy infrastructure, we have devices that are in regular use today that are decades old. In the IT world, I have Patch Tuesday where every week my critical infrastructure is updated. Then after about three years. I toss it and I get another one that is completely and wholly built on the more modern incarnation of technology. When we think about operational technology, applications, energy or water, we certainly can't re-engineer those systems on that cycle of replacement. So often we may not be able to patch or the technology that we are using is so old that the vendor is now no longer supporting patches."
"I think a lot of engineers understand materials that they build with. They understand wood, concrete, but they don't often get taught to think about digital systems in the same way they think about materials - that these systems have stress points and failure points and they can be trusted to a certain level but after that we need to build protections into our system to protect us from the ways that they can fail or be brought to failure by an adversary"
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via [email protected]
As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70
Chief Information Security Officer CISO Podcasts rankings.
Show more best episodes

Show more best episodes
FAQ
How many episodes does Reimagining Cyber - real world perspectives on cybersecurity have?
Reimagining Cyber - real world perspectives on cybersecurity currently has 144 episodes available.
What topics does Reimagining Cyber - real world perspectives on cybersecurity cover?
The podcast is about News, Security, Information Technology, Tech, Tech News, Hacking, Podcasts, Technology, Cyber, Cyber Security, Hacker and Cybersecurity.
What is the most popular episode on Reimagining Cyber - real world perspectives on cybersecurity?
The episode title 'Inside the Fight to Protect Data from Quantum Computers - Ep 43' is the most popular.
What is the average episode length on Reimagining Cyber - real world perspectives on cybersecurity?
The average episode length on Reimagining Cyber - real world perspectives on cybersecurity is 23 minutes.
How often are episodes of Reimagining Cyber - real world perspectives on cybersecurity released?
Episodes of Reimagining Cyber - real world perspectives on cybersecurity are typically released every 7 days.
When was the first episode of Reimagining Cyber - real world perspectives on cybersecurity?
The first episode of Reimagining Cyber - real world perspectives on cybersecurity was released on Dec 1, 2020.
Show more FAQ

Show more FAQ