Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy. We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives. Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you ...
…
continue reading
1
Word on the Street - AI Security’s Rapid Gold Rush with Richard Stiennon
7:29
7:29
Afspil senere
Afspil senere
Lister
Like
Liked
7:29We reconnect with Richard Stiennon to chart how AI is rewriting cybersecurity, from the rise of 290 AI security vendors to SOC automation, investor momentum, and the criteria that separate true AI players from marketing. • Explosion of AI security vendors since late 2022 • Criteria for defining AI-first cybersecurity companies • Investor appetite, …
…
continue reading
In this clip, Karl Mosgofian breaks down why most vendor pitches lose buyers in the first minutes and how to fix it with a simple, direct first-meeting flow. We show how to validate pain fast, lead with what you built, and make differentiation tangible so a champion can emerge. • One-slide pain validation with a quick head nod • Skip the long probl…
…
continue reading
1
Go-to-Market Strategies of a Veteran CIO
41:17
41:17
Afspil senere
Afspil senere
Lister
Like
Liked
41:17We explore how to sell to CIOs who are flooded with pitches yet hungry for real innovation, and how sellers can move from vague benefits to clear outcomes and CFO-ready cases. Carl Mosgofian shares how to frame differentiation, map to the stack, and help champions win internal approval. • CIO and CISO partnership realities and reporting nuance • Ve…
…
continue reading
1
AI Rapture, Hype, Faith, and Feedback Loops
40:11
40:11
Afspil senere
Afspil senere
Lister
Like
Liked
40:11We unpack how a failed “AI Rapture” spread from a viral prophecy to AI‑stamped pamphlets and sycophantic chatbots, and we trace the feedback loops that keep bad ideas alive. Along the way, we compare models, costs, and trade‑offs, and ask what real discernment looks like at work and online. • origins of the rapture rumor and AI‑branded pamphlet • s…
…
continue reading
1
Influence, AI, and the Art of Building Meaningful Connections
31:49
31:49
Afspil senere
Afspil senere
Lister
Like
Liked
31:49Josh Bruyning welcomes Rafael Ramirez to discuss communicating AI concepts, building community in cybersecurity, and navigating the tech industry as an immigrant. Rafael has almost 30,000 followers on LinkedIn. The conversation reveals practical strategies for explaining complex technologies to non-technical audiences and developing genuine profess…
…
continue reading
1
The Hidden Costs of Starting and Building a Cybersecurity Company
30:55
30:55
Afspil senere
Afspil senere
Lister
Like
Liked
30:55In this conversation, Joshua Bruyning engages with DataTribe Managing Directors Rob Ackerman and Leo Scott to explore the intricate dynamics of cybersecurity startups and venture capital. They discuss the essential qualities of successful founders, the importance of coachability, and the unique challenges faced in the cybersecurity landscape. The c…
…
continue reading
1
Old Meets New: The Hidden Costs of NOT Adopting AI
31:51
31:51
Afspil senere
Afspil senere
Lister
Like
Liked
31:51In this episode of Cybernomics, Al Kennickell joins me to discuss the importance of embracing AI in small and medium businesses, addressing common misconceptions and hesitations surrounding its use. We emphasize that many negative opinions about AI stem from a lack of understanding and experience. Our discussion highlights practical applications of…
…
continue reading
1
CISO vs BISO: Who's Really Running Security?
40:59
40:59
Afspil senere
Afspil senere
Lister
Like
Liked
40:59Charles Payne and Olivia Phillips join us to explore the evolving relationship between CISOs and BISOs, examining how business-focused security leadership is transforming cybersecurity from a technical function to a strategic business enabler. • BISOs serve as the "Swiss army knife" of the CISO, bringing deeper business knowledge to security decisi…
…
continue reading
1
Organizational Theory Meets Artificial Intelligence
33:02
33:02
Afspil senere
Afspil senere
Lister
Like
Liked
33:02We explore organizational theory applications to AI agents and examine the transformation of Security Operations Centers through artificial intelligence solutions. • Traditional organizational structures like military-style hierarchies are being applied to AI agent systems in cybersecurity • Matrix organizations with multiple reporting lines have p…
…
continue reading
1
Is SaaS Dead? The Hidden Cost of AI Agentic Companies
46:48
46:48
Afspil senere
Afspil senere
Lister
Like
Liked
46:48Josh Bruyning and Richard Stiennon explore how AI agents are fundamentally changing the SaaS industry and traditional software models. They discuss the shift from feature-based to outcome-based solutions and why companies must adapt to survive. • Richard Stiennon shares insights about Security Yearbook 2025 and IT Harvest's database tracking over 4…
…
continue reading
1
Why New Companies Are Winning Against Old Giants: The Hidden Costs and Opportunities of AI
45:20
45:20
Afspil senere
Afspil senere
Lister
Like
Liked
45:20EU's complex regulatory environment creates both challenges and opportunities for businesses navigating data privacy, financial services, and healthcare regulations across member states. • Significant differences exist between EU-wide regulations and country-specific implementations • Large companies like Meta and Uber have faced multi-million Euro…
…
continue reading
1
The Hidden Side of Protecting Your Children Online
41:31
41:31
Afspil senere
Afspil senere
Lister
Like
Liked
41:31Marcus Peet, Senior Director of Information Security at PT Solutions, shares his unique perspective as both a cybersecurity expert and father of three on navigating the complex world of digital parenting. His "growth with guardrails" philosophy demonstrates how parents can protect their children online while allowing them the freedom to develop nec…
…
continue reading
1
Word on The Street - Inside RSA's Vendor Mayhem
6:06
6:06
Afspil senere
Afspil senere
Lister
Like
Liked
6:06Kyle and I dive into the reality of the RSA Conference experience, exploring how the security industry's biggest event has transformed into a vendor-dominated spectacle with declining CISO attendance. • The conference atmosphere is overwhelmingly loud with vendors everywhere and marketing materials covering every available surface • San Francisco c…
…
continue reading
1
Market Watch - Will AI Replace Your Security Team? Hard Truths and Bold Predictions
29:52
29:52
Afspil senere
Afspil senere
Lister
Like
Liked
29:52AI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investment landscape reflects this shift, with 78% of venture capital reportedly flowing into AI companies despit…
…
continue reading
1
The Hidden Costs of Securing Law Firms
46:26
46:26
Afspil senere
Afspil senere
Lister
Like
Liked
46:26Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide. Beyond just modernizing paperwork, Dean reveals why attorneys have become prime targets for sophisticated hackers and nation-states. …
…
continue reading
1
Market Watch - AI and the Future of Security Operations
37:50
37:50
Afspil senere
Afspil senere
Lister
Like
Liked
37:50In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027. • SOC automation represents the most imme…
…
continue reading
1
Is Cybersecurity a Technology Risk or a Business Risk
30:35
30:35
Afspil senere
Afspil senere
Lister
Like
Liked
30:35Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires both leadership commitment and proper resource allocation to overcome the natural friction between IT and s…
…
continue reading
1
Why Your Business Is More Vulnerable Than You Think, The Hidden Costs of Not Knowing
38:39
38:39
Afspil senere
Afspil senere
Lister
Like
Liked
38:39Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than just a cost center. • Most companies don't need to hire a full security team – outsourcing cybersecurity …
…
continue reading
1
Market Watch: When Markets Fall, Savvy Investors Go Shopping for Cybersecurity Companies, with Richard Stiennon
41:31
41:31
Afspil senere
Afspil senere
Lister
Like
Liked
41:31Market fluctuations cause cybersecurity stocks to drop 4-7%, creating buying opportunities for savvy investors despite fears surrounding Trump's new tariff policies. • Tariff impacts vary across cybersecurity companies—hardware manufacturers like Palo Alto and Fortinet face direct challenges with 54% tariffs on Chinese-made equipment • Current tari…
…
continue reading
1
Market Research - Why Investors and Enterprises Should Invest in Israeli Cyber Companies
33:44
33:44
Afspil senere
Afspil senere
Lister
Like
Liked
33:44The extraordinary success of Israeli cybersecurity companies on the global stage represents a fascinating case study in how a small nation can dominate a critical technology sector. Despite having just 9 million citizens, Israel has become the world's second-largest hub for cybersecurity innovation, home to over 450 security startups that collectiv…
…
continue reading
1
The Hidden Costs of Protecting Medical Devices and Data
31:03
31:03
Afspil senere
Afspil senere
Lister
Like
Liked
31:03Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagnosed using a medical device, Christian dedicated his career to ensuring these life-saving technologies rem…
…
continue reading
1
The Hidden Costs of AI Employees, How to Leverage AI and Save your Job
39:58
39:58
Afspil senere
Afspil senere
Lister
Like
Liked
39:58We explore the emergence of a new AI-driven economy that's creating unprecedented opportunities for entrepreneurs and businesses of all sizes to compete at enterprise levels with minimal resources. • AI represents the most significant technological advancement since the wheel, democratizing powerful capabilities previously available only to large c…
…
continue reading
1
Google's $32B Cloud Security Gamble
36:23
36:23
Afspil senere
Afspil senere
Lister
Like
Liked
36:23Google makes a monumental $32 billion acquisition of cloud security leader Wiz, marking one of the largest cybersecurity acquisitions in history after previously attempting to purchase the company for $23 billion last year. • Wiz offers simple cloud security deployment that provides immediate visibility into cloud environments • Founded by a team t…
…
continue reading
1
Cyber Acquisitions #1 - Armis x OTORIO, ForcePoint x GetVisibility, CyberGuru x Mantra SAS - Niche is King (Right Now)
5:47
5:47
Afspil senere
Afspil senere
Lister
Like
Liked
5:47The cybersecurity industry is undergoing rapid consolidation as established companies expand their capabilities through strategic acquisitions rather than internal development. Three major acquisitions in March 2025 highlight key trends: the growing importance of securing operational technology, the central role of AI in data security, and the cont…
…
continue reading
1
The Hidden Costs of Scaling a Cyber Risk Program
30:23
30:23
Afspil senere
Afspil senere
Lister
Like
Liked
30:23In this episode, we explore the intricate relationship between risk management and business objectives, specifically tailored for small and medium-sized businesses. Chad Boeckmann discusses strategies to elevate cybersecurity risk awareness among executive leadership, the role of cyber insurance, and the importance of bridging the gap between secur…
…
continue reading
1
The Hidden Costs of Vulnerability Management
20:58
20:58
Afspil senere
Afspil senere
Lister
Like
Liked
20:58In this episode of Cybernomics, Josh Bruyning and Kyle Bhiro discuss the hidden costs associated with vulnerability management in cybersecurity. They explore the importance of understanding these costs, the role of AI in improving efficiency, and the necessity of human oversight in security operations. The conversation also touches on the concept o…
…
continue reading
1
The Hidden Costs of Regulating Cybersecurity and AI Privacy
1:02:04
1:02:04
Afspil senere
Afspil senere
Lister
Like
Liked
1:02:04On this episode of Cybernomics, Josh explores the Hidden Costs of Cybersecurity Regulations and conducts a cost-benefit analysis with Michael Nouguier, CISO at Richey May, and our guest co-host, Igor Volovich, former CISO at Invensys and Schneider Electric. Hidden Costs of Regulating Cybersecurity: Compliance costs (audits, certifications, and tech…
…
continue reading
1
The Hidden Costs of Terminating a CISO
39:26
39:26
Afspil senere
Afspil senere
Lister
Like
Liked
39:26Greg and Josh pull back the curtain on the pitfalls and strategic voids left by frequent CISO transitions, which can leave companies vulnerable and scrambling for continuity. We shed light on the arduous onboarding process new CISOs face, taking months to assess existing security frameworks and the ripple effects this delay has on strategic initiat…
…
continue reading
1
Unlocking ROI Through the Power of Authenticity
24:47
24:47
Afspil senere
Afspil senere
Lister
Like
Liked
24:47Authenticity emerges as a vital theme in our latest episode, showcasing how being true to oneself can create more genuine connections in cybersecurity and beyond. Mel "Fireball" Reyes shares his personal journey of embracing authenticity and its significant impact on audience engagement, trust, and organizational culture. • Discussion on the need f…
…
continue reading
1
The Hidden Costs of Security Operations Burnout
16:44
16:44
Afspil senere
Afspil senere
Lister
Like
Liked
16:44This episode explores the transformative role of automation in cybersecurity through Cyngular Security's innovative approach. By focusing on Cloud Investigation and Response Automation (CIRA), we discuss how this technology alleviates alert fatigue, reduces burnout among analysts, and empowers teams to enhance their security efforts. • Cyngular Sec…
…
continue reading
1
A Look back at Cybersecurity Investment in 2024
47:07
47:07
Afspil senere
Afspil senere
Lister
Like
Liked
47:07Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independ…
…
continue reading
1
Harnessing AI for Cyber Defense with Cequence Security's CISO
13:47
13:47
Afspil senere
Afspil senere
Lister
Like
Liked
13:47Unlock the secrets of API security with our esteemed guest, Randolph Barr, the new Chief Information Security Officer at Cequence Security. With a stellar career spanning companies like Zoom, Qualys, Cisco, and Webex, Randy is the perfect guide to navigate the complexities of the digital world. We explore the innovative strategies Sequence Security…
…
continue reading
1
The Hidden Challenges of Selling Cybersecurity Products
44:01
44:01
Afspil senere
Afspil senere
Lister
Like
Liked
44:01In this episode of Cybernomics (formerly Security Market Watch), host Josh Bruyning engages with Ian Poynter, founder of Kalahari Security, to explore the economics of cybersecurity. They discuss the challenges of selling security solutions, the importance of understanding business needs, and the inadequacy of mere sympathy in the face of security …
…
continue reading
1
Founder Story, From Village Roots to Silicon Valley, Revolutionizing API Security
15:15
15:15
Afspil senere
Afspil senere
Lister
Like
Liked
15:15Buchi Reddy, CEO and founder of Levo AI, shares his unique immigrant story and the journey that led him to start his own cybersecurity company. Levo AI focuses on API security and helps enterprises protect their digital footprint and applications using AI. Buchi discusses the challenges he faced as an immigrant and the importance of mentors and ski…
…
continue reading
1
Founder Story, The Hidden Costs of Startup Success with Startup Co-Founder at CommandZero
30:13
30:13
Afspil senere
Afspil senere
Lister
Like
Liked
30:13Dov Yoran, co-founder and CEO of Command Zero, shares his journey in the cybersecurity industry and the mission of his company. The conversation covers topics such as the category Command Zero falls into, the problem they are solving, the challenges of being an entrepreneur, and the importance of teamwork. Dov emphasizes the need to keep driving fo…
…
continue reading
1
Founder Story, “75% of My Company was Built By AI"
23:24
23:24
Afspil senere
Afspil senere
Lister
Like
Liked
23:24In this conversation, Josh Bruyning interviews Randy Blasik, the CTO and co-founder of ComplianceAide, about his journey as an AI bro and the use of generative AI in building his company. They discuss the power and potential of generative AI, the challenges of bringing a product like Compliance Aid to market, and the skepticism and misconceptions s…
…
continue reading
1
The Hidden Costs of Cyber Resilience
26:07
26:07
Afspil senere
Afspil senere
Lister
Like
Liked
26:07What happens when 75% of Chief Information Security Officers contemplate leaving their jobs? In this compelling episode of Security Market Watch, we engage with Matt Webster, CEO and CISO at Cyvergence, to tackle this critical issue head-on. With his extensive background as a former CISO, Matt sheds light on the alarming turnover rates in the indus…
…
continue reading
1
The Movie That Sparked a Cyber Career
20:14
20:14
Afspil senere
Afspil senere
Lister
Like
Liked
20:14Join us as Tina unpacks the challenges and triumphs of transitioning from a service-based to a product-based business. From navigating the complexities of venture capital to balancing technical oversight with strategic planning, Tina's experiences offer invaluable lessons for aspiring entrepreneurs. She highlights the critical importance of a stron…
…
continue reading
1
Rethinking Compliance, The Hidden Costs of Evidence-based Risk Management
19:22
19:22
Afspil senere
Afspil senere
Lister
Like
Liked
19:22Discover the intriguing parallel worlds of cyber security and finance as we navigate through compelling discussions with our distinguished guest, Igor Volovich. Promising to equip you with a nuanced understanding of the convergence of risk and compliance, we catapult into the breach of SolarWinds and the ensuing SEC charges. With Igor's expert insi…
…
continue reading
1
What's New in Vulnerability Management with a Senior Manager at IBM
8:40
8:40
Afspil senere
Afspil senere
Lister
Like
Liked
8:40Ready for a crash course in cybersecurity? Grab your note-taking tools and join us for a riveting conversation with the esteemed Dr. Nikki Robinson, the trailblazing STSM and lead architect at IBM, and a Cybersecurity Influencer of the Year. Armed with a wealth of knowledge and insights, Dr. Robinson guides us through the labyrinth of vulnerability…
…
continue reading
1
The Hidden Costs of Humans in Cybersecurity
12:33
12:33
Afspil senere
Afspil senere
Lister
Like
Liked
12:33Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work o…
…
continue reading
1
What is EPSS and Why is Something So Useful So Free?
9:09
9:09
Afspil senere
Afspil senere
Lister
Like
Liked
9:09Are you ready to unravel the mysteries of cybersecurity and exploit prediction? We're joined by our esteemed guest, Jay Jacobs. Today's episode promises to be a thrilling ride into the world of data insecurity as we welcome the innovator behind the groundbreaking EPSS (exploit prediction scoring system). This ingenious machine learning model, launc…
…
continue reading
1
Cyber Security Investment, and The Hidden Costs of DEI
48:24
48:24
Afspil senere
Afspil senere
Lister
Like
Liked
48:24Today's guest, Charles Payne, brings a unique perspective to cybersecurity with his background in finance, his current roles as CISO and CTO at Neptune Media, and his experiences as an angel investor. Charles shines a light on his transition from finance to cybersecurity, unraveling how his technical knowledge has given him a unique perspective on …
…
continue reading
1
The Hidden Costs of Innovation and The Future of AI and Blockchain
53:17
53:17
Afspil senere
Afspil senere
Lister
Like
Liked
53:17Get set for a mind-expanding journey as we navigate the intriguing world of AI and blockchain with our special guest, Jonathan Capriola, the innovative CEO and founder of AI Blockchain Ventures. Jonathan, a best-selling author, successful entrepreneur, and futurist, captivates with his unique perspective on the rapidly evolving world of technology.…
…
continue reading
1
Cybersecurity Education and Online Safety
40:37
40:37
Afspil senere
Afspil senere
Lister
Like
Liked
40:37Dubbed the Oprah of Cybersecurity and the Cybersecurity Social Media Queen, Dana Mantilia joins us for an exhilarating journey into the world of cybersecurity. Starting from zero just four years ago, Dana has since built a notable presence on LinkedIn and YouTube with her accessible approach to educating the everyday person about cybersecurity. The…
…
continue reading
1
Redefining Cloud System Access, The Hidden Costs Cutting Edge API Protection
29:20
29:20
Afspil senere
Afspil senere
Lister
Like
Liked
29:20Ready to get your mind blown by the intriguing world of policy orchestration? Gain a whole new perspective as we dissect this cutting-edge concept alongside Gerry Geble from Strata. Gerry introduces us to the fascinating world of identity query language (IDQL) - a revolutionary approach to defining access rules and policies. Come along on this invi…
…
continue reading
1
The Hidden Challenges of API Protection
36:08
36:08
Afspil senere
Afspil senere
Lister
Like
Liked
36:08Are you ready to unlock the secrets of API security? Today, we've got a thrilling dialogue with Ameya Talwalkar and Varun Kohli from Cequence, a cybersecurity firm that's been securing APIs for prominent financial institutions and Fortune 500 companies for nearly a decade. In a world where 80% of internet traffic is API-related, our conversation co…
…
continue reading
1
The Hidden Costs of Navigating The Security Solution Market, The Vendor Problem
47:03
47:03
Afspil senere
Afspil senere
Lister
Like
Liked
47:03Get ready for an enlightening exchange with seasoned industry expert, Richard Stiennon, as he uncovers the secrets behind his successful journey in the security ecosystem. Richard, the mastermind behind IT-Harvest, offers exclusive insights into the creation and operations of a data-driven analyst product that stands in contrast to Gartner as a bea…
…
continue reading
1
The Hidden Costs of Starting a Security Company, The Role of CISO in the Sales Process
26:34
26:34
Afspil senere
Afspil senere
Lister
Like
Liked
26:34We're thrilled to welcome Mark Dorsi, CISO at Netlify, to our show for a deep dive into the complexities of startup maturity and the vital role of security practice. Mark spills the secrets on transitioning startups from early stages to full maturity, and the different types of exits that companies can pursue. He offers his invaluable perspective o…
…
continue reading
1
The Hidden Costs of Disaster Response in the Financial Industry
26:57
26:57
Afspil senere
Afspil senere
Lister
Like
Liked
26:57Are you ready to understand the vital role of disaster recovery planning and the importance of cybersecurity in today's digital age? Join hosts Maggie Dillon and Josh as they sit down with Jack Bensimon, who walks us through a disaster recovery manual in a way that's easy to grasp. Jack helps us understand the necessity of preparing for potential d…
…
continue reading