<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/threatcon1/" rel="self" type="application/rss+xml"/><title><![CDATA[THREATCON1]]></title><podcast:guid>6fa35588-21d2-50cb-93b8-44948f91f09e</podcast:guid><lastBuildDate>Tue, 19 May 2026 10:00:59 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[© 2025 THREATCON1 VulnCheck]]></copyright><managingEditor>VulnCheck</managingEditor><itunes:summary><![CDATA[THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis and fresh perspectives that matter related to national security and economic viability.]]></itunes:summary><image><url>https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png</url><title>THREATCON1</title><link><![CDATA[https://www.threatcon1.org]]></link></image><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><itunes:owner><itunes:name>VulnCheck</itunes:name></itunes:owner><itunes:author>VulnCheck</itunes:author><description>THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis and fresh perspectives that matter related to national security and economic viability.</description><link>https://www.threatcon1.org</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[The place to go for insights on emerging cyber threats.]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/threatcon1/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Episode 17: How Cyber Threat Hunters Think | Joe Slowik of Dataminr on Threat Intel, Detection Engineering &amp; Cyber Warfare</title><itunes:title>Episode 17: How Cyber Threat Hunters Think | Joe Slowik of Dataminr on Threat Intel, Detection Engineering &amp; Cyber Warfare</itunes:title><description><![CDATA[<p>Recorded live at the RSA Conference, this episode of the THREATCON1 Podcast features a deep-dive conversation with Joe Slowik — one of the cybersecurity industry’s leading voices in cyber threat intelligence, detection engineering, and adversary operations.</p><p>Hosted by Patrick Garrity and Kimber Duke from VulnCheck, the discussion explores how modern threat actors operate, why most organizations still struggle with cybersecurity fundamentals, and how defenders can build stronger, intelligence-driven security programs.</p><p>ABOUT OUR GUEST:</p><p>Before joining Dataminr, Joe held cybersecurity and threat intelligence roles across government and industry, including work with Dragos, Gigamon, Huntress, and MITRE. His background spans Navy cyber warfare operations, incident response, threat hunting, intrusion analysis, and large-scale detection engineering.</p><p>In this episode, the conversation covers:</p><ul><li>How cyber threat intelligence actually supports real security outcomes</li><li>Why detection engineering is becoming essential for modern security teams</li><li>The mindset defenders need to think like attackers</li><li>Lessons from the Black Basta ransomware chat leaks</li><li>Threat hunting methodologies and operational security practices</li><li>VPN abuse, proxy infrastructure, and telecom compromise risks</li><li>Why healthcare and manufacturing continue to be high-risk targets</li><li>How attackers prioritize targets using sales and marketing-style tactics</li><li>The future of cybersecurity talent, hacker culture, and defensive operations</li><li>Why strong cybersecurity still comes down to fundamentals and operational discipline</li></ul><br/><p>Whether you work in a SOC, lead a security team, build detection content, hunt threats, or simply want to better understand how modern cyber adversaries operate, this episode delivers practical insights from leaders working on the front lines of cybersecurity.</p><p></p><p>Dataminr uses AI and real-time event discovery to help organizations detect emerging risks, cyber threats, geopolitical events, and breaking incidents faster — enabling security teams to respond before threats escalate.</p><p>VulnCheck provides exploit and vulnerability intelligence designed to help organizations prioritize real-world threats, understand exploitation activity, and stay ahead of emerging vulnerabilities before attackers weaponize them.</p><p></p>]]></description><content:encoded><![CDATA[<p>Recorded live at the RSA Conference, this episode of the THREATCON1 Podcast features a deep-dive conversation with Joe Slowik — one of the cybersecurity industry’s leading voices in cyber threat intelligence, detection engineering, and adversary operations.</p><p>Hosted by Patrick Garrity and Kimber Duke from VulnCheck, the discussion explores how modern threat actors operate, why most organizations still struggle with cybersecurity fundamentals, and how defenders can build stronger, intelligence-driven security programs.</p><p>ABOUT OUR GUEST:</p><p>Before joining Dataminr, Joe held cybersecurity and threat intelligence roles across government and industry, including work with Dragos, Gigamon, Huntress, and MITRE. His background spans Navy cyber warfare operations, incident response, threat hunting, intrusion analysis, and large-scale detection engineering.</p><p>In this episode, the conversation covers:</p><ul><li>How cyber threat intelligence actually supports real security outcomes</li><li>Why detection engineering is becoming essential for modern security teams</li><li>The mindset defenders need to think like attackers</li><li>Lessons from the Black Basta ransomware chat leaks</li><li>Threat hunting methodologies and operational security practices</li><li>VPN abuse, proxy infrastructure, and telecom compromise risks</li><li>Why healthcare and manufacturing continue to be high-risk targets</li><li>How attackers prioritize targets using sales and marketing-style tactics</li><li>The future of cybersecurity talent, hacker culture, and defensive operations</li><li>Why strong cybersecurity still comes down to fundamentals and operational discipline</li></ul><br/><p>Whether you work in a SOC, lead a security team, build detection content, hunt threats, or simply want to better understand how modern cyber adversaries operate, this episode delivers practical insights from leaders working on the front lines of cybersecurity.</p><p></p><p>Dataminr uses AI and real-time event discovery to help organizations detect emerging risks, cyber threats, geopolitical events, and breaking incidents faster — enabling security teams to respond before threats escalate.</p><p>VulnCheck provides exploit and vulnerability intelligence designed to help organizations prioritize real-world threats, understand exploitation activity, and stay ahead of emerging vulnerabilities before attackers weaponize them.</p><p></p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">ceaf1171-42ca-4cb2-a069-85351f0bb93f</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 19 May 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ceaf1171-42ca-4cb2-a069-85351f0bb93f.mp3" length="43327984" type="audio/mpeg"/><itunes:duration>35:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode></item><item><title>Episode 16: From ‘Hackers Are Criminals’ to Industry Leaders — What Changed? | Casey Ellis of Bugcrowd</title><itunes:title>Episode 16: From ‘Hackers Are Criminals’ to Industry Leaders — What Changed? | Casey Ellis of Bugcrowd</itunes:title><description><![CDATA[<p>Recorded live at the RSA Conference, this episode of THREATCON1 features a deep dive into the evolving world of cybersecurity with Casey Ellis, Founder of Bugcrowd.</p><p></p><p>Joined by Patrick Garrity (Security Researcher) and Kimber Duke (Director of Product at VulnCheck), the conversation explores how the industry is changing—and why many of the core problems remain the same.</p><p></p><p>From the rise of AI-powered capabilities to the growing importance of vulnerability disclosure programs, this episode unpacks the tension between speed, innovation, and security.</p><p></p><p>🔍 What You’ll Learn</p><p>-  Why cybersecurity today feels “faster, louder, and more chaotic”</p><p>- How AI is expanding both opportunity and risk in hacking</p><p>- The evolution of bug bounty programs and ethical hacking</p><p>- Why most software is built without security as a priority</p><p>- The reality of vulnerability disclosure—and why it’s still broken</p><p>- The importance of empathy between researchers and organizations</p><p>- How community plays a critical role in modern security</p><p>- The legal risks hackers face—and how initiatives like the Security Research Legal Defense Fund are changing that</p><p></p><p>⚡ Key Insights</p><p>- “We’re solving the same problems—just faster and louder.”</p><p>- Security often comes second to shipping products quickly</p><p>- Ethical hackers are now gaining a seat at the leadership table</p><p>- Clear vulnerability disclosure processes can prevent real-world damage</p><p>- The future of cybersecurity depends on collaboration, not silos</p><p></p><p>👤 About the Guest</p><p>Casey Ellis is the Founder of Bugcrowd, a pioneer in crowdsourced cybersecurity and bug bounty programs. With over a decade of experience shaping how organizations work with ethical hackers, Casey has played a key role in advancing vulnerability disclosure practices globally.</p><p></p><p>🔗 Resources &amp; Projects Mentioned </p><p>Disclose.io — Improving vulnerability disclosure standards https://disclose.io </p><p>Security Research Legal Defense Fund — Supporting ethical hackers facing legal challenges https://srldf.org </p><p>🎙️ About THREATCON1 </p><p>THREATCON1  brings together leading voices in cybersecurity to explore the biggest challenges, ideas, and innovations shaping the industry today. https://threatcon1.org</p>]]></description><content:encoded><![CDATA[<p>Recorded live at the RSA Conference, this episode of THREATCON1 features a deep dive into the evolving world of cybersecurity with Casey Ellis, Founder of Bugcrowd.</p><p></p><p>Joined by Patrick Garrity (Security Researcher) and Kimber Duke (Director of Product at VulnCheck), the conversation explores how the industry is changing—and why many of the core problems remain the same.</p><p></p><p>From the rise of AI-powered capabilities to the growing importance of vulnerability disclosure programs, this episode unpacks the tension between speed, innovation, and security.</p><p></p><p>🔍 What You’ll Learn</p><p>-  Why cybersecurity today feels “faster, louder, and more chaotic”</p><p>- How AI is expanding both opportunity and risk in hacking</p><p>- The evolution of bug bounty programs and ethical hacking</p><p>- Why most software is built without security as a priority</p><p>- The reality of vulnerability disclosure—and why it’s still broken</p><p>- The importance of empathy between researchers and organizations</p><p>- How community plays a critical role in modern security</p><p>- The legal risks hackers face—and how initiatives like the Security Research Legal Defense Fund are changing that</p><p></p><p>⚡ Key Insights</p><p>- “We’re solving the same problems—just faster and louder.”</p><p>- Security often comes second to shipping products quickly</p><p>- Ethical hackers are now gaining a seat at the leadership table</p><p>- Clear vulnerability disclosure processes can prevent real-world damage</p><p>- The future of cybersecurity depends on collaboration, not silos</p><p></p><p>👤 About the Guest</p><p>Casey Ellis is the Founder of Bugcrowd, a pioneer in crowdsourced cybersecurity and bug bounty programs. With over a decade of experience shaping how organizations work with ethical hackers, Casey has played a key role in advancing vulnerability disclosure practices globally.</p><p></p><p>🔗 Resources &amp; Projects Mentioned </p><p>Disclose.io — Improving vulnerability disclosure standards https://disclose.io </p><p>Security Research Legal Defense Fund — Supporting ethical hackers facing legal challenges https://srldf.org </p><p>🎙️ About THREATCON1 </p><p>THREATCON1  brings together leading voices in cybersecurity to explore the biggest challenges, ideas, and innovations shaping the industry today. https://threatcon1.org</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">5d9555fb-a654-4228-989f-d9a8ebddff53</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 05 May 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5d9555fb-a654-4228-989f-d9a8ebddff53.mp3" length="49920388" type="audio/mpeg"/><itunes:duration>41:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode></item><item><title>Episode 15: Most Enterprise Software Is Already Exploitable (And No One Knows It) | Joe Silva, CEO of Spektion</title><itunes:title>Episode 15: Most Enterprise Software Is Already Exploitable (And No One Knows It) | Joe Silva, CEO of Spektion</itunes:title><description><![CDATA[<p>In this live episode recorded at RSA Conference, the THREATCON1 team sits down with Joe Silva, Founder &amp; CEO of Spektion, for a deep dive into the evolving reality of enterprise cybersecurity in the age of AI and explosive software complexity.</p><p>Joe shares his unique journey from military intelligence and government service, through roles at iSight Partners, Symantec, TransUnion, and JLL as CISO, to now building a cybersecurity startup focused on redefining how organizations understand and manage exploitability.</p><p><br></p><p>At the core of the conversation is a shift away from traditional vulnerability management and CVE-driven thinking toward runtime, behavior-based visibility. Joe explains how modern environments are increasingly filled with custom-built tools, AI-generated code, and rapidly evolving software that often falls outside traditional security models.</p><p><br></p><p>Key topics covered include:</p><p><br></p><p>- Why CVE-based vulnerability management is no longer enough</p><p>- How runtime telemetry reveals true exploitability in real time</p><p>- The growing problem of alert fatigue and the move toward “non-alerting” security models</p><p>- Why most enterprise environments contain far more custom and unknown software than teams realize</p><p>- The rise of AI-generated code and its impact on secure development practices</p><p>- The shift from patching toward mitigation as a primary security strategy</p><p>- How supply chain attacks are evolving in an AI-accelerated development world</p><p>- Why memory-based vulnerabilities remain one of the most under-addressed systemic risks</p><p><br></p><p>The discussion also explores a forward-looking reality: security teams must increasingly operate at machine speed, focusing less on perfect prevention and more on fast detection, prioritisation, and mitigation of real exploitable conditions.</p><p><br></p><p>A candid, practical, and forward-thinking conversation on what it truly takes to secure modern software ecosystems.</p>]]></description><content:encoded><![CDATA[<p>In this live episode recorded at RSA Conference, the THREATCON1 team sits down with Joe Silva, Founder &amp; CEO of Spektion, for a deep dive into the evolving reality of enterprise cybersecurity in the age of AI and explosive software complexity.</p><p>Joe shares his unique journey from military intelligence and government service, through roles at iSight Partners, Symantec, TransUnion, and JLL as CISO, to now building a cybersecurity startup focused on redefining how organizations understand and manage exploitability.</p><p><br></p><p>At the core of the conversation is a shift away from traditional vulnerability management and CVE-driven thinking toward runtime, behavior-based visibility. Joe explains how modern environments are increasingly filled with custom-built tools, AI-generated code, and rapidly evolving software that often falls outside traditional security models.</p><p><br></p><p>Key topics covered include:</p><p><br></p><p>- Why CVE-based vulnerability management is no longer enough</p><p>- How runtime telemetry reveals true exploitability in real time</p><p>- The growing problem of alert fatigue and the move toward “non-alerting” security models</p><p>- Why most enterprise environments contain far more custom and unknown software than teams realize</p><p>- The rise of AI-generated code and its impact on secure development practices</p><p>- The shift from patching toward mitigation as a primary security strategy</p><p>- How supply chain attacks are evolving in an AI-accelerated development world</p><p>- Why memory-based vulnerabilities remain one of the most under-addressed systemic risks</p><p><br></p><p>The discussion also explores a forward-looking reality: security teams must increasingly operate at machine speed, focusing less on perfect prevention and more on fast detection, prioritisation, and mitigation of real exploitable conditions.</p><p><br></p><p>A candid, practical, and forward-thinking conversation on what it truly takes to secure modern software ecosystems.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">7e57ff33-64f9-46ac-9857-0180b5ad936b</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 21 Apr 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7e57ff33-64f9-46ac-9857-0180b5ad936b.mp3" length="34510552" type="audio/mpeg"/><itunes:duration>28:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode></item><item><title>Episode 14: Network Edge Security - The Attack Surface Everyone Underestimates | Saeed Abbasi of Qualys</title><itunes:title>Episode 14: Network Edge Security - The Attack Surface Everyone Underestimates | Saeed Abbasi of Qualys</itunes:title><description><![CDATA[<p>Recorded live at <strong>RSA Conference in San Francisco</strong>, Patrick Garrity and Kimber Duke from <strong>VulnCheck</strong> sit down with <strong>Saeed Abbasi</strong>, Senior Manager of Security Research at the <strong>Qualys Threat Research Unit</strong>, for a deep dive into one of the most overlooked attack surfaces in cybersecurity: <strong>network edge devices</strong>.</p><p>From firewalls and VPN gateways to home routers, edge devices sit at the intersection of the internet and corporate networks — making them prime targets for attackers.</p><p>In this episode, Saeed shares insights from years of vulnerability research across organizations like <strong>Trend Micro, Palo Alto Networks, and Qualys</strong>, including:</p><p>• Why <strong>network edge devices are frequently targeted by attackers</strong></p><p>• The challenges organizations face when <strong>patching or replacing vulnerable infrastructure</strong></p><p>• How <strong>botnets exploit consumer routers</strong> while <strong>ransomware actors target enterprise edge devices</strong></p><p>• Why <strong>visibility and asset inventory are critical for security teams</strong></p><p>• The growing importance of <strong>risk-based vulnerability prioritization</strong></p><p>• How attackers exploit vulnerabilities <strong>within days — or even before patches are available</strong></p><p>The conversation also explores broader trends in vulnerability research, the evolution of exploitation timelines, and what organizations can do today to reduce risk at the edge.</p><p>If you're responsible for <strong>vulnerability management, threat research, or network security</strong>, this episode offers valuable insight into how attackers are evolving — and how defenders can keep up.</p><p><strong>Guests</strong></p><p>Saeed Abbasi – Senior Manager, Security Research, Qualys Threat Research Unit</p><p><strong>Hosts</strong></p><p>Patrick Garrity – VulnCheck</p><p>Kimber Duke – Director of Product, VulnCheck</p><p>Recorded live at <strong>RSA Conference</strong>.</p>]]></description><content:encoded><![CDATA[<p>Recorded live at <strong>RSA Conference in San Francisco</strong>, Patrick Garrity and Kimber Duke from <strong>VulnCheck</strong> sit down with <strong>Saeed Abbasi</strong>, Senior Manager of Security Research at the <strong>Qualys Threat Research Unit</strong>, for a deep dive into one of the most overlooked attack surfaces in cybersecurity: <strong>network edge devices</strong>.</p><p>From firewalls and VPN gateways to home routers, edge devices sit at the intersection of the internet and corporate networks — making them prime targets for attackers.</p><p>In this episode, Saeed shares insights from years of vulnerability research across organizations like <strong>Trend Micro, Palo Alto Networks, and Qualys</strong>, including:</p><p>• Why <strong>network edge devices are frequently targeted by attackers</strong></p><p>• The challenges organizations face when <strong>patching or replacing vulnerable infrastructure</strong></p><p>• How <strong>botnets exploit consumer routers</strong> while <strong>ransomware actors target enterprise edge devices</strong></p><p>• Why <strong>visibility and asset inventory are critical for security teams</strong></p><p>• The growing importance of <strong>risk-based vulnerability prioritization</strong></p><p>• How attackers exploit vulnerabilities <strong>within days — or even before patches are available</strong></p><p>The conversation also explores broader trends in vulnerability research, the evolution of exploitation timelines, and what organizations can do today to reduce risk at the edge.</p><p>If you're responsible for <strong>vulnerability management, threat research, or network security</strong>, this episode offers valuable insight into how attackers are evolving — and how defenders can keep up.</p><p><strong>Guests</strong></p><p>Saeed Abbasi – Senior Manager, Security Research, Qualys Threat Research Unit</p><p><strong>Hosts</strong></p><p>Patrick Garrity – VulnCheck</p><p>Kimber Duke – Director of Product, VulnCheck</p><p>Recorded live at <strong>RSA Conference</strong>.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">7f33dffe-78e9-4454-bf1e-1aef0151494a</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Thu, 09 Apr 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7f33dffe-78e9-4454-bf1e-1aef0151494a.mp3" length="43299510" type="audio/mpeg"/><itunes:duration>35:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode></item><item><title>Episode 13: Why Hackers Are Targeting Edge Devices | Ryan Dewhurst of watchTowr</title><itunes:title>Episode 13: Why Hackers Are Targeting Edge Devices | Ryan Dewhurst of watchTowr</itunes:title><description><![CDATA[<p>In this episode of the <strong>THREATCON1 Podcast</strong>, Patrick Garrity is joined by <strong>Ryan Dewhurst</strong>, Head of Threat Intelligence at <strong>WatchTowr</strong>, for a deep dive into the rapidly evolving world of vulnerabilities, threat intelligence, and real-world exploitation.</p><p>Ryan shares the story of his journey through cybersecurity — from creating the widely used <strong>Damn Vulnerable Web Application (DVWA)</strong> and the <strong>WPScan vulnerability database</strong>, to building projects like <strong>KevIntel</strong>, and now leading threat intelligence efforts at WatchTowr.</p><p>The conversation explores how modern attackers operate, why <strong>time-to-exploit is shrinking</strong>, and why <strong>internet-facing infrastructure like routers, firewalls, VPNs, and edge devices</strong> has become a primary target for threat actors.</p><p></p><p>Patrick and Ryan also discuss the growing scale of the vulnerability landscape, the limitations of traditional scoring systems like <strong>CVSS</strong>, and why organizations must move toward <strong>context-driven vulnerability prioritization</strong> instead of simply chasing severity scores.</p><p></p><p>Along the way, they examine how threat intelligence teams detect exploitation in the wild using <strong>honeypot networks</strong>, reverse engineering, and vulnerability research — and what defenders should be paying attention to as the cybersecurity landscape continues to accelerate.</p><p></p><p>If you’re interested in <strong>emerging threats, exploited vulnerabilities, and the future of cyber defense</strong>, this episode is packed with insights.</p><p></p><p><strong>Topics covered in this episode</strong></p><p>• Ryan Dewhurst’s path from DVWA and WPScan to WatchTowr</p><p>• The rise of exploited vulnerability intelligence</p><p>• Why attackers are increasingly targeting network edge devices</p><p>• The shrinking time-to-exploit window</p><p>• Zero-day vs end-day vulnerabilities in real attacks</p><p>• Detecting exploitation with honeypots and threat telemetry</p><p>• Why CVSS scores alone aren’t enough</p><p>• The growing challenge of managing vulnerability volume</p><p>• What cybersecurity teams should expect in the years ahead</p><p></p><p>🎧 <strong>Subscribe to the THREATCON1 Podcast</strong> for more conversations with cybersecurity researchers, threat intelligence leaders, and industry experts exploring the evolving threat landscape.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <strong>THREATCON1 Podcast</strong>, Patrick Garrity is joined by <strong>Ryan Dewhurst</strong>, Head of Threat Intelligence at <strong>WatchTowr</strong>, for a deep dive into the rapidly evolving world of vulnerabilities, threat intelligence, and real-world exploitation.</p><p>Ryan shares the story of his journey through cybersecurity — from creating the widely used <strong>Damn Vulnerable Web Application (DVWA)</strong> and the <strong>WPScan vulnerability database</strong>, to building projects like <strong>KevIntel</strong>, and now leading threat intelligence efforts at WatchTowr.</p><p>The conversation explores how modern attackers operate, why <strong>time-to-exploit is shrinking</strong>, and why <strong>internet-facing infrastructure like routers, firewalls, VPNs, and edge devices</strong> has become a primary target for threat actors.</p><p></p><p>Patrick and Ryan also discuss the growing scale of the vulnerability landscape, the limitations of traditional scoring systems like <strong>CVSS</strong>, and why organizations must move toward <strong>context-driven vulnerability prioritization</strong> instead of simply chasing severity scores.</p><p></p><p>Along the way, they examine how threat intelligence teams detect exploitation in the wild using <strong>honeypot networks</strong>, reverse engineering, and vulnerability research — and what defenders should be paying attention to as the cybersecurity landscape continues to accelerate.</p><p></p><p>If you’re interested in <strong>emerging threats, exploited vulnerabilities, and the future of cyber defense</strong>, this episode is packed with insights.</p><p></p><p><strong>Topics covered in this episode</strong></p><p>• Ryan Dewhurst’s path from DVWA and WPScan to WatchTowr</p><p>• The rise of exploited vulnerability intelligence</p><p>• Why attackers are increasingly targeting network edge devices</p><p>• The shrinking time-to-exploit window</p><p>• Zero-day vs end-day vulnerabilities in real attacks</p><p>• Detecting exploitation with honeypots and threat telemetry</p><p>• Why CVSS scores alone aren’t enough</p><p>• The growing challenge of managing vulnerability volume</p><p>• What cybersecurity teams should expect in the years ahead</p><p></p><p>🎧 <strong>Subscribe to the THREATCON1 Podcast</strong> for more conversations with cybersecurity researchers, threat intelligence leaders, and industry experts exploring the evolving threat landscape.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">23fca996-068c-42ed-8831-b77a8a11e943</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 31 Mar 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/23fca996-068c-42ed-8831-b77a8a11e943.mp3" length="44999176" type="audio/mpeg"/><itunes:duration>37:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode></item><item><title>Episode 12: Inside Cyber Threat Intelligence at Chevron | AI, Supply Chains &amp; Nation-State Risks with Lillian Lang of Chevron</title><itunes:title>Episode 12: Inside Cyber Threat Intelligence at Chevron | AI, Supply Chains &amp; Nation-State Risks with Lillian Lang of Chevron</itunes:title><description><![CDATA[<p>In this episode of the THREATCON1 Podcast, Tom Bain and Patrick Garrity sit down with Lillian Lang, Senior Manager of Cyber Threat Intelligence at <strong>Chevron</strong>, to explore how modern cyber threats are evolving—and what defenders must do to stay ahead.</p><p>Lillian shares her journey from federal intelligence work after 9/11 to protecting critical infrastructure in the private sector, offering a rare inside look at:</p><ul><li>How nation-state actors target the energy industry</li><li>The real impact of supply-chain vulnerabilities and zero-day exploits</li><li>Why third-party risk and business continuity are now core security concerns</li><li>The growing role of AI in cyber defense—and the new risks it introduces</li><li>What cyber threat intelligence teams actually do inside global enterprises</li></ul><br/><p>This conversation delivers practical insight for cybersecurity professionals, technology leaders, and anyone interested in how critical infrastructure is defended in an increasingly complex threat landscape.</p><p>Subscribe for more conversations with the people shaping the future of cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the THREATCON1 Podcast, Tom Bain and Patrick Garrity sit down with Lillian Lang, Senior Manager of Cyber Threat Intelligence at <strong>Chevron</strong>, to explore how modern cyber threats are evolving—and what defenders must do to stay ahead.</p><p>Lillian shares her journey from federal intelligence work after 9/11 to protecting critical infrastructure in the private sector, offering a rare inside look at:</p><ul><li>How nation-state actors target the energy industry</li><li>The real impact of supply-chain vulnerabilities and zero-day exploits</li><li>Why third-party risk and business continuity are now core security concerns</li><li>The growing role of AI in cyber defense—and the new risks it introduces</li><li>What cyber threat intelligence teams actually do inside global enterprises</li></ul><br/><p>This conversation delivers practical insight for cybersecurity professionals, technology leaders, and anyone interested in how critical infrastructure is defended in an increasingly complex threat landscape.</p><p>Subscribe for more conversations with the people shaping the future of cybersecurity.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">0cb9ed28-3c1b-4843-9380-af8c18266a78</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 17 Feb 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0cb9ed28-3c1b-4843-9380-af8c18266a78.mp3" length="54699288" type="audio/mpeg"/><itunes:duration>45:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode></item><item><title>Episode 11: How AI Is Changing Ransomware  And What Comes Next  Cynthia Kaiser Halcyon Former FBI Cyber Exec</title><itunes:title>Episode 11: How AI Is Changing Ransomware  And What Comes Next  Cynthia Kaiser Halcyon Former FBI Cyber Exec</itunes:title><description><![CDATA[<p>In this episode of the THREATCON 1 Podcast, hosts Tom Bain and Patrick Garrity sit down with Cynthia Kaiser, SVP at Halcyon and former FBI cyber executive, to explore the rapidly evolving world of ransomware, AI-driven threats, and national-security-level cyber defense.</p><p>Drawing on two decades inside the FBI—including briefing the President’s Daily Intelligence Brief—Cynthia shares frontline insight into how cyber threats have changed, why ransomware is moving faster than ever, and what organizations must do now to stay protected.</p><p>In this conversation:</p><ul><li>How AI is reshaping ransomware attacks and social engineering</li><li>Why today’s cyber threats blur the line between espionage and warfare</li><li>The growing gap between government capability and private-sector technology</li><li>What “assume breach” really means in modern cybersecurity</li><li>When (if ever) paying a ransom makes sense</li><li>Practical strategies to contain attacks and protect critical infrastructure</li></ul><br/><p>This is a must-watch discussion for security leaders, IT professionals, policymakers, and anyone concerned about the future of cyber defense.</p><p>About Cynthia Kaiser</p><p>Cynthia is an award-winning cyber executive, former FBI leader, and SVP at Halcyon focused on stopping ransomware and advancing threat intelligence. She has been featured in major global media and previously served as a President’s Daily Brief intelligence briefer across two U.S. administrations.</p><p>Subscribe for more conversations with the people shaping the future of cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the THREATCON 1 Podcast, hosts Tom Bain and Patrick Garrity sit down with Cynthia Kaiser, SVP at Halcyon and former FBI cyber executive, to explore the rapidly evolving world of ransomware, AI-driven threats, and national-security-level cyber defense.</p><p>Drawing on two decades inside the FBI—including briefing the President’s Daily Intelligence Brief—Cynthia shares frontline insight into how cyber threats have changed, why ransomware is moving faster than ever, and what organizations must do now to stay protected.</p><p>In this conversation:</p><ul><li>How AI is reshaping ransomware attacks and social engineering</li><li>Why today’s cyber threats blur the line between espionage and warfare</li><li>The growing gap between government capability and private-sector technology</li><li>What “assume breach” really means in modern cybersecurity</li><li>When (if ever) paying a ransom makes sense</li><li>Practical strategies to contain attacks and protect critical infrastructure</li></ul><br/><p>This is a must-watch discussion for security leaders, IT professionals, policymakers, and anyone concerned about the future of cyber defense.</p><p>About Cynthia Kaiser</p><p>Cynthia is an award-winning cyber executive, former FBI leader, and SVP at Halcyon focused on stopping ransomware and advancing threat intelligence. She has been featured in major global media and previously served as a President’s Daily Brief intelligence briefer across two U.S. administrations.</p><p>Subscribe for more conversations with the people shaping the future of cybersecurity.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">a13e6968-066d-403a-a24b-a70f92b473f2</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 10 Feb 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a13e6968-066d-403a-a24b-a70f92b473f2.mp3" length="54898062" type="audio/mpeg"/><itunes:duration>45:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode></item><item><title>Episode 10: Reducing Noise Risk and Attack Surface in Financial Services | Neil Robinson Virgin Money</title><itunes:title>Episode 10: Reducing Noise Risk and Attack Surface in Financial Services | Neil Robinson Virgin Money</itunes:title><description><![CDATA[<p>Tom and Patrick chat with Neil Robinson, Head of Security Engineering and Cybersecurity, Virgin Money. Neil shares his perspectives on tracking and managing emerging cyber threats in the financial services industry, gives us an alternate role or the CISO - The Chief "Translation" Officer, and provides some ways in which he focuses in on reducing noise, creating more effective signal, and how he sees the "AI slop" affecting that signal-to-noise ratio from some intel providers. Finally, Neil make an enormously salient point on how trust factors into threat actor tracking across a targeted "Top 10" threat actors who matter in the financial industry.</p>]]></description><content:encoded><![CDATA[<p>Tom and Patrick chat with Neil Robinson, Head of Security Engineering and Cybersecurity, Virgin Money. Neil shares his perspectives on tracking and managing emerging cyber threats in the financial services industry, gives us an alternate role or the CISO - The Chief "Translation" Officer, and provides some ways in which he focuses in on reducing noise, creating more effective signal, and how he sees the "AI slop" affecting that signal-to-noise ratio from some intel providers. Finally, Neil make an enormously salient point on how trust factors into threat actor tracking across a targeted "Top 10" threat actors who matter in the financial industry.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">6cfb499d-74b8-4cd5-a8af-cf2da7bd9148</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 03 Feb 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6cfb499d-74b8-4cd5-a8af-cf2da7bd9148.mp3" length="37728832" type="audio/mpeg"/><itunes:duration>31:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode></item><item><title>Episode 9: Teen Hackers, Billion-Dollar Damage — Zafran’s Yonatan Keller &amp; Nate Rollings on AI Threats Rising</title><itunes:title>Episode 9: Teen Hackers, Billion-Dollar Damage — Zafran’s Yonatan Keller &amp; Nate Rollings on AI Threats Rising</itunes:title><description><![CDATA[<p>In this episode of <strong>THREATCON1</strong>, hosts <strong>Tom Bain</strong> and <strong>Patrick Garrity</strong> sit down with <strong>Nathan Rollings</strong>, Field CISO at <strong>Zafran</strong>, and <strong>Yonatan Keller</strong>, Analyst Team Lead at <strong>Zafran</strong>, for a deep, practitioner-focused conversation on the realities of modern vulnerability management.</p><p>Together, they explore why patching alone can’t keep up with today’s threat landscape — and how security teams can dramatically reduce risk by prioritizing <em>what actually matters</em>.</p><p>🔍 <strong>Key Topics Covered</strong></p><p><strong>Why patching is too slow</strong></p><p>The average enterprise takes ~49 days to patch — while attackers weaponize vulnerabilities in days (or minutes).</p><p><br></p><p><strong>Mitigating controls vs. patching</strong></p><p>How firewalls, EDRs, WAFs, segmentation, and configuration changes can meaningfully reduce exploitability — even when patching isn’t possible.</p><p><br></p><p><strong>The “1 in 50,000” insight</strong></p><p>Why only a tiny fraction of vulnerabilities are <em>truly critical</em> when you factor in runtime, reachability, exploitability, and existing controls.</p><p><br></p><p><strong>Zero-days without CVEs</strong></p><p>How agentic workflows can assess exposure, identify impacted assets, and recommend mitigations <em>before</em> scanners, signatures, or CVE IDs exist.</p><p><br></p><p><strong>CTEM as a maturity journey</strong></p><p>Moving from noisy vulnerability lists to operationalized, risk-driven exposure management — without creating shelfware.</p><p><br></p><p><strong>Threat enablement is the real danger</strong></p><p>Why loosely organized groups and even teenagers are now capable of causing enterprise-level disruption.</p><p><br></p><p><strong>Edge devices, legacy software, and OT risk</strong></p><p>Why internet-facing systems and unpatchable environments (manufacturing, healthcare, critical infrastructure) demand a mitigation-first mindset.</p><p><br></p><p><strong>AI vulnerabilities: the next frontier</strong></p><p>No CVEs, no standards, rapid adoption — and a growing attack surface most organizations aren’t tracking yet.</p><p><br></p><p><strong>AI as a force multiplier for defenders</strong></p><p>How agentic AI can shorten exposure windows, automate analysis, and upskill under-resourced security teams.</p><p><br></p><p><br></p><h3>🎯 <strong>Why This Episode Matters</strong></h3><p>If you’re overwhelmed by vulnerability volume, constrained by patching windows, or struggling to align security priorities with business reality, this episode offers a grounded, experience-driven perspective on how modern teams are adapting — and where the industry is heading next.</p><p><br></p><p><strong>THREATCON1</strong> is created by <strong>VulnCheck</strong> and focuses on emerging threats, real-world security operations, and conversations with practitioners shaping the future of cybersecurity.</p><p><br></p><p>🔔 Subscribe for more episodes exploring vulnerabilities, threat intelligence, and exposure management with the people who matter most.</p>]]></description><content:encoded><![CDATA[<p>In this episode of <strong>THREATCON1</strong>, hosts <strong>Tom Bain</strong> and <strong>Patrick Garrity</strong> sit down with <strong>Nathan Rollings</strong>, Field CISO at <strong>Zafran</strong>, and <strong>Yonatan Keller</strong>, Analyst Team Lead at <strong>Zafran</strong>, for a deep, practitioner-focused conversation on the realities of modern vulnerability management.</p><p>Together, they explore why patching alone can’t keep up with today’s threat landscape — and how security teams can dramatically reduce risk by prioritizing <em>what actually matters</em>.</p><p>🔍 <strong>Key Topics Covered</strong></p><p><strong>Why patching is too slow</strong></p><p>The average enterprise takes ~49 days to patch — while attackers weaponize vulnerabilities in days (or minutes).</p><p><br></p><p><strong>Mitigating controls vs. patching</strong></p><p>How firewalls, EDRs, WAFs, segmentation, and configuration changes can meaningfully reduce exploitability — even when patching isn’t possible.</p><p><br></p><p><strong>The “1 in 50,000” insight</strong></p><p>Why only a tiny fraction of vulnerabilities are <em>truly critical</em> when you factor in runtime, reachability, exploitability, and existing controls.</p><p><br></p><p><strong>Zero-days without CVEs</strong></p><p>How agentic workflows can assess exposure, identify impacted assets, and recommend mitigations <em>before</em> scanners, signatures, or CVE IDs exist.</p><p><br></p><p><strong>CTEM as a maturity journey</strong></p><p>Moving from noisy vulnerability lists to operationalized, risk-driven exposure management — without creating shelfware.</p><p><br></p><p><strong>Threat enablement is the real danger</strong></p><p>Why loosely organized groups and even teenagers are now capable of causing enterprise-level disruption.</p><p><br></p><p><strong>Edge devices, legacy software, and OT risk</strong></p><p>Why internet-facing systems and unpatchable environments (manufacturing, healthcare, critical infrastructure) demand a mitigation-first mindset.</p><p><br></p><p><strong>AI vulnerabilities: the next frontier</strong></p><p>No CVEs, no standards, rapid adoption — and a growing attack surface most organizations aren’t tracking yet.</p><p><br></p><p><strong>AI as a force multiplier for defenders</strong></p><p>How agentic AI can shorten exposure windows, automate analysis, and upskill under-resourced security teams.</p><p><br></p><p><br></p><h3>🎯 <strong>Why This Episode Matters</strong></h3><p>If you’re overwhelmed by vulnerability volume, constrained by patching windows, or struggling to align security priorities with business reality, this episode offers a grounded, experience-driven perspective on how modern teams are adapting — and where the industry is heading next.</p><p><br></p><p><strong>THREATCON1</strong> is created by <strong>VulnCheck</strong> and focuses on emerging threats, real-world security operations, and conversations with practitioners shaping the future of cybersecurity.</p><p><br></p><p>🔔 Subscribe for more episodes exploring vulnerabilities, threat intelligence, and exposure management with the people who matter most.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">875fc7e4-72eb-4bb7-9a39-51c429a1a6e5</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 13 Jan 2026 06:23:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/875fc7e4-72eb-4bb7-9a39-51c429a1a6e5.mp3" length="58544780" type="audio/mpeg"/><itunes:duration>48:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode></item><item><title>Episode 8: When Offense Meets Defense — How Cybersecurity Teams Reduce Risk Faster | Tyler Shields</title><itunes:title>Episode 8: When Offense Meets Defense — How Cybersecurity Teams Reduce Risk Faster | Tyler Shields</itunes:title><description><![CDATA[<p>In this episode of the <strong>Threatcon1 Podcast</strong>, Tom and Patrick sit down with <strong>Tyler Shields</strong>, Cybersecurity Strategy Analyst at <strong>Omdia</strong>, for a wide-ranging conversation on where cybersecurity is heading — and what actually matters to practitioners right now.</p><p>Tyler brings a rare perspective shaped by years spent across research, offensive security, vendor strategy, and analyst work. Together, they unpack how <strong>AI is reshaping cybersecurity workflows</strong>, why <strong>threat and exposure management</strong> is emerging as a critical discipline, and how <strong>offensive and defensive security must converge</strong> to drive real risk reduction.</p><p>The discussion dives deep into the realities behind AI hype, the importance of keeping humans in the loop, and why buyers are overwhelmed by security debt rather than lacking data. Tyler also offers a candid take on the <strong>CVE ecosystem</strong>, vulnerability scoring fragmentation, and why context — not raw severity scores — is the only thing that makes vulnerability data actionable.</p><p>The episode closes with a look at the next generation of cybersecurity leaders, startup strategy, and what students entering the field are uniquely positioned to do differently.</p><p><strong>Key topics include:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Applied AI vs. AI hype in cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat &amp; exposure management as a risk-reduction engine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Offensive security’s role in prioritization and validation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why vulnerability scoring breaks down without context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CVEs, ecosystem fragmentation, and global vulnerability data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Platformization, consolidation, and the future of security tooling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building cybersecurity startups that solve real buyer problems</li></ol><br/><p>http://threatcon1.org</p><p>https://vulncheck.com</p><p>https://omdia.tech.informa.com</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <strong>Threatcon1 Podcast</strong>, Tom and Patrick sit down with <strong>Tyler Shields</strong>, Cybersecurity Strategy Analyst at <strong>Omdia</strong>, for a wide-ranging conversation on where cybersecurity is heading — and what actually matters to practitioners right now.</p><p>Tyler brings a rare perspective shaped by years spent across research, offensive security, vendor strategy, and analyst work. Together, they unpack how <strong>AI is reshaping cybersecurity workflows</strong>, why <strong>threat and exposure management</strong> is emerging as a critical discipline, and how <strong>offensive and defensive security must converge</strong> to drive real risk reduction.</p><p>The discussion dives deep into the realities behind AI hype, the importance of keeping humans in the loop, and why buyers are overwhelmed by security debt rather than lacking data. Tyler also offers a candid take on the <strong>CVE ecosystem</strong>, vulnerability scoring fragmentation, and why context — not raw severity scores — is the only thing that makes vulnerability data actionable.</p><p>The episode closes with a look at the next generation of cybersecurity leaders, startup strategy, and what students entering the field are uniquely positioned to do differently.</p><p><strong>Key topics include:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Applied AI vs. AI hype in cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat &amp; exposure management as a risk-reduction engine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Offensive security’s role in prioritization and validation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why vulnerability scoring breaks down without context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CVEs, ecosystem fragmentation, and global vulnerability data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Platformization, consolidation, and the future of security tooling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building cybersecurity startups that solve real buyer problems</li></ol><br/><p>http://threatcon1.org</p><p>https://vulncheck.com</p><p>https://omdia.tech.informa.com</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">bf3081b1-543e-4299-b8cb-dd4d02c3e79d</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 23 Dec 2025 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/bf3081b1-543e-4299-b8cb-dd4d02c3e79d.mp3" length="49908363" type="audio/mpeg"/><itunes:duration>41:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode></item><item><title>Episode 7: The Biggest Cyber Threats Today - Nabil Hannan on Insecure Software, CVEs &amp; AI</title><itunes:title>Episode 7: The Biggest Cyber Threats Today - Nabil Hannan on Insecure Software, CVEs &amp; AI</itunes:title><description><![CDATA[<p>In this episode of THREATCON1, Tom and Patrick sit down with Nabil Hannan, Field CISO at NetSPI, AI-focused startup advisor, and host of the Agent of Influence podcast. Nabil shares his unique perspective on today’s most pressing cybersecurity challenges, including:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Insecure software and why vulnerabilities are becoming increasingly dangerous in our hyper-connected world.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The human factor in cybersecurity: why people often pose a bigger risk than technology itself.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Secure by design principles and the hurdles organizations face when trying to implement them at scale.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CVE program insights: understanding the gap between published vulnerabilities and real-world threats.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Software Bill of Materials (S-BoM): why tracking third-party components is critical for enterprise security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI in cybersecurity: from deepfakes to real-time impersonation, Nabil breaks down the risks and practical applications.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Career insights: Nabil reflects on his journey through software development, product management, and cybersecurity leadership.</li></ol><br/><p>Whether you’re a cybersecurity professional, software engineer, or just interested in the evolving digital threat landscape, this episode is packed with actionable insights and real-world examples from someone on the front lines of security.</p><p>Resources &amp; Links Mentioned:</p><p>THREATCON1: https://www.threatcon1.org/</p><p>NetSPI: https://www.netspi.com</p><p>Agent of Influence Podcast: https://www.netspi.com/podcast/logistics-cybersecurity/</p><p>Follow THREATCON1 for more expert discussions on emerging threats.</p>]]></description><content:encoded><![CDATA[<p>In this episode of THREATCON1, Tom and Patrick sit down with Nabil Hannan, Field CISO at NetSPI, AI-focused startup advisor, and host of the Agent of Influence podcast. Nabil shares his unique perspective on today’s most pressing cybersecurity challenges, including:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Insecure software and why vulnerabilities are becoming increasingly dangerous in our hyper-connected world.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The human factor in cybersecurity: why people often pose a bigger risk than technology itself.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Secure by design principles and the hurdles organizations face when trying to implement them at scale.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CVE program insights: understanding the gap between published vulnerabilities and real-world threats.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Software Bill of Materials (S-BoM): why tracking third-party components is critical for enterprise security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI in cybersecurity: from deepfakes to real-time impersonation, Nabil breaks down the risks and practical applications.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Career insights: Nabil reflects on his journey through software development, product management, and cybersecurity leadership.</li></ol><br/><p>Whether you’re a cybersecurity professional, software engineer, or just interested in the evolving digital threat landscape, this episode is packed with actionable insights and real-world examples from someone on the front lines of security.</p><p>Resources &amp; Links Mentioned:</p><p>THREATCON1: https://www.threatcon1.org/</p><p>NetSPI: https://www.netspi.com</p><p>Agent of Influence Podcast: https://www.netspi.com/podcast/logistics-cybersecurity/</p><p>Follow THREATCON1 for more expert discussions on emerging threats.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">2e47fce7-698f-47e6-9aaa-0d70b745e673</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Tue, 09 Dec 2025 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2e47fce7-698f-47e6-9aaa-0d70b745e673.mp3" length="60317047" type="audio/mpeg"/><itunes:duration>50:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode></item><item><title>Episode 6: From North Korea to LinkedIn: The New Era of Social-Engineered Intrusion with Christine Fignar</title><itunes:title>Episode 6: From North Korea to LinkedIn: The New Era of Social-Engineered Intrusion with Christine Fignar</itunes:title><description><![CDATA[<p>Tom and Patrick sit down with Christine Fignar, Cybersecurity Analyst at the Federal Reserve Bank of Minneapolis, to unpack one of the most misunderstood areas of security: insider threats and human-driven risk. Christine’s background spanning aviation, HR, communications, and counterterrorism gives her a rare perspective on stress, behavior patterns, and the subtle signals that often precede incidents.</p><p>We get into her “Cone of Uncertainty” framework for visualizing how threats form and evolve, discuss hiring fraud, offboarding gaps, nation-state recruitment, and why organizations routinely miss early warning signs. A conversation for anyone looking to better understand, track, and communicate human-centric risk.</p><p>🔍 Topics Covered</p><ul><li>How the Federal Reserve approaches insider threat detection</li><li>The “Cone of Uncertainty” model — and why it works for cyber</li><li>Why human stress is one of the strongest predictors of insider risk</li><li>How to watch for early “storm signals” inside your organization</li><li>The rise of nation-state hiring scams (North Korea, China)</li><li>OSINT techniques for tracking behavioral risk</li><li>Why cyber teams must become “English-to-English translators”</li><li>Problems with spreadsheets, CVSS scores, and risk communication</li><li>The hidden dangers in onboarding/offboarding workflows</li><li>Real-world examples: sales data theft, disgruntled employees, access misconfigurations</li><li>Why organizations still fail at protecting sensitive information</li></ul><br/><p><br></p><p>🎙️ About Our Guest</p><p>Christine Fignar</p><p>Cybersecurity Analyst, Federal Reserve Bank of Minneapolis</p><p>Specializes in insider threat, incident response, human-behavior-driven risk, and threat intelligence analysis.</p><p>Background includes aviation operations, HR, communications, and counterterrorism/anti-corruption studies.</p><p>📢 If You’re in Cybersecurity, This Episode Is For You</p><p>Perfect for security leaders, threat intel analysts, defenders, SOC teams, and anyone who wants to understand the human side of modern cyber threats — beyond the dashboards and detection tools.</p>]]></description><content:encoded><![CDATA[<p>Tom and Patrick sit down with Christine Fignar, Cybersecurity Analyst at the Federal Reserve Bank of Minneapolis, to unpack one of the most misunderstood areas of security: insider threats and human-driven risk. Christine’s background spanning aviation, HR, communications, and counterterrorism gives her a rare perspective on stress, behavior patterns, and the subtle signals that often precede incidents.</p><p>We get into her “Cone of Uncertainty” framework for visualizing how threats form and evolve, discuss hiring fraud, offboarding gaps, nation-state recruitment, and why organizations routinely miss early warning signs. A conversation for anyone looking to better understand, track, and communicate human-centric risk.</p><p>🔍 Topics Covered</p><ul><li>How the Federal Reserve approaches insider threat detection</li><li>The “Cone of Uncertainty” model — and why it works for cyber</li><li>Why human stress is one of the strongest predictors of insider risk</li><li>How to watch for early “storm signals” inside your organization</li><li>The rise of nation-state hiring scams (North Korea, China)</li><li>OSINT techniques for tracking behavioral risk</li><li>Why cyber teams must become “English-to-English translators”</li><li>Problems with spreadsheets, CVSS scores, and risk communication</li><li>The hidden dangers in onboarding/offboarding workflows</li><li>Real-world examples: sales data theft, disgruntled employees, access misconfigurations</li><li>Why organizations still fail at protecting sensitive information</li></ul><br/><p><br></p><p>🎙️ About Our Guest</p><p>Christine Fignar</p><p>Cybersecurity Analyst, Federal Reserve Bank of Minneapolis</p><p>Specializes in insider threat, incident response, human-behavior-driven risk, and threat intelligence analysis.</p><p>Background includes aviation operations, HR, communications, and counterterrorism/anti-corruption studies.</p><p>📢 If You’re in Cybersecurity, This Episode Is For You</p><p>Perfect for security leaders, threat intel analysts, defenders, SOC teams, and anyone who wants to understand the human side of modern cyber threats — beyond the dashboards and detection tools.</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">0fb35836-4455-44b5-a97e-87243fe4a6f8</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Wed, 03 Dec 2025 06:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0fb35836-4455-44b5-a97e-87243fe4a6f8.mp3" length="53774839" type="audio/mpeg"/><itunes:duration>44:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode></item><item><title>Episode 5: Building a Proactive Cyber Strategy with Focus and Cross-team Collaboration</title><itunes:title>Episode 5: Building a Proactive Cyber Strategy with Focus and Cross-team Collaboration</itunes:title><description><![CDATA[<p>Tom&nbsp;and Patrick welcomed Simon Goldsmith, CISO, Ovo Energy to the show, to chat about the emerging threat landscape across different industries he’s served in - from the CISO’s perspective. We dig into some of his cyber experiences throughout his career, talk rugby, debate Oasis vs Blur and even drill down into how to counter coordinated nation-state attacks!</p>]]></description><content:encoded><![CDATA[<p>Tom&nbsp;and Patrick welcomed Simon Goldsmith, CISO, Ovo Energy to the show, to chat about the emerging threat landscape across different industries he’s served in - from the CISO’s perspective. We dig into some of his cyber experiences throughout his career, talk rugby, debate Oasis vs Blur and even drill down into how to counter coordinated nation-state attacks!</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">b2196b67-e0c3-4145-b42b-29260a10b176</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Mon, 24 Nov 2025 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/b2196b67-e0c3-4145-b42b-29260a10b176.mp3" length="50589375" type="audio/mpeg"/><itunes:duration>42:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode></item><item><title>Episode 4: Cyber Ops Experience Meets Following Industry Money with Mike Privette</title><itunes:title>Episode 4: Cyber Ops Experience Meets Following Industry Money with Mike Privette</itunes:title><description><![CDATA[<p>Tom and Patrick host Mike Privette, Founder, Return on Security, to get a sense of Mike's perspectives on how he's used his operational background in cyber as a former multi-time CISO to pivot into something entirely different&nbsp;in the cyber market today! Mike brings insights on how he tracks and slices data on all cyber funding and M&amp;A activity with his broad-ranging dataset and his leading newsletter. They cover ground on emerging threats, AI investment in cyber and what pushed him to pursue a unique pivot in his cybersecurity journey!</p>]]></description><content:encoded><![CDATA[<p>Tom and Patrick host Mike Privette, Founder, Return on Security, to get a sense of Mike's perspectives on how he's used his operational background in cyber as a former multi-time CISO to pivot into something entirely different&nbsp;in the cyber market today! Mike brings insights on how he tracks and slices data on all cyber funding and M&amp;A activity with his broad-ranging dataset and his leading newsletter. They cover ground on emerging threats, AI investment in cyber and what pushed him to pursue a unique pivot in his cybersecurity journey!</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">cbdeeb3b-ec5d-4f82-8f39-6592204a1e53</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Mon, 17 Nov 2025 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cbdeeb3b-ec5d-4f82-8f39-6592204a1e53.mp3" length="52928816" type="audio/mpeg"/><itunes:duration>44:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode></item><item><title>Episode 3: CVE&apos;s Emerging Threats and Horror Movies — with Tod Beardsley (RunZero)</title><itunes:title>Episode 3: CVE&apos;s Emerging Threats and Horror Movies — with Tod Beardsley (RunZero)</itunes:title><description><![CDATA[<p>Tom and Patrick sit down with VP of Security Research, Tod Beardsley. We talk to Tod about his current role leading cyber research at RunZero, his time at CISA, emerging cyber threats he's currently engaged in researching, his perspective on the CVE program and its future - and finally, horror movies, of which Tod is an aficionado and active podcast host himself of Podsothoth: A Lovecraft Book Club. This session isn't THAT scary really...</p>]]></description><content:encoded><![CDATA[<p>Tom and Patrick sit down with VP of Security Research, Tod Beardsley. We talk to Tod about his current role leading cyber research at RunZero, his time at CISA, emerging cyber threats he's currently engaged in researching, his perspective on the CVE program and its future - and finally, horror movies, of which Tod is an aficionado and active podcast host himself of Podsothoth: A Lovecraft Book Club. This session isn't THAT scary really...</p>]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">30423ca8-d270-4390-a80c-2b722e8aa05f</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Wed, 12 Nov 2025 17:14:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/30423ca8-d270-4390-a80c-2b722e8aa05f.mp3" length="58831461" type="audio/mpeg"/><itunes:duration>48:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode></item><item><title>Episode 2: The Ins and Outs of Offensive Cyber with Andrew Boyd</title><itunes:title>Episode 2: The Ins and Outs of Offensive Cyber with Andrew Boyd</itunes:title><description><![CDATA[
                In this episode, Tom and Patrick chat with former Director of the CIA’s Center for Cyber Intelligence, Andrew Boyd, about the root of today’s emerging cyber threats to both business and to citizens. They dive into his experience in offensive cybersecurity across multiple former government roles, how he grew his skillset into cyber and experiences in serving the U.S. in many innovation-led cyber capacities, and his current cyber-inspired initiatives.
            ]]></description><content:encoded><![CDATA[
                In this episode, Tom and Patrick chat with former Director of the CIA’s Center for Cyber Intelligence, Andrew Boyd, about the root of today’s emerging cyber threats to both business and to citizens. They dive into his experience in offensive cybersecurity across multiple former government roles, how he grew his skillset into cyber and experiences in serving the U.S. in many innovation-led cyber capacities, and his current cyber-inspired initiatives.
            ]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">2fafd16f-e3d0-42ad-b645-1ca6909a02fd</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Wed, 17 Sep 2025 16:45:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/52b904c0-fc92-4e58-8f8b-c947a36b8d42.mp3" length="31826863" type="audio/mpeg"/><itunes:duration>33:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Episode 1: Cyber Summer Break with Jen Easterly</title><itunes:title>Episode 1: Cyber Summer Break with Jen Easterly</itunes:title><description><![CDATA[
                In this episode, Tom and Patrick chat with Jen Easterly, former Director of CISA, for the U.S. government. Topics covered range from public-private collaboration efforts to better protect our national security, to her perspectives on defending against threat actors targeting U.S. interests as well as the impact AI is having on cyber today, with a sneak peak into a few of her upcoming key initiatives. And we go to learn how Jen Easterly spent her summer!
            ]]></description><content:encoded><![CDATA[
                In this episode, Tom and Patrick chat with Jen Easterly, former Director of CISA, for the U.S. government. Topics covered range from public-private collaboration efforts to better protect our national security, to her perspectives on defending against threat actors targeting U.S. interests as well as the impact AI is having on cyber today, with a sneak peak into a few of her upcoming key initiatives. And we go to learn how Jen Easterly spent her summer!
            ]]></content:encoded><link><![CDATA[https://www.threatcon1.org]]></link><guid isPermaLink="false">2cc4b588-2fdc-4eaa-b491-149d8d8f1e1f</guid><itunes:image href="https://artwork.captivate.fm/21e5cab0-08e3-41bd-9775-d5b4dd8e272f/5oqtypjnxrvbeyeqnfwaudklglh3po1jhahkuhar.png"/><pubDate>Wed, 17 Sep 2025 16:45:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1f57d9cb-7265-4b88-b73e-01284154ccd6.mp3" length="28834277" type="audio/mpeg"/><itunes:duration>30:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item></channel></rss>