Hacker Valley Studio-logo

Hacker Valley Studio

Technology Podcasts

Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.

Location:

United States

Description:

Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.

Language:

English

Contact:

7705579711


Episodes
Ask host to enable sharing for playback control

The AI That Tried to Escape with Ron Eddings

6/12/2025
What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-summarizing email clients acting as unintentional insiders, the stakes have never been higher. Ron also shares insights from his brand-new book Attack Surface Management, co-authored with MJ Kaufman and published by O'Reilly, and breaks down why the simplest social engineering tactics remain the most dangerous—even in the age of advanced AI. Impactful Moments: 00:00 - Introduction 02:30 - Model Context Protocol explained 05:00 - Google's VEO-3 and fake riot videos 07:00 - Fake Facebook ads pushing malware 09:30 - Social engineering still reigns supreme 13:30 - Using AI to write malicious emails 16:30 - Calendly phishing and credential theft 19:00 - Gemini and the risk of auto-summarization 21:30 - LLM access to your private documents 22:45 - Takeaways and protecting your environment Links: Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/ Grab a copy of Ron’s new book, “Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets”: https://a.co/d/1nmPod2 Check out the full article on “The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare” here: https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:23:43

Ask host to enable sharing for playback control

Zero Trust Isn’t a Tool — It’s Everything with George Finney

6/5/2025
What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and author of Project Zero Trust, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you build. George shares stories from hacking a college database to launching a deepfake of himself trained on his own books, all while breaking down how AI and creativity are reshaping security leadership. Impactful Moments: 00:00 - Introduction 01:16 - Cyber Hall of Fame recognition 07:00 - Hacked his college to solve mail 09:00 - Took startup job without paycheck 14:14 - Zero Trust is a strategy, not tool 17:00 - Tailoring security like a custom suit 23:29 - AI strategy through Zero Trust lens 29:30 - Built a Zero Trust voice clone hotline 36:00 - You don’t need to be a CISO 38:30 - Why weirdos make cybersecurity stronger Links: Connect with our guest, George Finney: https://www.linkedin.com/in/georgefinney/ Check out George’s books on Amazon: https://www.amazon.com/stores/author/B01MT0C6X3 Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:40:15

Ask host to enable sharing for playback control

Your Two-Year Edge Starts Now with Marco Figueroa

5/29/2025
You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing. In this episode, Ron is joined by Marco as he breaks down the rapid evolution of AI agents—from Claude Code to Codex to Google Flow. He explains why general-purpose models are leveling off, how specialized tools are reshaping the landscape, and why creativity is now your most valuable edge. Whether you're in code, ops, or content, your two-year advantage starts right here. Impactful Moments 00:00 - Introduction 01:08 - AI agents are no longer hype 03:45 - Major LLM releases and what's next 05:32 - The Grok delay and pricing drama 07:30 - Why general models are losing steam 10:50 - Benchmark manipulation and model specialization 14:15 - The future belongs to creatives 22:05 - The next AI drops to watch Links: Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:36:34

Ask host to enable sharing for playback control

Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg Hatcher & John Stigerwalt

5/22/2025
Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs. In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world action. They share high-stakes red team operations—like triggering alarms and dodging police during a break-in—and explain why most companies are wide open to physical and insider threats. This isn’t a theory. It’s what’s happening right now, and it’s being executed with precision and purpose. Impactful Moments 00:00 - Introduction 02:13 - Origin story of White Knight Labs 08:56 - Why physical red teaming is broken 12:20 - Breaking into a lottery facility 16:00 - Hiding from police mid-engagement 22:30 - Getting hired to breach from inside 25:45 - Hijacking code from offshore devs 33:29 - Real difference: red team vs pen test 35:00 - Get in touch with WKL Links Connect with our guests! Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/ John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/ Learn more about White Knight Labs: https://www.whiteknightlabs.com Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:37:31

Ask host to enable sharing for playback control

Building Cyber Resilience Through Culture with David Shipley

5/15/2025
What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parallels with preventative healthcare — and explain why culture, psychological safety, and behavior change are the true secret weapons. Impactful Moments: 00:00 - Introduction 01:36 - The true meaning of "people in cyber" 03:13 - Cybersecurity’s flawed healthcare analogy 07:31 - Nutrition for cyber: proactive strategies 10:00 - MSPs: why selling tools isn’t enough 16:22 - Measuring culture, not just clicks 19:12 - Why people really click phishing emails 23:59 - Building psychological safety in security 30:30 - Celebrating human wins in security 34:00 - The future: empathy, transparency, trust Links: Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/ Learn more about Beauceron Security here: https:///www.beauceronsecurity.com/partner Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:44:30

Ask host to enable sharing for playback control

Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman

5/8/2025
Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way. In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certificate management to preparing for a post-quantum future, this conversation covers real-world risks, surprising breach stories, and practical steps for bringing order to crypto chaos—without the stress. Impactful Moments: 00:00 – Introduction 04:00 – Three major problems with crypto today 06:45 – Certificates often missing from inventories 08:30 – Managing EV charging infrastructure with spreadsheets 11:00 – The two biggest certificate-related risks 12:50 – Expired certs can tank brand trust 14:45 – Automation usually comes after spreadsheets 16:30 – Why quantum risk grows every year 18:15 – Start with a cryptographic inventory 20:30 – Nation-state threats and critical infrastructure 22:15 – AI could fast-track quantum breakthroughs 24:45 – Entrust’s new unified crypto security platform 26:35 – One question every CISO must answer in 2025 Links: Connect with our guest, Michael Klieman: https://www.linkedin.com/in/mklieman/ Learn more about Entrust at: https://entrust.com/csp Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:29:48

Ask host to enable sharing for playback control

Protecting People, Not Just Perimeters with Andrey Suzdaltsev

4/24/2025
AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter. In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric protection. From offensive AI simulations to family-inclusive cyber safety, Andrey shares how his team secures both professional and personal perimeters before cybercriminals can strike. Impactful Moments 00:00 Cyber criminals get a theatrical glow-up 01:47 AI models + personal data = mass fraud 03:42 Brightside’s 3-part solution explained 07:32 Why security must get personal 11:16 Ron’s reaction to Brightside’s realism 13:16 AI research tools now used by hackers 19:33 Why deepfake detection may fail 15:16 Automating attacks with AI agents 37:34 Protecting families = smarter security 41:56 Brightside’s vision for defending human risk Links Connect with our guest, Andrey Suzdaltsev: https://www.linkedin.com/in/ndrey Learn more about Brightside: www.brside.com Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:45:21

Ask host to enable sharing for playback control

Digital Clutter and the Death of Passwords with Collin Sweeney & Chase Cunningham

4/10/2025
Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out? In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cunningham, a.k.a. “Dr. Zero Trust,” for a bold conversation on the future of authentication. From the failures of MFA to the promise of zero-knowledge proofs, the crew breaks down how we got stuck with broken access systems—and what it’ll take to finally fix them. Whether it’s SIM swapping, face IDs, or security keys on the battlefield, this is the real talk on identity security you don’t want to miss. Impactful Moments: 00:00 – Introduction 03:45 – ZKX’s origin: voice verification breakthrough 06:45 – Collin’s “oh crap” SolarWinds realization 09:15 – Why MFA still fails in practice 13:15 – Zero-knowledge proofs explained with a coin 15:30 – How ZKPs reduce identity attack surfaces 17:45 – Making MFA faster, smarter, more human 20:00 – MFA fatigue and ice skating uphill 24:00 – Why people still cling to passwords 30:54 – Quantum fears vs real-world encryption limits Links: Connect with Collin Sweeney: https://www.linkedin.com/in/collin-sweeney-6ab6a5176/ Check out ZKX Solutions new product, Helix: zkxsolutions.com/helix Connect with Chase Cunningham: https://www.linkedin.com/in/dr-chase-cunningham/ Grab a copy of Chase Cunningham's book “vArIable: A Novel in the gAbrIel Series” here: www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mp Check out Hacker Valley’s upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord B

Duration:00:43:26

Ask host to enable sharing for playback control

What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen

4/3/2025
What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast? In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the uncomfortable truth about skill decline in security teams. You’ll hear how he built an AI-powered threat intel engine, why most cybersecurity advice is outdated, and his hard-earned wisdom on surviving—and thriving—in a landscape built to break you. Impactful Moments: 00:00 - Introduction 01:30 - Meeting RSnake at Hacker Hoedown 04:50 - AI-powered newsletter curation 08:15 - Ranking news by global impact 13:00 - Keeping LLM costs under 25 cents/day 16:10 - Paths to revenue for cybersecurity pros 24:00 - Why venture capital often kills innovation 33:20 - Cloud migration and the crocodile problem 37:00 - Decline in practitioner technical skill 40:00 - Designing tools for non-experts Links: Connect with our guest, Robert “RSnake” Hansen: https://www.linkedin.com/in/roberthansen3/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:00:36

Ask host to enable sharing for playback control

Hackers Have HR Now? featuring Christopher Budd

3/27/2025
The internet once came this close to crashing—and Microsoft was on the front line. In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors post job ads for ransom note writers, Christopher lays it all out with perspective only decades in the game can bring. If you think AI or ransomware is the endgame, you’re not seeing the whole board. Impactful Moments: 00:00 - Introduction 04:35 - Breaking down the Nimda attack 07:00 - “We carried 90% of the internet” 10:37 - Ransomware gangs fighting for headlines 15:26 - Secure perimeter is officially dead 17:31 - AI as your cybernetic exosuit 24:00 - Filtering 100,000 security emails with AI 27:05 - Privacy tension in AI-powered defense 32:00 - The inevitable swing back to local control 35:31 - “You will”: when sci-fi became real Links: Connect with our guest, Christopher Budd: https://www.linkedin.com/in/christopherbudd/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:36:59

Ask host to enable sharing for playback control

Staying Ahead in the Age of AI Agents with Marco Figueroa

3/21/2025
Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are scrambling to keep up. Building on his bold January prediction that 2025 would be the Year of the AI Agent, Marco returns to break down real-world threats, including an insider attack using an infinite logic bomb. From the rise of AI-driven security tools to the biggest risks companies aren’t ready for, this episode is your roadmap to staying ahead in the new AI era. Impactful Moments: 00:00 - Introduction 02:00 - Insider threat case: Infinite logic bomb attack 06:00 - Why AI will transform security forever 10:00 - AI agents will replace entire workflows 16:00 - The AI pricing war is heating up 22:00 - How to structure AI-driven security workflows 30:00 - The mind-blowing AI coding method you need 38:00 - The future of AI-assisted cybersecurity teams Links: Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:40:57

Ask host to enable sharing for playback control

I Built an AI Version of Myself – Here’s Why with Marcus J. Carey

3/14/2025
The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and career development. In this episode, he shares the workflows he uses that redefine productivity, from dictating books in a week to building a personal AI twin. In this episode, Ron and Marcus highlight AI’s true power—when used right. They discuss why intuition is the secret ingredient, how AI is reshaping cybersecurity, and why people who master AI will lead the future. Plus, Marcus breaks down how he built his own personal GPT, his approach to learning, and why he sees AI as a tool, not a threat. Impactful Moments: 00:00 - Introduction 01:18 - Meet Marcus J. Carey 03:00 - Using AI to write a book fast 06:00 - Creating a personal AI twin 09:00 - AI’s impact on cybersecurity defense 15:00 - The power of intuition in AI 22:00 - Why learning fundamentals still matters 30:00 - AI-enhanced workflows for coding 36:00 - The reality of AI "hallucinations" 39:00 - Final thoughts on mastering AI Links: Connect with our guest, Marcus J. Carey: https://www.linkedin.com/in/marcuscarey/ Grab a copy of Marcus’ book, “Hacker, Inc.: Mindset For Your Career” here: https://a.co/d/8i7waDc Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:39:48

Ask host to enable sharing for playback control

Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole

3/7/2025
We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it’s peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI’s role in our digital future, and why most people are sleepwalking through a war they don’t even realize they’re in. From the rise of deepfakes to North Korea’s billion-dollar hacking economy, this episode is one you can’t afford to ignore. Impactful Moments: 00:00 - Introduction 02:00 - Dr. Eric Cole’s journey from the CIA to cybersecurity leadership 07:20 - The fundamentals of hacking and why they still matter 11:00 - AI is only as smart as the data we give it 17:00 - The rise of deepfakes and digital deception 19:45 - Cyber warfare: How North Korea funds its economy through hacking 23:50 - The problem with America’s peacetime mentality 30:00 - Should we be worried about AI replacing humans? 36:10 - The key to success: mastering people skills, not just tech skills 40:30 - Final thoughts and where to follow Dr. Eric Cole Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/ Check out Dr. Eric Cole’s books – Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet: https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:41:45

Ask host to enable sharing for playback control

The AI Shift You Can’t Ignore with Marco Figueroa

2/28/2025
AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, who called it in January: 2025 is the year of AI agents, and the early signs are already here. From Grok 3’s speed advantage to AI-powered red teaming for $25K, this is the reality check security leaders need. No more six-month security projects—it’s all about speed, automation, and staying ahead. Impactful Moments: 00:00 - Introduction 01:45 - Breaking down Palantir’s stock drop 07:15 - Why Grok 3 is a game-changer 10:24 - The real difference between GPT-4 and Grok 17:25 - AI-powered red teaming for $25K? 22:00 - The death of six-month security projects 26:24 - OpenAI’s Operator: The future or a gimmick? 34:22 - How AI is eliminating busywork 36:55 - Next month’s prediction: Agents building agents Links: Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:37:35

Ask host to enable sharing for playback control

Superhuman Productivity and AI Mastery with Pedram Amini

2/21/2025
What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy. Pedram Amini, Chief Scientist at OPSWAT, joins Ron Eddings to discuss his journey from bootstrapped startups to AI-driven innovation. Together they cover topics like the role of AI in cybersecurity, the rise of fake identities in hiring, the ethics of AI-generated content, and why mastering AI tools is no longer optional—it's essential. Pedram shares his workflow for superhuman productivity, his thoughts on deepfakes, and how AI is reshaping how we work and communicate. Impactful Moments: 00:00 - Introduction 02:00 - Meet Pedram Amini, cyber innovator 03:07 - The $17M North Korea insider threat case 06:00 - Fake job candidates and AI hiring scams 09:28 - Deepfakes and AI-driven deception 14:00 - Future of AI-powered personal assistants 20:49 - The reality of bootstrapping vs. VC funding 26:00 - AI in cybersecurity: risk or revolution? 31:00 - “AI isn’t taking your job—someone using AI is” 35:00 - The ultimate AI-powered legacy project Links: Connect with our guest, Pedram Amini: https://www.linkedin.com/in/pedramamini/ Check out the entire article about the $17M North Korea insider threat case here: https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:36:17

Ask host to enable sharing for playback control

Cybersecurity Meets AI: The Good, The Bad & The Janky

2/13/2025
There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led. Impactful Moments: 00:00 - Introduction 02:00 - The good and bad of AI in security 04:00 - Google’s AI weapons controversy 06:30 - Deepfake scams and AI-powered phishing 09:00 - How AI helps (and fails) at programming 12:00 - Automating security research with AI 18:00 - AI-generated meeting notes & productivity hacks 21:00 - What AI should NEVER do 23:00 - The future of AI in cybersecurity Links: Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:22:38

Ask host to enable sharing for playback control

A Human-Centric Approach to Cybersecurity with Edna Conway

2/4/2025
What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology. Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around. Impactful Moments: 00:00 – Introduction 01:22 – Keynote insights: Innovation meets tradition 02:39 – From prosecutor to cybersecurity leader 07:00 – Human-first approach to AI and security 11:40 – LLMs in cybersecurity: opportunities and accuracy 16:34 – Balancing risk with AI use in business 23:06 – Bringing diverse talent into cybersecurity 32:30 – Advice on leadership and collaboration Links: Connect with our guest, Edna Conway: https://www.linkedin.com/in/ednaconway/ Learn more about ISSA Middle TN here: https://issamidtn.org/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:35:40

Ask host to enable sharing for playback control

Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam

1/28/2025
Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses. Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses. Impactful Moments: 00:00 - Introduction 04:15 - Why agentless devices dominate the next decade 06:30 - Insights from Ordr's “Rise of the Machines” report 08:50 - Hidden risks: 42% of devices are agentless 11:15 - Solving the "Swiss cheese" problem of security gaps 14:30 - Prioritizing vulnerabilities with business context 18:10 - Orchestration vs. automation: The harmony difference 22:00 - Why visibility is the foundation of security 27:30 - Ordr’s unique approach to securing the attack surface Links: Connect with our guest, Pandian Gnanaprakasam: https://www.linkedin.com/in/gpandian/ Check out Ordr’s Rise of the Machines report here: https://ordr.net/resources/rise-of-the-machines-report-2024 Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:38:03

Ask host to enable sharing for playback control

How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi

1/22/2025
What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible. From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7. Impactful Moments 00:00 - Introduction 01:11 - The evolution of cybersecurity 03:03 - Cybersecurity Mergers & Acquisitions 05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation 06:00 - KC7 wins “Team of the Year” at the SANS DMAs 8:43 - Founding the KC7 Foundation 10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge 11:46 - How KC7 gamifies real-world cybersecurity 14:52 - Bringing KC7 to high school and middle school students 16:52 - Expanding access to cybersecurity careers 25:09 - A watchmaker’s journey to Microsoft 34:00 - How to get started with KC7 Links Connect with our guest, Simeon Kakpovi on LinkedIn: https://www.linkedin.com/in/kakpovi/ Check out the Cybersecurity M&A Roundup Article here: https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:35:35

Ask host to enable sharing for playback control

Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright

1/14/2025
What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation. Impactful Moment: 00:00 - Introduction 03:00 - Defining attack surface management 06:13 - See-Know-Secure framework 09:05 - Analogies for explaining ASM to stakeholders 15:33 - Building an inventory for asset visibility 20:42 - Convincing leadership: Budget strategies 25:00 - Tools and methodologies for ASM 36:57 - Managed services vs. in-house approaches 43:00 - Starting your ASM journey Links: Connect with our guests – Wes Wright: https://www.linkedin.com/in/4kidwes/ Jerich Beason: https://www.linkedin.com/in/jerich-beason/ Learn more about Ordr: https://ordr.net/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Duration:00:44:49