

Data Security Decoded
Rubrik
Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.
Episodes
Mentioned books

Jul 15, 2025 • 22min
HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.
In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.
Errol Weiss has been a driving force in advancing cybersecurity resilience across critical sectors, beginning with his early work at the National Security Agency and later leading security programs at Citi and Bank of America. As Chief Security Officer at Health-ISAC, he built a threat operations center from the ground up, delivering original threat intelligence to healthcare organizations that often lack the resources to do it alone. With deep experience across consulting, finance, and healthcare, Errol has become a leading voice in shifting the conversation from protection to recovery, promoting a resilience-first mindset, collaborative intelligence sharing, and a human-centric security culture.
Join Caleb and Errol as they explore what makes healthcare cybersecurity unique, how to embed security into clinical culture, and why building a “human firewall” is just as critical as any technical control in today’s evolving threat landscape.
Episode Highlights:
00:00 - Intro
01:33 - Moving from consulting and finance to healthcare cybersecurity
02:12 - What ISACs are and how Health-ISAC supports threat sharing
04:39 - Building a threat operations center from scratch
06:38 - Collaboration differences between finance and healthcare ISACs
07:24 - Shifting from disaster recovery to cyber recovery and resilience
09:12 - Why HIPAA 2.0 is unlikely to advance and what’s happening instead
11:58 - How policy mandates collide with healthcare’s talent and budget challenges
13:01 - Biking, mental clarity, and leadership outside of work
14:26 - Embedding security into healthcare culture and creating a human firewall
16:43 - The rise of the minimum viable hospital concept
18:20 - Why Errol remains optimistic about AI and the future of cybersecurity
Episode Resources:
Health-ISAC Official Site
National Council of ISACs website
Rubrik Zero Labs website
Caleb Tolin on LinkedIn
Errol Weiss on LinkedIn

Jun 24, 2025 • 17min
Securing the Software Supply Chain
Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.
What You'll Learn:
How to prioritize vulnerability management by focusing on critical edge devices and access points
Why understanding your network architecture is crucial for effective threat defense
The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies
How to build supply chain resilience through vendor assessment and backup supplier planning
Why older vulnerabilities remain a primary attack vector and how to address them effectively
The framework for developing an actionable threat profile tailored to your organization's needs
Key Insights:
Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits
Supply chain security requires understanding vendor access levels and maintaining secondary suppliers
AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation
Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs
Building an effective security strategy starts with understanding your organization's specific threat profile
Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities
Highlights:
[00:00:00] Vulnerability Exploitation Trends
Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities.
[04:30] Supply Chain Security Essentials
Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations.
[07:23] AI in Cybersecurity: Reality vs Hype
Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation.
[14:08] Threat Profile Development
Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile.
Episode Resources:
Caleb Tolin on LinkedIn
Allison Wikoff on LinkedIn
PwC website
PwC - Year in Retrospect Report 2024
Rubrik Zero Labs website

Jun 4, 2025 • 24min
AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout
AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.
What You'll Learn:
How AI agents achieve a 95% reduction in false positive alerts while maintaining high investigation accuracy
Why AI won't replace SOC analysts but will elevate their roles by eliminating tedious tasks
The framework for building trust in AI security tools through evidence-backed investigations and transparent decision-making
How AI is lowering barriers to entry for cybersecurity careers by focusing on analytical thinking over technical expertise
The critical balance between AI automation and human context in security operations.
How to evaluate and implement AI security solutions, including key criteria for testing accuracy and effectiveness
Highlights:
[02:57] Dramatic Reduction in False Positives Through AI-Driven Investigation
[07:21] AI Augmentation vs. Replacement: Elevating Security Roles
[09:34] Lowering Barriers to Entry in Cybersecurity
[17:41] Building Trust Through Transparent AI Operations
[21:58] Strategic Implementation of AI Security Solutions
Episode Resources:
Caleb Tolin on LinkedIn
Grant Oviatt on LinkedIn
Prophet Security website
Rubrik Zero Labs website

May 20, 2025 • 32min
Making Generative AI Transparent
In this episode of Data Security Decoded, host Caleb Tolin sits down with Gabrielle Hibbert, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns.
What You'll Learn:
How nutrition labels for AI tools can make complex technology accessible to non-technical users
Why current privacy policies fail to protect consumers, with 93% of users unable to understand them
The three-pillar approach to AI transparency: general usage information, safety measures, and potential risks
How companies can balance corporate sensitivity with consumer transparency in AI tool deployment
Why Generation Z and Millennial users feel increasingly burdened by technology, and how transparency can help
The regulatory framework needed to standardize AI tool labeling across industries
How iterative processes and APIs can keep AI nutrition labels current with rapid technological changes
The importance of multi-stakeholder collaboration in developing effective AI transparency standards
Episode Highlights:
[00:00:55] Creating Consumer-Friendly AI Transparency Labels
[04:58] Building Universal Understanding Across Technical Levels
[22:13] Regulatory Framework Integration
[27:21] Dynamic Updates Through API Integration
Episode Resources:
Caleb Tolin on LinkedIn
Gabrielle Hibbert on LinkedIn
FCC Broadband Labeling System
New America – Translating the Artificial Report Page
FDA Nutrition Label Design Standards

Apr 22, 2025 • 30min
The State of Data Security: A Distributed Crisis
Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Joe Hladik, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.
What You'll Learn:
How the cybersecurity landscape has evolved from traditional nation-state threats to modern ransomware operations
Why data sprawl creates complex security challenges as sensitive information moves across platforms and users
The real-world challenges organizations face when managing vulnerability patches and business continuity
How identity management has become more complex than just "the new perimeter" in cloud environments
Why data security posture management is crucial for protecting sensitive information across distributed systems
The ways modern threat actors combine financial and political motivations in sophisticated attack campaigns
The conversation draws from "The State of Data Security: A Distributed Crisis," a new report from Rubrik Zero Labs, and provides practical insights into how organizations can better manage their data security posture while addressing emerging threats in an increasingly complex digital landscape.
Episode Highlights:
[20:05] Understanding Data Sprawl and Security Posture Management
[27:05] Identity Management as a Dynamic Security Challenge
[08:40] The Evolution of Cyber Threats and Motivations
[32:28] The Future of Security Research and Response
Episode Resources:
Caleb Tolin on LinkedIn
Joe Hladik on LinkedIn
The State of Data Security: A Distributed Crisis, Rubrik Zero Labs Report

Apr 8, 2025 • 23min
Data Weaponization: How Cyber Attacks Impact the Vulnerable
Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations.
Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.
The conversation explores how attacks on critical infrastructure, particularly healthcare, create immediate impacts. While cyber attacks aren't becoming more sophisticated, they're growing more vicious. Ransomware attacks against healthcare facilities disproportionately affect women, who often serve as caregivers and rely more heavily on healthcare services.
Pavlina examines the geopolitical dimensions of cybercrime, noting how certain nations harbor cybercriminals aligned with their foreign policy goals. These sanctuary jurisdictions make accountability difficult and contribute to attacks aimed at disrupting societal resilience.
Join Caleb and Pavlina as they discuss policy frameworks addressing gender dimensions of data weaponization, explore international cooperation efforts, and share practical advice for under-resourced organizations to improve their cyber resilience despite limited funding. They also examine the critical role of responsible data collection and the importance of donors specifically allocating cybersecurity funding when supporting vulnerable organizations.
Episode Highlights:
[01:02] Defining Data Weaponization
[04:11] Critical Infrastructure Targeting
[09:29] Geopolitical Dimensions of Cybercrime
[13:24] Policy Frameworks and International Cooperation
[19:31] Resources for Under-resourced Organizations
Episode Resources:
Caleb Tolin on LinkedIn
Pavlina Pavlova on LinkedIn
New America report by Pavlina Pavlova
Cyber Peace Institute
United Nations Cybercrime Convention

Mar 27, 2025 • 32min
Civilian Cyber Corps: Protecting Underfunded Organizations
Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host, Caleb Tolin, is joined by Michael Razeeq, a cybersecurity policy researcher specializing in advocating for Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.
Michael's research provides a unique perspective on the emergence of the Civilian Cyber Corps across various models, from university cyber clinics to state-level programs. These task forces address gaps in cybersecurity defense where resource constraints leave organizations vulnerable. As a 2024 #ShareTheMicInCyber Fellow at New America and 2025 Fellow at UC Berkeley CLTC, he advocates for a "whole society" approach to cybersecurity, highlighting successful implementations in states like Ohio and drawing inspiration from Estonia's cyber defense unit.
Join Caleb and Michael as they explore the operational frameworks of C3s, discuss the challenges of recruiting and vetting volunteers, examine legal considerations for establishing programs, and share insights on measuring both quantitative and qualitative impacts of these initiatives. They also look at the future of C3s through increased collaboration and partnerships like the Cyber Resilience Core.
Episode Highlights:
[01:30] The Rise of Civilian Cyber Corps (C3s)
[13:11] Pathways to Establishing C3 Programs
[19:47] Left of Boom vs Right of Boom Services
[26:49] Addressing C3 Implementation Challenges
Episode Resources:
Caleb Tolin on LinkedIn
Michael Razeeq on LinkedIn
“Civilian Cyber Corps: A Model Law for States” by Michael Razeeq for New America
New America’s #ShareTheMicInCyber Fellowship Program
UC Berkeley Center for Long-Term Cybersecurity Program
CISA Cybersecurity Resources for High-Risk Communities

Mar 18, 2025 • 29min
How to Effectively Train Your Employees on Cybersecurity
Welcome to the Data Security Decoded podcast. In this episode, our host, Richard Cassidy, is joined by Carolin Desirée Toepfer, founder of Cyttraction and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.
Carolin's unique position as a CISO for multiple organizations gives her exceptional perspective on cybersecurity challenges across different industries and company sizes. Her approach focuses on addressing gaps in the European cybersecurity landscape where, according to Cisco studies, only 2% of companies are well-prepared. As founder of Cyttraction, an edtech company focused on cybersecurity training, she advocates for reframing security training to emphasize data integrity and digital identity protection, making it more relevant to business stakeholders.
Join Richard and Carolin as they explore the evolution of the CISO role in Europe, discuss the global skills shortage in cybersecurity, examine cultural differences in security awareness between North America and Europe, and share insights on effective training strategies that accommodate modern attention spans and learning preferences.
Episode Highlights:
00:02 - Introduction and CISO as a Service Role
01:57 - European Cybersecurity Landscape and Challenges
03:26 - Path to Becoming a CISO
06:17 - Regional Differences in Cybersecurity Approaches
09:53 - AI Governance and Business Impact
14:39 - Reframing Security Training for Business Alignment
19:20 - Measuring Training Effectiveness
24:01 - Future Outlook for Cybersecurity
Episode Resources:
Richard Cassidy on LinkedIn
Carolin Desirée Toepfer on LinkedIn
Cyttraction Learning Platform
The State of Data Security: The New Rules Breaking the Banks report from Rubrik Zero Labs

Jan 21, 2025 • 33min
Regulatory Readiness and Resilience with Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.
In this episode, our host, Ghazal Asif, Global VP of Channels, Alliances, and Inside Sales at Rubrik, is joined by Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl. With over two decades of leadership experience, Kris has built a career focused on advancing technology ecosystems that drive human progress. At Kyndryl, she leads initiatives to design, manage, and safeguard the world's most reliable technology infrastructure.
Previously, Kris served as EY’s Global Cybersecurity Leader, where she worked with diverse teams across 150+ countries to solve complex cybersecurity challenges. She has also held leadership roles at IBM, including VP of IT Risk and Chief Information Security Officer (CISO), and served as CEO of BluVector, a Comcast company. Kris also sits on the board of Dominion Energy, where she supports efforts to achieve Net Zero emissions by 2050.
Join Ghazal and Kris as they explore actionable strategies for integrating cyber resilience into business operations, the importance of regulatory readiness for global organizations navigating new compliance frameworks, and how diverse teams drive innovative problem-solving in cybersecurity.
Episode Highlights:
00:00 - Intro
03:45 - Evolving Perspectives on Compliance and Regulation
07:25 - Why Diversity in IT and Security Teams Drives Better Solutions
09:59 - Cybersecurity vs. Cyber Resilience
14:25 - Practical Strategies for Building Cyber Resilience
17:40 - Communicating Security Strategies to Non-Technical Leaders
20:25 - The Paradox of Per Capita Spend
26:09 - Regulatory Readiness in a Complex Global Landscape
28:09 - Preparing for Cyber Threats: The Critical Role of Basic Hygiene
30:18 - Looking Forward: Optimism for the Future of Cybersecurity
Episode Resources
Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report
Ghazal Asif on LinkedIn
Kris Lovejoy on LinkedIn

Jan 7, 2025 • 1h 3min
Bridging Cyber Policy Gaps for Rural and Underserved Communities with Nicole Tisdale
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.
In this episode, our host, Travis Rosiek, Public Sector CTO at Rubrik, is joined by Nicole Tisdale, Founder of Advocacy Blueprints, former Director of Legislative Affairs for the National Security Council, and author of Right to Petition. Nicole shares her journey from rural Mississippi to national security leadership, offering insights into cybersecurity equity, workforce development, and public policy's critical role in addressing underserved communities' unique challenges.
Nicole’s leadership has been instrumental in shaping transformative policies, including spearheading The White House’s advocacy that secured a $1 billion cybersecurity grant program and the nation’s first cyber incident reporting law. Representing the United States in global policy dialogues across 30 nations, she has been a prominent voice in advancing security and equity on the international stage. Now as the Founder of Advocacy Blueprints, Nicole continues to champion cybersecurity and civic engagement, equipping organizations and individuals with the tools to influence policy effectively. She is also the author of Right to Petition, a practical guide for empowering citizens in advocacy.
Join Travis and Nicole as they delve into the challenges of bridging policy gaps for underserved communities and her vision for equitable cybersecurity policies that prepare, respond, and recover in today’s digital landscape.
Episode Highlights:
00:00 - Intro
02:57 - Advocacy for Underserved Communities
06:21 - Addressing Cybersecurity Gaps in Rural and Low-Income Communities
07:17 - Defensive vs. Offensive Cybersecurity Policy
12:10 - The Role of Proactive Policy in Cyber Resilience
18:35 - The Importance of Cybersecurity Workforce Development
21:41 - Regional Nodes for Workforce Growth and Local Cybersecurity Defense
25:48 - Connecting Workforce Development to Community Economic Stability
30:05 - The Ripple Effects of Cyberattacks on Healthcare Systems
34:57 - Cybersecurity as Critical Infrastructure Protection: The Rural Perspective
38:39 - Advocacy Blueprints: Empowering Communities to Influence Policy
45:15 - Effective Advocacy: Known Information and Resource Alignment in Cyber Policy
48:03 - Advice for Government Leaders During Leadership Transitions
55:59 - Optimism About Cybersecurity’s Future
Episode Resources:
Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report
Travis Rosiek on LinkedIn
Nicole Tisdale on LinkedIn
Right to Petition by Nicole Tisdale


