Data Security Decoded

Rubrik
undefined
Aug 13, 2025 • 24min

Breaking the Intelligence-Defense Divide with Scott Scher

Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy.In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.What You’ll Learn:The mindset shift from cyber threat intelligence to cyber counter-threat intelligenceWhy threat intel must not just inform, but recommend actions for defendersHow intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisionsWhy we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forcesHow Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependencyEpisode Highlights:[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula[08:19] What CTI and defenders really need to understand about each other[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions[17:45] How CTI helps organizations protect their most sensitive dataEpisode Resources:Caleb Tolin on LinkedInScott Scher on LinkedInData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Jul 31, 2025 • 23min

The Geopolitical Security Playbook: When Nations Clash in Cyberspace

In this episode of Data Security Decoded, host Caleb Tolin sits down with Dustin Droullard, a cyber threat intelligence expert and former Army intelligence analyst, to discuss how global conflict is increasingly playing out in cyberspace, from digital espionage to civilian-targeted cyber operations. This episode highlights why organizations must rethink their cyber risk strategies in light of modern geopolitical threats and growing digital exposure.What You’ll Learn:How influence operations are used to confuse, divide, and destabilizeUnderstanding your organization’s role in geopolitical conflictsWhat basic cybersecurity practice still gets overlookedWhere small businesses can find free resources to improve security posture and resilience How anthropology, business, and literature studies can power cyber careersThe gap in current cyber education and how to fix it with critical thinking and specializationEpisode Highlights:[00:00:33] From Army Intelligence to Cyber Operations[00:02:45] Espionage vs. Effects: Cyber Tactics in Geopolitical Conflict[00:06:38] Influence Operations and Psychological Warfare[00:10:39] Why Every Business is a Target, Whether They Know It or Not[00:13:21] Cybersecurity on a Budget: Resources for Underserved Organizations[00:15:57] Anthropology in Cyber: Understanding the Human Behind the Hack[00:20:33] Non-Tech Majors That Thrive in Cybersecurity[00:23:03] What Cyber Schools Are Missing: Business, Collaboration & Critical ThinkingEpisode Resources:Caleb Tolin on LinkedInDustin Droullard on LinkedInCISA – Cybersecurity and Infrastructure Security AgencyData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Jul 15, 2025 • 21min

HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.Errol Weiss has been a driving force in advancing cybersecurity resilience across critical sectors, beginning with his early work at the National Security Agency and later leading security programs at Citi and Bank of America. As Chief Security Officer at Health-ISAC, he built a threat operations center from the ground up, delivering original threat intelligence to healthcare organizations that often lack the resources to do it alone. With deep experience across consulting, finance, and healthcare, Errol has become a leading voice in shifting the conversation from protection to recovery, promoting a resilience-first mindset, collaborative intelligence sharing, and a human-centric security culture.Join Caleb and Errol as they explore what makes healthcare cybersecurity unique, how to embed security into clinical culture, and why building a “human firewall” is just as critical as any technical control in today’s evolving threat landscape.Episode Highlights00:00 - Intro01:33 - Moving from consulting and finance to healthcare cybersecurity02:12 - What ISACs are and how Health-ISAC supports threat sharing04:39 - Building a threat operations center from scratch06:38 - Collaboration differences between finance and healthcare ISACs07:24 - Shifting from disaster recovery to cyber recovery and resilience09:12 - Why HIPAA 2.0 is unlikely to advance and what’s happening instead11:58 - How policy mandates collide with healthcare’s talent and budget challenges13:01 - Biking, mental clarity, and leadership outside of work14:26 - Embedding security into healthcare culture and creating a human firewall16:43 - The rise of the minimum viable hospital concept18:20 - Why Errol remains optimistic about AI and the future of cybersecurityEpisode ResourcesHealth-ISAC Official SiteNational Council of ISACs website Rubrik Zero Labs websiteCaleb Tolin on LinkedInErrol Weiss on LinkedInData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Jun 24, 2025 • 16min

Securing the Software Supply Chain

Navigating Modern Cybersecurity: From Supply Chain Risks to AI EvolutionIn this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.What You'll Learn:How to prioritize vulnerability management by focusing on critical edge devices and access pointsWhy understanding your network architecture is crucial for effective threat defenseThe reality of AI in cyber attacks: current uses, limitations, and practical defense strategiesHow to build supply chain resilience through vendor assessment and backup supplier planningWhy older vulnerabilities remain a primary attack vector and how to address them effectivelyThe framework for developing an actionable threat profile tailored to your organization's needsKey Insights:Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploitsSupply chain security requires understanding vendor access levels and maintaining secondary suppliersAI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generationOrganizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFsBuilding an effective security strategy starts with understanding your organization's specific threat profilePartnering with vendors and suppliers can help smaller organizations enhance their security capabilitiesHighlights:[00:00:00] Vulnerability Exploitation TrendsAllison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities. Security teams must prioritize patching edge devices like VPNs and WAPs that provide remote access capabilities. Rather than trying to patch everything, organizations should focus on understanding their network architecture and critical access points. A real-world example is the Log4j vulnerability, which highlighted the challenge of identifying vulnerable components embedded within other systems. This insight helps security teams better allocate limited resources by focusing on the most critical vulnerabilities first.[04:30] Supply Chain Security Essentials  Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations. She recommends implementing specific training programs and enhanced authentication measures, particularly for password resets and employee validation. Running tabletop exercises focused on supplier-related ransomware scenarios helps identify weak points. The key takeaway is maintaining backup suppliers for critical services to ensure business continuity when primary vendors face disruptions.[07:23] AI in Cybersecurity: Reality vs HypeTolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation. Organizations should understand that threat actors typically follow the path of least resistance rather than pursuing complex AI-driven attacks. Most AI implementation mirrors legitimate business use - automating repetitive tasks rather than enabling sophisticated new threats. This insight helps security teams maintain perspective and avoid overinvesting in AI-specific defenses while staying focused on fundamental security measures.[14:08] Threat Profile DevelopmentTolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile. Security teams should identify their most critical assets and likely threats, then build defenses around protecting those priorities. Organizations shouldn't hesitate to leverage external expertise, as even government agencies rely on partners for threat intelligence. This practical framework helps organizations develop sustainable security programs aligned with their actual risks rather than theoretical threats.Episode Resources: Caleb Tolin on LinkedInAllison Wikoff on LinkedInPwC websitePwC - Year in Retrospect Report 2024Rubrik Zero Labs websiteData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Jun 4, 2025 • 23min

AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout

AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work.In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.What You'll Learn:How AI agents achieve a 95% reduction in false positive alerts while maintaining high investigation accuracyWhy AI won't replace SOC analysts but will elevate their roles by eliminating tedious tasksThe framework for building trust in AI security tools through evidence-backed investigations and transparent decision-makingHow AI is lowering barriers to entry for cybersecurity careers by focusing on analytical thinking over technical expertiseThe critical balance between AI automation and human context in security operations.How to evaluate and implement AI security solutions, including key criteria for testing accuracy and effectivenessHighlights:[02:57] Dramatic Reduction in False Positives Through AI-Driven Investigation[07:21] AI Augmentation vs. Replacement: Elevating Security Roles[09:34] Lowering Barriers to Entry in Cybersecurity[17:41] Building Trust Through Transparent AI Operations[21:58] Strategic Implementation of AI Security SolutionsEpisode Resources:Caleb Tolin on LinkedInGrant Oviatt on LinkedInProphet Security websiteRubrik Zero Labs websiteData Security Decoded is handcrafted by our friends over at: fame.so
undefined
May 20, 2025 • 31min

Making Generative AI Transparent

In this episode of Data Security Decoded, host Caleb Tolin sits down with Gabrielle Hibbert, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns.What You'll Learn:How nutrition labels for AI tools can make complex technology accessible to non-technical usersWhy current privacy policies fail to protect consumers, with 93% of users unable to understand themThe three-pillar approach to AI transparency: general usage information, safety measures, and potential risksHow companies can balance corporate sensitivity with consumer transparency in AI tool deploymentWhy Generation Z and Millennial users feel increasingly burdened by technology, and how transparency can helpThe regulatory framework needed to standardize AI tool labeling across industriesHow iterative processes and APIs can keep AI nutrition labels current with rapid technological changesThe importance of multi-stakeholder collaboration in developing effective AI transparency standardsEpisode Highlights:[00:00:55] Creating Consumer-Friendly AI Transparency Labels[04:58] Building Universal Understanding Across Technical Levels[22:13] Regulatory Framework Integration[27:21] Dynamic Updates Through API IntegrationEpisode Resources:Caleb Tolin on LinkedInGabrielle Hibbert on LinkedInFCC Broadband Labeling SystemNew America – Translating the Artificial Report PageFDA Nutrition Label Design StandardsData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Apr 22, 2025 • 28min

The State of Data Security: A Distributed Crisis

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Joe Hladik, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.What You'll Learn:How the cybersecurity landscape has evolved from traditional nation-state threats to modern ransomware operationsWhy data sprawl creates complex security challenges as sensitive information moves across platforms and usersThe real-world challenges organizations face when managing vulnerability patches and business continuityHow identity management has become more complex than just "the new perimeter" in cloud environmentsWhy data security posture management is crucial for protecting sensitive information across distributed systemsThe ways modern threat actors combine financial and political motivations in sophisticated attack campaignsThe conversation draws from "The State of Data Security: A Distributed Crisis," a new report from Rubrik Zero Labs, and provides practical insights into how organizations can better manage their data security posture while addressing emerging threats in an increasingly complex digital landscape.Episode Highlights:[20:05] Understanding Data Sprawl and Security Posture Management[27:05] Identity Management as a Dynamic Security Challenge [08:40] The Evolution of Cyber Threats and Motivations[32:28] The Future of Security Research and ResponseEpisode ResourcesCaleb Tolin on LinkedInJoe Hladik on LinkedInThe State of Data Security: A Distributed Crisis, Rubrik Zero Labs ReportData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Apr 8, 2025 • 21min

Data Weaponization: How Cyber Attacks Impact the Vulnerable

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations.Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.The conversation explores how attacks on critical infrastructure, particularly healthcare, create immediate impacts. While cyber attacks aren't becoming more sophisticated, they're growing more vicious. Ransomware attacks against healthcare facilities disproportionately affect women, who often serve as caregivers and rely more heavily on healthcare services.Pavlina examines the geopolitical dimensions of cybercrime, noting how certain nations harbor cybercriminals aligned with their foreign policy goals. These sanctuary jurisdictions make accountability difficult and contribute to attacks aimed at disrupting societal resilience.Join Caleb and Pavlina as they discuss policy frameworks addressing gender dimensions of data weaponization, explore international cooperation efforts, and share practical advice for under-resourced organizations to improve their cyber resilience despite limited funding. They also examine the critical role of responsible data collection and the importance of donors specifically allocating cybersecurity funding when supporting vulnerable organizations.Episode Highlights:[01:02] Defining Data Weaponization[04:11] Critical Infrastructure Targeting[09:29] Geopolitical Dimensions of Cybercrime[13:24] Policy Frameworks and International Cooperation[19:31] Resources for Under-resourced OrganizationsEpisode ResourcesCaleb Tolin on LinkedInPavlina Pavlova on LinkedInNew America report by Pavlina PavlovaCyber Peace InstituteUnited Nations Cybercrime ConventionData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Mar 27, 2025 • 30min

Civilian Cyber Corps: Protecting Underfunded Organizations

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host, Caleb Tolin, is joined by Michael Razeeq, a cybersecurity policy researcher specializing in advocating for  Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.Michael's research provides a unique perspective on the emergence of the Civilian Cyber Corps across various models, from university cyber clinics to state-level programs. These task forces address gaps in cybersecurity defense where resource constraints leave organizations vulnerable. As a 2024 #ShareTheMicInCyber Fellow at New America and 2025 Fellow at UC Berkeley CLTC, he advocates for a "whole society" approach to cybersecurity, highlighting successful implementations in states like Ohio and drawing inspiration from Estonia's cyber defense unit.Join Caleb and Michael as they explore the operational frameworks of C3s, discuss the challenges of recruiting and vetting volunteers, examine legal considerations for establishing programs, and share insights on measuring both quantitative and qualitative impacts of these initiatives. They also look at the future of C3s through increased collaboration and partnerships like the Cyber Resilience Core.Episode Highlights:[01:30] The Rise of Civilian Cyber Corps (C3s)[13:11] Pathways to Establishing C3 Programs[19:47] Left of Boom vs Right of Boom Services[26:49] Addressing C3 Implementation ChallengesEpisode ResourcesCaleb Tolin on LinkedInMichael Razeeq on LinkedIn“Civilian Cyber Corps: A Model Law for States” by Michael Razeeq for New America New America’s #ShareTheMicInCyber Fellowship ProgramUC Berkeley Center for Long-Term Cybersecurity ProgramCISA Cybersecurity Resources for High-Risk CommunitiesData Security Decoded is handcrafted by our friends over at: fame.so
undefined
Mar 18, 2025 • 28min

How to Effectively Train Your Employees on Cybersecurity

Welcome to the Data Security Decoded podcast. In this episode, our host, Richard Cassidy, is joined by Carolin Desirée Toepfer, founder of Cyttraction and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.Carolin's unique position as a CISO for multiple organizations gives her exceptional perspective on cybersecurity challenges across different industries and company sizes. Her approach focuses on addressing gaps in the European cybersecurity landscape where, according to Cisco studies, only 2% of companies are well-prepared. As founder of Cyttraction, an edtech company focused on cybersecurity training, she advocates for reframing security training to emphasize data integrity and digital identity protection, making it more relevant to business stakeholders.Join Richard and Carolin as they explore the evolution of the CISO role in Europe, discuss the global skills shortage in cybersecurity, examine cultural differences in security awareness between North America and Europe, and share insights on effective training strategies that accommodate modern attention spans and learning preferences.Episode Highlights:00:02 - Introduction and CISO as a Service Role01:57 - European Cybersecurity Landscape and Challenges03:26 - Path to Becoming a CISO06:17 - Regional Differences in Cybersecurity Approaches09:53 - AI Governance and Business Impact14:39 - Reframing Security Training for Business Alignment19:20 - Measuring Training Effectiveness24:01 - Future Outlook for CybersecurityEpisode ResourcesRichard Cassidy on LinkedInCarolin Desirée Toepfer on LinkedInCyttraction Learning PlatformThe State of Data Security: The New Rules Breaking the Banks report from Rubrik Zero LabsData Security Decoded is handcrafted by our friends over at: fame.so

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app