From Nigeria to the US, Bidemi Ologunde’s journey is a masterclass in resilience, adaptability, and proactive career growth. In this episode of CyberMAYnia, Bidemi shares how he carved his own path in cybersecurity, moving from a passion for cybercrime investigations to becoming a specialist in threat intelligence and security strategy.We dive into:How Bidemi transitioned from Nigeria to the US and built a thriving career in cybersecurity.The importance of proactively creating opportunities rather than waiting for them.Lessons from his expertise in cybercrime, geopolitical intelligence, and security strategy.His advice for anyone looking to break into the industry and make an impact.Bidemi’s story is a testament to the power of taking initiative, embracing challenges, and making things happen—no matter where you start.Tune in to hear how he did it and get inspired to take charge of your own career.
From serving as a CISO for one of Israel’s largest telecom companies to advising global enterprises on cybersecurity innovation, Ami Hofman brings a wealth of experience in risk management, CTEM, SOC transformation, and beyond.We explore:- What it takes to be a successful CISO in a high-stakes environment-The challenges and rewards of moving from Israel to the other side of the world- How emerging technologies are reshaping cybersecurity strategies- The balance between innovation, security, and business growth- What keeps Ami motivated after decades in the industryAmi’s global perspective and hands-on approach to security leadership make this an episode you won’t want to miss.
John Linkowsky is a cybersecurity leader, educator, and mentor who has spent decades shaping the next generation of cyber professionals. From his work managing cybersecurity engineering teams to his passion for teaching and mentoring, John shares what it really takes to build a career in cybersecurity with purpose.We discuss:Why education and mentorship are the keys to a thriving cybersecurity industryHow to stay passionate and engaged in an ever-evolving fieldThe biggest lessons learned from years of managing and teaching in cybersecurityPractical advice for those looking to transition or grow in their cyber careersCybersecurity is more than just a job—it’s a mission. Tune in and get inspired by John’s journey!
Lori Ross O'Neil has spent her career protecting some of the most critical systems on the planet—from aerospace engineering at NASA to securing national infrastructure at PNNL. In this episode of CyberMAYnia, Lori shares how she transitioned from aerospace to cybersecurity, the unique challenges of protecting critical infrastructure, and the evolving threats facing national security.We also dive into her passion for mentorship, the importance of bringing diverse perspectives into cybersecurity, and her mission to strengthen the next generation of cyber professionals. Whether you're an aspiring cybersecurity leader or just curious about the intersection of cyber and critical infrastructure, this is an episode you won’t want to miss!
In this episode of CyberMAYnia, I sit down with Walter Speelman, a passionate cybersecurity evangelist, mentor, and the new president of the ISC2 Central Florida Chapter. Walter’s journey in cybersecurity is not just about building a career—it’s about making a real impact.From his years of technical expertise to his unwavering commitment to community building and mentorship, Walter shares his insights on:How to turn cybersecurity into a lifelong mission, not just a jobThe importance of giving back and why mentorship mattersStrategies for career growth and staying motivated in an ever-evolving fieldWhat it really means to be a cybersecurity evangelist and why the industry needs more of themWhether you're just starting out in cybersecurity or looking for ways to reinvigorate your passion, this episode is packed with inspiration and actionable advice.
Join us on CyberMAYnia for an insightful conversation with Joe Patti, a seasoned Information Security leader. With extensive experience in the financial sector, Joe offers a unique perspective on the evolution of cybersecurity, particularly in highly targeted industries.In this episode, we delve into Joe's journey from the early days of the commercial internet to his recent experiences in shaping world-class security teams. Discover the essential qualities he seeks in team members and his take on the impact of emerging technologies, like AI, on the cybersecurity workforce.Don't miss out on Joe's insights on the recent SEC Cybersecurity Risk Management rules and the real-world implications of these regulations. From the hype surrounding the announcement to the SEC's own Twitter account hack.Don't miss this episode to gain a deeper understanding of the current and future cybersecurity trends.
In this episode of CyberMAYnia, I sit down with Tracy Hickey, a cybersecurity leader who took an unconventional path from managing a Zappos warehouse to leading AWS security initiatives that drive billions in revenue. Tracy shares how she built her career, the lessons she learned along the way, and why personal branding and authenticity are crucial for success in tech.We dive into:The unexpected career path that led Tracy from logistics to securing cloud environmentsHow cybersecurity can drive business growth (and why execs need to hear this)The importance of personal branding in a world full of technical talentLessons from AWS and beyond on leadership, resilience, and taking risksTracy’s story is a must-listen for anyone looking to break into cybersecurity, pivot their career, or simply get inspired by someone who refused to take the traditional path.Subscribe now and don’t miss this conversation!
In this episode of CyberMAYnia, we sit down with Kyle Hinterberg, Senior Manager & PCI QSA at LBMC, to explore the evolving threats in payment security, fraud, and compliance. As AI and deepfake technology continue to advance, businesses face new challenges in protecting financial transactions from cybercriminals.What you’ll learn in this episode:How AI and deepfakes are reshaping fraud and payment securityThe biggest misconceptions about PCI DSS complianceStrategies businesses can implement to protect customer payment dataKyle’s journey into cybersecurity and payments securityWhether you're in cybersecurity, finance, or just curious about the future of digital transactions, this episode is packed with insights, real-world examples, and expert advice.Subscribe for more cybersecurity discussions and expert insights.
In this episode, Daniel Ehrenreich and I discuss ICS security challenges, why hackers are unlikely to use ransomware against ICS systems, and why planning is the secret to resiliency.We delves into the importance of proactive security measures, the role of standards in ICS security, and the evolving approaches organizations must take to manage risks effectively. Daniel emphasizes the need for training and awareness within organizations to prepare for potential cyber threats, especially in critical infrastructure sectors.takeawaysWhy Ransomware attacks on ICS are technically possible but unlikely.The critical role the SRP triad (Safety, Reliability, and performance) plays in ICS security.Training is essential for effective cybersecurity management.And here's the article that sparked our conversation:https://www.linkedin.com/pulse/ics-ot-directed-ransomware-likely-happen-daniel-ehrenreich-2kv1f/
In this episode of Cyber MAYnia, host May interviews Chris Hadnagy, CEO of Social Engineer LLC and founder of the Innocent Lives Foundation. They discuss Chris's journey into cybersecurity, the evolution of social engineering, the impact of AI on threats, and the importance of human factors in cybersecurity. Chris shares insights on phishing scams, psychological tactics used by cybercriminals, and the ethical considerations in social engineering training. The conversation also highlights the challenges faced in the cybersecurity industry and the significance of sharing knowledge to empower others.takeaways• Chris Hadnagy emphasizes the importance of human-based security in cybersecurity.• The evolution of social engineering has been influenced by advancements in technology, particularly AI.• Phishing remains one of the most common techniques used by cybercriminals today.• Fear is a primary tactic used by cybercriminals to manipulate victims.• Education and awareness are crucial in combating social engineering attacks.• The Innocent Lives Foundation focuses on helping law enforcement locate child predators.• Ethical considerations are vital in social engineering training to avoid causing harm to individuals.• The human factor in cybersecurity is often overlooked in favor of technical solutions.• Sharing knowledge and mentoring others can lead to greater rewards in the cybersecurity field.• Building a strong moral compass is essential for success in cybersecurity.