Hidden AI Threats: Is Your CISO Prepared? | Hanah-Marie Darley | Breaking into Cybersecurity
🚀 ARE YOU PREPARED FOR THE SILENT FAILURE OF AGENTIC AI? Agentic AI introduces a critical new risk for enterprise security: silent failures. Unlike traditional breaches, these occur when AI agents operate within their given permissions but subtly deviate from their intended purpose, creating stealthy, hard-to-detect vulnerabilities. _________________________________________________ 🛡️ MITIGATING ADVANCED AI RISKS To safeguard your digital future, you must move beyond traditional risk management. This discussion covers: • Defining Silent Failures: Understanding how AI agents deviate without triggering standard alarms. • The Power of Diverse Perspectives: Why non-traditional backgrounds in psychology and politics are essential for AI governance. • Real-Time Mitigation: An inside look at how Geordie AI's "Beam" system is engineered to detect and neutralize these advanced threats. _________________________________________________ 🎙️ EPISODE HIGHLIGHTS & INSIGHTS Join hosts Renee Small and Christophe Foulon for a deep dive with Hanah-Marie Darley, co-founder of Geordie AI. Hanah-Marie leverages her background as a former US Government intelligence analyst to expose the unseen risks demanding immediate attention from CISOs. _________________________________________________ ⏳ TIMESTAMPS 0:00 AI's Silent Threat: Are CISOs Prepared for Agentic AI? 0:45 Meet Hanah-Marie Darley: From US Intelligence to AI Security Visionary 2:15 Uncovering 'Silent Failures' in Agentic AI: What Every CISO Needs to Know 14:15 Geordie AI's Beam System: Real-time AI Risk Mitigation Explained 26:15 Navigating Your Cybersecurity Career Path in the Age of AI _________________________________________________ 🔗 CONNECT & SUBSCRIBE • Newsletter: https://newsletter.breakingintocybersecurity.org • Listen On Spotify: https://open.spotify.com/show/16hs6zYtLa4iS4RTcyNF71 • Listen On Apple: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698 • Learn More: http://cpf-coaching.com _________________________________________________ 📚 FEATURED RESOURCES • Magnetic Hiring (Free Book): http://magnetichiring.com/book • The Cybersecurity Advantage: https://leanpub.com/the-cybersecurity-advantage • Hacker Inc. Mindset: https://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/ #Cybersecurity #CISO #AgenticAI #GenerativeAI #InfoSec #aistatus Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It’s a conversation about what they did before, why they pivoted into cyber, what the process was they went through, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership, as well as tips/tricks/advice from cybersecurity leaders.Check out our books:The Cybersecurity Advantage - https://leanpub.com/the-cybersecurity-advantageDevelop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roleshttps://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/
CISO's AI Warning: Future-Proof Your Cyber Job - Daniel Ayala
What does a 25-year cybersecurity career actually look like — and what does the CISO role require today when AI, regulatory pressure, and economic uncertainty all collide at once?Daniel Ayala is the Founder and Managing Partner of Secratic, a fractional CISO and Chief Privacy Officer consultancy. He's served as CISO at ProQuest, Interim CISO at Michigan State University, and today advises multiple SMBs simultaneously on security strategy, AI risk, and data privacy.In this episode, we talk about what it really takes to step into a CISO role, how the fractional CISO model works as a career path, why insider threat programs need a serious update in the AI era, and what practitioners pivoting into security leadership actually need to know.---**⏱ TIMESTAMPS**- 00:00 — Intro- 02:00 — Daniel's background and the 25-year journey- 08:00 — How Secratic was born: the fractional CISO model- 14:00 — Serving multiple organizations simultaneously- 19:00 — AI risk: what CISOs actually need to be doing right now- 25:00 — Insider threat in the age of workforce disruption- 30:00 — Privacy engineering vs. compliance thinking- 35:00 — CMMC, SEC disclosure, and what they mean for practitioners- 40:00 — How to position yourself for a CISO or vCISO role- 44:00 — Mentorcore: formalizing mentorship in cybersecurity- 47:00 — Advice for career changers breaking into cyber---**🔗 CONNECT WITH DANIEL**- LinkedIn: https://www.linkedin.com/in/danielaayala/- Secratic: https://secratic.com- The Great Security Podcast: https://greatsecuritydebate.net- Mentorcore: https://mentorcore.biz- Blog: https://danielayala.com**📚 BOOKS FROM OUR HOSTS**- Develop Your Cybersecurity Career Path: https://amzn.to/3443AUI- Hack the Cybersecurity Interview: https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/- Hacker Inc.: https://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/- Magnetic Hiring (Renee): https://magnetichiring.com/book**🎤 BREAKING INTO CYBERSECURITY**Real conversations about pivoting into cyber — what you did before, how you got in, and how to keep growing.- 🌐 Website: https://breakingintocybersecurity.org- 📬 Newsletter: https://newsletter.breakingintocybersecurity.org- 🎧 Spotify: https://open.spotify.com/show/16hs6zYtLa4iS4RTcyNF71- 🍎 Apple Podcasts: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698- 💼 LinkedIn: https://www.linkedin.com/company/breaking-into-cybersecurity/#CyberSecurity #CISO #AIRisk #FractionalCISO #CareerChange #BreakingIntoCybersecurity #CyberLeadership #Privacy #InfoSec #CyberCareer
From Libraries to AI Security: Peter Swimm's Cybersecurity Path | Breaking Into Cybersecurity
Peter Swimm started at a library computer desk. He ended up as a product owner at Microsoft and founder of his own AI security consultancy.In this episode, Peter shares the real path — not the polished LinkedIn version. He talks about why working at startups changed how he thinks about learning, what it actually takes to balance security with user experience, and why conversational AI is opening a security attack surface most teams aren't prepared for.If you're trying to break into cybersecurity from a non-traditional background, or you're already in tech and wondering what's next — this conversation is for you.🔑 Key Takeaways:→ Why baking security in from day one beats retrofitting it later→ The "promiscuous learning" mindset that opens more doors than any cert→ How conversational AI is changing the threat landscape right now→ Career moves that come from taking on work outside your job description→ What organizational culture really signals about your growth ceiling📌 Chapters:0:00 Intro — Peter's Cybersecurity Origin Story0:58 First tech job and what the internet taught him2:41 Transition into product ownership5:03 Balancing security vs. user experience9:19 Career advice: what actually works16:00 The evolution of conversational AI21:23 AI security: the challenges nobody talks about26:42 Final thoughts and advice🔗 Connect with Peter Swimm:LinkedIn: https://www.linkedin.com/in/peterswimm/🎙️ Breaking Into Cybersecurity:Newsletter: https://newsletter.breakingintocybersecurity.orgSpotify: https://open.spotify.com/show/16hs6zYtLa4iS4RTcyNF71Apple Podcasts: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698📚 Books We Recommend:Develop Your Cybersecurity Career Path: https://amzn.to/3443AUIHack the Cybersecurity Interview: https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Magnetic Hiring (Renee Small): https://magnetichiring.com/book#CyberSecurity #CareerChange #BreakingIntoCybersecurity #AISecurity #CyberCareer## Links Mentioned- Peter's LinkedIn: https://www.linkedin.com/in/peterswimm/- Toilville (Peter's Consultancy): [mentioned in episode]- Breaking Into Cybersecurity Newsletter: https://newsletter.breakingintocybersecurity.org- Christophe's CPF Coaching: https://www.cpf-coaching.com- Renee's Book (Magnetic Hiring): https://magnetichiring.com/book---## Listen & Watch- YouTube: https://www.youtube.com/@BreakingIntoCybersecurity- Spotify: https://open.spotify.com/show/16hs6zYtLa4iS4RTcyNF71- Apple Podcasts: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698- Newsletter: https://newsletter.breakingintocybersecurity.org
Creating Secure Products, Career Strategies and Cybersecurity: Peter Swimm's Advice
Breaking into Cybersecurity: Peter Swim's Journey from Libraries to Leading AI Conversationshttps://www.linkedin.com/in/peterswimm/In this episode of Breaking into Cybersecurity, we feature Peter Swim, the founder of the consultancy Toilville. Peter shares his unique journey into cybersecurity, starting from working at a library to becoming a product owner at Microsoft. He discusses the importance of security in tech and AI, the impact of working in startups, and how his experiences have shaped his career. Peter also provides valuable advice to juniors in the field, emphasizing the need to stay flexible, keep learning, and find the right organizational culture. This episode is a must-watch for anyone interested in tech, cybersecurity, and career development in the AI space.00:00 Introduction to Peter Swim's Cybersecurity Journey00:58 Early Career and Initial Interest in Tech02:41 Transition to Product Ownership05:03 Balancing Security and User Experience09:19 Career Advice for Aspiring Professionals16:00 The Evolution of Conversational AI21:23 Challenges and Insights in AI and Security26:42 Conclusion and Final ThoughtsSponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It’s a conversation about what they did before, why they pivoted into cyber, what the process was they went through, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership, as well as tips/tricks/advice from cybersecurity leaders.Check out our books:The Cybersecurity Advantage - https://leanpub.com/the-cybersecurity-advantageDevelop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roleshttps://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Hacker Inc.: Mindset For Your Careerhttps://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and encouraging more people to enter the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping secure people and processes, drawing on a solid understanding of the technologies involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing technology use while balancing its implications for people, processes, and information security, through a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.comWebsite: https://www.cyberhubpodcast.com/breakingintocybersecurityPodcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuriYouTube: https://www.youtube.com/c/BreakingIntoCybersecurityLinkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Adeel Shaikh Muhammad's Journey: From Networking to Cybersecurity Expertise
Adeel Shaikh Muhammad's Journey: From Networking to Cybersecurity ExpertiseIn this episode of Breaking into Cybersecurity, Adeel Sheik Mohammed shares his journey from his early exposure to computers through his father's training institute to becoming a cybersecurity expert. Adiel describes his academic background in telecommunication and networking, the pivotal decision to specialize in cybersecurity, and the certifications and hands-on experience that facilitated his transition. He discusses his roles, including his first cybersecurity job as a solution architect with WatchGuard, and elaborates on his continued learning through certifications. Adiel also talks about his contributions to the field, including authoring books on AI’s impact on SOC and cybersecurity and his ongoing doctorate focused on AI and cybersecurity. The episode concludes with advice for aspiring cybersecurity professionals on networking, certifications, and staying current with industry developments.https://www.linkedin.com/in/shadeel/https://speakerhub.com/speaker/adeel-shaikh-muhammadhttps://adeel.solutionshttps://www.amazon.com/dp/B0DG66357Nhttps://www.amazon.com/dp/B0F3DCKYQ9https://www.amazon.com/dp/B0DVC5Z3XZ00:00 Introduction and Guest Introduction00:53 Early Life and Initial Interest in Cybersecurity02:09 Transition to Cybersecurity04:35 First Cybersecurity Role05:43 Certifications and Continuous Learning07:31 Writing Books and Doctorate Journey10:19 Current Work and Future Plans18:44 Advice for Aspiring Cybersecurity Professionals21:35 Conclusion and Final ThoughtsSponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It’s a conversation about what they did before, why they pivoted into cyber, what the process was they went through, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership, as well as tips/tricks/advice from cybersecurity leaders.Check out our books:The Cybersecurity Advantage - https://leanpub.com/the-cybersecurity-advantageDevelop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roleshttps://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Hacker Inc.: Mindset For Your Careerhttps://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/---About the host:Christophe Foulon focuses on helping secure people and processes, drawing on a solid understanding of the technologies involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing technology use while balancing its implications for people, processes, and information security, through a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuri- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/