CyberRisk TV at BlackHat 2025 – Day 1

This episode is sponsored by
Full Show Notes
Segment One

Cybersecurity circus hits Las Vegas | Black Hat + DEFCON madness! – BH25 #1

Key Moments
  • 0:00 - – Welcome to Black Hat & Hacker Summer Camp
  • 0:30 - – Vegas Chaos: B-Sides, DEFCON & Alley Vomiting
  • 01:15 - – Gambling Culture & Fortnite Comparisons
  • 01:50 - – Reuniting with Friends & Selective Extroverts
  • 03:00 - – Narcissism, Sobriety & Herding Drunk Cats
  • 04:10 - – Secret Food Spots & Surreal Vegas Memories
  • 05:00 - – The AI Hype Cycle & Security’s Burden
  • 06:30 - – Booth Sizes, Budgets & Vendor Sentiment
  • 08:00 - – Cybersecurity Career Concerns & Education Gaps
  • 10:30 - – Python vs C++ & Adapting to Industry Needs
Segment Two

Digital Exposure and Modern Kill Chain: Protecting People in Weaponized Data Economy – Chuck Randolph – BH25 #1

Key Moments
  • 0:00 - – Welcome to Black Hat 2025: Executive Protection in Focus
  • 0:39 - – Why Executive Protection Has Evolved
  • 01:46 - – The Digital Kill Chain: From Ideation to Action
  • 03:10 - – Real-World Doxxing and Online Targeting
  • 04:33 - – The Impact of Social Media Algorithms on Threat Behavior
  • 05:50 - – AI Gone Rogue: When Chatbots Reinforce Violent Ideation
  • 06:50 - – Merging Cyber and Physical Security at the Board Level
  • 08:46 - – Insider Risk & Key Person Vulnerability
  • 10:32 - – The Remote Work Dilemma: Security at the Edge
  • 14:41 - – What Leaders Can Do Now: Strategic Risk Recommendations
Guest
Senior Vice President, Strategic Intelligence and Security at 360 Privacy

Charles “Chuck” Randolph is Senior Vice President for Strategic Intelligence and Security at 360 Privacy, bringing over 30 years of expertise in corporate, intelligence, and military operations. In the private sector, Chuck previously served in executive roles at Microsoft, Ontic, and AT-RISK International, spearheading global risk management, executive protection, and intelligence strategies. He specializes in converging cyber and physical security to enhance organizational resilience.

Segment Three

The 2025 Mid-Year Threat Landscape and the Shifting Battlefield with CyberProof – Yuval Wollman – BH25 #1

Key Moments
  • 0:00 - Welcome to Black Hat 2025
  • 0:45 - What Is CyberProof?
  • 01:40 - The Modern Cybersecurity Challenge
  • 03:18 - AI Agents: A New Attack Surface
  • 05:00 - Hackers vs. AI Agents: Who Wins?
  • 06:20 - Ransomware-as-a-Service & Funksec
  • 07:55 - The Cybercrime Economy
  • 09:08 - Targeted Attacks on Industries
  • 10:19 - Cyber Warfare & Nation-State Spillover
  • 13:48 - How to Prepare for the Future of Cyber Risk
Guest
President at CyberProof

Yuval Wollman is a former intelligence chief who brings a wealth of experience across public and private sectors to bear in his role as President of CyberProof. He also leads UST Spark, a startups’ innovation hub accelerating customers’ digital transformations. Yuval is accustomed to reading between the lines, always looking out for the small detail that could lead to a big strategic shift. Prior to CyberProof, Yuval served as Vice President for business development at IDB Group, one of Israel’s largest conglomerates. He previously spent a decade working in the Israeli public sector, ending his role as Director General of Intelligence Ministry.

During his military service, Yuval served as an officer in the Israeli Defense Forces 8200 unit. He worked as a government official in the Israeli Finance Ministry and became the senior economic adviser to the Finance Minister and Chief of Staff. Yuval is a lawyer who clerked in the Israeli Supreme court, drafting decisions in both constitutional and corporate law. He holds a Masters and Bachelors in Economics and Bachelors in Law from the Hebrew University.

Segment Four

Hard Truths About AI in Cybersecurity Reveal Truly Hardened Defenses – Chris Boehm – BH25 #1

Key Moments
  • 0:00 - Intro from Black Hat 2025: Meet Chris Bain
  • 0:44 - The Name Game: Pronunciation Struggles
  • 01:19 - Chris Boehm's Career Journey in Cybersecurity
  • 02:11 - Microsegmentation Explained Like You’re in 5th Grade
  • 03:30 - Why Microsegmentation Matters in the Cloud & AI Era
  • 04:11 - Shadow IT and Security Risks in Cloud Environments
  • 05:47 - Why AI Struggles to Stop Lateral Movement
  • 07:51 - Where AI Is Actually Helping in Cybersecurity
  • 09:16 - Finding the Balance: AI Agents vs. Microsegmentation
  • 13:35 - How to Evaluate Real vs. Hype in AI Security Tools
Guest
Field CTO at Zero Networks

Chris Boehm is the Field Chief Technology Officer (CTO) at Zero Networks. He has 15+ years of experience in cybersecurity, spanning public sector IT, cloud engineering, and executive leadership. Chris started in State and Local Government before leading hybrid infrastructure and security programs, then spent 7 years at Microsoft across Defender, Azure, and M365, delivering threat detection, identity, and compliance solutions globally. At SentinelOne, he served as Field CISO through its IPO, advising Fortune 500s on threat-informed defense, risk, and strategy. Now at Zero Networks, he helps organizations implement real zero trust and segmentation – tied to tactics, techniques and procedures, not theory – bringing hands-on credibility and an operator’s lens to modern security architecture.

Segment Five

AI-Based Web Attack Testing – Tom Pore – BH25 #1

Key Moments
  • 0:00 - Intro from Black Hat 2025
  • 0:30 - How Attackers Are Using AI Today
  • 01:49 - The Shift to Continuous Application Testing
  • 02:31 - Pentera’s New AI-Driven Web Attack Capability
  • 03:27 - Using LLMs & NLP for Context-Aware Attacks
  • 04:42 - Identifying and Pivoting on Sensitive Data
  • 05:06 - Credential Extraction & Recursive Testing
  • 06:37 - Language, Culture, and System-Aware Payloads
  • 07:49 - Solving Authentication Challenges in Testing
  • 10:10 - The Future of AI in Red vs Blue Teaming
Guest
AVP, Sales Engineering at Pentera

Thomas Pore is the AVP of Sales Engineering at Pentera, where he helps organizations close real-world security gaps through automated validation and offensive expertise. With over 20 years in network security, his background spans NDR, encrypted traffic analysis, ethical hacking, and hands-on incident response. His insights come from the front lines—uncovering how attackers succeed and helping defenders take back control.

Segment Six

Discuss Semperis’ 2025 Global Ransomware Report – Mickey Bresman – BH25 #1

Key Moments
  • 0:00 - Live from Black Hat 2025 Intro
  • 01:00 - Meet Mickey Bresman, CEO of Semperis
  • 01:45 - The Evolution of Ransomware
  • 03:00 - From Encryption to Data Theft and Extortion
  • 04:30 - Organized Crime Enters Cybersecurity
  • 06:00 - Real-World Threats: Blending Digital and Physical
  • 08:00 - Should You Ever Pay the Ransom?
  • 10:00 - The Importance of Disaster Recovery Planning
  • 13:00 - Common Mistakes in Incident Response
  • 15:00 - Final Advice & Cybersecurity Takeaways
Guest
Chief Executive Officer at Semperis

Mickey Bresman is CEO and co-founder of Semperis, the identity-driven cyber resilience and crisis response company.

Beginning his technical career in the Navy, Mickey’s comfort zone is on the front lines helping organizations thwart and respond to cyberattacks. The long-time cybersecurity expert and entrepreneur has an extensive track record of driving revenue growth and scaling organizations across the globe. Prior to founding Semperis, Mickey held the position of CTO at YouCC Technologies, a Microsoft Gold Partner integration company. As a cybersecurity thought leader, Mickey has been quoted or featured in many major publications, including Forbes, Fortune, Wall Street Journal and others.

Semperis recently surpassed $150M in annual recurring revenue, a milestone that fewer than one in every 1,000 venture-backed enterprise software companies achieves. The company was recently recognized by Cohesity as its 2025 Security Partner of the Year, one of Dun’s 100 Best HighTech Companies, recognized by Inc. Magazine as one of its Best Workplaces for four consecutive years and has been named to Deloitte’s Technology’s Fast 500 for the sixth consecutive years.

Segment Seven

The Software Supply Chain and Cybersecurity – Theresa Lanowitz – BH25 #1

Key Moments
  • 0:00 - Live from BlackHat 2025 in Las Vegas
  • 0:40 - What is the software supply chain?
  • 01:58 - Doug’s early fears and real-world coding experiences
  • 03:21 - 3 drivers of the software supply chain crisis
  • 05:17 - The rise of AI-generated code and dependency overload
  • 06:25 - Human oversight vs. AI: The risks of unchecked modules
  • 07:45 - Why visibility matters: Supply chain breaches by the numbers
  • 09:25 - Understanding the importance of a Software Bill of Materials (S-BOM)
  • 11:22 - Vibe coding: A growing threat to secure development
  • 13:28 - The return of QA and software engineering fundamentals
  • 15:27 - Final advice: How to secure your software supply chain
Guest

Theresa Lanowitz is a globally recognized cybersecurity leader, former Gartner analyst, and former Chief Cybersecurity Evangelist with AT&T Cybersecurity and LevelBlue.

She is the creator of Executive-led Growth, a strategy that emphasizes the importance of business understanding in the cybersecurity market.

With a distinguished career in the technology industry, Theresa has held influential roles at companies including Gartner, Borland, Taligent, and Sun Microsystems, significantly impacting application security and emerging technologies.

Theresa is a globally respected leader known for her deep and diverse experience in cybersecurity. She frequently speaks at major industry conferences, including RSA and Black Hat sharing her insights on market trends, AI integration, and the evolving threat landscape. She’s been published in Forbes, Dark Reading, SC Media, ISMG, InformationWeek, and more, with her contributions reflecting a deep commitment to advancing cybersecurity practices and fostering innovation within the industry.

Theresa holds a Bachelor of Science in Computer Science from the University of Pittsburgh, Pittsburgh, PA.

Segment Eight

Software’s Agentic Future Is Coming. How CISOs Can Prepare Today – Josh Lemos – BH25 #1

Key Moments
  • 0:00 - Intro: Live from Black Hat 2025
  • 01:00 - How Executives Are Approaching AI Adoption
  • 02:00 - AI Usage in the Enterprise: The 3 Key Patterns
  • 03:30 - Real-World AI Test with ChatGPT
  • 04:20 - The First Step in AI Governance: Visibility
  • 05:10 - Role of Certifications like ISO 42001 in AI Transparency
  • 06:00 - Securing Agentic AI: From Code to Guardrails
  • 07:30 - Agentic AI & Productivity Gains in Development
  • 09:00 - East-West Expansion of Agent Workflows
  • 11:30 - Trust, Audit Trails, and Monitoring Non-Human Identities
Guest
CISO at Block

Josh Lemos is the Chief Information Security Officer at GitLab Inc., where he brings 20 years of experience leading information security teams to his role. Josh has led security teams at numerous high-growth technology companies, including ServiceNow, Cylance, and, most recently, Block (formerly known as Square). Josh’s commitment to securing technologies to make a positive impact in the world has been a common thread throughout his career. He serves as a mentor to aspiring information security professionals and is active in supporting organizations that promote diversity and inclusion in the technology industry. Josh holds a B.S. in Computer and Information Systems Security from the University of San Francisco.

Segment Nine

AI Security Chaos at Black Hat 2025: Can We Even Keep Up? – BH25 #1

Key Moments
  • 0:00 - Welcome to Black Hat 2025 Day 1 Recap
  • 0:31 - Throwback to 2019: Cigars, Chaos & 28 Interviews
  • 01:52 - AI Takes Over the Conversation
  • 02:39 - Businesses Are Using AI—Ready or Not
  • 03:35 - Securing AI: Trust, Tools & Agentic Challenges
  • 04:58 - The Inconsistency Problem with LLMs
  • 06:51 - Comparing AI Models: Claude, Gemini, OpenAI
  • 08:37 - Ransomware: Why Haven’t We Solved It Yet?
  • 11:05 - Can Zero Trust Ever Be Absolute?
  • 14:26 - The Future: Agentic AI Arms Race

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds