CyberRisk TV at BlackHat 2025 – Day 2

This episode is sponsored by
Full Show Notes
Segment One

Digital Supply Chains, AI Blind Spots & Cyber Executive Protection – Black Hat Day 2 – BH25 #2

Key Moments
  • 0:00 - Welcome to Black Hat 2025: Day 2 Kickoff
  • 0:34 - Jackie’s Hilarious Hotel Water Crisis
  • 01:22 - The Hidden Risks in Digital Supply Chains
  • 02:39 - Vibe Coding & Software Dependency Chaos
  • 04:45 - Importing Everything: A Cybersecurity Concern
  • 06:06 - Can LLMs Distinguish Sarcasm from Fact?
  • 09:04 - The Dangers of Trusting AI Without Validation
  • 11:20 - Executive Protection in the Digital Age
  • 12:48 - Account Compromise & Market Manipulation
  • 14:10 - Party Highlights & What’s Next at Black Hat
Segment Two

Unified Cryptographic Management: The Foundation of Digital Trust in the Quantum Era – Ted Shorter – BH25 #2

Key Moments
  • 0:00 - Surviving Day One at Black Hat 2025
  • 01:10 - Quantum Computing: Cool, Weird, and Terrifying
  • 02:00 - How Quantum Threatens RSA & ECC Encryption
  • 03:15 - NIST’s Post-Quantum Algorithm Progress
  • 04:30 - Why 2030 Is the Critical Deadline
  • 05:10 - Keyfactor’s Acquisitions & Quantum Strategy
  • 06:20 - Legacy Tech and the Quantum Security Gap
  • 07:15 - Full Crypto Visibility: What It Really Means
  • 08:30 - Building Your Quantum Transition Plan
  • 10:00 - Final Thoughts & Why the Time to Act Is Now
Guest
CTO & Co-founder at Keyfactor

Ted Shorter is the Chief Technology Officer and co-founder at Keyfactor. Responsible for Keyfactor’s Intellectual Property development efforts, Ted helps align Keyfactor’s focus with the changing security landscape, ensuring our clients understand the importance of crypto-agility.

Ted has worked in the security arena for over 25 years, in the fields of cryptography, Public Key Infrastructure, authentication and authorization, and software vulnerability analysis. His past experience includes 10 years at the National Security Agency, a master’s degree in computer science from The Johns Hopkins University, and an active CISSP certification.

Segment Three

The End of an Era: Modernizing Vulnerability Management – J.J. Guy – BH25 #2

Key Moments
  • 0:00 - Welcome to Black Hat 2025: Live from Mandalay Bay
  • 01:12 - J.J. Guy on Sevco’s Origin and the CASM Framework
  • 02:22 - Why Asset Inventory is the Foundation of Security
  • 03:24 - Bridging CASM and Vulnerability Management
  • 04:37 - Business Context and the Evolving Risk Landscape
  • 06:26 - Challenges with Legacy Vulnerability Scanning Tools
  • 07:25 - From On-Prem to Cloud: The Inventory Visibility Problem
  • 08:44 - Agent Deployment Gaps and Security Blind Spots
  • 10:00 - Building a Risk Model for Executives, Not Just Ops
  • 13:32 - The Future: Risk Prioritization, Gartner MQ & What’s Next
Guest
CEO & Co-Founder at Sevco Security

J.J. is the CEO and co-founder of Sevco Security. After spending a decade as an intelligence officer, J.J. joined the founding team of Carbon Black, blazing the trail to create the EDR market. Most recently, J.J. was the Chief Operating Officer of JASK.

Segment Four

AppSec under AI pressure with Idan Plotnik of Apiiro – Idan Plotnik – BH25 #2

Key Moments
  • 0:00 - Welcome to Black Hat 2025 at Cyber Risk TV
  • 0:28 - Meet Idan Plotnik: Ex-Microsoft & Apiiro CEO
  • 0:48 - The Pain Behind Starting Apiiro
  • 01:48 - 75% of Engineers Will Use AI Assistants by 2028
  • 02:20 - The Hidden Risks of AI-Powered Code Commits
  • 03:49 - Why More Code Means More Vulnerabilities
  • 04:45 - Unvetted Dependencies & API Sprawl Explained
  • 06:06 - Cloud Costs, Security, and the Data Disconnect
  • 09:35 - How Apiiro’s Deep Code Inventory Works
  • 11:55 - Autofix AI Agent: Fixing Code with Full Context
Guest
Co-Founder and CEO at Apiiro

Idan is a serial entrepreneur and product strategist, bringing to Apiiro nearly 20 years of experience in cybersecurity. Previously, Idan was Director of Engineering at Microsoft following the acquisition of Aorato where he served as the founder and CEO.

Segment Five

Shaping the Future of Threat Intelligence-driven Cybersecurity – Jason Passwaters – BH25 #2

Key Moments
  • 0:00 - Intro from BlackHat 2025
  • 0:45 - Meet Jason Passwaters of Intel 471
  • 01:36 - Evolution of Cybersecurity Teams
  • 03:15 - Intelligence Beyond the Firewall
  • 05:10 - Lowering the Barrier for Attackers
  • 07:00 - The Rise of Cybercrime as a Business
  • 08:07 - Agentic AI and Risk Operationalization
  • 10:15 - Integrating Intel Across the Enterprise
  • 13:12 - Supply Chain Threats and Vendor Risks
  • 16:00 - Real-World Example: SolarWinds Breach
  • 16:50 - Final Thoughts & Where to Learn More
Guest
CEO at Intel 471

Jason Passwaters is the CEO of Intel 471, a cyber threat intelligence company headquartered in the United States and with over 250 employees located across the globe. He co-founded the business eleven years ago and successfully bootstrapped Intel 471 through 2021 at which point the company underwent a strategic investment by private equity firm Thoma Bravo. Presently, Jason is steering Intel 471 through a phase of substantial growth, with a primary focus on strategy as well as mergers and acquisitions to fortify the company’s long-term vision and objectives. Jason’s experience draws from nearly 12 years of service in the US Marine Corps. During this period, he served primarily as a Counterintelligence/Human Intelligence (HUMINT) specialist. Additionally, Jason spent four years supporting federal law enforcement, specializing in tracking Eastern European and Russian cybercriminals. He also has experience with other cybersecurity startups that went on to successful exits.

Jason has been at the forefront of the commercial cyber threat intelligence industry since its inception being one of the few practitioners early on with deep experience in both the intelligence community and cyber. With a wealth of international experience, Jason has led and built teams across diverse locations such as Ukraine, Taiwan, China, India, Romania, Brazil, Colombia, Netherlands, United Kingdom, and more. As an accomplished intelligence practitioner, he has spearheaded and executed cyber threat intelligence initiatives, contributing significantly to the identification and mitigation of some of the most prolific cybercriminals and nation-state actors of the past 19+ years. Jason earned his BS in Business Management from Liberty University.

Segment Six

You Can’t Get There From Here: Why We Need A New Way to Manage Exposure – HD Moore – BH25 #2

Key Moments
  • 0:00 - Intro from BlackHat 2025 with Jackie McGuire
  • 0:30 - Meet HD Moore, CEO & Co-Founder of runZero
  • 01:15 - Why Vulnerability Management Is Still Broken
  • 02:10 - The Problem with Unauthenticated Discovery
  • 03:25 - The Tool Overload & Data Volume Crisis
  • 04:45 - HD’s Offensive Testing Background & Approach
  • 06:00 - How runZero Finds Hidden & Exploitable Assets
  • 07:40 - Real-World Risks: Shadow IT & AI Expansion
  • 09:10 - Explaining Vulnerability Management to CEOs
  • 10:50 - Why Security Tools Are Often the Weak Link
  • 13:45 - Final Thoughts & Where to Learn More About runZero
Guest
CEO and Founder at runZero

HD Moore is a pioneer of the cybersecurity industry who has dedicated his career to vulnerability research, network discovery, and software development since the 1990s. He is most recognized for creating Metasploit and is a passionate advocate for open-source software and vulnerability disclosure.

HD serves as the CEO and founder of runZero, which provides a single source of truth for exposure management across your total attack surface. Delivering in-depth visibility into every asset and exposure, runZero helps you mitigate risks faster, meet compliance requirements, and ensure you continuously discover critical insights that others miss — including unknown and unmanageable devices and elusive exposures that evade traditional tools.

Prior to founding runZero, HD held leadership positions at Atredis Partners, Rapid7, and BreakingPoint. HD has also been a frequent speaker at industry events such as Black Hat and DEF CON. HD’s professional journey began with exploring telephone networks, developing exploits for the Department of Defense, and hacking into financial institution networks.

Segment Seven

The Rising Need for Offensive Security Strategy and Skill – Rohit Dhamankar – BH25 #2

Key Moments
  • 0:00 - Intro: Offensive Security at Black Hat 2025
  • 0:34 - Guest Intro: Rohit Dhamankar from Fortra
  • 01:15 - Why Offensive Security Is Gaining Regulatory Attention
  • 02:41 - Pen Testing vs. Red Teaming Explained
  • 04:09 - The Shift from Hope to Proof in Cybersecurity
  • 05:08 - The Need for Continuous Penetration Testing
  • 06:45 - How to Mature into a Continuous Testing Strategy
  • 07:28 - Red Teaming Challenges & Resource Strategies
  • 08:43 - Can AI Enhance Red Teaming at Scale?
  • 10:20 - Purple Teaming & Red/Blue Collaboration Platforms
  • 13:49 - Final Thoughts: Building an Offensive Security Strategy
Guest
Vice President of Product Strategy at Fortra

Rohit is the Vice President of Product Strategy at Fortra. Rohit has more than 20 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Dhamankar holds a Master of Science in Electrical Engineering from the University of Texas Austin and a Master of Science in Physics from IIT in Kanpur, India.

He has worked in leading and advisory roles for many successful start-ups and Texas based VCs. Rohit has spoken at RSA, Black Hat and other cybersecurity industry conferences. In addition, he worked with the SANS Institute for many years authoring industry-driving reports and newsletters.

Segment Eight

AI Arms Race, Supply Chain Nightmares & Booth Scams – Day 2 Recap – BH25 #2

Key Moments
  • 0:00 - Day 2 Wrap-Up Begins at BlackHat 2025
  • 0:21 - Titles, Badges & Identity Confusion
  • 0:48 - Free Pepper Spray & Show Floor Chaos
  • 01:52 - Intel, Threat Surface & CTE Insights
  • 02:49 - AI-Powered Threat Intel: Friend or Foe?
  • 04:07 - The Lopsided Battle: Offense vs Defense
  • 05:35 - AI in the Software Supply Chain
  • 07:03 - Traffic Jams & Massive Exhibit Hall
  • 09:58 - Startup Alley & Creative Booth Tactics
  • 13:36 - Recon Missions, Media Zones & Wrap-Up

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds