CyberRisk TV at BlackHat 2025 – Day 3

This episode is sponsored by
Full Show Notes
Segment One

Inside Black Hat Las Vegas 2025: Vendor Chaos, Secret Shortcuts & DEF CON Madness! – BH25 #3

Key Moments
  • 0:00 - – Kicking Off Black Hat Las Vegas 2025 in 97° Heat
  • 01:01 - – Vendor Floor Mayhem & Exclusive Private Events
  • 02:15 - – Mapping the Vegas Strip: Secret Hotel Shortcuts
  • 03:40 - – The Ultimate Mandalay Bay to Cosmo Navigation Guide
  • 04:48 - – Party Bus Stories & Filming on the Move
  • 05:32 - – Testing Black Hat’s New Podcast Pods
  • 06:41 - – Exploring Massive Booths & Hunting the Best Swag
  • 08:03 - – Museum Tangents: Mona Lisa, Dali & Art Surprises
  • 10:26 - – Cosmopolitan Nightlife & Pentera’s Hakkasan Party
  • 12:03 - – Wrapping BlackHat & Looking Ahead to DEFCON
Segment Two

Securing What Runs: The New CISO Priority – Danny Jenkins – BH25 #3

Key Moments
  • 0:00 - – Live from BlackHat 2025 in Las Vegas
  • 01:00 - – Meeting ThreatLocker CEO Danny Jenkins
  • 02:10 - – FedRAMP: What It Is and Why It Matters
  • 03:30 - – The Pain and Price of FedRAMP Audits
  • 05:00 - – Auditor Challenges and Compliance Confusion
  • 07:15 - – How ThreatLocker Approaches Zero Trust Security
  • 09:00 - – Launching Defense Against Misconfigurations (DAC)
  • 12:00 - – Shocking Software Risks: 7Zip, Coupon Clippers & More
  • 14:20 - – Application-Level Security Policies Explained
  • 16:45 - – Final Thoughts from BlackHat 2025
Guest
CEO & Co-Founder at ThreatLocker

Danny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity company specializing in Zero Trust endpoint protection solutions. With over two decades of experience in building and securing corporate networks, including red and blue team operations, Jenkins is a recognized authority in the cybersecurity industry. He is dedicated to advancing cybersecurity awareness and frequently speaks on topics such as ransomware and the Zero Trust approach. Jenkins began his cybersecurity career in 1997 as an ethical hacker. His early career experiences reinforced the importance of proactive, robust cybersecurity measures.

Segment Three

How the Enterprise Browser Neutralizes the Risks of Compromised Credentials – Michael Leland – BH25 #3

Key Moments
  • 0:00 - Live from BlackHat 2025, Las Vegas
  • 0:35 - Meet Michael Leland, VP Field CTO at Island
  • 01:10 - The harsh truth: credential compromise is inevitable
  • 01:45 - From “breaking in” to “logging in” — attacker shift explained
  • 02:30 - MFA strategies that actually work in the real world
  • 03:15 - Phishing, smishing, and deepfake scams — trust is broken
  • 04:20 - Why the browser is the second weakest link in security
  • 05:05 - Real-time blocking of unsanctioned logins and credential misuse
  • 06:45 - Managing risky browser extensions with live risk scoring
  • 08:15 - BYOD done right — secure work on any device
  • 09:40 - Final takeaways and where to learn more about Island
Guest
VP and Field CTO at Island

Michael is Field CTO at Island, bringing over 30 years of data networking, operations, and cybersecurity domain expertise. He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne, he held the title of Chief Technical Strategist for McAfee. Michael was the co-founder and CTO of NitroSecurity – later acquired by McAfee – where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.

Segment Four

Fix What Matters With Adversarial Exposure Validation (AEV) – Seemant Sehgal – BH25 #3

Key Moments
  • 0:00 - Live from BlackHat 2025 in Las Vegas
  • 0:24 - Introducing Seemant Sehgal, Founder of BreachLock
  • 0:50 - The SOC’s Silent Killer: Alert Fatigue Explained
  • 01:50 - From Banking Cybersecurity to Offensive Security Innovation
  • 02:51 - Adversarial Exposure Validation: How It Works
  • 05:03 - Visualizing Kill Chains to Prioritize Real Risks
  • 06:41 - Executive Buy-In: Turning Cyber Risk into Business Risk
  • 08:43 - Automation vs Human Expertise in Offensive Security
  • 10:37 - Who BreachLock Helps: From Fortune 500 to Critical Infrastructure
  • 12:33 - AI Transparency, Control, and the Future of Cybersecurity
Guest
Founder & CEO at Breachlock

Seemant Sehgal founded BreachLock with two things: 20+ years of experience in the cybersecurity industry and a dream to create a solution that would make proactive security the new standard.

As the former Head of Cybersecurity at ING Bank, who held a multi-million-dollar cybersecurity budget, he dealt with the pain of traditional pentesting approaches falling short of what modern businesses today need for a strong security posture. A go-getter by nature, Seemant was motivated to solve these challenges, and went on to create the world’s first full-stack, human-led, AI-powered Penetration Testing as a Service (PTaaS) solution with a strong company culture that has helped BreachLock gain momentum and scale rapidly.

Today, BreachLock is a global leader in offensive security, offering attack surface management, penetration testing, red teaming, and adversarial exposure validation (AEV) services within one unified platform.

Segment Five

Agentic AI driven Cyber Threat Intelligence: Building on a strong foundation – Jawahar “Jawa” Sivasankaran – BH25 #3

Key Moments
  • 0:00 - Welcome to BlackHat 2025 from Las Vegas
  • 0:33 - Guest intro: Jawahar Sivasankaran, President at Cyware
  • 0:53 - 28 years in cybersecurity – from practitioner to president
  • 02:09 - Why cyber threat intelligence needs a unified approach
  • 03:49 - Integrating feeds, platforms & dark web monitoring
  • 04:49 - Sandboxing challenges & CTI integration
  • 05:42 - The rise of agentic AI in autonomous SOCs
  • 07:29 - From automation scripts to AI-driven outcomes
  • 10:24 - Guardrails for safe AI-driven remediation
  • 11:05 - Open-source MCP server & standards-based security
  • 14:44 - Practical CTI tips for resource-constrained CISOs
Guest

Jawahar is a seasoned leader with over 25 years of experience driving innovation, growth, and customer success in the security product space. He currently serves as President of Cyware, a pivotal role in empowering organizations with advanced, AI-driven threat intelligence and security solutions. Before Cyware, Jawahar was President and COO of Appgate, where he was responsible for all go-to-market functions including sales, marketing, and customer success, and held the position of a Section 16 public company officer. Before that, he was instrumental in transforming specialization sales for Splunk’s advanced security offerings, significantly contributing to growth and customer intimacy. He also held various leadership roles in go-to-market and product functions during his tenure at Cisco.

Segment Six

Agentic AI is Here—Are Your APIs Ready? – Michael Callahan – BH25 #3

Key Moments
  • 0:00 - Welcome to BlackHat 2025 at Mandalay Bay
  • 0:38 - Introducing Michael Callahan, CMO of Salt Security
  • 01:15 - What is Agentic AI and why it sounds “dangerous”
  • 02:10 - How MCP servers broker AI agent communications
  • 03:40 - The hidden API explosion behind AI productivity
  • 04:55 - Shadow MCP servers and growing security risks
  • 06:15 - DNS poisoning as an analogy for MCP attacks
  • 07:45 - Why traditional security can’t keep up with AI speed
  • 09:05 - CISO decision-making under pressure to adopt AI
  • 11:00 - The “API fabric” concept and radioactive supply chains
  • 13:20 - Autonomous AI agents creating unpredictable vulnerabilities
  • 15:10 - How attacks can bypass detection by looking legitimate
  • 16:25 - Closing thoughts and where to find more Black Hat coverage
Guest
Chief Marketing Officer at Salt Security

Michael Callahan is the Chief Marketing Officer at Salt Security, a leading API security firm. Appointed in October 2023, he brings over 20 years of cybersecurity executive leadership, with prior roles at Acronis, Cofense, McAfee, HP, FireMon, Juniper, and Zimperium. At Salt, he leads brand, demand generation, and global go‑to‑market strategy.

Segment Seven

Why the traditional SOC model is broken – Matt Muller – BH25 #3

Key Moments
  • 0:00 - Welcome to BlackHat 2025: Final Interview with Matt Muller
  • 0:30 - The Broken SOC Model: Why Legacy Approaches Fail
  • 01:26 - SOC Origins and Why Burnout Persists
  • 02:49 - Rethinking the SOC: Flipping the Model
  • 03:48 - Empowering Junior Analysts with AI
  • 04:58 - Do We Still Need Tiers? Flattening the SOC Structure
  • 05:51 - Senior Analysts as Researchers & AI Architects
  • 07:22 - AI in the SOC: Co-Pilot vs. Full Automation
  • 08:28 - Tooling & Trust: Barriers to Full Automation
  • 10:06 - Human + AI Orchestration with Consensus Controls
  • 12:09 - Securing AI Agents: Identity, Access & Insider Threats
  • 14:21 - Measuring SOC Success: The Metrics That Matter
  • 15:25 - Closing Thoughts & Where to Learn More
Guest
Field CISO at Tines

Matt Muller is an accomplished security leader with over a decade of hands-on experience in cybersecurity. Currently serving as Field CISO at Tines, Matt leverages his deep understanding of security operations and product leadership to shape product and cybersecurity strategies. His extensive background, which includes leadership roles at Coinbase and Material Security, enables him to offer strategic guidance to clients on how to integrate security automation, orchestration, and AI into their organizations, driving stronger defenses and innovation in the rapidly evolving security landscape.

Segment Eight

BlackHat 2025 Wrap-Up: Predicting the Future of AI, Quantum & Cybersecurity – BH25 #3

Key Moments
  • 0:00 - – Welcome to the Black Hat 2025 Wrap-Up
  • 0:25 - – The Mandalay Bay Lampshade Mystery
  • 01:06 - – Ice Buckets, Trash Cans, and On-Camera Laughs
  • 01:16 - – New Security Trends from the Show Floor
  • 01:48 - – What is the Model Context Protocol (MCP)?
  • 02:53 - – Quantum Computing and the Future of HTTPS
  • 04:29 - – Agentic AI, Identity Management, and Trust
  • 07:28 - – The Potential Death of Google Search
  • 08:27 - – How AI Could Reshape Internet Monetization
  • 10:08 - – The Browser Problem and Consumer Privacy

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds