Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading

1
What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen
0:36
0:36
Play later
Play later
Lists
Like
Liked
0:36What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast? In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the u…
…
continue reading

1
Hackers Have HR Now? featuring Christopher Budd
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59The internet once came this close to crashing—and Microsoft was on the front line. In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors…
…
continue reading

1
Staying Ahead in the Age of AI Agents with Marco Figueroa
40:57
40:57
Play later
Play later
Lists
Like
Liked
40:57Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are scrambling to keep up. Building on his bold January prediction that 2025 would be the Year of the AI Agent, Marco returns to break down real-world threats,…
…
continue reading

1
I Built an AI Version of Myself – Here’s Why with Marcus J. Carey
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and career development. In this episode, he shares the workflows he uses that redefine productivity, from dictating books in a week to building a personal AI twin. …
…
continue reading

1
Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it’s peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, …
…
continue reading

1
The AI Shift You Can’t Ignore with Marco Figueroa
37:35
37:35
Play later
Play later
Lists
Like
Liked
37:35AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, who called it in January: 2025 is the year of AI agents, and the early signs are already here. From Grok 3’s speed advantage to AI-powered red teami…
…
continue reading

1
Superhuman Productivity and AI Mastery with Pedram Amini
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy. Pedram Amini, Chief Scientist at OPSWAT, joins…
…
continue reading

1
Cybersecurity Meets AI: The Good, The Bad & The Janky
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing it…
…
continue reading

1
A Human-Centric Approach to Cybersecurity with Edna Conway
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology. Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of inn…
…
continue reading

1
Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses. Pandian shares key findings from …
…
continue reading

1
How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible. From his journey as a threat hunter to building a free online game that t…
…
continue reading

1
Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-…
…
continue reading

1
The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role. In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solvin…
…
continue reading

1
Understanding the Psychology of Cyber Risk with David Shipley
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could. In this episode, Ron and David examine why people, …
…
continue reading

1
From Landscaping to Cyber Leadership with Cole Lisko
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks. Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with…
…
continue reading

1
Think Like a Hacker, Solve Like a Leader featuring Ted Harrington
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security test…
…
continue reading

1
Hacking Trust with AI and Deepfakes featuring Iain Jackson
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity. Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating…
…
continue reading

1
Championing the Human in Cybersecurity with Julie Haney
2:31
2:31
Play later
Play later
Lists
Like
Liked
2:31What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection. In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, w…
…
continue reading

1
Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss
40:21
40:21
Play later
Play later
Lists
Like
Liked
40:21Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild. Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, H…
…
continue reading

1
Transforming SOC Operations with AI featuring Roy Halevi
49:04
49:04
Play later
Play later
Lists
Like
Liked
49:04Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats. In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response…
…
continue reading

1
From Shadow IT to Full Asset Visibility with Wes Wright
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets. In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cy…
…
continue reading

1
Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews
41:49
41:49
Play later
Play later
Lists
Like
Liked
41:49How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity. In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW…
…
continue reading

1
Rethinking Cybersecurity Hiring with Naomi Buckwalter
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth. In this episode, Naomi challenges why industry hiring norms fall short, shares candid st…
…
continue reading

1
AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management. Whether you’re worried about deepfak…
…
continue reading

1
How to Become a True Security Leader with Nathan Case
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with…
…
continue reading

1
AI and the Future of Cyber Defense with John Hubbard
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS. John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge…
…
continue reading

1
How Adversaries Are Living Off The Dark Web with Jason Haddix
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees? In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting agains…
…
continue reading

1
AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan
18:20
18:20
Play later
Play later
Lists
Like
Liked
18:20In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&T Business. Senthil shares information about how a new product, AT&T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evol…
…
continue reading

1
Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech. Evgeniy Kharam has authored “Architecting Success: The Art …
…
continue reading

1
Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix
46:02
46:02
Play later
Play later
Lists
Like
Liked
46:02Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage. Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With sto…
…
continue reading

1
I Failed Over 300 Times Trying To Get Into Security ft. Joe South
40:12
40:12
Play later
Play later
Lists
Like
Liked
40:12Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward. Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybe…
…
continue reading

1
Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, l…
…
continue reading

1
Offensive Security: Unlocking Hidden ROI with Seemant Sehgal
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15In this episode, Ron sits down at Black Hat with guest Seemant Sehgal, Founder & CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. Seemant highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist th…
…
continue reading
In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally. Impactful Moments: 00:00 - Welcome 00:56 - Hello From Vegas! 01:41 - Conference Anxiety 03:43 - Origins of Black Hat 06:17 - Which Conference? 08:18 - Conference Strategy 11:47+ - You Can O…
…
continue reading
In this episode, Hosts Ron Eddings and Jen Langdon discuss questions about AI in Cyber. From the current state to where AI could be going, to resources to help you engage and up-level, there’s a little bit of everything for everyone in this episode. Impactful Moments: 00:00 - Welcome 00:46 - Introduction 02:29 - Engineering AI 06:54 - Was it Made B…
…
continue reading

1
Leaving an Impression: Strategies for Captivating a Massive Audience
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29In this episode, hosts Ron Eddings and Jen Langdon discuss the power of storytelling through various media. Whether your goal is to create video content, deliver keynotes on stage, or be creative through other digital mediums, there will be something for everyone! Impactful Moments: 00:00 - Welcome 01:05 - Introductions 04:55 - Storytelling in Stor…
…
continue reading

1
How Can I Best Proactively Secure My SaaS?
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder & CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution. Impactful M…
…
continue reading

1
What We All Should Be Talking About When It Comes to AI and Security
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly. Anirban discusses the importance of organizational buy-in an…
…
continue reading

1
Navigating AI as a CISO with Whitney Palacios
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offer…
…
continue reading

1
The Power of AppSec, Cyber Education, and Friendship with Tanya Janca
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep…
…
continue reading

1
Networking 2.0: The Future of Decentralized Networking & Access Management
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-sourc…
…
continue reading

1
How AI is the Key Turning Point in TPRM with Paul Valente
25:47
25:47
Play later
Play later
Lists
Like
Liked
25:47In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to crea…
…
continue reading

1
A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ra…
…
continue reading

1
Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breache…
…
continue reading

1
Enterprise Browsers: Work’s Natural Next Step
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Bradon Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also disc…
…
continue reading

1
Building Tech and Adding Value in the Era of AI with Josh Danielson
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen…
…
continue reading

1
Building Fast and Not Breaking Things with Shlomi Matichin
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26In this episode, Ron Eddings and guest Shlomi Matichin, Co-Founder & CTO at Valence Security, discuss how the hurdles and triumphs in the journey of establishing Valence Security resulted in a reduction in SaaS misconfigurations and vulnerabilities. Impactful Moments: 0:00 - Welcome 01:50 - Introducing guest, Shlomi Matichin 02:46 - Founder’s Journ…
…
continue reading

1
Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley
35:45
35:45
Play later
Play later
Lists
Like
Liked
35:45In this episode, Host Ron Eddings gets to know guest Confidence Staveley, founder of Merkel Fence and CyberSafe Foundation. He uncovers Confidence’s inspiring story, not only about how she transforms her community and the people around her through her non-profit, but the grit she needed to overcome the obstacles to get to a career in cyber and buil…
…
continue reading

1
How to Hack your Career: Building a vCISO Business with Ayman Elsawah
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.…
…
continue reading

1
Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market …
…
continue reading