Security Weekly Podcast Network (Video)

Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413


Listen Later

In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more!

Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click.

From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust.

Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture.

This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh!

In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What’s happening?

Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries.

To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh

Show Notes: https://securityweekly.com/bsw-413

...more
View all episodesView all episodes
Download on the App Store

Security Weekly Podcast Network (Video)By Security Weekly

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

35 ratings


More shows like Security Weekly Podcast Network (Video)

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,999 Listeners

MacBreak Weekly (Audio) by TWiT

MacBreak Weekly (Audio)

2,013 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

639 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,019 Listeners

Security Weekly News (Audio) by Security Weekly Productions

Security Weekly News (Audio)

33 Listeners

The Daily by The New York Times

The Daily

112,398 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,965 Listeners

Tech Brew Ride Home by Morning Brew

Tech Brew Ride Home

966 Listeners

The Matt Walsh Show by The Daily Wire

The Matt Walsh Show

28,576 Listeners

Morning Wire by The Daily Wire

Morning Wire

26,656 Listeners

The Criminal Connection Podcast by The Criminal Connection Podcast

The Criminal Connection Podcast

40 Listeners