Cybersecurity Awesomeness Podcast
The Cybersecurity Awesomeness Podcast from Enterprise Management Asscoaites (EMA) features cybersecurity experts Chris Steffen and Ken Buckler discussing critical cybersecurity issues. They cover everything from the challenges of certificate management and the cyber workforce talent shortage to deep. Available on all major platforms, this podcast offers credible, well-regarded insights into today's top security topics.
Cybersecurity Awesomeness Podcast - Episode 150
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the 2026 RSAC in San Francisco. Dubbed the "Super Bowl" of security, the event expects over 45,000 attendees and 600 vendors at the Moscone Center. Chris, managing a schedule of nearly 40 meetings, joins Ken to navigate the overwhelming noise of the show floor.
The duo identifies Agentic AI and autonomous solutions as the dominant—yet potentially distracting—themes of the year. They caution against the "silver bullet" mentality, urging leaders to focus on securing AI agents against hallucinations and IP leaks rather than viewing them as t...
Cybersecurity Awesomeness Podcast - Episode 149
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the RSA Conference (RSAC), often described as the "Super Bowl" of cybersecurity by talking about the EMA Vendor Vision report. To help attendees navigate the overwhelming presence of over 600 exhibitors, the hosts break down EMA’s "Vendor Vision" report, which spotlights ten essential innovators. The discussion covers a broad technological spectrum, ranging from Straker’s cutting-edge adversarial AI in the Early Stage Expo to Sky High Security’s leadership in Data Security Posture Management (DSPM).
Key highlights include AWS’s unified cloud security...
Cybersecurity Awesomeness Podcast - Episode 148
In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.
The conversation characterizes AI a...
Cybersecurity Awesomeness Podcast - Episode 147
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.
While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for secu...
Cybersecurity Awesomeness Podcast - Episode 146
In this "Cybersecurity 101" episode, Chris Steffen and Ken Buckler demystify quantum computing and its looming implications for modern encryption. Ken contrasts traditional binary bits—static ones and zeros—with qubits, using the analogy of a spinning coin to represent the multiple simultaneous states quantum computers can process. This immense power allows quantum systems to solve complex problems in milliseconds that would take traditional computers lifetimes. However, significant physical hurdles remain, such as the requirement for near-absolute zero cooling environments.
The most pressing security concern discussed is "Q-Day" and the "Harvest Now, Decrypt Later" strategy. Malicious actors are curr...
Cybersecurity Awesomeness Podcast - Episode 145
In this episode, Chris Steffen and Ken Buckler dissect the federal government’s evolving—and somewhat strained—approach to cybersecurity. A major catalyst for the discussion is the recent withdrawal of agencies like CISA, the FBI, and the NSA from the RSAC conference following former CISA head Jen Easterly’s appointment there. While potentially a move toward fiscal responsibility—given the $5,000 per-person total cost of the event—the hosts warn this retreat could stifle vital public-private partnerships and recruitment efforts.
The discussion also tackles systemic talent issues within the military. Experts often face a "promotion trap," being moved into m...
Cybersecurity Awesomeness Podcast - Episode 144
In this episode of the Cybersecurity Awesomeness Podcast, host Chris Steffen and Simon Wijckmans, CEO of C-side, discuss the critical visibility gap in client-side security. While organizations invest heavily in infrastructure and server-side protection, the user's browser remains a largely unmonitored attack vector. Historically, solutions like Content Security Policies and JavaScript agents have proven brittle or easily bypassed by sophisticated scripts that can hide from crawlers or override security hooks.
The conversation highlights a major shift driven by PCI DSS 4.0, which now mandates the monitoring and authorization of client-side scripts. Simon explains that modern browser changes regarding...
Cybersecurity Awesomeness Podcast - Episode 143
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler discuss a humorous yet sobering encounter with a failed AI-driven scam. Ken recently received a common "advance fee" investment scam email, but with a unique twist: the attacker accidentally sent the Python source code instead of the intended message. The code contained telltale signs of AI generation, including placeholder instructions like "replace this with the actual import" for the Gemini SDK.
The hosts explain that while this specific attacker failed "successfully," the incident provides concrete proof that scammers are using generative AI to replace...
Cybersecurity Awesomeness Podcast - Episode 142
In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.
Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers...
Cybersecurity Awesomeness Podcast - Episode 141
In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.
A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.
The discussion also...
Cybersecurity Awesomeness Podcast - Episode 140
Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.
Cybersecurity Awesomeness Podcast - Episode 139
Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.
Cybersecurity Awesomeness Podcast - Episode 138
Chris Steffen and Ken Buckler from EMA discuss API security.
Cybersecurity Awesomeness Podcast - Episode 137
Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.
Cybersecurity Awesomeness Podcast - Episode 136
Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.
Cybersecurity Awesomeness Podcast - Episode 135
Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.
Cybersecurity Awesomeness Podcast - Episode 134
Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.
Cybersecurity Awesomeness Podcast - Episode 133
Chris Steffen and Ken Buckler from EMA discuss trends in network security.
Cybersecurity Awesomeness Podcast - Episode 132
Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.
Cybersecurity Awesomeness Podcast - Episode 131
Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.
Cybersecurity Awesomeness Podcast - Episode 130
Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.
Cybersecurity Awesomeness Podcast - Episode 129
Chris Steffen and Ken Buckler from EMA discuss data security and software updates for Cybersecurity Awareness Month.
Cybersecurity Awesomeness Podcast - Episode 128
Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.
Cybersecurity Awesomeness Podcast - Episode 127
Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.
Cybersecurity Awesomeness Podcast - Episode 126
Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.
Cybersecurity Awesomeness Podcast - Episode 125
Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.
Cybersecurity Awesomeness Podcast - Episode 124
Chris Steffen and Ken Buckler from EMA discuss the largest ever recorded DDoS attack, and the efforts used to stop it.
Cybersecurity Awesomeness Podcast - Episode 123
Chris Steffen and Ken Buckler from EMA discuss cybersecurity's role at the start the new school year.
Cybersecurity Awesomeness Podcast - Episode 122
Chris Steffen and Ken Buckler from EMA discuss proactive vs. reactive cybersecurity.Â
Cybersecurity Awesomeness Podcast - Episode 121
Chris Steffen and Ken Buckler from EMA present a Black Hat 2025 Wrap-Up and discuss AI security.
Cybersecurity Awesomeness Podcast - Episode 120
Chris Steffen and Ken Buckler from EMA discuss data governance for agentic AI.
Cybersecurity Awesomeness Podcast - Episode 119
Chris Steffen and Ken Buckler from EMA present a preview of Black Hat 2025.
Cybersecurity Awesomeness Podcast - Episode 118
Chris Steffen and Ken Buckler from EMA discuss the latest Zero Day attack on SharePoint.
Cybersecurity Awesomeness Podcast - Episode 117
Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: the CIA of security, known as the security triad.
Cybersecurity Awesomeness Podcast - Episode 116
Chris Steffen and Ken Buckler from EMA discuss having a false sense of cybersecurity with some of the tools people regularly download and use.
Cybersecurity Awesomeness Podcast - Episode 115
Chris Steffen and Ken Buckler from EMA discuss the clickbait news cycle, and how it impacts cybersecurity.
Cybersecurity Awesomeness Podcast - Episode 114
Chris Steffen and Ken Buckler from EMA discuss nation state cyber attacks, specifically in light of current events in the Middle East.
Cybersecurity Awesomeness Podcast - Episode 113
Chris Steffen and Ken Buckler from EMA discuss the variables between running a workload on premise vs. in the cloud or as a SaaS service.
Cybersecurity Awesomeness Podcast - Episode 112
Chris Steffen and Ken Buckler from EMA discuss Penetration Testing as a Service.
Cybersecurity Awesomeness Podcast - Episode 111
Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Cybersecurity Maturity. Â