Rephonic
Artwork for Redefining CyberSecurity

Redefining CyberSecurity

Sean Martin, ITSPmagazine
Cybersecurity
Artificial Intelligence
Ransomware
HITRUST
Risk Management
Incident Response
Cyber Insurance
Application Security
Vulnerability Management
CISO
AI Security
Healthcare
AI In Cybersecurity
Cloud Security
Vulnerabilities
Zero Trust
Cyber Resilience
Black Hat
DEF CON
Critical Infrastructure

Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon whi... more

PublishesTwice weeklyEpisodes600Founded4 years ago
Number of ListenersCategories
BusinessTechnology

Listen to this Podcast

Artwork for Redefining CyberSecurity

Latest Episodes

⬥EPISODE NOTES⬥

The most dangerous sentence in cybersecurity disclosure right now is "no evidence of unauthorized access to our network." It is technically true. It is also operationally hollow. The customer whose data is on a leak site does not car... more

Every major enterprise platform this quarter — Salesforce Headless 360, Workday Agent System of Record, Microsoft Copilot Studio, SAP Joule, Oracle agentic, ServiceNow Moveworks, IBM watsonx Orchestrate — is pitching a control plane for your AI agent... more

YouTube

⬥EPISODE NOTES⬥

What if the device quietly recording your daily commute could be turned against you in the time it takes to order a burger? That is not a hypothetical -- it is a demonstrated reality. Alina Tan, Security Architect and Co-Founder of H... more

YouTube

When Anthropic announced Project Glasswing, the headline was the capability: an AI model that found a 27-year-old flaw in OpenBSD and a 17-year-old remote code execution vulnerability in FreeBSD — fully autonomously, no human in the loop after the in... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap
CyberWire Daily
CyberWire DailyN2K Networks
Darknet Diaries
Darknet DiariesJack Rhysider

Recent Guests

Alina Tan
Co-founder of HE&T Security Labs, car security researcher
HE&T Security Labs
Episode: DriveThru Hacking: When Your Dashcam Becomes the Attack Vector | A Redefining CyberSecurity Podcast Conversation with Alina Tan and George Chen
George Chen
Security architect with a focus on connected vehicles
Episode: DriveThru Hacking: When Your Dashcam Becomes the Attack Vector | A Redefining CyberSecurity Podcast Conversation with Alina Tan and George Chen
Madelein van der Hout
Senior analyst at Forrester covering cyber security and risk
Forrester
Episode: You Shot the Arrow. The Bow Went With It. | Lens Four by Sean Martin | Read by TAPE9
Ed Skoudis
President of the SANS Technology Institute; Founder & CEO of Counter Hack
SANS Technology Institute; Counter Hack
Episode: When AI Touches Everything: Operationalizing the Five Most Dangerous New Attack Techniques at RSAC 2026 | A Redefining CyberSecurity Podcast Conversation with Ed Skoudis, President of SANS Technology Institute and Founder & CEO of Counter Hack
Roland Cloutier
Former Chief Security Officer for EMC, ADP, ByteDance; author and converged security leader
Business Protection Group / advisory roles
Episode: When Cyber Meets Physical: Building Executive and Employee Protection Programs That Actually Work | A Redefining CyberSecurity Podcast Conversation with Roland Cloutier, Principal of The Business Protection Group
Steve Schlarman
Senior Director of Archer
Archer
Episode: Adapting to the Speed of Risk: Why GRC Programs Must Move with the Business | A Brand Highlight Conversation with Steve Schlarman, Senior Director of Archer
Richard Stiennon
Chief Research Analyst at IT-Harvest
IT-Harvest
Episode: SOC Automation and the AI-Driven Future of Cybersecurity Defense | A Redefining CyberSecurity Podcast Conversation with Richard Stiennon, Chief Research Analyst of IT-Harvest
Josh Mason
Penetration testing expert and author
NACC, Noob Village
Episode: Speaking Security with a Business Accent: Why Being Right Isn't Enough If Nobody Listens | A Redefining CyberSecurity Podcast Conversation with Josh Mason
Subo Guha
Senior Vice President of Product Management at Stellar Cyber
Stellar Cyber
Episode: The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber

Host

Sean Martin
Host and primary presenter focused on transforming cybersecurity into business-relevant conversations.

Reviews

4.8 out of 5 stars from 6 ratings
  • If you want to listen to ONE Cybersecurity Podcast this is it!

    The best cybersecurity experts stop here to have conversation with Sean Martin!

    A MUST LISTEN for anyone remotely interested in Cybersecurity and the Business side of it.

    Great job!

    Apple Podcasts
    5
    Arcanorum
    United States4 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners describe the host as knowledgeable and engaging, with conversations that balance technical depth and business relevance.
Guests are consistently high-caliber experts from cybersecurity, research, and industry, delivering practical insights for professionals.

Top Technology Podcasts

Acquired
AcquiredBen Gilbert and David Rosenthal
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan
Hard Fork
Hard ForkThe New York Times
The Room Podcast
The Room PodcastClaudia Laurie and Madison McIlwain
Building AI Boston
Building AI BostonBuilding AI Boston
Eye On A.I.
Eye On A.I.Craig S. Smith

Talking Points

Recent interactions between the hosts and their guests.

DriveThru Hacking: When Your Dashcam Becomes the Attack Vector | A Redefining CyberSecurity Podcast Conversation with Alina Tan and George Chen
Q: Can you give an overview of what you did and how the presentation came together?
We introduced DriveThru Hacking as a novel attack technique, described the privacy implications of dashcam data, demonstrated a lab-based botnet scenario, and discussed cloud-connected risks and hardening approaches for different layers of the vehicle ecosystem.
When Cyber Meets Physical: Building Executive and Employee Protection Programs That Actually Work | A Redefining CyberSecurity Podcast Conversation with Roland Cloutier, Principal of The Business Protection Group
Q: What are the main flavors of executive and employee protection programs that organizations struggle with today?
They tend to fall into three patterns: urgent executive threats and workplace violence issues, a desire to streamline fragmented security leadership and metrics, and requests from non-security stakeholders for an external view and guidance on governance and protection strategy.
When AI Touches Everything: Operationalizing the Five Most Dangerous New Attack Techniques at RSAC 2026 | A Redefining CyberSecurity Podcast Conversation with Ed Skoudis, President of SANS Technology Institute and Founder & CEO of Counter Hack
Q: Is there one overarching takeaway from this year's content that stands out compared to the last ten years?
AI is now embedded in every topic, not as a standalone theme but as a pervasive enabler that accelerates both attackers' capabilities and defenders' responses, making AI a core lens through which all cybersecurity trends are viewed.
SOC Automation and the AI-Driven Future of Cybersecurity Defense | A Redefining CyberSecurity Podcast Conversation with Richard Stiennon, Chief Research Analyst of IT-Harvest
Q: Are these SOC automation tools still distinct from traditional SIM and SOAR vendors, or are they simply expanding existing capabilities?
They are largely distinct; the new wave focuses on full automation of triage, investigation, and even some threat hunting, beyond what traditional SIM/SOAR provide, often with dedicated AI-driven workflows.
Speaking Security with a Business Accent: Why Being Right Isn't Enough If Nobody Listens | A Redefining CyberSecurity Podcast Conversation with Josh Mason
Q: How does the book address the gap between being technically correct and being strategically effective?
It emphasizes that being technically right is not enough if you're not shaping decisions and outcomes the business cares about; the book teaches framing, storytelling, and aligning security work with business priorities to influence decisions and drive action.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Redefining CyberSecurity

What is Redefining CyberSecurity about and what kind of topics does it cover?

This show centers on practical, business-focused cybersecurity insights, with a strong emphasis on how security strategies intersect with leadership, culture, and organizational resilience. Episodes frequently explore how technology choices, governance, AI, and human factors influence real-world risk management, incident response, and security culture. A notable strength is the mix of vendor-agnostic discussions and brand highlights from notable security companies, often featuring practitioners, researchers, and executives who translate complex topics into actionable takeaways for business leaders and security teams alike.

Where can I find podcast stats for Redefining CyberSecurity?

Rephonic provides a wide range of podcast stats for Redefining CyberSecurity. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Redefining CyberSecurity and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Redefining CyberSecurity get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Redefining CyberSecurity, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Redefining CyberSecurity?

Rephonic provides comprehensive predictive audience data for Redefining CyberSecurity, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Redefining CyberSecurity have?

To see how many followers or subscribers Redefining CyberSecurity has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Redefining CyberSecurity?

These podcasts share a similar audience with Redefining CyberSecurity:

1. Defense in Depth
2. CyberWire Daily
3. Cybersecurity Today
4. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
5. Darknet Diaries

How many episodes of Redefining CyberSecurity are there?

Redefining CyberSecurity launched 4 years ago and published 600 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Redefining CyberSecurity?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Redefining CyberSecurity?

Rephonic pulls ratings and reviews for Redefining CyberSecurity from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Redefining CyberSecurity?

Rephonic provides full transcripts for episodes of Redefining CyberSecurity. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Redefining CyberSecurity?

Recent guests on Redefining CyberSecurity include:

1. Alina Tan
2. George Chen
3. Madelein van der Hout
4. Ed Skoudis
5. Roland Cloutier
6. Steve Schlarman
7. Richard Stiennon
8. Josh Mason

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days