• Cyber After Hours

  • 著者: Evan & Paul
  • ポッドキャスト

Cyber After Hours

著者: Evan & Paul
  • サマリー

  • Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
    © 2025 Cyber After Hours
    続きを読む 一部表示

あらすじ・解説

Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
© 2025 Cyber After Hours
エピソード
  • Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
    2025/04/22

    Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity?

    In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices.

    The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber threats.

    They also debate the real-world applications of SOAR, sharing tips on how to vet and test implementations effectively, avoid hidden cloud costs, and leverage behavioral analysis alongside AI integration.

    Plus, they chat about the surprising trend of organizations shifting back to on-prem solutions, and why cybersecurity is becoming increasingly accessible even for smaller teams.

    Is SOAR just a fancy feature, or is it the cornerstone of modern cybersecurity operations?

    Listen in as Evan, Paul, and Josh blend humor, candid experiences, and practical advice for navigating the evolving landscape of security tools.

    Pour yourself a drink, hit play, and join us for a spirited debate—because cybersecurity conversations shouldn’t be dull.

    Connect with us on LinkedIn:

    Evan: https://www.linkedin.com/in/evanmorgan/

    Paul: https://www.linkedin.com/in/pm01/

    続きを読む 一部表示
    59 分
  • Endpoint Security: Is It Really the First Line of Defense?
    2025/04/15

    Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story?

    In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes.

    As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotlight as the new perimeter?

    The duo digs deep into why endpoint detection and response (EDR) tools, while critical, can't go it alone—and why defense-in-depth remains the gold standard for true cyber resilience.

    Beyond technical talk, Paul and Evan emphasize why collaboration beats competition in cybersecurity, highlighting how building a supportive network is essential not just for career growth, but for tackling the industry's biggest challenges.

    They also dive into why businesses must truly understand their unique risks before throwing money at shiny security tools.

    Whether you’re an entrepreneur navigating the wild world of cybersecurity or simply curious about protecting your business better, grab a beverage and join Paul and Evan for an honest, insightful, and occasionally humorous discussion about the realities of endpoint security.

    Tune in to Cyber After Hours—where security talk stays human, helpful, and just the right amount of fun.

    Connect with us on LinkedIn:

    Evan: https://www.linkedin.com/in/evanmorgan/

    Paul: https://www.linkedin.com/in/pm01/

    続きを読む 一部表示
    47 分
  • Data Privacy vs. Cybersecurity: Where Do They Intersect?
    2025/04/08

    Ever feel numb when you hear about yet another data breach?

    You're not alone.

    In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days.

    From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led to consumer indifference—and why this needs to change.

    Steve sheds light on the blurry lines between data privacy and cybersecurity, highlighting why simply "checking the compliance box" isn't enough anymore.

    Together, they unpack critical questions:

    Are privacy regulations actually making a difference?

    Can organizations move from visibility to meaningful risk reduction?

    And why does innovation in security often lag behind the threats themselves?

    Along the way, they chat about how AI is shaking things up, why data integrity might soon overshadow confidentiality, and how ransomware underscores the importance of availability (because what's privacy worth if your data’s locked away?).

    Whether you're a cybersecurity pro or just privacy-curious, join us for an entertaining, eye-opening discussion on where security meets privacy—and why the future might be less about keeping secrets and more about building trustworthy communities.

    Grab a drink, settle in, and tune in to Cyber After Hours—because talking about privacy and security shouldn’t put you to sleep.

    Connect with us on LinkedIn:

    Evan: https://www.linkedin.com/in/evanmorgan/

    Paul: https://www.linkedin.com/in/pm01/

    続きを読む 一部表示
    54 分

Cyber After Hoursに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。