エピソード

  • Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AI
    2026/02/09

    Shiny tools don’t break attackers in basic mistakes.

    In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.

    Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.

    You’ll learn:

    • Why old printers, IoT devices, and “temporary” systems are prime attack paths
    • What most organizations misunderstand about pen testing and red teaming
    • How poor asset inventory and change management undermine security programs
    • The real risks behind shadow IT and unmanaged tools
    • Where AI helps in pen testing and where experience still wins
    • Why mastering the basics beats chasing new security gadgets every time

    Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.

    Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.

    Key Moments:

    03:57 Critical Infrastructure: Finding Vulnerabilities

    06:44 "Cyber Risks from Hidden Devices"

    11:25 Cybersecurity: Focus on Basics

    16:09 Complex Systems Demand Continuous Testing

    18:17 Understanding Complex System Security

    22:54 "Testing: External vs. Internal"

    24:12 Enterprise Challenges with AI Integration

    27:40 AI Lowers Barriers for Hacking

    About the guest :

    Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.

    How to connect Corey :
    https://www.linkedin.com/in/coreylebleu/

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast
    続きを読む 一部表示
    34 分
  • OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now
    2026/02/02

    Remote access transformed overnight - and OT environments are still feeling the impact.

    In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it’s heading next.

    They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.

    You’ll learn:

    • How COVID permanently changed OT remote access expectations
    • Why IT-first security approaches don’t translate well to OT
    • The role of layered access controls and policy-driven permissions
    • How dynamic access and trust scoring are reshaping OT security
    • Where IT/OT convergence helps - and where it creates new risk
    • What leaders must prioritize to balance access, safety, and resilience

    If you’re responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity.

    Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.

    Key Moments:

    00:00 Securing Critical Infrastructure Access

    03:59 "OT Mindset: Defense and Offense"

    07:26 "Remote Access Challenges in Operations"

    11:45 "Challenges in OT-IT Integration"

    16:07 Authority Must Match Responsibility

    18:23 Simplifying OT Authentication Challenges

    21:53 "Dynamic Trust Scoring with AI"

    24:05 "Access Control and Segmentation"

    28:57 "Secure Access Without Overreach"

    33:12 "Left of Boom Awareness"

    35:56 OT Security and Local Control

    39:35 "Driving Early Adoption Awareness"

    41:54 "Proactive Support for Critical Infrastructure"

    45:52 "Remote Work Enhances Team Efficiency"

    47:17 "Exciting Tech for Cybersecurity"

    About the guest :
    Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.

    How to connect steve :

    Website : https://hyperport.io/

    Linkedin: https://www.linkedin.com/in/steverutherford1/

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    続きを読む 一部表示
    50 分
  • Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses
    2026/01/19

    Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.

    In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.

    Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.

    You’ll learn:

    • Why remote access is one of the biggest OT risk multipliers
    • How poor visibility creates blind spots attackers love
    • Why asset inventory and documentation are foundational - not optional
    • How segmentation and least-privilege design shrink the attack surface
    • What compliance frameworks get right - and what they don’t
    • Best practices for vendor access, MFA, session recording, and monitoring
    • How to design secure connectivity without breaking operations

    Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure.

    Tune in to learn how to secure access without sacrificing operations - only on Protect It All.

    Key Moments:

    01:11 "Secure Connectivity in OT"

    05:10 "Reducing Attack Surface Through Access Limits"

    10:02 "Control System Upgrade Failure Impact"

    12:00 Beyond Passwords: Strengthening Security

    17:16 "Strengthening Cybersecurity Basics"

    18:26 "Balancing Compliance and Security"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    続きを読む 一部表示
    20 分
  • Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget
    2026/01/12

    Small businesses aren’t too small to be targeted; they're often the first targets.

    In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight.

    Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend.

    You’ll learn:

    • Why small businesses are prime cyber targets
    • The most common mistakes that lead to catastrophic loss
    • How basic policies and employee awareness stop most attacks
    • Why multi-factor authentication, backups, and segmentation are non-negotiable
    • How to prioritize cybersecurity when resources are limited
    • Why resilience not perfection is the real goal

    Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand.

    Tune in to learn how to protect your business, your data, and your future only on Protect It All.

    Key Moments:

    03:37 Cybersecurity Risks for Small Businesses

    08:06 System Security and Backup Essentials

    12:21 Cybersecurity: Prepare, Monitor, Survive

    14:21 Efficient Device Monitoring Simplified

    19:31 "Three-Two-One Backup Strategy"

    20:20 "Planning Left of Bang"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    続きを読む 一部表示
    26 分
  • Cybersecurity Success in 2026: Why Planning Early and Investing in People Wins
    2026/01/05

    Great cybersecurity programs aren’t built in a panic - they’re built through early planning, trusted relationships, and consistent execution.

    In this kickoff episode for 2026 of Protect It All, host Aaron Crow shares practical, real-world guidance on how cybersecurity leaders can avoid last-minute scrambles and instead build momentum that lasts all year. Drawing from years of experience across IT and OT environments, Aaron explains why people, trust, and planning matter more than any single tool or technology.

    This episode dives into how successful teams think ahead, budgeting wisely, engaging stakeholders early, and creating space for learning, networking, and collaboration beyond spreadsheets and ROI metrics.

    You’ll learn:

    • Why starting early is the most underrated cybersecurity advantage
    • How trust and relationships accelerate security programs
    • Why investing in people over tools delivers better outcomes
    • How to avoid procrastination and year-end panic
    • The role of networking, conferences, and peer learning in long-term success
    • How diversity, challenge, and momentum strengthen security teams
    • What leaders should prioritize to make 2026 a year of progress - not firefighting

    Whether you’re planning budgets, building teams, or refining IT/OT security strategy, this episode delivers actionable guidance to help you move from intention to execution.

    Tune in and learn how to build a cybersecurity program that works all year long - only on Protect It All.

    Key Moments:

    03:51 "Planning for Unforeseen Challenges"

    09:02 "AI Automation: Challenges and Expectations"

    10:21 "Budgeting: The Importance of Buffers"

    16:16 "Diversity in Problem-Solving Approaches"

    17:53 "Understanding Perspectives and Future Goals"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    続きを読む 一部表示
    22 分
  • AI Isn’t the Answer: Why Cybersecurity Fundamentals Still Decide OT and IT Success
    2025/12/29

    AI is everywhere - but it won’t fix broken cybersecurity foundations.

    In this end-of-year wrap-up episode of Protect It All, host Aaron Crow takes a hard look at the growing hype around AI in cybersecurity and explains why fundamentals still matter more than any shiny new tool, especially in OT environments.

    Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like asset inventory, network segmentation, and clear ownership. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you’re protecting in the first place.

    You’ll learn:

    • Why basic cybersecurity hygiene still determines success or failure
    • How AI fits best when foundations are already in place
    • The dangers of shadow AI in OT and industrial environments
    • Why asset visibility and segmentation remain non-negotiable
    • How leaders should think about AI as a support tool - not a shortcut

    What OT and IT teams should prioritize heading into 2026
    Whether you’re closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype.

    Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All.

    Key Moments:

    03:32 "Technology Complexity vs. Practicality"

    09:33 "AI as an Entry-Level Intern"

    12:29 "AI: A Powerful Team Tool"

    16:24 "AI Alone Won't Fix Cyber"

    19:34 "Mastering Basics Before AI Integration"

    21:46 "Shadow AI and Resilience"

    25:26 "Addressing Gaps and Ownership"

    30:27 "Foundations Matter for Success"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    続きを読む 一部表示
    33 分
  • Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right
    2025/12/22

    AI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way.

    In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments.

    Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn’t as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation.

    You’ll learn:

    • Why legacy systems aren’t going away anytime soon
    • The hidden risks of chasing AI without strong foundations
    • How to balance security, usability, and business value
    • Why process and governance matter more than tools
    • How IT leaders can communicate cyber and AI value in business terms
    • Where AI creates opportunity - and where it creates new attack paths

    Whether you’re leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership.

    Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All.

    Key Moments:

    00:00 "Legacy Tech in Modern Firms"

    06:22 "Technology, Change, and Customer Focus"

    09:51 "Challenges in Articulating Cybersecurity Value"

    12:27 "Tech Solutions Must Drive Value"

    15:43 Sell Ideas Beyond the Code

    19:03 "Ransomware Risks in Acquisitions"

    24:02 Government, Services, and Compliance Debate

    25:35 Balancing AI, Cybersecurity, and Regulation

    30:33 BlackBerry's Downfall: Ignored Innovation

    32:06 "Evolution and Misuse of AI"

    34:45 "Opportunity to Lead Change"

    37:52 "AI Without Guidance Backfires"

    41:07 "AI: Smart but Context-Lacking"

    46:45 "AI Empowering Business Transformation"

    50:30 "Effortless Tech-Fueled Imitation"

    About the guest :

    Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value.

    How to connect Neil: https://www.linkedin.com/in/neildmorris/

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook:
    続きを読む 一部表示
    53 分
  • AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most
    2025/12/15

    Cybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for.

    In this episode of Protect It All, host Aaron Crow sits down with Sue McTaggart, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on culture, governance, and fundamentals done right.

    Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why human oversight and curiosity remain essential in an increasingly automated world.

    You’ll learn:

    • Why technology alone can’t fix cybersecurity problems
    • How to embed a security-first mindset across teams and leadership
    • What AI changes - and what it doesn’t - in cybersecurity governance
    • The role of Zero Trust and foundational cyber hygiene
    • Why people, process, and accountability prevent more breaches than tools
    • How generational shifts and curiosity shape the future of cyber careers

    Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts.

    Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All.

    Key Moments:

    01:12 Cybersecurity Evolution and Insights

    03:51 "Cybersecurity Requires Culture Shift"

    07:09 "Tech Failures and Curfew Challenges"

    10:30 "Prioritizing Security in AI Development"

    15:05 Cybersecurity's Role in Everything

    19:37 "Everything is Sales"

    23:54 Adapting Communication for Audiences

    26:26 "Think Ahead, Stay Curious."

    28:30 Tinkering and Curiosity Unleashed

    31:32 "Gen Z: Redefining Work and Life."

    36:17 Governing AI: Benefits and Risks

    37:59 AI Needs Human Oversight

    42:35 "AI's Role in Cybersecurity."

    47:25 "Hackers Exploit Basic Vulnerabilities."

    About the guest:

    Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness.

    How to connect Sue: https://www.linkedin.com/in/sue-mctaggart-24604158/

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: http...
    続きを読む 一部表示
    52 分