Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/68/4c/ff/684cff16-99e5-95dd-9279-3cada41b7bd2/mza_9153905623253474481.jpg/600x600bb.jpg
Cyber After Hours
Evan & Paul
34 episodes
2 months ago
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
Show more...
Technology
Comedy,
Leisure
RSS
All content for Cyber After Hours is the property of Evan & Paul and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
Show more...
Technology
Comedy,
Leisure
Episodes (20/34)
Cyber After Hours
Cyber Insurance: A Worthwhile Investment or a Safety Net with Holes?
Ever wonder if cyber insurance is a must-have safety net or just another costly checkbox? In Episode 38 of Cyber After Hours—titled “Cyber Insurance: A Worthwhile Investment or a Safety Net with Holes?”—we dive headlong into the messy world of cyber coverage. It’s not just about reading the fine print; it’s about deciding whether an insurance policy can truly protect you when ransomware strikes or if it’s merely a gamble with too many unknowns. Along the way, we explore how AI is shaping both the offense and defense of cyber threats, why “Do Not Disturb” might say more about our communication habits than we think, and how resilience in data recovery could make or break entire industries—especially healthcare. Throughout the episode, we share insights on the evolving insurance landscape, from the rise of cryptocurrency-fueled extortion to the ongoing debate about whether AI coding assistance is a game-changer or just another layer of risk. We also tackle the narratives around cyber incidents: what role insurance really plays, how often it’s left out of the conversation, and where it might be heading next. Tune in, join the conversation, and decide for yourself if cyber insurance is worth the investment—or if it’s time to look at risk management through a different lens. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
2 months ago
55 minutes 24 seconds

Cyber After Hours
Securing Cloud Infrastructure: Common Pitfalls to Avoid
Ever wonder if simply “lifting and shifting” your on-prem strategies to the cloud might leave you with more headaches—and a bigger bill—than you bargained for? In Episode 36 of Cyber After Hours—titled “Securing Cloud Infrastructure: Common Pitfalls to Avoid”—we dive headfirst into the real-world challenges of cloud adoption. From the behind-the-scenes stories of trying to replicate old solutions in new environments (hint: it’s rarely cheaper) to the importance of data telemetry, attribution, and automation, this conversation tackles what it really takes to keep your cloud secure. We explore how the cloud’s rapid scalability can be both a blessing and a curse, why understanding the difference between cloud and on-prem is a must, and how self-healing capabilities can offer stronger defenses (if you know how to use them). You’ll also hear personal anecdotes about navigating unexpected costs, managing complexity in hybrid setups, and balancing the human factor with emerging AI tools. Throughout the episode, we keep it genuine and relatable with the speakeasy vibe that defines our show—no distractions, just meaningful talk about staying ahead in a rapidly evolving tech landscape. Tune in, join the conversation, and learn how to steer clear of common pitfalls in cloud security. After all, in a world where technology transforms overnight, staying informed is your best defense. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
3 months ago
50 minutes 42 seconds

Cyber After Hours
Cybersecurity Startups: Are They Leading Innovation or Just Adding Noise?
Ever wonder if cybersecurity startups are truly innovating—or just flooding the market with shiny new noise? In this episode of Cyber After Hours—Cybersecurity Startups: Are They Leading Innovation or Just Adding Noise?—hosts Paul Marco and Evan Morgan welcome UK-based podcast host Nick Widdop for a candid conversation about startups shaking up the cybersecurity landscape (think Wiz) and the thin line between groundbreaking innovation and buzzword overload. Kicking things off with some relatable banter on handling life stress (let’s face it, cybersecurity pros have seen it all!), they quickly shift gears to debate how startups influence the industry. Are these companies genuinely solving problems or just repackaging existing solutions with fancier marketing? The trio explores the secrets behind successful innovation ecosystems (hello, Israel!), why some startups flame out after initial success, and how AI complicates the innovation conversation. They also discuss how established companies often struggle to stay nimble—and why real innovation isn’t just flashy tech, but about solving real-world problems. Whether you’re navigating startup waters, evaluating new cybersecurity tools, or just curious about the next big thing, this episode offers plenty of laughs, thoughtful debate, and actionable insights. Pour your favorite beverage, tune in, and join us—because cybersecurity innovation should make your job easier, not noisier. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
3 months ago
59 minutes 10 seconds

Cyber After Hours
Cybersecurity and Compliance: Allies or Adversaries
Ever feel like compliance and cybersecurity are two teammates who just can’t get along? In this lively episode of Cyber After Hours—Cybersecurity and Compliance: Allies or Adversaries?—Paul Marco, Evan, and special guest Carlos Bonet, Security & Compliance Sales Director at Microsoft, dive headfirst into the complex dance between staying compliant and keeping genuinely secure. They explore why compliance often feels more like red tape than a roadmap—and why regulations sometimes lag painfully behind rapid tech advances like AI. From candid conversations about the evolving role (and accountability) of CISOs, to debates on whether compliance regulations actually boost security or just slow it down, this episode covers it all. They also unpack how smart CISOs can use compliance strategically to unlock budgets, navigate politics, and push real security improvements. Is compliance the security guardrail your organization needs, or just another hurdle to innovation? Can AI help balance compliance and cutting-edge defense? Listen as they share personal stories, reflections, and insights into transforming compliance from a dreaded checklist into a strategic advantage. Grab your favorite beverage, tune in, and discover how to turn compliance from an adversary into your cybersecurity ally—because protecting your organization shouldn’t feel like an endless game of regulatory whack-a-mole. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
4 months ago
55 minutes 27 seconds

Cyber After Hours
The Rise of Cybercrime as a Service and How to Combat It
Ever wonder why cybercrime feels like it has better customer service than your cable provider? You’re not alone! In this episode of Cyber After Hours—The Rise of Cybercrime as a Service and How to Combat It—Paul and Evan are joined by their guest, Rob Davis, SVP and Head of Digital Identity Services at Citizens, share an eye-opening (and occasionally jaw-dropping) look at how cybercriminals have turned hacking into a neatly packaged, subscription-based business model. Yes, cybercrime even has its own version of Amazon Prime—minus the taxes. Starting off with casual chat about hobbies like 3D printing, the conversation quickly shifts into serious territory, unpacking the disturbing economics behind cybercrime and why simply throwing money at the problem won’t solve it. Evan, Paul, and Rob explain how criminal syndicates operate like legitimate companies—complete with customer service departments, SLAs, and marketing strategies. But don’t despair just yet. They also dive into practical strategies businesses can use to disrupt these criminal networks, emphasizing proactive defense, innovative tools like AI-driven bots, and the importance of incident response over the illusion of perfect security. This episode highlights why cybersecurity resilience isn’t just about defense—it’s about understanding how attackers think and staying one step ahead. It’s a call to action for collective international efforts to dismantle cybercrime infrastructures and reduce their profitability. Tune in, grab your favorite beverage, and get ready to rethink cybersecurity—because protecting your business from cyber threats shouldn’t be harder than canceling a gym membership. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
4 months ago
50 minutes 34 seconds

Cyber After Hours
How to Secure Legacy Systems in a Modern World?
Ever wonder if those dusty legacy systems you’ve been ignoring are one breach away from disaster? In Episode 29 of Cyber After Hours—titled “How to Secure Legacy Systems in a Modern World?”—co-hosts Evan Morgan and Paul Marco dig into the tough questions around outdated tech. They talk about everything from finding the right work-life balance (and when it’s time to ask for help) to why “if you’re not learning or earning, it might be time to quit.” Along the way, they highlight how hiring the right people can supercharge a team and how shifting to modern platforms—like SaaS—can help you ditch the security risks of old systems. They also take a deeper look at the cultural hurdles that keep organizations from truly moving forward, reminding us that staying stuck on aging infrastructure can be just as costly as making the leap to new solutions. With Windows 10 hitting end of support soon, risk management is no longer an option; it’s a necessity. Throughout the episode, you’ll hear practical advice on communicating real-world risks to business leaders, plus candid insights on how to continuously manage—and mitigate—those risks. Tune in, join the conversation, and learn why legacy systems may not be worth the gamble in today’s fast-paced cybersecurity landscape. After all, if you’re not evolving, you might just be standing in the path of the next big threat. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
5 months ago
47 minutes 53 seconds

Cyber After Hours
Securing Remote Workforces: Lessons from the Pandemic
Ever felt like the pandemic was one massive, global disaster recovery test? You’re not alone. In this episode of Cyber After Hours—Securing Remote Workforces: Lessons from the Pandemic—Paul and Evan are joined by their guest, John Vigeant, Chief Executive Officer (CEO) of Login VSI, to dive into how the world of cybersecurity (and office life itself!) changed almost overnight. Starting with candid chats about the emotional roller coaster of pandemic-era decision-making, they quickly explore how remote work permanently shifted the way we think about hiring, collaboration, and trust. From rapid-fire adoption of video conferencing and cloud tech, to navigating tricky trust issues and management pitfalls (spoiler: micromanaging didn’t win anyone manager of the year), the duo reflects on why focusing on employee output—not just presence—became more important than ever. They also discuss how organizations struggled with cybersecurity investments, bouncing between overkill and bare-minimum approaches. And speaking of struggles, the episode highlights how essential flexibility, strategic team gatherings, and prioritizing employee well-being are for long-term loyalty and success. Whether you’re leading teams, navigating remote life, or securing your digital workspace, join Paul and Evan as they unpack valuable pandemic lessons with humor, honesty, and a dash of cyber wisdom. Pour a drink, settle in, and tune in to Cyber After Hours—where we turn tough lessons into valuable insights (and occasionally laugh at our own missteps). Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
5 months ago
53 minutes 36 seconds

Cyber After Hours
Zero Trust: Buzzword or Best Practice?
Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really takes to implement Zero Trust. From the importance of saying “no” to avoid burnout, to the need for continuous authentication and behavioral analysis, they explore why this framework (not a product!) might be your best bet for securing sensitive data. They also dig into the nuts and bolts of Role-Based Access Control (RBAC), revealing how even the best intentions can go off track without clearly defined roles. The conversation covers everything from complex government environments to the everyday challenges of managing who should—and shouldn’t—be a domain admin. Ultimately, they challenge listeners to think critically about whether Zero Trust is just another buzzword or a genuine best practice that can reshape our approach to security. Tune in, join the conversation, and decide for yourself if Zero Trust is the future of cybersecurity or just the latest industry catchphrase. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
5 months ago
1 hour 5 minutes 48 seconds

Cyber After Hours
Developing Cybersecurity Talent: Is Academia Keeping Up?
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett’s adventure of learning Python ”just because,” the conversation quickly turns to serious questions: Are certifications enough to bridge the gap between theory and practice? Can lifelong learning replace a degree? And how is AI changing the game for students and professionals alike? Paul and Evan explore the necessity for academia and industry collaboration, stressing why practical, hands-on skills often speak louder than diplomas. They also touch on ethical considerations—like how far is too far when padding your resume—and why mentorship and networking might be your greatest career accelerators. Whether you’re a seasoned pro, fresh graduate, or just cybersecurity-curious, grab your favorite beverage and tune in. You’ll laugh, learn, and maybe even reconsider your stance on degrees vs. experience. Join us for another insightful (and delightfully human) cybersecurity chat at Cyber After Hours—because staying relevant in cyber means never stopping the conversation. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
5 months ago
53 minutes 4 seconds

Cyber After Hours
Cybersecurity Budgeting: Where to Spend, Where to Save
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to Evan’s quest to match his energy, this lively conversation touches on the power of root cause analysis, the value of operationalizing what you already have, and why you should think twice before piling on more tech. They also highlight why it’s critical to define your use cases first—because buying every buzzy product out there won’t help if you don’t have the right processes in place. Whether you’re looking to optimize your existing toolset, stretch your budget further, or spark innovation by bringing diverse voices to the table, this episode is packed with entertaining anecdotes and practical insights. Just remember, it’s all for conversation, not official consultation. Tune in, join the discussion, and find out how to balance what you’re spending with what you’re truly getting. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
5 months ago
55 minutes 8 seconds

Cyber After Hours
Security in the DevOps Era: Balancing Speed and Safety
Ever feel like the faster you develop, the harder it gets to stay secure? You’re not alone—and you’re certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid development can feel like walking a tightrope, the trio explores why effective communication, celebrating small victories, and strong leadership support are crucial in keeping teams motivated and secure. Josh offers practical insights on overcoming friction in application development, discusses how Infrastructure as Code (IaC) is shaking things up, and explains why smaller teams might just have the advantage when implementing strict security measures. Together, they unpack the “shift-left” trend, emphasizing how culture, context, and the right tools can bridge the gap between developers and security teams. Because, let’s face it: security shouldn’t slow innovation—it should enable it. Whether you’re knee-deep in DevOps or just curious about building safer, faster development pipelines, join us for this honest (and sometimes hilarious) exploration into balancing speed with security. Tune in, grab your favorite drink, and enjoy the ride—because cybersecurity conversations should be human, engaging, and just a bit fun. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
6 months ago
44 minutes 37 seconds

Cyber After Hours
Do Hype Cycles Help or Hurt?
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry can sometimes feel like code words for confusion. From the promise of next-gen firewalls to the realities of cloud adoption costs and Zero Trust implementations, this episode challenges the gap between marketing buzz and actual results. Evan and Paul don’t just highlight what’s overhyped; they also explore the critical thinking needed to extract genuine value from emerging trends. By the end, you’ll walk away with fresh ideas on how to manage email overload, a clearer perspective on what’s real versus what’s hype in cybersecurity, and a reminder that true innovation should solve actual problems—not just invent new acronyms. Tune in, join the conversation, and decide for yourself whether hype cycles are the spark that ignites progress or simply another tech distraction! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
6 months ago
49 minutes 25 seconds

Cyber After Hours
Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Devin sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn’t just a nice-to-have anymore—it’s critical for lean teams trying to keep pace with the growing complexity of cyber threats. They also debate the real-world applications of SOAR, sharing tips on how to vet and test implementations effectively, avoid hidden cloud costs, and leverage behavioral analysis alongside AI integration. Plus, they chat about the surprising trend of organizations shifting back to on-prem solutions, and why cybersecurity is becoming increasingly accessible even for smaller teams. Is SOAR just a fancy feature, or is it the cornerstone of modern cybersecurity operations? Listen in as Evan, Paul, and Josh blend humor, candid experiences, and practical advice for navigating the evolving landscape of security tools. Pour yourself a drink, hit play, and join us for a spirited debate—because cybersecurity conversations shouldn’t be dull. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
6 months ago
58 minutes 55 seconds

Cyber After Hours
Why Endpoint Security is Your First Line of Defense
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotlight as the new perimeter? The duo digs deep into why endpoint detection and response (EDR) tools, while critical, can’t go it alone—and why defense-in-depth remains the gold standard for true cyber resilience. Beyond technical talk, Paul and Evan emphasize why collaboration beats competition in cybersecurity, highlighting how building a supportive network is essential not just for career growth, but for tackling the industry’s biggest challenges. They also dive into why businesses must truly understand their unique risks before throwing money at shiny security tools. Whether you’re an entrepreneur navigating the wild world of cybersecurity or simply curious about protecting your business better, grab a beverage and join Paul and Evan for an honest, insightful, and occasionally humorous discussion about the realities of endpoint security. Tune in to Cyber After Hours—where security talk stays human, helpful, and just the right amount of fun. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
6 months ago
47 minutes 9 seconds

Cyber After Hours
Data Privacy vs. Cybersecurity: Where Do They Intersect?
Ever feel numb when you hear about yet another data breach? You’re not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve’s impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led to consumer indifference—and why this needs to change. Steve sheds light on the blurry lines between data privacy and cybersecurity, highlighting why simply ”checking the compliance box” isn’t enough anymore. Together, they unpack critical questions: Are privacy regulations actually making a difference? Can organizations move from visibility to meaningful risk reduction? And why does innovation in security often lag behind the threats themselves? Along the way, they chat about how AI is shaking things up, why data integrity might soon overshadow confidentiality, and how ransomware underscores the importance of availability (because what’s privacy worth if your data’s locked away?). Whether you’re a cybersecurity pro or just privacy-curious, join us for an entertaining, eye-opening discussion on where security meets privacy—and why the future might be less about keeping secrets and more about building trustworthy communities. Grab a drink, settle in, and tune in to Cyber After Hours—because talking about privacy and security shouldn’t put you to sleep. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
7 months ago
53 minutes 45 seconds

Cyber After Hours
Cybersecurity Needs a Revolution, Not a Department of No
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the ”Department of No”—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get painted as the gatekeepers of “no.” They share how shifting the focus from risk avoidance to storytelling and context can make cybersecurity a business enabler instead of a blocker. We unpack real-world strategies for transforming security teams from risk-averse gatekeepers into innovative partners who say “yes”—strategically, of course! This episode is all about balancing caution with courage, technical skills with empathy, and leadership with collaboration. Whether you’re deep in the cybersecurity trenches or simply curious about building stronger, more positive security cultures, this episode offers humor, practical insights, and a fresh perspective on how to embrace the art of saying “yes.” Tune in, grab your favorite beverage, and join us for another engaging round at Cyber After Hours—because cybersecurity is best served with a side of humanity. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
7 months ago
50 minutes 44 seconds

Cyber After Hours
How Quantum Computers Will Change Cybersecurity Forever
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the noise—think SOC automation, but with purpose. Then the real fun begins: quantum computing. We dig into its impact on encryption, national security, and risk prediction—asking the big questions like, Can quantum AI predict the exact day of a breach? Or better yet, can it prevent one? But it’s not all theory—we stay grounded in practical reality. Edward breaks down why a fully autonomous SOC is still out of reach, and why the smartest play today is using AI to amplify, not replace, human analysts. As Paul puts it, ”The only limit right now is imagination.” Add in a few good-natured jabs about flip-flops vs. snow boots, some big questions about nation-state surveillance, and a surprising Star Trek tangent on quantum entanglement, and you’ve got a wild, thoughtful, and surprisingly human take on where cyber defense is headed. If you’ve ever wondered how to future-proof your security program in the face of exponential tech growth, this is your episode. Thanks for watching and listening! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
7 months ago
50 minutes 28 seconds

Cyber After Hours
Cybersecurity Regulations Are Coming—What You Need To Know
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often dominated by flashy tools and jargon. With a nod to Simon Sinek’s “Golden Circle,” they highlight the value of digging into motives, not just methods. In a relaxed, bar-like setting where unscripted humor mixes with expert know-how, you’ll get a front-row seat to the personal stories, thought-provoking questions, and spirited debates that make cybersecurity a truly people-centric endeavor. Ready for a fresh take on the next wave of cybersecurity regulation—and the perspectives shaping it? Tune in to Cyber After Hours, grab your favorite beverage, and join the conversation. This is where technology meets humanity, one lively discussion at a time. Thank you for watching / listening! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
7 months ago
52 minutes 3 seconds

Cyber After Hours
Why Passwords Will Never Be Secure
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity.  Think biometrics, physical keys, and the cutting-edge world of quantum computing—all in one candid conversation. But we don’t stop at the theoretical: we dig into practical insights, like how password managers (hello, YubiKey) and multi-factor authentication are making waves in industries like healthcare. We also tackle the cultural hurdles of adopting new security tech—because let’s face it, not everyone is as excited about password changes as we are. And yes, there’s a lighthearted detour about decaf coffee (trust us, it’s worth the laugh). Tune in to find out why continuous innovation in digital security is crucial, what the future might hold for your organization’s authentication methods, and how a little bit of humor can keep you sane in the ever-evolving world of cybersecurity. Join us for this lively deep dive—you won’t want to miss it! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/
Show more...
8 months ago
43 minutes 15 seconds

Cyber After Hours
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
Ever wish strategic planning felt more like a celebration and less like a chore?  In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection.  Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity.  AI models like DeepSeek take center stage, offering both enticing efficiencies and equally potent threats to data integrity and privacy.  We unravel how adversarial nations might exploit these innovations and discuss why there’s no room for shortcuts when security is on the line. Finally, we chart an exciting course into the realms of AI and quantum computing.  Think AI agents, RAG models, and quantum superposition—tech frontiers that promise to reshape our daily lives and radically enhance how we identify and manage risk.  Our chat brims with curiosity and awe, exploring the momentous possibilities that quantum breakthroughs may unlock.  If you’re even remotely curious about the future of cybersecurity (or just love a good adventure story), this is one episode you won’t want to miss.  Tune in now! Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/
Show more...
8 months ago
1 hour 6 minutes 39 seconds

Cyber After Hours
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.