
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 1 chart position in 1 market.
By chart position
- 🇳🇿NZ · Technology#188500 to 3K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
250 to 1.5K🎙 Weekly cadence·158 episodes·Last published 3w ago - Monthly Reach
Unique listeners across all episodes (30 days)
500 to 3K🇳🇿100% - Active Followers
Loyal subscribers who consistently listen
200 to 1.2K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 10 epsHost
Recent guests
Recent episodes
Episode 158: Episode 158: AI Is Increasing Your Cyber Risk – Can It Also Reduce It? With Mike Armistead
Apr 28, 2026
45m 13s
Episode 158: AI Is Increasing Your Cyber Risk – Can It Also Reduce It? With Mike Armistead
Apr 28, 2026
45m 13s
Episode 157: AI Security: Testing, Exploits, and Threat Feeds With Marco Figueroa
Apr 3, 2026
50m 13s
Episode 156: AI Security: Threat Modeling & Pipeline Evolution with Jason Rebholz
Feb 25, 2026
48m 52s
Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea
Dec 17, 2025
30m 16s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 4/28/26 | ![]() Episode 158: Episode 158: AI Is Increasing Your Cyber Risk – Can It Also Reduce It? With Mike Armistead✨ | AICybersecurity+3 | Mike Armistead | AICyber Risk | — | AICyber Risk+3 | — | 45m 13s | |
| 4/28/26 | ![]() Episode 158: AI Is Increasing Your Cyber Risk – Can It Also Reduce It? With Mike Armistead | No description provided. | 45m 13s | ||||||
| 4/3/26 | ![]() Episode 157: AI Security: Testing, Exploits, and Threat Feeds With Marco Figueroa✨ | AI SecurityTesting+3 | Marco Figueroa | — | — | AI SecurityCybersecurity+3 | — | 50m 13s | |
| 2/25/26 | ![]() Episode 156: AI Security: Threat Modeling & Pipeline Evolution with Jason Rebholz✨ | AI SecurityThreat Modeling+1 | Jason Rebholz | — | — | AI SecurityThreat Modeling+3 | — | 48m 52s | |
| 12/17/25 | ![]() Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea✨ | Incident ResponseCloud Security+3 | Matt Lea | Cloud Forward Organizations | — | incident responsecloud security+3 | — | 30m 16s | |
| 11/6/25 | ![]() Ep 154: How DORA Will Impact US Companies with Dejan Kosutic✨ | DORAUS Companies+3 | Dejan Kosutic | DORA | US | DORAUS Companies+3 | — | 33m 56s | |
| 9/22/25 | ![]() Ep 153: Inside ISO 42001: The Future of AI Governance with Danny Manimbo✨ | AI GovernanceISO Standards+3 | Danny Manimbo | ISO 42001AI Governance | — | ISO 42001AI Governance+5 | — | 40m 09s | |
| 8/12/25 | ![]() EP 152: Granular, Persistent, Zero Trust: The Case for File-Level Security✨ | Zero TrustFile-Level Security+3 | — | Zero TrustFile-Level Security | — | Zero TrustFile-Level Security+5 | — | 37m 18s | |
| 7/1/25 | ![]() EP 151: Trust, But Verify: How HITRUST is Reshaping Assurance✨ | HITRUST frameworkcybersecurity+4 | Chris Schaeffer | HITRUSTSOC 2+3 | — | HITRUSTcybersecurity+6 | — | 45m 29s | |
| 4/29/25 | ![]() Ep 150: Is OSCAL the Future of Security Documentation (& FedRAMP)?✨ | cyber risk managementOSCAL+4 | Kenny Scott | OSCALParamify+1 | — | OSCALFedRAMP+5 | — | 46m 47s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 3/6/25 | ![]() Ep 149: Unlocking the Future: Passkeys and Passwordless Authentication with Anna Pobletts✨ | passkeyspasswordless authentication+3 | Anna Pobletts | PasskeysPasswordless Authentication | — | passkeyspasswordless+5 | — | 40m 58s | |
| 2/11/25 | ![]() Episode 148: Cloud Detection & Response | In this episode, John Verry interviews Eric Gumanofsky, Vice President for Product Innovation at Tenable Security, about the concept of Cloud Detection and Response (CDR). They discuss the similarities and differences between CDR and Endpoint Detection and Response (EDR), as well as the integration of CDR into a comprehensive Cloud Native Application Protection (CNAP) solution. They also explore the challenges and benefits of automating response in the cloud and the importance of risk-based decision-making. The conversation highlights the evolving nature of the cloud security space and the need for organizations to stay informed and make informed decisions. | 37m 24s | ||||||
| 1/29/25 | ![]() Episode 147: Why vCISO Engagements Fail | In this episode, John Verry and Matt Webster discuss the evolving landscape of virtual CISO services, exploring the common pitfalls and failures associated with these projects. They emphasize the importance of clear expectations, the distinction between a virtual CISO and a virtual security team, and the necessity of executive buy-in for successful cybersecurity initiatives. The conversation also highlights the need for specialized expertise in various cybersecurity domains and the challenges of maintaining focus amidst tactical distractions. They explore the tactical challenges organizations face, the importance of redundancy in virtual CISO services, and how breaches can impact these engagements. The discussion emphasizes the need for cultural fit and industry-specific knowledge when hiring a virtual CISO, ensuring organizations can navigate the ever-evolving cybersecurity landscape effectively. | 59m 02s | ||||||
| 1/7/25 | ![]() Episode 146: Dark Web Monitoring | In this conversation, John Verry interviews Steph Shample, Cybercrime Analyst for DarkOwl, about the dark web and its implications for cybersecurity professionals. They discuss: The basics of the dark web, its purpose, and the types of activities that take place there. They also explore the value of darknet data for threat intelligence and how it can be used to understand and combat cyber threats. Cybersecurity professionals can benefit from understanding the dark web to gain insights into the tactics, techniques, and procedures used by threat actors. Additionally, they touch on the evolving nature of cyber attacks and the importance of sharing information within industry-specific groups and the role of tools like Dark Owl in proactively monitoring the dark web. | 47m 11s | ||||||
| 12/2/24 | ![]() Episode 145: CMMC: The Final Rule | In this episode of the Virtual See-So Podcast, host John Verry speaks with Sanjeev Verma, chairman and co-founder of Prevail, about the intricacies of CMMC compliance and the importance of cybersecurity. They discuss: The delays in CMMC implementation, key elements of the new regulation, and the importance of being prepared for compliance. The complexities of compliance with CMMC regulations, the importance of documentation, and the implications of using cloud services and VDI. They emphasize that compliance is an ongoing process requiring annual affirmation and that organizations must be proactive in their cybersecurity measures. T They highlight the necessity of flow down requirements and the role of encryption in protecting sensitive data. | 56m 38s | ||||||
| 10/17/24 | ![]() Episode 144: TxRAMP or StateRAMP or AZRAMP or FedRAMP? What’s right for your company? | In this episode of The Virtual CISO Podcast, your host John Verry is joined by Mike Craig to break down the differences between FedRAMP, TxRAMP, AZRAMP, and StateRAMP.Together, they discuss:How the Naoris Protocol establishes decentralized trust for compute endpoints. Key distinctions between the RAMP frameworks and how they impact an organization's path to Authorization to Operate (ATO).How Organizationally Defined Parameters (ODPs) shape the implementation of controls across different RAMPs.The impact of Federal Acquisition Regulations (FAR) on FedRAMP technical architecture and cost recovery.Why nearly 60% of FedRAMP projects fail, and how strategic planning can help companies avoid costly mistakes. And more!If you're considering federal cybersecurity compliance or just want to stay ahead in cloud security, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe for more insightful episodes. For updates on cybersecurity, digital technology, and more, follow us on LinkedIn: https://www.linkedin.com/company/pivot-point-security/ | 53m 20s | ||||||
| 9/23/24 | ![]() Episode 143: Is Decentralized Proof of Security Leveraging Blockchain the future of Cybersecurity? | In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography.How the Naoris Protocol establishes decentralized trust for compute endpoints. The importance of a decentralized security baseline for digital trust.Real-world applications in cyber insurance and regulatory compliance.The growing threat of quantum computing and the need for post-quantum security.And more!If you're considering federal cybersecurity compliance or just want to stay ahead in cloud security, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe for more insightful episodes. For updates on cybersecurity, digital technology, and more, follow us on LinkedIn: Pivot Point Security. | 49m 46s | ||||||
| 8/21/24 | ![]() Episode 142: CNAPP - Secure Cloud Apps in a Snap | No description provided. | 43m 06s | ||||||
| 7/11/24 | ![]() Episode 141: Stopping Business Email Compromise with a Novel Malicious File Reconstruction Approach | In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with Aviv Grafi, CTO and founder of Votiro, as they discuss innovative solutions to combat business email compromise. Join us as we discuss:The mechanisms of business email compromise How malicious files are used in cyberattacks The limitations of traditional security methods The benefits of malicious file reconstruction technologyAnd more! If you want to learn more about cybersecurity, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe to the Virtual CISO Podcast. For updates on cybersecurity, digital technology, and more, follow us on LinkedIn:https://www.linkedin.com/company/pivot-point-security/ | 38m 22s | ||||||
| 6/27/24 | ![]() Episode 140: DIB/CMMC Cybersecurity – Interesting Observations from a Significant Study | Join us for an engaging episode of the Virtual CISO Podcast with host John Verry. This episode features Chris Petersen, co-founder of LogRhythm and current CEO of Radical. Chris brings over two decades of experience in cybersecurity, offering deep insights into the industry's challenges and advancements. In this episode, we'll explore: - The surprising results from Radical’s DIB Cybersecurity Survey, including the incongruity between high self-assessed security skills and other survey responses. - The critical issue of poor scoping in System Security Plans (SSPs) and its impact on the effectiveness of security monitoring within the Defense Industrial Base (DIB). - The paradox of organizations delaying CMMC certification despite acknowledging the lengthy process and the looming enforcement deadline.If you want to learn more about cybersecurity, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe to the Virtual CISO Podcast. For updates on the state of cybersecurity, digital technology, and more, follow us on LinkedIn, https://www.linkedin.com/company/pivot-point-security/ | 47m 44s | ||||||
| 6/7/24 | ![]() Episode 139: How adding Crisis Management to your Incident Response Plan can save your bacon? | Join us for an engaging episode of the Virtual CISO Podcast with host John Verry. This episode features Kevin Dinino, President of KCD PR, who delves into the critical aspects of crisis management and communications. Kevin brings over 20 years of experience in guiding companies through the complexities of strategic communications, particularly in the cybersecurity, financial, and technology sectors. In this episode, we'll explore: The nuances of differentiating between an incident and a crisis, and how to handle the transition from one to the other.The essential components of a comprehensive crisis management plan and the importance of integrating cyber incident response with overall crisis communication strategies.Real-world examples of effective crisis communication, including the famous Tylenol recall and modern-day cyber incidents.The evolving landscape of cyber liability insurance and the role of PR firms in mitigating the reputational impact of security breaches. Insights into the latest federal disclosure requirements and their implications for incident and crisis management.If you want to learn more about cybersecurity, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe to the Virtual CISO Podcast. For updates on the state of cybersecurity, digital technology, and more, follow us on LinkedIn, / pivot-point-security . | 38m 53s | ||||||
| 5/16/24 | ![]() Episode 138: Is Consuming SaaS an Information Security Faustian Bargain? w/ William Eshagh | No description provided. | 44m 30s | ||||||
| 5/1/24 | ![]() Episode 137: Strategies and Insights w/ Sagi Brody | No description provided. | 30m 57s | ||||||
| 4/10/24 | ![]() Episode 136: AI Risk Management – Is ISO 42001 the Solution? w/ Ariel Allensworth | No description provided. | 52m 45s | ||||||
| 3/28/24 | ![]() Episode 135: Can Distributed Ledger Technology Simplify Privacy Compliance? W/ Zenobia Godschalk | In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Zenobia Godschalk, Senior Vice President of Hedera Hashgraph, as they discuss distributed ledger technology and its effects on privacy compliance. Join us as we discuss the following: The erosion of Privacy OnlineDistributed Ledger Technology (DLT) and how it enables Web 3How DLT can be used to improve security and compliance with Privacy regulationsIf you want to learn more about cybersecurity, follow The Virtual CISO Podcast on your favorite streaming platforms and subscribe to the Virtual CISO Podcast.For updates on the state of cybersecurity, digital technology, and more, follow us on LinkedIn: https://www.linkedin.com/company/pivot-point-security/ | 43m 06s | ||||||
Showing 25 of 159
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.




