PodcastsBusinessData Security Decoded

Data Security Decoded

Rubrik
Data Security Decoded
Latest episode

46 episodes

  • Data Security Decoded

    AI Moves Fast. Privacy Has to Move Faster.

    03/03/2026 | 25 mins.
    AI promises speed, scale, and efficiency—but it also magnifies privacy risk in ways many organizations aren’t prepared for. In this episode, Caleb Tolin welcomes Ojas Rege of OneTrust for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption.

    Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.

    The discussion dives deep into purpose limitation under GDPR and the EU AI Act, clarifying where organizations commonly misunderstand consent and where AI training introduces entirely new risks. Ojas emphasizes a simple but powerful test: are you using personal data for the same purpose you originally received consent for—or has AI quietly expanded that purpose?

    The conversation then shifts to cloud and data sovereignty, particularly for European organizations navigating geopolitical uncertainty. Ojas outlines why data mapping, prioritization, and software supply chain visibility matter more than ever—and why perfection is less realistic than smart prioritization.

    Ultimately, this episode reframes governance as an enabler. When privacy and data governance are embedded early, organizations can innovate faster, build lasting trust, and deploy AI with confidence in an increasingly complex global environment.

    What You’ll Learn


    Why AI scales privacy risk just as fast as business value


    How purpose limitation breaks down with general-purpose AI models


    When AI use requires new consent—and when it doesn’t


    Why transparency is foundational to long-term customer trust


    How data sovereignty concerns extend beyond cloud providers


    Where software supply chains create hidden privacy blind spots


    How good governance can accelerate, not block, AI deployment

    Episode Highlights


    [00:02:00] AI Scales the Good—and the Bad How AI accelerates both innovation and privacy harm.


    [00:04:00] Purpose Limitation Meets AI Reality Why general-purpose models challenge traditional consent frameworks.


    [00:06:30] Trust as a Business Risk Why transparency matters as much as legal compliance.


    [00:07:30] Cloud & Data Sovereignty Explained What European organizations can do today to reduce risk.


    [00:10:30] The Software Supply Chain Blind Spot Why third parties make sovereignty harder in the AI era.


    [00:12:30] Data as Economic Power How nations now view citizen data as an AI asset.

    [00:14:00] Governance That Enables Speed Why governing early helps organizations move faster later.
  • Data Security Decoded

    The Real Risks of Agentic AI in the Enterprise

    17/02/2026 | 27 mins.
    As enterprises race to adopt AI, many are discovering that traditional security models no longer hold. In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization.

    Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations., and why conditional access and governance must be foundational, not optional.

    The conversation also tackles ethical AI head-on. Camille argues that AI ethics and AI security are inseparable, and that removing humans from the loop introduces both legal and operational risk. From shadow AI to agent autonomy, she offers a clear-eyed framework for deploying AI systems that augment human teams rather than replace them.

    This episode is a practical guide for security leaders and learners navigating AI adoption, focused on resilience, trust, and long-term enterprise readiness.

    What You’ll Learn


    Why identity has become the dominant attack surface


    How AI agents and non-human identities increase risk


    Where EDR falls short in Identity-driven attacks


    Why AI ethics is foundational to AI security


    How governance enables secure AI deployment


    When AI should augment—not replace—security teams

    Episode Highlights

    [00:03:00] Cyber offense and the evolving national strategy

    [00:07:30] Identity eclipses malware as the primary threat

    [00:10:00] AI systems as high-value targets

    [00:12:30] Human judgment vs. automated response

    [00:14:00] The ethics–security connection

    [00:15:30] Why AI governance can’t be an afterthought
  • Data Security Decoded

    When Hacktivists Target Water Utilities: Inside a Russian-Aligned OT Attack

    03/02/2026 | 19 mins.
    Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, Daniel dos Santos, VP of Research at Forescout, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now.

    What You’ll Learn


    How honeypots can uncover real-world hacktivist tactics and behaviors


    Why exposed HMIs remain one of the weakest entry points in OT environments


    How Telegram has become a primary platform for hacktivist attack claims


    The evolving motivations behind Russian-aligned hacktivist groups


    Why visibility across all networked devices is critical to defense


    How opportunistic attacks differ from targeted nation-state operations


    Practical steps to avoid becoming “easy prey” for attackers

    Episode Highlights

    00:02:30 – How the Attack Was Discovered Spotting the honeypot activity through Telegram claims00:04:00 – The Entry Point Explained Default credentials and exposed HMIs00:06:45 – Hacktivist Motivation Shift From activism to geopolitics and profit00:10:50 – Why OT Attacks Are Hard to Eradicate Hidden devices and lateral movement

    00:14:20 – The Core Defensive Takeaway Don’t ignore opportunistic threats

    Episode Resources

    Forescout Research ReportsTelegram (hacktivist communications platform)Canadian Government OT Security Alert

    Shodan (internet-exposed asset scanning tool)
  • Data Security Decoded

    How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed

    20/01/2026 | 24 mins.
    AI is changing how malware is built—and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.

    What You’ll Learn


    How LLMs help analysts move from syntax-level review to intent-based malware analysis


    Why processing thousands of samples daily requires AI-assisted triage and clustering


    How attackers are abusing WSL and cloud-native environments to evade detection

    What AI-generated, dynamically delivered malware code means for traditional defenses


    Where LLMs excel—and where human validation remains essential

    Why resilience matters more than speed in AI-driven security operations

    Episode Highlights

    [00:00] AI-generated malware and shrinking attacker footprints

    [03:30] Why Rubrik Zero Labs built an LLM-driven malware analysis system

    [05:45] Scaling from 6,000 samples to 20 worth investigating[07:40] Extracting malware “business logic” before sending code to LLMs

    [10:05] Chameleon malware abusing Windows Subsystem for Linux

    [13:00] APT-linked Linux RATs and what sophistication signals intent

    [15:00] LLM hallucinations and the need for human verification

    Episode Resources


    Rubrik Zero Labs Research Reports
  • Data Security Decoded

    Ransomware, Remote Access, and the OT Reality Check

    06/01/2026 | 27 mins.
    In this episode of Data Security Decoded, Cybersecurity veteran Dawn Cappelli joins host Caleb Tolin to unpack the rapidly evolving threat landscape facing operational technology environments. With decades of experience spanning CERT, Rockwell Automation, and now Dragos, Dawn breaks down how geopolitical conflicts, empowered hacktivists, and ransomware are reshaping OT risk. She shares the five critical ICS controls every organization should prioritize and discusses why community-driven defense models are now essential for resilience. A must-listen for leaders responsible for critical infrastructure, manufacturing, and industrial cybersecurity.

    What you'll learn:

    How global conflicts have dissolved previous norms that protected critical infrastructure from cyber retaliation.

    Why hacktivist groups are becoming more dangerous — and how state actors quietly support them.

    The five highest-impact ICS security controls and where most organizations fail.

    Why OT environments remain decades behind IT security — and what leaders must immediately address.

    How ransomware operators target manufacturing and critical infrastructure for maximum leverage.

    The risks of insecure remote access and unmanaged third-party connections.

    How OT-CERT and community defense can uplift organizations with limited resources.

    Episode Highlights:

    00:00 – Opening + Guest Introduction Caleb introduces Dawn and frames her decades of OT and insider threat leadership.

    02:00 – Dawn’s Early Journey into OT and Security How nuclear engineering, the CDC bioterrorism portal, and 9/11 sparked her cybersecurity mission.

    05:00 – Founding the CERT Insider Threat Center Inside the origin story and its impact on insider risk theory.

    07:00 – Moving to Rockwell: The Hidden OT Backdoor Risk Why insider sabotage in OT environments was a turning point in her career.

    08:00 – The Geopolitical Shift in OT Threats How Russia–Ukraine changed everything about attacking critical infrastructure.

    10:00 – The Rise of State-Aligned Hacktivists Why groups like Cyber Avengers now have real disruption capability.

    13:00 – The SANS Five ICS Controls Dawn breaks down the controls that prevent and detect most attacks.

    17:00 – Ransomware Trends in OT Why manufacturing is a prime target and how attacks are evolving.

    19:00 – The Promise and Peril of Agentic AI in OT Why autonomous agents could cause catastrophic outcomes.

    21:00 – OT-CERT: Free Global Resources How Dragos is empowering organizations worldwide with practical support.

    Episode Resources:

    Information on OT-CERT: OT-CERT

    Register for OT-CERT: Register for Dragos OT-CERT | Dragos

    Information on Community Defense Program: Community Defense Program | Dragos

    Register for Community Defense Program: Register for Dragos Community Defense Program | Dragos

    SANS Five ICS Cybersecurity Critical Controls: The Five ICS Cybersecurity Critical Controls

More Business podcasts

About Data Security Decoded

Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.
Podcast website

Listen to Data Security Decoded, Aspire with Emma Grede and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Data Security Decoded: Podcasts in Family

Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/4/2026 - 10:00:04 PM