PodcastsBusinessThe Entropy Podcast

The Entropy Podcast

Francis Gorman
The Entropy Podcast
Latest episode

56 episodes

  • The Entropy Podcast

    Smarter Cyber Strategy with Leonard McAuliffe

    11/05/2026 | 40 mins.
    This episode focuses on what real cyber strategy looks like versus the outdated “framework + gap analysis” approach. Leonard McAuliffe PWC explains that most organizations confuse activity with strategy focusing on compliance, maturity scores, and annual plans instead of aligning cybersecurity to actual business risk.
    The conversation reframes cyber strategy as a business-aligned, risk-driven, continuously evolving discipline. It emphasizes understanding stakeholder priorities, mapping real threats to controls, and treating strategy as a living system that adapts to AI, geopolitics, and changing attack surfaces.
    Takeaways:
    1. Most “Cyber Strategies” Aren’t Strategies
     They’re annual roadmaps or compliance exercises 
     Built around frameworks (NIST, ISO) instead of business risk 
     Improve maturity—but don’t necessarily reduce real risk 
    2. Strategy Must Start With the Business
     Engage CEO, CFO, CIO, CRO—not just security teams 
     Understand risk appetite and critical processes 
     Align to IT, digital, and AI strategies 
    3. Focus on Risk → Threats → Controls (Not Maturity Scores)
     Define key cyber risks (e.g., business disruption) 
     Map threat scenarios (e.g., ransomware via phishing) 
     Link to controls and measure effectiveness 
    4. Strategy is a Living System
     Must evolve with:  AI 
     Threat intelligence 
     Regulatory changes 
     Business shifts 

    5. Prioritization = Risk + Cost Trade-Off
     You can’t do everything 
     Decisions must be explicit:  What risk are we accepting? 
     What exposure remains? 

    6. Regulation Shouldn’t Drive Strategy
     Constantly reacting to new regs derails focus 
     Instead:  Build a strong master control framework 
     Map regulations onto it 

    Soundbites: 
     “Most cyber strategies look good on paper but don’t manage real risk.” 
     “You’re improving maturity, not reducing risk.” 
     “Cyber can’t operate in a bubble it has to enable the business.” 
     “If you don’t fund it, you’re accepting the risk. It’s that simple.” 
     “Boards don’t care about maturity levels they care about real threats.”
  • The Entropy Podcast

    How to Recruit a President with Glenn Carle

    04/05/2026 | 50 mins.
    In this episode of The Entropy Podcast, Glenn Carle a former CIA clandestine officer with over two decades of experience breaks down how intelligence agencies think, operate, and influence outcomes over the long term.
    Drawing on real-world tradecraft, Glenn explains how vulnerabilities are identified, how influence is cultivated, and how narratives are seeded and amplified over time. The conversation explores the growing tension between intelligence institutions and political power, the risks facing democratic systems, and how modern geopolitics is increasingly shaped by information warfare and perception management.
    The discussion also ventures into controversial territory examining the possibility of long-term influence operations at the highest levels of power while highlighting the difference between evidence, interpretation, and hypothesis.
    This is a conversation about how power actually works beneath the surface and what happens when institutions designed to protect truth are put under pressure.
    Takeaways:
    Intelligence is about patterns, not events
    Influence is often long-term and indirect
    Vulnerability ≠ control
    Institutions are under pressure
    Information warfare shapes reality
    The line between analysis and speculation matters
    SoundBytes:
    “In intelligence, there are no coincidences only patterns you haven’t understood yet.”
    “You don’t recruit someone in a moment you shape them over time.”
    “Every strength can become a vulnerability in the right context.”
    “If telling the truth costs you your job, the system stops working.”
    “You don’t need the truth you need enough repetition to make something feel true.”
    “The most effective operations are the ones no one notices—until it’s too late.”
    “Understanding how something could happen is not the same as proving that it did.”
    This conversation explores complex and often controversial geopolitical themes from the perspective of a former intelligence officer. Some views expressed particularly around long-term intelligence operations and political influence reflect interpretation and professional judgement rather than independently verified public conclusions. Listeners are encouraged to engage critically and consult additional sources where appropriate.
  • The Entropy Podcast

    One Click to Collapse: The SME Risk with Robert Maxwell

    27/04/2026 | 32 mins.
    In this episode of the Entropy Podcast, Robert Maxwell (CEO of TGT Solutions) reframes cybersecurity from a technical concern into a core business risk especially for small and medium-sized enterprises (SMEs).
    He argues that cyber threats are fundamentally about cash, trust, and continuity, not just systems. A single compromised credential or phishing attack can dismantle years of work in minutes, particularly in SMEs where operations often depend on one person, one account, or one set of credentials. 
    Maxwell introduces a key mindset shift: cybersecurity is an investment, not an expense. Like building a portfolio, incremental and consistent investment in cyber resilience pays dividends protecting revenue, relationships, and long-term business viability. 
    The conversation also explores human vulnerability as the dominant attack vector, the risks introduced by AI adoption, and why attackers prioritize ease over sophistication. Ultimately, the episode highlights a stark reality: it’s no longer “if” a business is attacked, but “when” and how prepared it is when that moment comes.
    Key Takeaways:
    1. Cyber is now a business problem, not an IT problem
    It directly impacts cashflow, supplier relationships, and customer trust—not just systems.
    2. SMEs are disproportionately vulnerable
    Reliance on single accounts, single individuals, and weak password practices creates critical single points of failure.
    3. Attackers prioritize ease, not scale or sophistication
    The simplest entry point—often human—is the most exploited.
    4. “Too small to hack” is a dangerous myth
    Smaller firms are often easier targets and valuable entry points into supply chains.
    5. Cybersecurity must be treated as an investment
    Incremental improvements (policies, training, redundancy) generate long-term “dividends” in resilience.
    6. Human behavior is the biggest risk surface
    Phishing, credential reuse, and lack of policy enforcement remain dominant vulnerabilities.
    7. AI is amplifying exposure
    Organizations are unintentionally leaking sensitive data through unmanaged AI usage.
    8. External validation is critical
    Internal reviews often miss risks—independent assessments reveal blind spots.
    9. Banks and institutions are shifting liability
    Poor cyber hygiene increasingly results in unrecoverable financial loss.
    10. Timing matters
    Fixing issues after a breach is exponentially more expensive than proactive investment.
    Soundbites:
     “Cyber isn’t a technical issue anymore—it’s about cash.” 
     “You can lose trust, cash, and credibility in under a minute.” 
     “It’s not ‘if’ you get attacked—it’s ‘when’ and ‘how much they take.’” 
     “One person, one password, one account—that’s all it takes.” 
     “Attackers don’t look for the biggest target—they look for the easiest one.” 
     “We were too busy… until we got hacked.” 
     “Cybersecurity isn’t an expense. It’s an investment that pays dividends.” 
     “The password they stole six months ago? It still works—that’s the problem.” 
     “AI is making companies more vulnerable—and they don’t even realize it.” 
     “You’re building a business for generations—cyber can erase it in minutes.”
    You can learn more about TGT solutions from their website: https://www.tgtsolutions.com/
  • The Entropy Podcast

    You Can’t Delete This: Inside Digital Forensics with Jason Jordaan

    15/04/2026 | 46 mins.
    In this episode of The Entropy Podcast, host Francis Gorman speaks with Jason Jordan about the reality of digital forensics, cybercrime investigations, and the evolving role of AI in evidence and incident response. 
    Jason shares his journey from police detective to global forensic expert, unpacking how modern investigations work from reconstructing deleted data to testifying in court. The conversation dives into why AI can’t be blindly trusted in legal contexts, how digital footprints are nearly impossible to erase, and the psychological toll of confronting the worst of human behavior in cybercrime.
    Key Takeaways
    Digital forensics is still built on fundamentals
    Despite AI and automation, everything comes back to understanding data structures at a low level. 
    AI is powerful but dangerous in legal settings
    If you can’t explain how an output was produced, it won’t stand up in court. 
    You can’t truly hide in the digital world
    Like physical forensics, digital interactions always leave trace evidence. 
    Incident response ≠ forensic investigation
    One stops the attack; the other explains how and why it happened. 
    Human error is often the weakest link
    Many breaches aren’t technical failures they’re failures in monitoring or behavior. 
    Bias is controlled through process, not perfection
    Documentation, peer review, and validation are critical to staying objective. 
    Cybercrime is increasingly sophisticated and organized
    Attacks now involve long-term planning, insider access, and complex technical setups. 
    The job comes with real psychological cost
    Exposure to extreme content and consequences requires resilience and support systems. 
    Passion and curiosity are essential
    This field isn’t just technical—it’s investigative, relentless, and deeply demanding. 
    Soundbites
     “In forensics, if you can’t explain it—you can’t use it.” 
     “AI can’t testify in court. A human has to.” 
     “You don’t stop being a forensic scientist—it’s who you are.” 
     “Every interaction leaves a trace—digital or physical.” 
     “We don’t just catch bad guys—we make sure it’s the right one.” 
     “Pull the plug or preserve evidence? That’s the real-world trade-off.” 
     “Cybercrime today is organized, patient, and highly engineered.” 
     “You only get to make one big mistake in this field.” 
     “If you love puzzles, this is the ultimate career.”
  • The Entropy Podcast

    The Identity Trap with Shelly Bernard

    14/04/2026 | 36 mins.
    In this episode of The Entropy Podcast, host Francis Gorman speaks with Shelly Bernard about how identity, cognitive wiring, and environment shape high performers particularly those transitioning from elite military and intelligence careers. 
    They explore why many struggle after leaving high-performance environments, how ego and identity can limit growth, and why emotional intelligence is becoming a critical advantage in modern domains like cybersecurity and cognitive warfare. The conversation ultimately reframes performance as a matter of alignment between how you think and where you operate.
    Key Takeaways
    Identity is often borrowed from environment
    High performance = alignment
    Ego limits adaptability
    Different brains, different strengths
    Emotional intelligence is undervalued but critical
    Environment shapes behavior over time
    Cognitive warfare is reshaping conflict 
    Unmet needs drive unintended behavior
     
    Soundbites
     “High performance isn’t just skill it’s alignment.” 
     “Ego protects identity, but it blocks growth.” 
     “Emotion isn’t a liability it’s a strategic tool.” 
     “The battlefield is shifting from physical to cognitive.” 
     “People don’t struggle because they’re incapable they’re misaligned.” 
     “If your environment doesn’t fit your wiring, something will break.” 
     “Always ask: why?” 
    Follow The Other Side Podcast:
    YouTube: https://youtu.be/wUDFU0EPt-g?si=b1dslirwAY6b4XMX

    Spotify: https://open.spotify.com/show/4YJpBVrhDmvUnYCviliFG3?si=d3fWtscXTEytPa2Ge4myCA

More Business podcasts

About The Entropy Podcast

Hosted by Francis Gorman, The Entropy Podcast brings together intelligence community veterans, post-quantum cryptography pioneers, CISOs, business leaders, and frontline practitioners for unfiltered conversations on the threats, complexity, and geopolitics shaping our world.Past guests include former senior CIA officers, leading cryptographers, digital forensics experts, and security and technology leaders from across financial services, critical infrastructure, and government, voices rarely heard together in one place.Each episode goes beyond headlines to explore how cyber risk, emerging technology, and geopolitical instability are reshaping the way organisations operate, compete, and defend themselves. Expect candid insight on quantum risk, nation-state threats, AI, espionage, financial crime, business resilience, and the human dimensions of leadership.Designed for CISOs, board members, founders, technologists, policy thinkers, and the professionally curious, Entropy sits at the intersection of business, technology, and cybersecurity a space for genuine conversations with unique minds, the kind that don’t fit neatly into a press release.The name Entropy reflects the growing complexity and unpredictability of the systems we depend on, and the discipline required to lead through them.Disclaimer: The views and opinions expressed on The Entropy Podcast are those of the host and guests in their personal capacity and do not represent the views, positions, or policies of their respective employers, affiliated organisations, or any government body. Guest appearances do not constitute endorsement by the host, and the host’s commentary does not constitute endorsement of guests’ views. Content is provided for informational and educational purposes only and does not constitute professional, legal, financial, or security advice.Buy Our Swag:We now have some slick new swag you can purchase through our Esty store.https://theentropypodcast.etsy.com Watch and SubscribeYou can also watch full episodes and exclusive content on our YouTube channel:www.youtube.com/@TheEntropyPodcastAchievementsThe Entropy Podcast delivered strong chart performance throughout 2025, demonstrating consistent international reach and listener engagement.Regularly ranked within the Top 20 Technology podcasts in Ireland.Achieved a Top 25 placement in the United States Technology charts, holding the position for one week.Charted internationally across multiple markets, including Israel, Belgium, and the United Kingdom.This performance reflects sustained global interest and growing recognition across key podcast markets.Audio Quality NoticeSome episodes may feature minor variations in audio quality due to remote recording environments and external factors. We continuously strive to deliver the highest possible audio standards and appreciate your understanding.
Podcast website

Listen to The Entropy Podcast, The Story of Money and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features