Cyber After Hours

By: Evan & Paul
  • Summary

  • Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and [Your Name] bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
    © 2025 Cyber After Hours
    Show more Show less
Episodes
  • S1 E14 - Should Governments Make It Illegal To Pay Cyber Extortion Demands?
    Feb 25 2025

    Ever wonder what would happen if paying cyber ransom demands was flat-out illegal?

    In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that.

    Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation.

    We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax.

    We dig into the controversial issue of banning ransomware payments, asking if companies should be forced to fend off attackers without cutting that check.

    Real-world experiences and high-profile cases reveal the dangers of flawed decryption keys, repeated attacks, and the temptation to rely on quick fixes instead of building stronger defenses.

    Ross’s entrepreneurial insights show why cybersecurity investments might be a better bet than gambling on a criminal’s word.

    We also explore how government incentives and cyber insurance could reshape security strategies, pushing organizations to harden their defenses rather than pay their way out of trouble.

    The parallels between cybersecurity and healthcare come into focus, highlighting why threat visibility and information sharing are so crucial.

    Throughout the episode, we touch on the often-overlooked risks in operational technology and celebrate the growing influence of Chief Information Security Officers.

    Their leadership—and the rise of trusted information-sharing networks—could spell a more secure future.

    But it’s a team effort: everyone from executives to engineers plays a role in making it happen.

    Join us for an engaging discussion that blends humor, entrepreneurship, and real talk about the crossroads of innovation and cybersecurity.

    Tune in to Cyber After Hours to see how these stories and perspectives might just shape the way we tackle cyber threats moving forward.

    Ever wonder how facial hair fundraisers and cybersecurity connect?

    In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.

    From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.

    We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.

    We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.

    Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.

    Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.

    Tune in, join the conversation, and learn how to fortify your defenses against the unknown!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    1 hr and 10 mins
  • S1 E13 - The Role of AI in Offensive Cybersecurity
    Feb 22 2025

    AI: The Ultimate Hacker or Cybersecurity’s Best Ally?

    In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys?

    AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before.

    Financial services and other regulated industries are left wondering:

    - Can they afford to stick with the status quo?

    - And what happens when AI starts battling itself?

    - How far off is a world where autonomous AI defends against AI-driven attacks?

    Spoiler: There’s an Irish whiskey bet riding on this one.

    Of course, it wouldn’t be Cyber After Hours without a few detours—like our take on Microsoft’s latest strong-arming tactics with Outlook (seriously, who asked for this?).

    Plus, we get personal about the entrepreneurial grind and the unexpected lessons that come with it.

    So, grab a drink, tune in, and let’s talk about the future of offensive AI in cybersecurity—because ready or not, it’s already here.

    Ever wonder how facial hair fundraisers and cybersecurity connect?

    In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.

    From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.

    We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.

    We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.

    Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.

    Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.

    Tune in, join the conversation, and learn how to fortify your defenses against the unknown!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    57 mins
  • S1 E12 - What Cybersecurity Lessons Can We Learn From Recent Breaches?
    Feb 22 2025

    Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies?

    In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub.

    Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity.

    We dig into big-picture lessons from some high-profile breaches, exploring how data sprawl, the jump from on-prem to cloud, and the rise of AI have completely changed the security game.

    Omri also highlights the balance between unleashing innovation and staying compliant, reminding us how quickly tech advances—and how our defenses have to keep up.

    Our final deep dive zeroes in on why cybersecurity education and clear-eyed leadership matter so much.

    Whether you’re in the C-suite or managing front-line systems, Omri shares practical tips to make security everyone’s job.

    We wrap up with a pragmatic look at risk management—ultimately, it’s about dialing up your defenses just enough to keep the bad actors at bay without stifling the business you’re trying to protect.

    Join us for a conversation that blends lighthearted conference antics with serious intel on staying a step ahead of emerging threats.

    If you’re ready to sharpen your security know-how and pick up a few swag-hunting tips along the way, this episode is a must-listen.

    Enjoy the show and let us know your favorite takeaway!

    Thank you for watching / listening!

    Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    47 mins

What listeners say about Cyber After Hours

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.