The Security Detail Podcast: Exploring Cyber Threats Across Different Industries

Cybersecurity threats pose significant risks across various industries, with the potential to disrupt operations, compromise sensitive information, and inflict financial losses. SURGe, Splunk’s strategic security research team, is examining the cyber threat landscape across different industries in a new podcast series called The Security Detail. Every other week, co-hosts Audra Streetman and Kirsty Paine interview security experts about the top threats that they’re seeing in their particular vertical. The episodes will encompass industries including healthcare, education, manufacturing, the technology sector, retail and hospitality, finance, utilities, telecommunications, and the public sector. We’ll continue to update this page as new episodes are released.

Season 3

Episode 5: Browser Security with Fletcher Oliver, Chrome Browser Customer Engineer

Browser security is crucial for protecting personal information and preventing malicious attacks, ensuring safe and private online experiences. In Episode 5 of The Security Detail, Chrome browser customer engineer Fletcher Oliver shares some of the top browser security risks and how to defend against them. We also discuss SURGe research that examines security risks associated with Chrome browser extensions.

This episode is now available on streaming platforms:

Episode 4: Application Security with Tanya Janca, Head of Community and Education at Semgrep

Application security is crucial for protecting sensitive data and ensuring the integrity and trustworthiness of software systems against cyber threats. In this episode, Tanya Janca, head of community and education at Semgrep discusses the importance of “shifting left” in the software development lifecycle, along with the best and worst practices in DevSecOps.

This episode is now available on streaming platforms:

Episode 3: International Law and Cyber Operations with François Delerue, Assistant Professor of Law at IE University

In episode 3 of The Security Detail, François Delerue, Assistant Professor of Law at IE University, discusses the application of international law to cyber operations, including the challenges with attribution and the threshold for cyberwarfare.

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Listen on Podbean

Episode 2: LLM Research and CISO Liability with Liz Wharton, founder of Silver Key Strategies

In episode 2 of The Security Detail, Liz Wharton, attorney and founder of Silver Key Strategies, discusses her research on using large language models (LLMs) to analyze SEC 8-K filings and other public reporting to gain cybersecurity insights. The interview also covers the heightened liability security executives face when reporting material incidents to the US Securities and Exchange Commission (SEC).

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Listen on Podbean

Episode 1: Veterans in Cybersecurity with Tom Marsland, board chair of VetSec

In episode 1 of Season 3 of The Security Detail, Tom Marsland, board chair of VetSec, explains how the non-profit helps veterans and transitioning military members find employment in the industry.

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Listen on Podbean

Season 2

Episode 1: Tour of Cyber Coalition 2023, NATO’s flagship cyber defense exercise

Season 2 of The Security Detail kicks off with an inside look at Cyber Coalition 2023, NATO's flagship cyber defense exercise. Audra Streetman traveled to Tallinn, Estonia to tour the exercise and interview creators and participants about the knowledge and collaboration needed to defend the Alliance from cyber threats.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 2: Water with CISA's Amy Thomas, cyber risk analyst and Noah Powers, RVA program lead, penetration testing capabilities

Water treatment facilities are part of the critical infrastructure that supports essential services. A cyberattack on these facilities could disrupt the supply of clean water, leading to severe consequences for public health, safety, and the economy. In this episode, two representatives from the US Cybersecurity and Infrastructure Security Agency, or CISA, share strategies to defend the water sector from cyberattacks. They also provide an update on CISA's investigation into an Iranian-linked campaign targeting Israeli-made Programmable Logic Controllers (PLCs) at a number of US water utilities.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Episode 3: Media with Runa Sandvik, security researcher and founder of Granitt

Cybersecurity is crucial for journalists and newsrooms to safeguard sensitive information, protect sources, and ensure the integrity of their reporting in an increasingly digital and interconnected media landscape. Episode 3 of The Security Detail features an interview with Runa Sandvik, a security researcher and founder of Granitt, a consulting firm that focuses on digital security for journalists and other at-risk people.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 4: Elections with Marci Andino, senior director, Election Infrastructure Information Sharing and Analysis Center (EI-ISAC)

In this episode of The Security Detail, we explore the complex domain of election cybersecurity with Marci Andino, senior director of the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). From international interference threats to localized phishing attacks, discover the varied challenges election offices face and the strategies deployed to safeguard the integrity of electoral processes.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 5: Food and Agriculture with Jonathan Braley, director of the Food and Ag-ISAC

The food and agriculture industry is a critical sector that represents nearly a fifth of US economic activity. Businesses in this sector also rely on other important industries such as water, transportation, and energy. In this episode, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry, as well as the various services offered through the ISAC.

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Download

Episode 6: Electric featuring Robert M. Lee, CEO and Co-Founder of Dragos

Cybersecurity is crucial for the electric sector to safeguard critical infrastructure from cyber threats and potential disruptions, ensuring the reliable and secure delivery of electricity to homes, businesses, and essential services. In episode 6, Robert M. Lee, CEO and Co-Founder of Dragos provides an overview of the top cyber threats facing electric utilities and the role that Dragos plays in strengthening ICS and OT resilience.

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Download

Episode 7: MITRE ATT&CK framework featuring Adam Pennington, MITRE ATT&CK Lead

The MITRE ATT&CK framework provides a standardized taxonomy and knowledge base of adversary tactics, techniques, and procedures (TTPs), enabling organizations to enhance threat detection, response, and mitigation strategies effectively. In this episode, Adam Pennington tells us about the origins of the ATT&CK project, how organizations can effectively leverage it, and the journey that led Adam to his current role as the project's leader.

This episode is now available on streaming platforms:

- Listen on Apple - Listen on Spotify - Download

Episode 8: Emerging Technology Predictions from Past Guests

In this episode, hear from past interview guests about their predictions for emerging technology, like artificial intelligence and quantum computing.

This episode is now available on streaming platforms:

- Listen on Apple

- Listen on Spotify

- Download

Episode 9: Top Cybersecurity Skills According to Past Guests

In episode 9 of The Security Detail, hear from past interview guests about what they consider to be the most important cybersecurity skill for future practitioners.

This episode is now available on streaming platforms:

- Listen on Apple

- Listen on Spotify

- Download

Season 1

Episode 1: The Public Sector with Paul Kurtz

As Splunk’s Chief Cybersecurity Advisor, Paul Kurtz is well-versed in today’s cyber threat landscape. In this episode, Kurtz shares lessons learned from his cybersecurity career, which began in the early 1990s in the US government, where he served at the White House on the National Security Council and Homeland Security Council.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 2: Telecommunications with Ian Keller

The telecommunications industry is responsible for our modern communications, including internet service providers, cable companies, and mobile operators. In this episode, cybersecurity advisor and ex-CISO Ian Keller explains why this sector is such an attractive target for state-sponsored adversaries along with his advice for CISOs.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 3: Manufacturing with Tim Chase

The manufacturing sector faces targeted attacks on critical infrastructure, including supply chain attacks and industrial espionage, which can lead to production disruptions and intellectual property theft. In this episode, Tim Chase, program director at the Global Resilience Federation (GRF), shares threat trends he’s observed from his leadership of the manufacturing ISAC.

This episode is now available on streaming platforms:

* Listen on Spotify * Listen on Apple * Download

Episode 4: The Public Sector featuring Dan Tripovich

In this episode, we take a look at the cyber threat landscape for the public sector from an Australian perspective. Featuring Dan Tripovich, the Assistant Director-General Standards, Technical Advice and Research (STAR) within the Australian Signals Directorate’s Australian Cyber Security Centre Group. STAR Branch delivers ACSC’s flagship publications, including the Australian Government Information Security Manual, the Essential Eight and Protective Cyber Security guidance to the Australian public. Dan is also responsible for the delivery of the ACSC’s Research, International Standards and Technical Advice capabilities to support the secure operation of Critical, Emerging and Operational Technologies.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 5: Healthcare with Zach Nelson

The healthcare industry is vulnerable to cyber threats, as cybercriminals target medical records, personal information, and connected medical devices, potentially endangering patient safety. In this episode, Zach Nelson shares the top cyber threats he’s seeing as the assistant VP of the Health ISAC’s Threat Operations Center.

- Listen on Spotify - Listen on Apple - Download

Episode 6: Retail and Hospitality with Suzie Squier

The retail industry confronts threats like ransomware and data breaches, which jeopardize customer payment details and erode consumer trust. In this episode, Suzie Squier, president of the Retail and Hospitality ISAC, shares intelligence findings for the top cyber threats facing the sector.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 7: Financial Services with Paul Trueman

In the financial sector, banks and investment firms face constant threats such as phishing attacks, ransomware, and identity theft, putting customer data and financial assets at risk. In this episode, Paul Trueman, the Executive Vice President of Segments in Cyber and Intelligence at Mastercard, share insights from his extensive experience in the industry and provides advice on navigating challenges.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 8: The Technology Sector with Sean Heide

The technology sector itself must grapple with data breaches, software vulnerabilities, and malicious insider threats that can compromise sensitive information and undermine digital infrastructure. In this episode, Sean Heide, Technical Research Director at the Cloud Security Alliance explores the top cloud security threats facing organizations today.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 9: Education with Brett Callow

The education sector is increasingly targeted by ransomware operators, jeopardizing the confidentiality, integrity, and availability of sensitive student and staff information. In this episode, Brett Callow, Threat Analyst at Emsisoft discusses the top security challenges facing K-12 schools and higher education.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple - Download

Episode 10: Aviation with Richard Waine

Cybersecurity in aviation is paramount as it safeguards critical systems, ensuring the safety of passengers and the integrity of flight operations. In this episode, Richard Waine, head of SecOps at easyJet, discusses the aviation cyber threat landscape and how easyJet is tackling a range of technical and policy issues.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Episode 11: Geopolitics with Dmitri Alperovitch

Cybersecurity has become a critical element in geopolitics, shaping international relations as nations grapple with the challenges of protecting their digital infrastructures and safeguarding national security in an interconnected world. In this episode, Dmitri Alperovitch, Executive Chairman at Silverado Policy Accelerator, discusses the intersection between cybersecurity and geopolitics and the evolving role of cyber in modern conflict.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Episode 12: Defence with Luke O’Brien

Cybersecurity is crucial for the defence industry as it safeguards sensitive information, intellectual property, and critical infrastructure from cyber threats, ensuring the integrity and resilience of military technologies. In this episode, Luke O’Brien, NATO's principal engineer for cyber defence explains NATO’s unique approach to cybersecurity.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Episode 13: Energy with Joe Slowik

Cybersecurity in the energy sector is crucial for safeguarding critical infrastructure, preventing potential disruptions to power grids, and mitigating the risk of cyberattacks that could have severe economic, environmental, and societal consequences. In this episode, Joe Slowik, threat intelligence manager at Huntress, discusses the top cyber threats to the energy sector.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Episode 14: Cybersecurity Career Advice from Past Interview Guests

Wrapping up Season 1 of The Security Detail, episode 14 features interviews with a number of past guests about the best advice they've received in their career along with the failures they've learned the most from.

This episode is now available on streaming platforms:

- Listen on Spotify - Listen on Apple Music - Download

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.