Show Notes
In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview the brilliant Dr. James Stanger, Chief Technology Evangelist at CompTIA and scuba diving aficionado. The episode is a kind of journey through time - touching on the past, present, and future of cybersecurity.
As the conversation begins, James looks to the past, sharing about himself and his background. He studied English Literature, worked as a technical editor and then writer, worked in education, and finally made his way to a position with CompTIA. All along, James demonstrated his propensity for combining aspects of his knowledge and experience, a propensity revealed most recently by the way in which his work for CompTIA merges education and cybersecurity. James’ background has an incredible evolution to it, and has set him up to be a well-rounded and knowledgeable addition to the cybersecurity field.
And his knowledge comes in handy, as much of James’s work involves answering client questions. James shares with Ron and Chris about current trends of questions he’s facing, as well as how he encourages agility in the face of emerging technology. Further, he explains the term, “ambient computing” and its tie to emerging tech, concluding that we are entering a hyper- or post-information age in which data is collected at an incredible rate. Data is in the air, captured, and processed, with massive stores of information about individuals available. This fact raises questions about how to ethically manage the data, and how to make sure it is used well. These questions, in turn, lead to considerations of business compliance, ramifications, and the like. As the conversation winds down, James shares areas of opportunity he sees in approaching cybersecurity from a business perspective, and explores ways in which he’d like to see the future of cybersecurity take shape - including an uptick in IT hiring, a stronger focus on implications, and more!
0:00 - Intro
1:41 - This episode features Dr. James Stanger, who begins by sharing about his background.
5:25 - What kinds of questions are companies and individuals asking these days?
8:04 - How is Dr. Stanger advising companies to pursue agility in light of emerging tech?
11:19 - What is ambient computing?
13:43 - The conversation turns to ethics, understanding of ramifications, and business compliance.
17:02 - What areas of opportunity does James see in approaching cybersecurity from a business perspective?
21:01 - James shares about what he wants the future of cybersecurity to look like.
Links:
Follow James Stanger on Twitter
Connect with James on LinkedIn
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Want to take the Introduction to EASY Framework Course with Ron and Chris? Take it for FREE here: www.hackervalley.com/easy
Recent Episodes
Hacking Trust with AI and Deepfakes featuring Iain Jackson
What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...
Championing the Human in Cybersecurity with Julie Haney
What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater ...
Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid ...
Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how ...
Transforming SOC Operations with AI featuring Roy Halevi
Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams ...
From Shadow IT to Full Asset Visibility with Wes Wright
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take ...
Building Opportunities for Women and Minorities in Cybersecurity ...
How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in ...
Rethinking Cybersecurity Hiring with Naomi Buckwalter
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, ...
AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter
In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, ...
How to Become a True Security Leader with Nathan Case
How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey ...
AI and the Future of Cyber Defense with John Hubbard
How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon.