Cyber After Hours

Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. No filters, no tedious corporate jargon. You get genuine insights, war stories, and candid opinions born from years of running world-class cyber programs. Cheers to Learning Like a proper after-hours hangout, there’s usually a tasty beverage involved—think a Woodford Old Fashioned or something equally classy (or not). Expect a casual vibe, some laughs, and the occasional strong opinion… the kind usually reserved for off-the-clock chats. Heads-Up for Sensitive Ears These conversations are as real as they get, which means adult language can make an appearance. If that’s not your cup of tea, consider yourself warned! Episode Length & Structure Episodes typically run between 25 to 55 minutes—long enough to dive deep into complex cybersecurity issues, but short enough to fit into your commute or wind-down routine. Join us on Cyber After Hours to hear about the triumphs, the fails, and all the wisdom we’ve gained from building enterprise cybersecurity programs in highly regulated environments. Grab a drink, settle in, and let’s talk cyber the way it’s meant to be discussed—totally unscripted.
Episodes
Episodes



Tuesday Apr 01, 2025
Cybersecurity Needs a Revolution, Not a Department of No
Tuesday Apr 01, 2025
Tuesday Apr 01, 2025
Ever felt like cybersecurity is always the team that says “no” to everything?
Well, it’s time to change that narrative.
In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises.
But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins.
Through candid personal stories, Paul and Evan tackle why security teams often get painted as the gatekeepers of “no.”
They share how shifting the focus from risk avoidance to storytelling and context can make cybersecurity a business enabler instead of a blocker.
We unpack real-world strategies for transforming security teams from risk-averse gatekeepers into innovative partners who say “yes”—strategically, of course!
This episode is all about balancing caution with courage, technical skills with empathy, and leadership with collaboration.
Whether you’re deep in the cybersecurity trenches or simply curious about building stronger, more positive security cultures, this episode offers humor, practical insights, and a fresh perspective on how to embrace the art of saying “yes.”
Tune in, grab your favorite beverage, and join us for another engaging round at Cyber After Hours—because cybersecurity is best served with a side of humanity.
Connect with us on LinkedIn:
Evan: https://www.linkedin.com/in/evanmorgan/
Paul: https://www.linkedin.com/in/pm01/



Tuesday Mar 25, 2025
How Quantum Computers Will Change Cybersecurity Forever
Tuesday Mar 25, 2025
Tuesday Mar 25, 2025
What happens when AI meets quantum computing in the heart of your SOC?
In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead.
From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity.
Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the noise—think SOC automation, but with purpose.
Then the real fun begins: quantum computing.
We dig into its impact on encryption, national security, and risk prediction—asking the big questions like,
Can quantum AI predict the exact day of a breach?
Or better yet, can it prevent one?
But it’s not all theory—we stay grounded in practical reality.
Edward breaks down why a fully autonomous SOC is still out of reach, and why the smartest play today is using AI to amplify, not replace, human analysts.
As Paul puts it, "The only limit right now is imagination."
Add in a few good-natured jabs about flip-flops vs. snow boots, some big questions about nation-state surveillance, and a surprising Star Trek tangent on quantum entanglement, and you’ve got a wild, thoughtful, and surprisingly human take on where cyber defense is headed.
If you’ve ever wondered how to future-proof your security program in the face of exponential tech growth, this is your episode.
Thanks for watching and listening!
Connect with us on LinkedIn:
Evan: https://www.linkedin.com/in/evanmorgan/
Paul: https://www.linkedin.com/in/pm01/



Tuesday Mar 18, 2025
Cybersecurity Regulations Are Coming—What You Need To Know
Tuesday Mar 18, 2025
Tuesday Mar 18, 2025
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation?
In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI.
It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges.
They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often dominated by flashy tools and jargon.
With a nod to Simon Sinek’s “Golden Circle,” they highlight the value of digging into motives, not just methods.
In a relaxed, bar-like setting where unscripted humor mixes with expert know-how, you’ll get a front-row seat to the personal stories, thought-provoking questions, and spirited debates that make cybersecurity a truly people-centric endeavor.
Ready for a fresh take on the next wave of cybersecurity regulation—and the perspectives shaping it?
Tune in to Cyber After Hours, grab your favorite beverage, and join the conversation.
This is where technology meets humanity, one lively discussion at a time.
Thank you for watching / listening!
Connect with us on LinkedIn:
Evan: https://www.linkedin.com/in/evanmorgan/
Paul: https://www.linkedin.com/in/pm01/



Tuesday Mar 11, 2025
Why Passwords Will Never Be Secure
Tuesday Mar 11, 2025
Tuesday Mar 11, 2025
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats?
In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients.
From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity.
Think biometrics, physical keys, and the cutting-edge world of quantum computing—all in one candid conversation.
But we don’t stop at the theoretical: we dig into practical insights, like how password managers (hello, YubiKey) and multi-factor authentication are making waves in industries like healthcare.
We also tackle the cultural hurdles of adopting new security tech—because let’s face it, not everyone is as excited about password changes as we are.
And yes, there’s a lighthearted detour about decaf coffee (trust us, it’s worth the laugh).
Tune in to find out why continuous innovation in digital security is crucial, what the future might hold for your organization’s authentication methods, and how a little bit of humor can keep you sane in the ever-evolving world of cybersecurity.
Join us for this lively deep dive—you won’t want to miss it!
Connect with us on LinkedIn:
Evan: https://www.linkedin.com/in/evanmorgan/
Paul: https://www.linkedin.com/in/pm01/



Tuesday Mar 04, 2025
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
Tuesday Mar 04, 2025
Tuesday Mar 04, 2025
Ever wish strategic planning felt more like a celebration and less like a chore?
In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection.
Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves.
Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity.
AI models like DeepSeek take center stage, offering both enticing efficiencies and equally potent threats to data integrity and privacy.
We unravel how adversarial nations might exploit these innovations and discuss why there’s no room for shortcuts when security is on the line.
Finally, we chart an exciting course into the realms of AI and quantum computing.
Think AI agents, RAG models, and quantum superposition—tech frontiers that promise to reshape our daily lives and radically enhance how we identify and manage risk.
Our chat brims with curiosity and awe, exploring the momentous possibilities that quantum breakthroughs may unlock.
If you’re even remotely curious about the future of cybersecurity (or just love a good adventure story), this is one episode you won’t want to miss.
Tune in now!
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Feb 25, 2025
Why Cyber Extortion Payments Should Be Illegal
Tuesday Feb 25, 2025
Tuesday Feb 25, 2025
Ever wonder what would happen if paying cyber ransom demands was flat-out illegal?
In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that.
Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation.
We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax.
We dig into the controversial issue of banning ransomware payments, asking if companies should be forced to fend off attackers without cutting that check.
Real-world experiences and high-profile cases reveal the dangers of flawed decryption keys, repeated attacks, and the temptation to rely on quick fixes instead of building stronger defenses.
Ross’ entrepreneurial insights show why cybersecurity investments might be a better bet than gambling on a criminal’s word.
We also explore how government incentives and cyber insurance could reshape security strategies, pushing organizations to harden their defenses rather than pay their way out of trouble.
The parallels between cybersecurity and healthcare come into focus, highlighting why threat visibility and information sharing are so crucial.
Throughout the episode, we touch on the often-overlooked risks in operational technology and celebrate the growing influence of Chief Information Security Officers.
Their leadership—and the rise of trusted information-sharing networks—could spell a more secure future.
But it’s a team effort: everyone from executives to engineers plays a role in making it happen.
Join us for an engaging discussion that blends humor, entrepreneurship, and real talk about the crossroads of innovation and cybersecurity.
Tune in to Cyber After Hours to see how these stories and perspectives might just shape the way we tackle cyber threats moving forward.
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Sunday Feb 23, 2025
How to Manage Zero-Day Vulnerabilities
Sunday Feb 23, 2025
Sunday Feb 23, 2025
Ever wonder how facial hair fundraisers and cybersecurity connect?
In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.
From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.
We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.
We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.
Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.
Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.
Tune in, join the conversation, and learn how to fortify your defenses against the unknown!
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Feb 18, 2025
How AI Will Change Hacking Forever
Tuesday Feb 18, 2025
Tuesday Feb 18, 2025
AI: The Ultimate Hacker or Cybersecurity’s Best Ally?
In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys?
AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before.
Financial services and other regulated industries are left wondering:
- Can they afford to stick with the status quo?
- And what happens when AI starts battling itself?
- How far off is a world where autonomous AI defends against AI-driven attacks?
Spoiler: There’s an Irish whiskey bet riding on this one.
Of course, it wouldn’t be Cyber After Hours without a few detours—like our take on Microsoft’s latest strong-arming tactics with Outlook (seriously, who asked for this?).
Plus, we get personal about the entrepreneurial grind and the unexpected lessons that come with it.
So, grab a drink, tune in, and let’s talk about the future of offensive AI in cybersecurity—because ready or not, it’s already here.
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Feb 11, 2025
What We Learned from the Worst Cyber Breaches
Tuesday Feb 11, 2025
Tuesday Feb 11, 2025
Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies?
In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub.
Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity.
We dig into big-picture lessons from some high-profile breaches, exploring how data sprawl, the jump from on-prem to cloud, and the rise of AI have completely changed the security game.
Omri also highlights the balance between unleashing innovation and staying compliant, reminding us how quickly tech advances—and how our defenses have to keep up.
Our final deep dive zeroes in on why cybersecurity education and clear-eyed leadership matter so much.
Whether you’re in the C-suite or managing front-line systems, Omri shares practical tips to make security everyone’s job.
We wrap up with a pragmatic look at risk management—ultimately, it’s about dialing up your defenses just enough to keep the bad actors at bay without stifling the business you’re trying to protect.
Join us for a conversation that blends lighthearted conference antics with serious intel on staying a step ahead of emerging threats.
If you’re ready to sharpen your security know-how and pick up a few swag-hunting tips along the way, this episode is a must-listen.
Enjoy the show and let us know your favorite takeaway!
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Feb 04, 2025
CISO vs. CTO: The Battle for Your Security Budget
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy?
In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares.
Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene.
If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light.
The conversation then shifts to the ever-evolving dance between CISOs and CTOs, where roles can blur depending on factors like company size and regulatory pressure.
From personal anecdotes that highlight real-world adaptations to the subtle ways these roles overlap, we explore how today’s CISOs often juggle legal, technical, and operational responsibilities, while CTOs focus on infrastructure and operations.
It’s a fascinating look at how businesses align these positions to stay compliant, efficient, and secure.
Finally, we dig into the transformative power of technology and the competitive edge that emerges when security is woven into every phase of software development.
The CIA triad—confidentiality, integrity, availability—gets a fresh spin here as a must-have foundation for any robust security strategy.
And with identity management playing a starring role, it’s clear that integrating security from the ground up is more than just a best practice—it’s a recipe for success in our hyper-connected world.
Tune in to discover how prioritizing security can set your organization apart and why seamless identity management might just be the key to thriving in the digital age.
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Jan 28, 2025
Hacking the Future: Network Security 2025
Tuesday Jan 28, 2025
Tuesday Jan 28, 2025
Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security?
That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond.
In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work.
Once the jokes (and glasses) are topped off, we dive into the real meat: SASE and SD-WAN.
We break down how these technologies are reshaping the old fortress mentality in network security.
Say goodbye to the traditional perimeter and hello to modern, cloud-first proxies, firewalls, and DLP solutions built for today’s fast-moving IT world.
Drawing on our engineering and operational chops, we clarify what’s what—like the subtle differences between LANs and WANs—and lay out a future vision of network security that might have you rethinking your entire setup ten years from now.
But it’s not all tech talk; we also explore the financial and strategic reality of on-prem vs. cloud.
From hidden costs and hybrid pitfalls to the absolute need for consistent security tools, we highlight why thoughtful, business-aligned planning is crucial.
Finally, we raise our glasses to celebrate the camaraderie that keeps cybersecurity exciting—because at the end of the day, it’s our shared passion that drives every late-night troubleshooting session and ambitious network overhaul.
Cheers to that, and cheers to you for joining us on this journey into the next frontier of network security!
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Jan 21, 2025
Open Source vs. Proprietary Cyber Threat Intelligence: The Great Debate
Tuesday Jan 21, 2025
Tuesday Jan 21, 2025
Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together?
In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales.
Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats.
From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free data to the plug-and-play appeal of curated subscriptions.
We revisit the legendary bank DDoS incidents, highlighting how real-time intel sharing and genuine collaboration saved more than just the day—it saved reputations.
Of course, we can’t forget the occasional “cyber theater” that plagues our industry, reminding everyone to invest in tools that actually protect, not just impress.
We wrap up with a lively discussion on the nuts and bolts of building a threat intelligence program (yes, we even chat about budget surprises and potential tax write-offs).
Laughter and lessons learned go hand in hand in this episode, so whether you’re a seasoned security pro or new to the intel game, you’ll find camaraderie, fresh insights, and plenty of fun.
Grab your leftovers, tune in, and join us on this entertaining journey through the ever-evolving world of cyber threat intelligence!
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Jan 07, 2025
Cyber Hygiene: Protect Yourself from Digital Disease
Tuesday Jan 07, 2025
Tuesday Jan 07, 2025
Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats?
In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches.
We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm.
It’s part comedy, part cautionary tale, and it sparks a lively debate about the fact that some scammers are themselves backed into a corner, while others are flat-out villains.
From there, we pivot to the basics of cyber hygiene, comparing outdated accounts and poorly maintained inventories to that messy drawer you keep meaning to organize.
Turns out, decluttering your digital life can make a huge difference in stopping threats before they become full-blown problems.
We also unpack how a structured approach to evaluating security tools can help separate the real deal from the snake oil.
Finally, we highlight the struggles that small and medium-sized businesses face in a market often overloaded with expensive enterprise products.
Whether it’s exploring open-source gems like OpenVAS or juggling too many security tasks on a tight budget, we offer practical ways to keep your defenses strong without breaking the bank.
If you’ve ever felt overwhelmed by endless security demands, this episode is a must-listen.
Join us for fresh perspectives, some well-earned laughs, and tips you can put into action right away.
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Dec 31, 2024
Cybersecurity Isn't About Tech - It's About Strategy
Tuesday Dec 31, 2024
Tuesday Dec 31, 2024
Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide?
In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals.
From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from lighthearted anecdotes to real-world lessons learned.
We underscore why a truly strategic approach is essential, covering everything from building a living roadmap that evolves with the threat landscape to ensuring your security practices stay transparent and error-free.
We also delve into the importance of trust—whether it’s getting executive buy-in for that shiny new initiative or ensuring your team feels empowered to innovate.
Throughout the episode, we swap personal stories that capture the passion, resilience, and yes, the occasional hilarity of working in cybersecurity.
Whether you’re still learning the ropes or have been around the block, this episode offers insights, camaraderie, and a glimpse into the spirited life of cyber pros.
Tune in, join the conversation, and learn how to level up your strategic thinking for a safer, smarter digital future!
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Dec 24, 2024
Why Cybersecurity is WAY More Complex Than You Think
Tuesday Dec 24, 2024
Tuesday Dec 24, 2024
Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic?
That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines.
The big question on our minds is why cybersecurity feels so complicated in the first place.
From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organizations with limited resources.
We also look at whether cybersecurity belongs alongside established fields like law or medicine, and explore why compliance alone doesn’t necessarily mean you’re secure (hint: a single firewall isn’t a silver bullet).
Instead, we champion education, prioritization, and a well-crafted plan over piling on the latest high-tech gadgets.
Our conversation turns to the meaning of “control,” examining how everyone—auditors, tech gurus, and executives—views it differently.
We even put cloud environments under the microscope to reveal their benefits and potential pitfalls.
By the end, we’re already excited about upcoming episodes, teasing everything from special guests to maybe even a catchy jingle for our sign-off.
If you’re craving real-world experiences, practical insights, and the occasional laugh, tune in to Cyber After Hours and discover how surviving pneumonia—or any cyber threat—can sometimes lead you to a whole new taste in life.
Cheers!
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Dec 17, 2024
How AI is Changing Cyber Defense Forever
Tuesday Dec 17, 2024
Tuesday Dec 17, 2024
Remember when iPods were the hot new thing?
Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces?
In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary.
It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves.
But it’s not all laughs and nostalgia.
We also share real-world tales from the cybersecurity front lines, reflecting on the rollercoaster of growing a business, grappling with regulatory hurdles like ISO and HIPAA, and wrestling with compliance fatigue.
Along the way, we open up about the challenges of entrepreneurship—balancing the rush of innovation with the everyday reality of keeping data secure.
Finally, we dive into the heart of AI’s transformative potential, exploring how generative AI is powering groundbreaking advancements while simultaneously arming cybercriminals with cutting-edge tools.
From big wins in automation to the unsettling misuse of machine learning, we paint a vivid picture of cybersecurity’s shifting landscape.
Tune in to hear our take on the strategies, safeguards, and mindset required to stay ahead in this high-stakes digital arena—and don’t miss the chance to see how AI is rewriting the rules of cyber defense.
Thank you for watching / listening!
Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Dec 10, 2024
The Good, the Bad, and the Ugly of Cyber Vendor Consolidation
Tuesday Dec 10, 2024
Tuesday Dec 10, 2024
Ever felt like you're paying a “convenience fee” just to access your own data in the cloud?
In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma.
We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won.
It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast.
From there, we explore the bigger picture of today’s cybersecurity vendor landscape.
With startups popping up left and right, followed by lightning-fast acquisitions, it can feel like there’s a new vendor (or a newly acquired one) around every corner.
Is the convenience of an all-in-one solution worth the potential lock-in?
And how do you avoid paying for overlapping tools that drive your costs—and your frustration—through the roof?
We call this “cyber waste,” and it’s something every security leader should be watching closely.
We wrap up by examining how vendor consolidation affects both your budget and your peace of mind, especially when an innovative product suddenly loses its spark after being acquired.
Is there a sweet spot between holistic platforms and best-in-class solutions?
Tune in as we share candid insights on managing these challenges—and how to keep your cybersecurity program effective, efficient, and maybe even a bit more transparent.
Join us for a frank conversation on what it really takes to make your investments count.
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Tuesday Dec 03, 2024
How to Build a Battle-Ready Cyber Incident Response Team
Tuesday Dec 03, 2024
Tuesday Dec 03, 2024
Ever been hit with unexpected costs that make you question whether profit outweighs protection?
In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas.
Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need.
Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven by hidden markups.
We also open up about the emotional whirlwind of facing a major cyber incident unprepared.
Imagine scrambling for data, unsure of your next move, and realizing mere compliance is nowhere near enough.
This episode underscores how unpredictable (and downright chaotic) cybersecurity threats can be, and why a solid plan, strong processes, and reliable people matter more than any piece of technology.
Finally, we focus on building a truly battle-ready incident response team—one that’s capable of handling the real-world pressures of modern threats.
Drawing parallels to military exercises, we talk about the power of realistic drills and the importance of letting engineers and cybersecurity experts collaborate effectively.
We reflect on how a crisis like the Apache Struts vulnerability can either leave a team in disarray or galvanize them into an organized, adaptable, and growth-oriented unit.
Tune in for a conversation that blends personal stories, honest insights, and a good dose of passion for getting incident response right.
Whether you’re a seasoned cybersecurity pro or just curious about what really happens when digital chaos strikes, you won’t want to miss this episode.
Thank you for watching / listening!Connect with us on LinkedIn:- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/



Saturday Nov 23, 2024
How to Fix the Cybersecurity Skills Gap (and Why It Matters)
Saturday Nov 23, 2024
Saturday Nov 23, 2024
Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it?
In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone.
Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets.
We also explore how cybersecurity skills are shifting at breakneck speed.
It’s not about hoarding technical know-how; it’s about seeing the bigger picture of how all those parts fit together.
Our chat ranges from chasing new experiences to contemplating how AI could reshape the industry faster than you can say “phishing.”
As we wrap up, we get real about transitioning from mentorship to consulting, stressing the value of personal connections over cold calls.
And yes, we throw in a bit of humor about our hopes for an audience bigger than just ten listeners (Paul really loves that joke lol).
Listen in for an unfiltered take on the growing pains, the learning curves, and the excitement of navigating cybersecurity’s wild frontier. We’d love to have you along for the ride.
Thank you for watching / listening!Connect with us on LinkedIn:
- Evan: https://www.linkedin.com/in/evanmorgan/- Paul: https://www.linkedin.com/in/pm01/