Think Bad, Do Good Podcast

AttackIQ’s video podcast series brings together security researchers, informed defenders, and intelligence practitioners for discussions about how security teams can build a strong threat-informed defense strategy. Listen below for lively discussions on emerging strategic concepts, threats and emulation plans, optimizing your cybersecurity investments, and cybersecurity events in the news.
  • Implementing Threat-Informed Defense in Cybersecurity Practices

    In this episode of “And Security for All,” host Kim Hakim & AttackIQ CCO Carl Wright talk about moving from a reactive to proactive cybersecurity practice.

  • Risky Business #686 – White House to Move on Spyware Industry

    AttackIQ’s Jonathan Reiber will be joining us in this week’s sponsor interview to talk about how companies and their boards are really moving towards outcomes-based security programs.

  • Confronting the Disinformation Age: A Conversation with Renée di Resta

    Confronting the Disinformation Age: A Conversation with Renée di Resta

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Think Bad, Do Good: Episode 17

    Catastrophic Loss: The State of the Cyberinsurance Market, with Josephine Wolff

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Think Bad, Do Good: Episode 16

    Lessons in Venture Capital: How to Build and Scale a Successful Cybersecurity Company, with Marcus Bartram of Telstra Ventures

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Dispatches from a hybrid war.

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Think Bad, Do Good: Episode 15

    Not Your Normal CISO: Lessons in Security Leadership, from Bartending to the Boardroom

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Think Bad, Do Good, Ep. 14

    Preparing for Disaster and Achieving Cybersecurity Readiness

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Brett Galloway

    AttackIQ CEO Reveals How to Achieve an Assume Breach Mindset

    Brett Galloway, CEO of AttackIQ, joined The Tech Talks Daily Podcast to discuss how security leaders can build a comprehensive defense-in-depth strategy to confidently report to their boards, auditors, and leadership teams the strength of their security posture.

  • Hot takes on today’s critical cybersecurity topics

    Hear Attack IQ VP of Cybersecurity Strategy and Policy Jonathan Reiber talk through cybersecurity concerns at an international level 

  • Christopher Frenz

    Adopting a Threat-Informed Defense (with Christopher Frenz)

    In this episode, Christopher and Jonathan talk zero-trust security & building an evidence-based security program via threat-informed defense 

  • Preparing for Russian State-Sponsored Cyberthreats

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

Never Settle for Uncertainty

Validate Your Defenses

Take the guesswork out of threat exposure management. Validate your defenses with real-world attack scenarios and focus on what matters most—managing your risk.

Schedule a Demo Try it Free