PodcastsRank #44086
Artwork for The Great Security Debate

The Great Security Debate

TechnologyPodcastsBusinessENunited-states
5 / 5
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
Top 88.2% by pitch volume (Rank #44086 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
N/A
Episodes
66
Founded
N/A
Category
Technology
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: Under 4K / month
Canonical: https://podpitch.com/podcasts/the-great-security-debate
Reply rate: Under 2%

Latest Episodes

Back to top

WOPR Was Right

Mon Jan 12 2026

Listen

Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way? Or will it end with WOPR’s recognition that the only way to win the game is not to play at all? It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.  Thanks for being part of the debate! Show Notes: Caracas Invasion - https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598Stuxnet Explained - https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.htmlBook Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - https://geni.us/swbNSan Bernardino vs Apple - https://epic.org/documents/apple-v-fbi-2/Movie Recommendation: Real Genius - https://geni.us/abYUYTBook Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - https://geni.us/SL21aCIA Triad - https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/Book Recommendation: Atomic Habits - https://geni.us/Nn2GSYrMichigan Council of Women in Technology -https://mcwt.orgCritical Infrastructure (Sectors) - https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectorsShadowbrokers - https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/AI Prescriptions (Utah) - https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122 Japanese Omoiyari - a...

More

Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way? Or will it end with WOPR’s recognition that the only way to win the game is not to play at all? It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.  Thanks for being part of the debate! Show Notes: Caracas Invasion - https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598Stuxnet Explained - https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.htmlBook Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - https://geni.us/swbNSan Bernardino vs Apple - https://epic.org/documents/apple-v-fbi-2/Movie Recommendation: Real Genius - https://geni.us/abYUYTBook Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - https://geni.us/SL21aCIA Triad - https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/Book Recommendation: Atomic Habits - https://geni.us/Nn2GSYrMichigan Council of Women in Technology -https://mcwt.orgCritical Infrastructure (Sectors) - https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectorsShadowbrokers - https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/AI Prescriptions (Utah) - https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122 Japanese Omoiyari - a...

Key Metrics

Back to top
Pitches sent
6
From PodPitch users
Rank
#44086
Top 88.2% by pitch volume (Rank #44086 of 50,000)
Average rating
5.0
Ratings count may be unavailable
Reviews
N/A
Written reviews (when available)
Publish cadence
N/A
Episode count
66
Data updated
Feb 10, 2026
Social followers
62

Public Snapshot

Back to top
Country
United States
Language
English
Language (ISO)
Release cadence
N/A
Latest episode date
Mon Jan 12 2026

Audience & Outreach (Public)

Back to top
Audience range
Under 4K / month
Public band
Reply rate band
Under 2%
Public band
Response time band
Private
Hidden on public pages
Replies received
Private
Hidden on public pages

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
62
Contact available
Yes
Masked on public pages
Sponsors detected
Private
Hidden on public pages
Guest format
Private
Hidden on public pages

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
i***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch The Great Security Debate

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #44086 by pitch volume, with 6 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
5 / 5
RatingsN/A
Written reviewsN/A

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About The Great Security Debate

Back to top

What is The Great Security Debate about?

Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net

How often does The Great Security Debate publish new episodes?

The Great Security Debate publishes on a variable schedule.

How many listeners does The Great Security Debate get?

PodPitch shows a public audience band (like "Under 4K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch The Great Security Debate?

Use PodPitch to access verified outreach details and pitch recommendations for The Great Security Debate. Start at https://podpitch.com/try/1.

Which podcasts are similar to The Great Security Debate?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact The Great Security Debate?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.