Resilient Cyber
Resilient Cyber Podcast
S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation
0:00
Current time: 0:00 / Total time: -38:24
-38:24

S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation

Welcome to Resilient Cyber!

If you’re interested in FREE content around AppSec, DevSecOps, Software Supply Chain and more, be sure to hit the “Subscribe” button below.

Join 5,000+ other readers ensuring a more secure digital ecosystem.

Subscribed

If you’re interested in Vulnerability Management, you can check out my book “Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem” on Amazon. It is focused on infusing efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management.

Get your copy on Amazon


  • First off, for folks not familiar with you and your background, can you tell us a little bit about your career and how you got to where you are now?

  • 1.2M followers on YouTube and 250,000 on LI, how did you get into content creation originally?

  • How did you navigate what resonated with your audience and hone that in over the years and has it changed across platforms?

  • You have videos and content dating over a decade old, before the curation of “Content Creators” in cybersecurity. What led you down that path, and what do you think some folks who look to get into content creation get wrong?

  • You produce an incredible amount of technical content as well, have you had to tailor it at all to align with your massive audience, or do you just do your thing and folks gravitate towards it as they see fit?

  • Pivoting a bit from content, there is obviously a lot of activity and trends underway in our ecosystem. Let's touch on some of those. 

  • First up is the SEC ruling around incident disclosure and documents such as 8K’s and 10K’s, what are your thoughts on the rules and their implications?

  • I believe you’ve spoken about nation state hacking and presence in critical infrastructure if I’m not mistaken, do you see cybersecurity playing an outsized role in future conflicts?

  • Given how technical you are, what are some of the latest tools and technologies that have you the most excited, and what are some you think may be overhyped?

Discussion about this podcast