Voices of the Vigilant Titelbild

Voices of the Vigilant

Voices of the Vigilant

Von: Jess Vachon
Jetzt kostenlos hören, ohne Abo

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech.

Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in integrity. From career pivots and cultural shifts to systemic inequities and visionary leadership, nothing is off the table.

This isn’t another tech podcast filled with jargon. Voices of the Vigilant is for those who lead with intention, speak truth to power, and are ready to reimagine what’s possible in an industry that’s overdue for change.


🔔 Subscribe, share, and step into a community where vigilance is both a practice and a path forward.


"Humanizing cybersecurity with candid tales from cyberspace and beyond!"

© 2026 Voices of the Vigilant
  • Running Toward the Fire - Cybersecurity, Motherhood, and Marathons
    Jan 25 2026

    Reinvention isn’t a neat pivot. It’s a grind, a choice you make on hard mornings, and a mindset you carry when no one’s clapping. We sit down with Saeger Fischer of Omada Technologies—former educator, mom of three, and 17‑time marathoner—who rebuilt her career in cybersecurity by treating learning like training and partnerships like team sports. Together we trace the real skills that translate from the classroom to the SOC: structure, self‑teaching, differentiated learning, and the patience to process before speaking. If you’ve ever felt behind, this story shows how consistent effort compounds into momentum.

    We also zoom out to the big picture leaders are wrestling with. Is the AI bubble nearing a correction as tools overpromise and underdeliver on simple workflows? Where do agentic SOC models fit, and how do we balance machine speed with human judgment? We break down why you can’t buy your way out of risk, how to separate signal from vendor noise, and why relationship‑driven selling outperforms quarter‑end pressure tactics. Then we dig into category shifts reshaping architecture: the rise of enterprise browsers like Island, collapsing brittle stacks, enabling zero trust without heavy VPNs or VDI, and speeding secure onboarding in minutes, not months.

    Finally, we confront timelines most teams prefer to defer: post‑quantum cryptography. Ten‑year roadmaps are already stale, and “harvest now, decrypt later” is not a thought experiment. We outline pragmatic steps to inventory crypto dependencies, prioritize migrations, and budget in phases. We also talk about public‑sector headwinds and where practitioners can still find trusted signal—peer communities, credible advisories, and leaders who share what actually works. If you’re eyeing a move into cyber, or you’re in the trenches and need a reset, this conversation blends grit, guidance, and grounded predictions you can act on today.

    If this resonated, subscribe, share with a friend who needs it, and drop your bold 2026 security prediction in a review—we’ll feature our favorites in a future episode.

    Send us a text

    Support the show

    https://www.vigilantviolet.com/
    www.linkedin.com/in/jessvachon1

    Mehr anzeigen Weniger anzeigen
    53 Min.
  • Muted to Unmuted: Finding Your Voice in Cybersecurity
    Dec 3 2025

    If you’ve ever felt like the odd one out in tech, this conversation will feel like oxygen. Akira Brand joins us to share how a shy kid, bullied for being different, found sanctuary in two unlikely rooms—the choir room and the computer lab—and turned that mix of voice and logic into a career leading application security. We map the path from opera training to DevRel to AppSec leadership, and dig into the moments that change everything: the first terminal command that touched the internet, the DEF CON night when community said “you belong,” and the leadership shift from heroic bursts to steady, compounding wins.

    We get tactical without losing the human thread. Akira explains why AppSec works best as enablement, not enforcement, and how a good leader “tailors” security into the SDLC instead of tearing it apart. Threat modeling becomes the star—recast from checkbox to business engine. We talk metrics that matter, risk you intentionally accept, and where compensating controls deliver the most value. You’ll hear pragmatic guidance on keeping velocity without sacrificing security, building credibility with developers, and designing programs teams actually use.

    We also explore AI’s double edge. For seasoned engineers, AI can boost secure development and documentation at speed. For beginners, it can hide missing fundamentals and import flawed patterns. Akira shares how to keep human review in the loop, vet model provenance, and use agentic AI to ship real tools faster—without skipping security basics. The episode closes with a message for outsiders: keep your integrity, find your people, and let your craft be both voice and shield.

    Subscribe, share with a friend who needs a lift, and tell us: what’s one security habit you’d “tailor” into your team’s workflow today? Your reviews help this show reach more builders, breakers, and brave weirdos—thanks for being part of the Voice of the Vigilant community.

    Send us a text

    Support the show

    https://www.vigilantviolet.com/
    www.linkedin.com/in/jessvachon1

    Mehr anzeigen Weniger anzeigen
    46 Min.
  • Fear into Fluency: Building Real Cyber Literacy
    Nov 21 2025

    Panic is not a security strategy. We sit down with Craig Taylor, co-founder of Cyberhoot and longtime virtual CISO, to unpack a people-first blueprint that replaces shame and fear with positive reinforcement, practical safeguards, and repeatable habits. Craig draws on his psychology background to explain why short, gamified exercises build muscle memory that holds up against urgent “CEO” emails and deepfake phone calls. The takeaway: rewarded behaviors are repeated, and that truth can transform both culture and outcomes.

    We dig into the highest-ROI controls leaders can deploy today, starting with multi-factor authentication across every external account and a fast path to passkeys. Craig demystifies passkeys in plain language, showing how FIDO2-backed credentials tie identity to both device and site, neutralizing password reuse and phishing without extra hassle. For overstretched SMBs, these steps deliver outsized protection with minimal cost.

    From there, we zoom out to program strategy. Craig outlines a risk assessment approach that ranks issues by impact, likelihood, and business materiality, then tackles the basics most teams skip: complete asset inventory, verified patching, least privilege, and clean entitlement hygiene. He shares why agentic AI makes phishing smarter and faster, and how a simple rubric for email analysis, practiced monthly, can blunt even adaptive lures. Throughout, we focus on win-win-win outcomes: empowered users, fewer incidents, and lower support costs for MSPs and IT teams.

    Ready to build a resilient security culture without burnout or blame? Tune in for clear steps, relatable stories, and tools you can use this quarter: MFA everywhere, passkeys where possible, short training sprints, and disciplined housekeeping.

    Special Podcast Offer:

    20% off CyberHoot for 1 year using the podcast’s unique coupon code:
    Coupon Code: "UnHacked"


    Free access to CyberHoot's Cybersecurity Literacy Training platform for individuals:
    https://cyberhoot.com/individuals

    Send us a text

    Support the show

    https://www.vigilantviolet.com/
    www.linkedin.com/in/jessvachon1

    Mehr anzeigen Weniger anzeigen
    42 Min.
Noch keine Rezensionen vorhanden