S1E1: Predicting Cyber Attacks Before They Strike
What if cybersecurity could predict — and prevent — attacks before they happen?
Scaling Cyber is a cybersecurity podcast where founders, CEOs, and industry leaders share how they built and scaled security companies globally and their views and opinions about cybersecurity trends and markets.
Hosted by Ignacio Sbampato and produced by BridgerWise, the show explores go-to-market strategy, partnerships, funding, and international expansion in the cybersecurity industry.
Scaling Cyber is available on the following platforms:
BridgerWise is the publisher behind Scaling Cyber. Founded by Ignacio Sbampato, BridgerWise focuses on helping cybersecurity companies scale internationally. Ignacio previously served as Chief Business Officer at ESET, one of the largest cybersecurity companies in Europe, where he led global commercial operations for over two decades.
What if cybersecurity could predict — and prevent — attacks before they happen?
Preventing Information Operations and Disinformation Campaigns against Public and Private Organizations.
What if, instead of chasing cybercriminals… you made them lose time and chase ghosts?
What if SecOps could investigate every alert — and even every non-alert — autonomously, 24/7, without adding a single analyst to the team?
What does it take for a cybersecurity company from Czechia to scale globally, double headcount in 18 months, and get on track to protect one billion people?
What if phishing simulations were as real, local, and dynamic as the attacks employees actually face?
What if companies could continuously validate their cloud security and finally see the blind spots attackers exploit every day?
What if one of the most overlooked problems in cybersecurity — email impersonation — was also one of the biggest growth opportunities?
What does the data really say about the state of global cybersecurity? Richard Stiennon shares his data-driven perspective on cybersecurity markets worldwide.
Europe imports 70% of the cybersecurity products it uses — a strategic vulnerability that also presents an enormous opportunity. Laurent Hausermann and Aurélie Clerc share how their cybersecurity venture studio is writing a new European playbook.
Can Europe build true cyber resilience, or will it remain dependent on solutions from elsewhere? Petri Kuivala, veteran CISO from Nokia, Microsoft, and NXP, shares 30 years of experience defending some of the world's largest organizations and helping European cybersecurity startups scale globally.
Cody Barrow, CEO of EclecticIQ, shares how he blends American speed with European values to lead a Netherlands-based cyber threat intelligence platform serving governments and critical infrastructure worldwide.
Information operations are commercially driven, highly scalable campaigns that increasingly target banks, brands, and enterprises across multiple countries at once. Andriy Kusyy of LetsData breaks down how modern info ops really work.
For many cybersecurity founders, industry analysts feel like a black box: hard to access, expensive, and supposedly "pay to play." But that perception is often wrong. Luigi Lenguito explains how a young cybersecurity company can influence analysts early.
Cyber deception technology has existed for years, yet many security leaders still associate it with legacy honeypots or academic experiments. Pawel Rybczyk and Anastasiia Dorosh from Labyrinth explain what modern cyber deception really looks like — and why organizations are finally ready to adopt it.
AI is no longer just a co-pilot in the SOC. Almog Ohayon of TandemTrace explains how AI agents are becoming the primary pilot — handling autonomous alert triage, investigation, and threat hunting.
Most security teams believe they are adopting AI, but many are actually adopting better automation. Almog Ohayon of TandemTrace explains the critical architectural and operational differences between SOC automation and true SOC autonomy.
Autonomous SOC platforms let small security teams run AI-driven threat hunting 24/7 — no shift gaps, no scale limits. Here's how it works in practice.
How does cyber deception technology actually work? Pawel Rybczyk and Anastasiia Dorosh of Labyrinth explain deployment, the engagement phase, and why it produces near-zero false positives.
AI SOC agents autonomously triage alerts, run hypothesis-driven threat hunting, and surface blind spots — 24/7, at unlimited scale. Here's how they actually work.
The cyber deception market is entering a new growth phase. What's driving adoption, who's buying, and why Gartner calls it preemptive security.
For guest applications, business inquiries, or general questions, use the contact form on the website.