S1E1: Predicting Cyber Attacks Before They Strike
What if cybersecurity could predict — and prevent — attacks before they happen?
Scaling Cyber is a cybersecurity podcast where founders, CEOs, and industry leaders share how they built and scaled security companies globally and their views and opinions about cybersecurity trends and markets.
Hosted by Ignacio Sbampato and produced by BridgerWise, the show explores go-to-market strategy, partnerships, funding, and international expansion in the cybersecurity industry.
Scaling Cyber is available on the following platforms:
BridgerWise is the publisher behind Scaling Cyber. Founded by Ignacio Sbampato, BridgerWise focuses on helping cybersecurity companies scale internationally. Ignacio previously served as Chief Business Officer at ESET, one of the largest cybersecurity companies in Europe, where he led global commercial operations for over two decades.
What if cybersecurity could predict — and prevent — attacks before they happen?
Preventing Information Operations and Disinformation Campaigns against Public and Private Organizations.
What if, instead of chasing cybercriminals… you made them lose time and chase ghosts?
What if SecOps could investigate every alert — and even every non-alert — autonomously, 24/7, without adding a single analyst to the team?
What does it take for a cybersecurity company from Czechia to scale globally, double headcount in 18 months, and get on track to protect one billion people?
What if phishing simulations were as real, local, and dynamic as the attacks employees actually face?
What if companies could continuously validate their cloud security and finally see the blind spots attackers exploit every day?
What if one of the most overlooked problems in cybersecurity — email impersonation — was also one of the biggest growth opportunities?
What does the data really say about the state of global cybersecurity? Richard Stiennon shares his data-driven perspective on cybersecurity markets worldwide.
Europe imports 70% of the cybersecurity products it uses — a strategic vulnerability that also presents an enormous opportunity. Laurent Hausermann and Aurélie Clerc share how their cybersecurity venture studio is writing a new European playbook.
Can Europe build true cyber resilience, or will it remain dependent on solutions from elsewhere? Petri Kuivala, veteran CISO from Nokia, Microsoft, and NXP, shares 30 years of experience defending some of the world's largest organizations and helping European cybersecurity startups scale globally.
Cody Barrow, CEO of EclecticIQ, shares how he blends American speed with European values to lead a Netherlands-based cyber threat intelligence platform serving governments and critical infrastructure worldwide.
Federico Meiners shares hard-earned lessons from building MDR services across Belgium and Europe — from a failed SOC attempt in the US to scaling ACEN to more than 50 monitored customers through standardization and automation.
Lukasz Jesis shares how a question about his own company's source code led to building two data protection companies from Poland — Xopero for mid-market backup and GitProtect for DevOps ecosystems — both growing at 100%+ YoY.
Mateusz Wepa shares how IITD built one of Poland's most focused cybersecurity distribution operations — going from 5 people to 12 in under two years — by obsessing over the channel, not the product, and treating trust as consistency over time.
Anett Mádi-Nátor, President of the Women4Cyber Foundation, shares how she built Europe's largest cybersecurity community — 80,000+ members across 35 countries — and how the foundation navigated a sudden collapse in US funding by pivoting to European corporate partners, local chapter activation, and AI-enabled capacity building.
Information operations are commercially driven, highly scalable campaigns that increasingly target banks, brands, and enterprises across multiple countries at once. Andriy Kusyy of LetsData breaks down how modern info ops really work.
For many cybersecurity founders, industry analysts feel like a black box: hard to access, expensive, and supposedly "pay to play." But that perception is often wrong. Luigi Lenguito explains how a young cybersecurity company can influence analysts early.
Cyber deception technology has existed for years, yet many security leaders still associate it with legacy honeypots or academic experiments. Pawel Rybczyk and Anastasiia Dorosh from Labyrinth explain what modern cyber deception really looks like — and why organizations are finally ready to adopt it.
AI is no longer just a co-pilot in the SOC. Almog Ohayon of TandemTrace explains how AI agents are becoming the primary pilot — handling autonomous alert triage, investigation, and threat hunting.
Most security teams believe they are adopting AI, but many are actually adopting better automation. Almog Ohayon of TandemTrace explains the critical architectural and operational differences between SOC automation and true SOC autonomy.
Autonomous SOC platforms let small security teams run AI-driven threat hunting 24/7 — no shift gaps, no scale limits. Here's how it works in practice.
How does cyber deception technology actually work? Pawel Rybczyk and Anastasiia Dorosh of Labyrinth explain deployment, the engagement phase, and why it produces near-zero false positives.
AI SOC agents autonomously triage alerts, run hypothesis-driven threat hunting, and surface blind spots — 24/7, at unlimited scale. Here's how they actually work.
The cyber deception market is entering a new growth phase. What's driving adoption, who's buying, and why Gartner calls it preemptive security.
How to scale a SOC with a lean team. ACEN MDR's Federico Meiners shares the standardization and automation playbook behind 50+ monitored customers.
Most SOC playbooks fail because they're never tested. What an effective SOC playbook includes, how to validate it, and how AI is changing the model.
For guest applications, business inquiries, or general questions, use the contact form on the website.