{"id":84263,"date":"2026-01-29T07:10:09","date_gmt":"2026-01-29T07:10:09","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84263"},"modified":"2026-04-15T05:01:21","modified_gmt":"2026-04-15T05:01:21","slug":"ai-new-cybersecurity-reality-conversations-with-dale-hoak","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/","title":{"rendered":"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84263\" class=\"elementor elementor-84263\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d1ee64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d1ee64\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf7ad4e\" data-id=\"cf7ad4e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23935d4 elementor-widget elementor-widget-video\" data-id=\"23935d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/IAahU8bWSwY?si=A-PhRTpPFVTyQZ4u&quot;,&quot;video_type&quot;:&quot;youtube&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e933ac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9e933ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77ca2e6\" data-id=\"77ca2e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ed9fb1 elementor-widget elementor-widget-heading\" data-id=\"6ed9fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Securing the Future: Lessons on AI, Compliance, Supply Chain Security, and Leadership from Cybersecurity Leader Dale <span data-teams=\"true\">Hoak<\/span> <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b00b935 elementor-widget elementor-widget-post-info\" data-id=\"b00b935\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 29, 2026<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThe Cybersecurity Podcast\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bb16ff0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb16ff0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2942d4\" data-id=\"b2942d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4be9b2 elementor-widget elementor-widget-text-editor\" data-id=\"c4be9b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this episode of the Cybersecurity Podcast by EC-Council, host Jay Bavisi speaks with Dale Hoak, a seasoned cybersecurity leader with a distinguished background spanning military service in the U.S. Navy to managing the New York Police Department (NYPD) Security Operations Center (SOC). Dale currently serves as CISO for RegScale, a platform focused on continuous controls monitoring and compliance automation. His journey from military service to high-stakes cybersecurity is a trial by fire, sharpening character and skill and delivering hard-earned lessons at every turn.<\/p><p>The discussion opens with Dale\u2019s journey and moves through high-stress cybersecurity environments, compliance challenges, AI integration in security, supply chain risks, and leadership advice for future CISOs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c36d85 elementor-widget elementor-widget-heading\" data-id=\"3c36d85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore the right career option <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c6252c elementor-widget elementor-widget-text-editor\" data-id=\"0c6252c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>After retiring from the U.S. Navy in 2017, Dale sought stability and initially started a compliance role. Upon realizing it wasn\u2019t the right fit, he chose to pivot, prioritizing work that resonates with his interests. He moved into security operations, which transformed his career as he navigated through the intricacies of the role.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f606d elementor-widget elementor-widget-heading\" data-id=\"68f606d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Impact of a high-intensity environment on professional growth <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfb21ad elementor-widget elementor-widget-text-editor\" data-id=\"bfb21ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The high-intensity atmosphere of the NYPD SOC had a transformative effect on Dale. Work pressure was immense; every action carried significant consequences for the safety of officers and the public; and all were dependent on the security of a vast and intricate network. Moreover, given the constant influx of critical information from agencies such as the FBI, CISA, and the Department of Homeland Security, it was essential to maintain a secure and accurate operating environment.<\/p><p>Dale\u2019s military training had instilled discipline and readiness in him, but these values became more tangible in the real-time demands of the role. Managing the New York City network required vigilance and swift and informed decisions under pressure. Threat intelligence was a requirement as well as a matter of public safety, where every detail counted. These experiences deepened his admiration for cybersecurity, fostering a strong appreciation for its vital role in protecting individuals and sensitive municipal data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd61ec elementor-widget elementor-widget-heading\" data-id=\"efd61ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lessons from a Log4j security breach <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0b54cc elementor-widget elementor-widget-text-editor\" data-id=\"d0b54cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the most impactful real-world challenges faced by the NYPD SOC was the Log4j vulnerability. Initially, the true scale and intensity of the threat were unclear, and it was not immediately evident which systems were affected, whether Windows, Linux, or other platforms. As the situation evolved, it became clear that an effective response depends on an accurate and comprehensive understanding of the entire network. Efforts to identify vulnerable assets were slowed due to outdated processes and procedures. The entire experience underscored the need for modernizing asset management and the importance of maintaining a current Software Bill of Materials (SBOM) to track where every component resides within the infrastructure.<\/p><p>The lesson drawn from the crisis was clear: without latest processes, asset visibility, and automated tools, organizations will fall back when confronting fast-moving cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd6599e elementor-widget elementor-widget-heading\" data-id=\"cd6599e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CISOs lead the shift to proactive security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0dd5bc elementor-widget elementor-widget-text-editor\" data-id=\"e0dd5bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Compliance has always been regarded as a mere checkbox activity; organizations focused on meeting regulatory requirements enough to satisfy authorities. This unmistakably led to a disconnect between compliance and security, for being compliant did not necessarily mean being secure.<\/p><p>Today\u2019s CISOs recognize that this outdated approach is no longer acceptable. They are striving to reframe compliance from a burdensome cost center into a dynamic business enabler.<\/p><p>Compliance operations have evolved to integrate compliance considerations at the earliest stages of development, ensuring developers themselves are part of the compliance loop. By leveraging standards such as the Open Security Controls Assessment Language (OSCAL), organizations can produce machine-readable outputs that offer immediate visibility into the security posture of their systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-614694e elementor-widget elementor-widget-heading\" data-id=\"614694e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Manage AI risks in compliance automation <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-095ab76 elementor-widget elementor-widget-text-editor\" data-id=\"095ab76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Integrating AI into CI\/CD pipelines brought about a unique set of challenges, especially due to AI hallucinations and the unpredictability of code generated by LLMs. The core issue was traced to the rapid commercialization of AI. This tendency reflected a broader market dynamic where the push for innovation outpaced the development of adequate safeguards. Security leaders described their initial apprehension, comparing the rise of AI to a \u201cSkynet moment\u201d for the industry, but also noted that, with time, they recognized AI as a new frontier for business enablement, if the right security frameworks are established.<\/p><p>Security leaders emphasize the need for comprehensive monitoring and oversight. Without measures, AI could generate outputs that could lead to risks through hallucinated or contextually incorrect data. Security professionals must reassess their approach and adapt their oversight strategies to the evolving technology.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5750615 elementor-widget elementor-widget-heading\" data-id=\"5750615\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Balancing speed and security: The CISO\u2019s AI dilemma <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3306800 elementor-widget elementor-widget-text-editor\" data-id=\"3306800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security professionals consistently struggle with limited budgets, resources, and time. AI addresses these gaps by optimizing resources and automating routine tasks, saving valuable time and effort. Nevertheless, despite the advantages, human oversight is indispensable.<\/p><p>Safeguards such as firewalls, access controls, and vigilant monitoring are necessary to prevent risks such as data poisoning and hallucinations. The quick global adoption of AI technologies has created significant pressure on organizations to keep up, with a prevailing narrative that says failing to use AI equates to falling behind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25a8025 elementor-widget elementor-widget-heading\" data-id=\"25a8025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adapt to the rapid pace of AI adoption  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3af2b29 elementor-widget elementor-widget-text-editor\" data-id=\"3af2b29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organizations are being pressured to implement AI solutions or risk becoming outdated. CISOs must recognize that AI is an unstoppable force and a powerful business multiplier. To keep pace, security leaders must quickly get skilled in how agentic AI systems function within their environments.<\/p><p>When integrating AI products, organizations should demand transparency from vendors by requesting model cards. CISOs should also consider how their AI systems are protected, including firewalls, access controls, monitoring, and integration with security information and event management (SIEM) tools. By taking a proactive approach, security leaders can help organizations harness AI\u2019s benefits while managing the risks it poses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7fbb60 elementor-widget elementor-widget-heading\" data-id=\"f7fbb60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Navigate the new frontier: Copilot and enterprise AI adoption <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0f187d elementor-widget elementor-widget-text-editor\" data-id=\"d0f187d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI is changing the fabric of enterprise operations. CISOs should understand that integrating tools such as Microsoft Copilot into everyday work embeds AI directly into the workflows, where it can ingest and process business-critical data often without clear boundaries. CISOs should also understand how AI models are built, what data they consume, and how information can flow across multiple LLMs, often beyond direct control.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33d8cec elementor-widget elementor-widget-heading\" data-id=\"33d8cec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Turn your employees into cyber defenders <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e72ce8a elementor-widget elementor-widget-text-editor\" data-id=\"e72ce8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As AI-driven threats grow prevalent, the responsibility of safeguarding data should no longer be limited to IT and security teams. Organizations must educate all other teams on data usage storage and data protection. Ongoing monitoring and insider threat management are critical. Fostering this awareness transforms employees into frontline defenders against evolving cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0f966 elementor-widget elementor-widget-heading\" data-id=\"6f0f966\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reframe compliance from checklist to culture <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77c7ebd elementor-widget elementor-widget-text-editor\" data-id=\"77c7ebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Compliance has often been viewed as a regulatory checkbox. However, to create a compliance-driven mindset, CISOs must reframe it as a must-have goal that supports organizational improvement. Embedding compliance into the culture means demonstrating its value beyond avoiding penalties, helping teams view it as a path to stronger security and resilient business. By making compliance integral to daily operations, organizations transform it from a cost center into a core component of their security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32dbfc elementor-widget elementor-widget-heading\" data-id=\"f32dbfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber resilience beyond compliance <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2e4b9 elementor-widget elementor-widget-text-editor\" data-id=\"8a2e4b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Achieving high levels of cybersecurity resilience requires compliance and a holistic approach including robust training, strong security operations, and good cyber hygiene. Employees should be trained and aware of the measures to maintain a secure environment. Security tools, from scanners to access controls and multi-factor authentication, should feed data into a centralized system for monitoring and orchestration. The outputs, when managed properly, drive compliance as a natural outcome, not a checkbox.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc0231 elementor-widget elementor-widget-heading\" data-id=\"1bc0231\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Confronting supply chain and third-party risks <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a01bc67 elementor-widget elementor-widget-text-editor\" data-id=\"a01bc67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Supply chain and third-party vendor risks are now more prominent than ever. For startups and small-scale organizations, managing vendor risk can be especially challenging. Security leaders must educate their teams on the implications of supply chain security. Effective supply chain security requires awareness, knowledge, and vigilance across development teams.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9107c elementor-widget elementor-widget-heading\" data-id=\"5c9107c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building trustworthy AI and cybersecurity practices <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58db423 elementor-widget elementor-widget-text-editor\" data-id=\"58db423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As organizations depend on AI for both operations and security, the integrity and transparency of these systems have become critical. Vendors must build secure products, provide clear documentation, and openly share SBOMs to build trust. CISOs and their teams should stay informed, leverage expert advice, and maintain constant vigilance.<\/p><p>In a world where attackers need only succeed once but defenders must get it right every time, strong supply chain security demands constant diligence and rapid response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ca4c11 elementor-widget elementor-widget-heading\" data-id=\"6ca4c11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is AI in cybersecurity a boon or a curse? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bd6199 elementor-widget elementor-widget-text-editor\" data-id=\"4bd6199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dale believes that AI will initially create more problems by empowering threat actors with advanced capabilities. However, he is of the opinion that defenders will eventually catch up and use AI to strengthen security once the industry adapts to new risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60e782f elementor-widget elementor-widget-heading\" data-id=\"60e782f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CISO accountability and the boardroom <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27babe5 elementor-widget elementor-widget-text-editor\" data-id=\"27babe5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While CISOs often bear the blame after cyber incidents, their main responsibility actually lies in communicating the risks to the board. Maintaining operational awareness and presenting risk in relatable, business-focused terms is crucial for securing funding and support, ideally before an incident occurs.<\/p><p>Dale advocates a shift in perspective: the CISO should be seen not as a lone operator. Like other C-suite leaders, the CISO needs a team comprising security officers, architects, analysts, and cross-functional partners. This will help to respond flexibly as challenges evolve.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41fc310 elementor-widget elementor-widget-heading\" data-id=\"41fc310\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advice for the next generation of CISOs <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b21232 elementor-widget elementor-widget-text-editor\" data-id=\"0b21232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For aspiring CISOs, Dale suggests viewing security as just one part of a larger business puzzle. Flexibility, open communication, and leading by example are essential. A CISO must set the tone for security culture, remain adaptable, and consistently reinforce policy.<\/p><p>Dale <span data-teams=\"true\">Hoak<\/span>\u2019s candid insights drive home a fundamental truth: the role of the CISO has never been more complex, challenging, or vital to organizational success. As the threat landscape continues to evolve, so must the office of the CISO, transforming from an individual contributor role into a collaborative, adaptable force at the heart of enterprise resilience. The path forward lies in continuous learning and clear risk communication, ensuring that cybersecurity is woven into the fabric of every organization. Watch episode 6 of The Cybersecurity Podcast <a href=\"https:\/\/www.youtube.com\/watch?v=IAahU8bWSwY\" target=\"_blank\" rel=\"noopener\">Blind Trust, AI &amp; the New Cybersecurity Reality| Dale <span data-teams=\"true\">Hoak<\/span>.<\/a><\/p><p>For more conversations shaping the future of cybersecurity, <a href=\"https:\/\/www.youtube.com\/@thecybersecuritypodcast_ecc\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to the Cybersecurity Podcast by EC-Council.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Securing the Future: Lessons on AI, Compliance, Supply Chain Security, and Leadership from Cybersecurity Leader Dale Hoak In this episode of the Cybersecurity Podcast by EC-Council, host Jay Bavisi speaks with Dale Hoak, a seasoned cybersecurity leader with a distinguished background spanning military service in the U.S. Navy to managing the New York Police Department&hellip;<\/p>\n","protected":false},"author":105,"featured_media":84264,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[13062],"tags":[],"class_list":{"0":"post-84263","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity-podcast"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI &amp; the New Cybersecurity Reality | Dale Hoak Podcast<\/title>\n<meta name=\"description\" content=\"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI &amp; the New Cybersecurity Reality | Dale Hoak Podcast\" \/>\n<meta property=\"og:description\" content=\"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T07:10:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T05:01:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"415\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"AI &amp; the New Cybersecurity Reality | Dale Hoak Podcast\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/\"},\"author\":{\"name\":\"tarun.mistri.ctr@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\"},\"headline\":\"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak\",\"datePublished\":\"2026-01-29T07:10:09+00:00\",\"dateModified\":\"2026-04-15T05:01:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/\"},\"wordCount\":1704,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dale-Hoak.jpeg\",\"articleSection\":[\"Cybersecurity Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/\",\"name\":\"AI & the New Cybersecurity Reality | Dale Hoak Podcast\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dale-Hoak.jpeg\",\"datePublished\":\"2026-01-29T07:10:09+00:00\",\"dateModified\":\"2026-04-15T05:01:21+00:00\",\"description\":\"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dale-Hoak.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dale-Hoak.jpeg\",\"width\":800,\"height\":415},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Podcast\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cybersecurity-podcast\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\",\"name\":\"tarun.mistri.ctr@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI & the New Cybersecurity Reality | Dale Hoak Podcast","description":"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/","og_locale":"en_US","og_type":"article","og_title":"AI & the New Cybersecurity Reality | Dale Hoak Podcast","og_description":"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-29T07:10:09+00:00","article_modified_time":"2026-04-15T05:01:21+00:00","og_image":[{"width":800,"height":415,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg","type":"image\/jpeg"}],"author":"tarun.mistri.ctr@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"AI & the New Cybersecurity Reality | Dale Hoak Podcast","twitter_misc":{"Written by":"tarun.mistri.ctr@eccouncil.org","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/"},"author":{"name":"tarun.mistri.ctr@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837"},"headline":"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak","datePublished":"2026-01-29T07:10:09+00:00","dateModified":"2026-04-15T05:01:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/"},"wordCount":1704,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg","articleSection":["Cybersecurity Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/","name":"AI & the New Cybersecurity Reality | Dale Hoak Podcast","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg","datePublished":"2026-01-29T07:10:09+00:00","dateModified":"2026-04-15T05:01:21+00:00","description":"Explore how AI is reshaping cybersecurity, from automated threat detection to evolving defense strategies, in this expert conversation with Dale Hoak.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg","width":800,"height":415},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Podcast","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cybersecurity-podcast\/"},{"@type":"ListItem","position":4,"name":"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837","name":"tarun.mistri.ctr@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84263"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84264"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}