Meet Armis at Black Hat 2024

Learn More

Bad Actors

Bad Actors is an Armis podcast series based on what is shaping the cyber and security landscape including interesting, compelling, educational, and curious aspects around technology from experts in the field. All interlaced with true behind the scenes stories.

Armis Bad Actors Podcast hero

E20: Powering Threat Detection Through AI with Andrew Grealy & Michael Freeman

In this episode, Andrew Grealy, Head of Armis Labs, and Michael Freeman, Head of Threat Intelligence at Armis, share their insights and highlight the pivotal role of AI in cybersecurity, emphasizing its ability to power Armis’ threat detection and proactive defense mechanisms. Listen now to learn the necessity for regulation, particularly in critical systems to ensure reliability and prevent bias, the need for defensive tools and threat actor targets.

E19: Navigating the Complex Nature of Cybersecurity Policy and Regulations with Dr. Amit Elazari

In this episode, CEO and Co-Founder of OpenPolicy, Dr. Amit Elazari discusses the current state of cybersecurity policies, how incident reporting & regulation is going through major shifts, AI’s need for expedited compliance requirements, and more!

E18: Tackling Cyberwarfare in the Age of AI with Nadir Izrael

In the newest series of Bad Actors, Armis Co-Founder & CTO, Nadir Izrael, discusses Cyberwarfare in the age of AI. He explores how AI is being leveraged in cyberwarfare, the implications, and what organizations can do to protect themselves.

Ep 17: Under the Sea of Scams: AI Voices, Mermaids and Phishing

In this episode, Curtis Simpson, Armis CISO, joins us to chat about AI voice manipulation, why you shouldn’t blindly trust a phone call, and lessons learned from The Little Mermaid.

Ep 16: AI Everywhere All at Once

In this episode, Nadir Izrael, Armis CTO and Co-Founder, joins us to chat about the rapid growth of AI, the effect it has on Cybersecurity, and how it will impact and change our lives, and potentially the world order as we know it.

Ep 15: Federal Frontlines & Fictional Fellowship: ‘You Shall Not Pass’ in Cybersecurity and Beyond

In this episode Sarah Oasen, CEO of Empower Solutions, shares her expertise on the Federal Cybersecurity attack surface, her insights on running a remote-first company and takes us on a trip to Tolkien’s middle-earth.

Ep 14: Read The Label! Sean Telles Tells us Why.

In this episode Sean Telles, Chief Strategy Officer at Alchemy Global Networks, discusses unmanaged endpoints, zero-trust, challenges of securing Grand Central Terminal, his learnings from Y2K and cybersecurity in the new world of VR.

Ep 13: Fred Gordy on Smart Buildings, The Dark Side of AI, and All That Jazz

In this episode, Fred Gordy, Director of Operational Technology and Risk Assessment at Michael Baker International, joins us to discuss the future of smart building technology, the new threat of AI-generated malware, and his highly controversial taste in music.

Ep 12: A Seat at the Table

In this episode, Dr. Parnaz Rafatjou joins us again, this time to discuss how to get in to tech, women and the industry, and tips for visiting Italy.

Ep 11: Evolution of XDR

Gorka Sadowski, Chief Strategy Officer at Exabeam, explains what XDR is, the importance of investing in it, and why motorcycles and tapas are his two favorite things.

Ep 10: Authentication vs Authorization

In this episode, Shaul Kremer, Chief Architect at, describes how to build secure systems with proper access control, shares his passion for computer archeology, and tells us which security topics keep him up at night.

Ep 9: Healthcare Technology Gap

In this episode, Dr. Parnaz Rafatjou helps navigate the complexities of technology in healthcare.

Ep 8: CISO’s Perspective

In this episode, Stephen Ward, former CISO, discusses why it’s important to view security through the eyes of a CISO.

Ep 7: Curing the Security Fundamentals

In this episode Sean Tufts, Practice Director OT & ICS Security at Optiv, joins us to discuss the fundamentals of security, lessons from the NFL and everything in between.

Ep 6: Crypto, Hacking and Your Credit Report

In this episode, Curtis Simpson, Armis’ CISO in Information Security joins us to chat about our new world of crypto, NFTs, and virtual reality. Listen until the end when he offers sound advice about your credit report.

Ep 5: Following the Money

In this episode, Chris Dobrec, Armis’ VP of Product and Industry solutions joins us to talk about the cyber threat landscape and how to know where the bad guys will strike next.

Ep 4: Getting the Fundamentals Right

In this episode, Peter Galanis, Entrepreneur, author, advisor, and CISO joins us to talk about his extensive background in cyber security, the daunting task of guarding against cyber attacks, and how the best defense is getting the fundamentals right.

Ep 3: Building the Millennium Falcon

Peter Doggart, Armis’ Chief Strategy Officer, joins us to provide his take on how Armis is accelerating, a look into Armis’ future, and his thoughts on building a Lego version of the Millennium Falcon. Plus, a very confused bird makes a guest appearance.

Ep 2: Seven Blind Mice

In this episode, Desiree Lee, Armis’ Chief Technology Officer joins us to chat about what it means to have “good” security and how important it is to see the bigger picture.

Ep 1: The New Age of Cyberwarfare

In this episode, Nadir Izrael, Armis’ Co-Founder and CTO joins us to chat about the new age of Cyber Warfare.

Armis Guest Appearances


Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady

Podcast: Industrial Cybersecurity Insider by Velta Technology

Dino Busalachi, CTO & Co-Founder of Velta Technology, has a fascinating conversation with Mick Coady, CTO of Armis, exploring the intricate world of operational technology (OT) and cybersecurity.


Mastering Cybersecurity: A CISO’s View into Vulnerability & Asset Management

Podcast: ISACA Orange County Chapter Podcast – Episode 01

This session, host Victor Monga along with featured speakers Mick Coady Armis CTO, and Nemi George VP, Information Security Pacific Dental Services, discuss the lifecycle of vulnerability management from discovery to resolution, the importance of asset identification and prioritization, and how these practices intertwine to enhance your security posture.