Full Metal Packet cover art

Full Metal Packet

Full Metal Packet

By: Control D
Listen for free

About this listen

Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world. Season 1 features CISOs, DFIR commanders, and security architects from SaaS, healthcare, government, and hospitality. Each episode dives into: - Breach Incidents → the first 72 hours that define an outcome (de-identified and NDA-safe). - SecOps Therapy → the frictions nobody talks about: burnout, broken workflows, and the fixes that matter. - Security Futures → fresh perspectives on what’s underrated, overhyped, and coming next in a world reshaped by AI. No vendor fluff - just operator-grade conversations that security professionals can apply immediately.Copyright 2026 Control D Economics Management Management & Leadership Politics & Government
Episodes
  • How CISOs Should Rationalize the Security Stack
    Feb 24 2026

    Ralph Chammah, Co-Founder & CEO of Blacklight AI, shares a builder’s perspective shaped by years in cybersecurity analytics—what breaks in real SOC environments, and what it takes to make detection actually usable at scale.

    In this episode, Ralph explains why “AI-first” security isn’t a label—it’s an operating model for reducing alert noise, improving context, and helping teams detect behavior that rule-based systems routinely miss.

    He explains:

    1. Why security stacks get noisy (and what “AI-first” should actually mean)
    2. How to cut through acronyms like XDR/MDR and evaluate real value
    3. How to use context + behavior patterns to catch insider risk and compromise
    4. Why privacy/trust decisions (local vs external processing) matter in AI security
    5. How replay/simulation helps validate detections and reduce false positives

    Episode Timeline:

    1. (01:46) Meet Ralph + what Blacklight AI does
    2. (06:45) Why he left the Big 4 to build a product
    3. (12:26) Tool overload, acronyms, and differentiation (XDR/MDR)
    4. (18:10) Why AI belongs in detection (and how to avoid bad signals)
    5. (21:44) Trust & privacy: where the data goes (and why)
    6. (23:16) “Battle scars” from SIEM life: parsers, missing fields, manual grind
    7. (29:32) Selective ingestion vs. “pipe everything” into the magic box
    8. (31:32) Validation: replaying history + simulation to prove detections
    9. (35:35) Biggest high-risk wins: insider threat + slow-burn intrusions
    10. (39:13) Jaguar Land Rover breach story + business impact
    11. (47:27) Quickest wins: what to connect first by maturity level
    12. (49:55) What tools he’d remove first (and why)
    13. (59:39) Platform vs point solutions: the real trade-off

    Connect with Ralph on LinkedIn

    Powered by controld.com

    Show More Show Less
    1 hr and 6 mins
  • Black-Box Security Is Failing CISOs: Build Provable Security
    Feb 10 2026

    Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie, brings a rare perspective shaped by government cyber operations, Big Tech, and building security platforms from first principles.

    In this episode, Maxime breaks down why modern security fails when it relies on black boxes, and what changes when you treat security like cloud infrastructure in an AI-driven world.

    He explains:

    1. Why “trust me bro” security models quietly fail CISOs
    2. How government cyber ops reshaped his view of threat modeling
    3. What provable security actually looks like in practice
    4. Why transparency beats vendor magic every time
    5. How AI should amplify SecOps teams, not replace them

    Episode Timeline:

    (00:00) From hacker curiosity to cybersecurity foundations

    (07:45) Lessons from government cyber operations

    (16:07) The shock of moving into private-sector security

    (25:35) Why most security platforms repeat the same mistakes

    (32:15) Provable security vs “trust me” security

    (41:40) Treating security like cloud infrastructure

    (49:50) AI’s real role in the future of SecOps

    (59:52) What CISOs should demand next from security vendors

    Connect with Maxime on LinkedIn

    Powered by Control D

    Show More Show Less
    1 hr and 1 min
  • “I Was the Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study
    Jan 28 2026

    Matt Lee, now Senior Director of Security & Compliance at Pax8, reveals how a ransomware blast at his former MSP triggered a multi-million-dollar fallout, 26 client disruptions, and a complete redefinition of what security leadership really means in today’s world.

    Matt is a battle-tested cybersecurity leader known for translating complex technical crises into practical security transformation. In this raw, revealing episode, he opens up about the breach that changed everything - and how it helped shape the philosophy behind Secure by Demand.

    He explains:

    1. How a hidden ransomware infection derailed a multi-company merger
    2. What most MSPs get dangerously wrong about security risk
    3. The real cost of reactive security: layoffs, lawsuits, and insurance gaps
    4. What “Secure by Demand” really means (and why it’s missing from most strategies)
    5. Why security maturity is the new battleground (not just tooling)
    6. How to lead through cyber chaos without losing your sanity

    Episode Timeline:

    1. (00:00) Intro: Who is Matt Lee and why this episode matters
    2. (02:42) Matt’s origin story - from hacker kid to MSP tech
    3. (06:19) Falling into security: “I just added ‘and Security’ to my badge”
    4. (11:30) The merger that hid a ticking ransomware time bomb
    5. (17:04) Voldemort incident discovery: “We bought a company mid-breach”
    6. (20:47) The day it hit: Ransomware spreads to 26 client businesses
    7. (25:15) What went wrong: due diligence gaps, supply chain blindness
    8. (30:22) Incident response chaos and internal suspicion
    9. (36:48) Fallout: 18-month recovery, insurance battles, FBI involvement
    10. (41:35) Live Compromised: The philosophy Matt built from the wreckage
    11. (47:10) The birth of “Secure by Demand” - a challenge to the industry
    12. (53:01) Software design flaws: why vendors ship insecure defaults
    13. (56:20) Advice for CISOs and MSPs: mindset, tooling, and where to start
    14. (59:40) Real-world examples: empathy, leadership, and rebuilding trust
    15. (01:03:15) Final reflections: Why the industry needs hard conversations

    Connect With Matt on LinkedIn

    Powered by Control D

    Show More Show Less
    1 hr and 19 mins
No reviews yet