Behind the Data Breach: Leadership, Trust, and Cybersecurity with Jason Manar

Why the Future of Cybersecurity Depends on People, Not Tools?

In a world driven by AI, automation, and endless security tools, one truth is becoming undeniable: cybersecurity fails where humans fail. In this episode of Behind the Data Breach, former FBI Cyber Supervisory Special Agent and current CISO of Kaseya, Jason Manar, reveals why the most advanced technology is powerless without the right people behind it.

Jason shares raw leadership lessons from his 15 years fighting cybercrime at the FBI to securing a global technology company. From hiring strategies based on character, not certifications to building cybersecurity cultures that outsmart cybercriminals, this episode exposes what truly protects organizations today: A resilient, educated, humble, and human-centric security workforce.

What You’ll Learn About Cybersecurity Leadership & Real-World Risk:

  • Why humans, not AI, not firewalls are the real cybersecurity perimeter
  • How overconfidence in tools and certifications creates blind spots for CISOs
  • The three most exploited attack paths that still lead to breaches today
  • FBI-inspired hiring philosophies that build resilient cyber teams
  • How AI will revolutionize security without replacing human judgment
  • What truly keeps modern CISOs awake at night (and it’s not what you think)


Hosted by: Fred Menachem | OutThink Cyber Podcast Network

Fred Menachem is a respected industry advocate and cyber strategist highlighting the real stories behind cybersecurity leaders who shape how the world stays secure.

Train your workforce with the best in cybersecurity

Related Articles
The Misaligned Incentives of Cybersecurity : Lessons from Healthcare
Markus Sanio
26/11/2025

The Misaligned Incentives of Cybersecurity : Lessons from Healthcare

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management and ISO 27001
Gry Evita Sivertsen
31/10/2025

Human Risk Management and ISO 27001

Read More about AI-Native Cybersecurity Human Risk Management
There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 2)
Rory Attwood
27/09/2025

There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 2)

Read More about AI-Native Cybersecurity Human Risk Management
There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 1)
Rory Attwood
12/09/2025

There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 1)

Read More about AI-Native Cybersecurity Human Risk Management
Slid into my DMs: The rise of AI Phishing Influencers
Olivia Debroy
18/08/2025

Slid into my DMs: The rise of AI Phishing Influencers

Read More about AI-Native Cybersecurity Human Risk Management
Beyond Passwords: Inside the Largest Credential Leak in History
Olivia Debroy
04/08/2025

Beyond Passwords: Inside the Largest Credential Leak in History

Read More about AI-Native Cybersecurity Human Risk Management
Practical Guide to COM-B
Andy Wood
25/07/2025

Practical Guide to COM-B

Read More about AI-Native Cybersecurity Human Risk Management
Building the Foundation: The Crucial Role of Security Culture in Today's Organizations
Andy Wood
18/07/2025

Building the Foundation: The Crucial Role of Security Culture in Today's Organizations

Read More about AI-Native Cybersecurity Human Risk Management
How to Build and Sustain a Successful Security Champions Program
Andy Wood
11/07/2025

How to Build and Sustain a Successful Security Champions Program

Read More about AI-Native Cybersecurity Human Risk Management
It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management
Thea Mannix
27/06/2025

It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management