top of page
podcasts (3).png

PODCASTS

PROTECT NOW, LLC.

The Security Guy and the CIA Spy Podcast

CHRON

June 2021 - Present

Security Expert Robert Siciliano and former CIA Intelligence Officer Peter Warmka talk openly about outsmarting hackers, scammers, and other cybercriminals.

​

See more >

Confessions of a CIA Spy

SECURITY CONFIDENTIAL

February 2023

Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection.

June 2nd, 2022

Confessions of a Spy with Peter Warmka

Peter Warmka was looking for a job with some excitement and accidentally became a CIA spy.  He reveals exactly what the selection process was like and how he was trained to target specific insiders and exploit their vulnerabilities to gain sensitive info.  And he’ll tell you how to do it too! 

The Art of Human Hacking

February 22nd, 2022

Peter and Southwestern CEO Dustin Hillis discuss the biggest threats facing the nation as well as individuals and public & private companies of all sizes and how to protect yourself, and cover the next generation of targeted phishing known as “spear phishing”, deception campaigns & the role of the media, and the cybersecurity threats of the future.

Finding targets of opportunity

April 2021

Guest Peter Warmka joins Dave to talk about how insider targets are chosen and assessed.

RANE INSIGHTS ON SECURITY WITH BRIAN LYNCH

Human Threats to Organizations

November 11th, 2020

Some people allocate significant resources to address insider threats without a clear understanding of how and why their trusted employees, contractors, and business associates could undertake an action which could result in serious financial and reputational damages to the firm.

RANE INSIGHTS ON SECURITY WITH BRIAN LYNCH

Insider Threats

September 11th, 2020

Peter Warmka and Brian Lynch discuss the motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists, and other threat actors.

SUBSCRIBE TO THE COUNTERINTELLIGENCE INSTITUTE NEWSLETTER

bottom of page