{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":300,"width":600,"title":"Are We Ready for 2026? Top Cyber Predictions on Policy, Tech, and Threats","description":"Cyber Focus kicks off 2026 (and its 100th new episode) with rapid-fire predictions from McCrary Institute senior fellows. They flag big policy inflection points\u2014especially whether Congress can reauthorize \u201cCISA 2015,\u201d sustain information-sharing protections, and keep state and local cybersecurity funding on track. Tech-wise, the group focuses on AI\u2019s accelerating integration, the \u201cspeed\u201d divide between defenders and adversaries, and emerging pressures across connectivity and infrastructure. On threats, they warn about deepfake-driven social engineering, ransomware that\u2019s getting faster and more accessible, \u201ctyphoon\u201d intrusions, and the compounding risk of encryption and security tech debt.  Main Topics Covered   CISA 2015 reauthorization, information sharing, and state\/local cyber funding priorities.  Cyber offense and deterrence: shaping adversary behavior by imposing real costs.  AI everywhere: faster attacks, faster defense, and higher infrastructure stakes.  Convergence and connectivity: data centers, wireless, subsea cables, satellite, and scale.  Deepfake social engineering and shrinking ransomware dwell times in 2026.  \u201cTyphoon\u201d intrusions, critical infrastructure exposure, and major-event targeting pressure.  Key Quotes  &quot;What I believe is going to overtake identity just in general is deep fake social engineering. And that means the calls that look like your CEO that tell you to get on an urgent call right now... I think I'd click on that if I didn't know better. And a lot of us in the security realm would.&quot;  \u2014 Cynthia Kaiser  &quot;We're actually getting the broader dividing line between haves and have nots... If you can't move fast, you're going to need to find someone who can... If you're someone that can't receive new information and immediately improve your defensive posture, you're probably a have not.&quot;  \u2014 Matt Hayden  &quot;We're seeing and hearing that the US government is interested in taking the fight to the adversaries... shaping the adversary's behavior is important because it slows them down, it imposes costs on them, and perhaps it could lead to deterrence.&quot;  \u2014 Christopher Roberti  &quot;I started with China and I'm going to end with China... making sure again, we don't take our eye off the ball that wow, there may be reasons to make deals economically with China. We have to treat them as a potential adversary.&quot;  \u2014 Bob Kolasky  &quot;At the end of the day, I look at as the typhoon epidemic\u2014Salt, Vault... What is the next typhoon we're going to uncover in 2026 that's going to be driving our cybersecurity defense measures?&quot;  \u2014 Bill Evanina Relevant Links and Resources  https:\/\/mccraryinstitute.com\/directory\/senior-fellows\/ ","author_name":"Cyber Focus: Cybersecurity, National Security, and Critical Infrastructure","author_url":"https:\/\/mccraryinstitute.com\/podcast\/","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/39627500\/height\/300\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"300\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/197198965"}