top of page
  • Writer's pictureRedCloud Consulting

10 Min With: RedCloud Alumni Bidemi Ologunde



Meet Bidemi Ologunde! He joined RedCloud in May 2022 as a threat intelligence consultant. When he’s not gathering and analyzing potential security threats for clients, he’s sharing the latest developments in cybersecurity and intelligence on his podcast, “The Bid Picture Podcast.” Read on to learn more about Bidemi, his role at RedCloud, and how he’s helping our clients address some of the largest cyber challenges of the day!​

 

Briefly describe your role at RedCloud.

As a threat intelligence consultant at RedCloud, my primary responsibility is to identify, evaluate and respond to security threats. To fulfill this role, I stay updated on the most recent cyber threats and attack methods. I gather and analyze information on potential security threats, which includes identifying their origin, their potential impact on the organization, and the probability of an attack. In addition, I collaborate in developing strategies to reduce these threats. This may involve implementing security measures and protocols, educating staff on cybersecurity best practices, and creating contingency plans for responding to security incidents.


Tell us a bit more about your podcast, its origin, topics covered, guests you have on and audience? 

Sharing knowledge and information with others has always been a passion of mine. During the early days of the pandemic, I found myself listening to more podcasts and realized that I could also create my own. So, in January 2021, "The Bid Picture Podcast'' was born, where I discuss the daily implications of cybersecurity and intelligence analysis.


In today's digital age, cybersecurity threats are on the rise and the stakes have never been higher. My goal was to make the podcast relatable to various audiences, including small business owners, government officials, corporate executives, parents, teenagers, grandparents, and anyone concerned about their online security.


On my podcast, I cover the latest developments in cybersecurity and intelligence analysis and how they impact our daily lives. I also invite guests from diverse backgrounds to share their insights on pressing issues such as data breaches, cyber attacks, online surveillance, and more.


Whether you're looking for practical tips on securing your online accounts or in-depth discussions on national security and geopolitics, "The Bid Picture Podcast" has everything you need to stay informed on the latest developments in cybersecurity and intelligence analysis. 


Check out Bid’s podcast on your favorite streaming platforms: 


If you had to give a business 3 points of key Cybersecurity advice, what would they be, what should they be most concerned about or focused on? 

The top priority for organizational leaders should be to prioritize cybersecurity as a business issue, rather than just an IT issue. A cyber attack or data breach can have a significant impact on an organization's reputation and financial standing. It is crucial that top-level executives consider cybersecurity a strategic priority and allocate adequate resources to protect their organization's assets and reputation. Additionally, cybersecurity should be integrated into the overall business strategy and risk management should be an ongoing process.


Educating employees on cybersecurity best practices is crucial. Employees are the first line of defense against cyber threats. Organizations must provide regular training and education to their workforce on how to identify phishing emails, recognize social engineering attacks, and understand the importance of strong passwords and multi-factor authentication. The organization should promote a culture of cybersecurity awareness and encourage employees to report any suspicious activity immediately.


It is essential to regularly test and update cybersecurity defenses. Cyber threats are continually evolving, and it is critical to keep security defenses up to date. Organizations should conduct regular vulnerability assessments and penetration testing to identify and address vulnerabilities in their systems and applications. They should also keep their software and security patches up to date and implement proactive security measures such as firewalls, intrusion detection, and prevention systems. Organizations must recognize that cybersecurity is an ongoing process that requires continual evaluation and updating of defenses to stay ahead of the threat landscape.


We understand you are tracking the developments in AI, as they relate to Cybersecurity. What industries will be most impacted by the AI revolution, and are there any particular security concerns emerging around this new technology?

The AI revolution is expected to impact a wide range of industries, but some industries are likely to experience more significant changes than others. Here are a few examples:

  • Healthcare: Artificial intelligence (AI) has the potential to revolutionize the healthcare industry in various ways, ultimately improving patient outcomes. While AI has the potential to improve the healthcare industry, there are important ethical and privacy considerations to be addressed when implementing AI in healthcare. Nonetheless, with the potential benefits it brings, AI is poised to revolutionize healthcare by making it more efficient, personalized, and effective in improving patient outcomes.

  • Finance: The finance industry can benefit greatly from AI, which has the potential to revolutionize the sector by improving efficiency, personalization, and risk management, revolutionizing the way it operates and serves its customers.

  • Manufacturing: AI has enormous potential to transform the manufacturing industry, enhancing its efficiency, productivity, and cost-effectiveness. However, it's critical to consider ethical and social considerations such as the potential impact on jobs and the need for sustainable and responsible manufacturing practices.

  • Transportation: The transportation industry stands to gain significant benefits from AI in various areas including self-driving vehicles, predictive maintenance, real-time traffic data analysis, and more. 

  • Retail: AI is expected to help retailers to personalize marketing, optimize inventory management, and enhance customer service. However, retailers must also consider important ethical and privacy considerations when implementing AI, such as protecting customer data and ensuring fairness in pricing and promotion.

With that being said, there are several security concerns around the emerging AI technology, including data privacy, adversarial attacks, lack of transparency, cybersecurity threats, and autonomous weapons to name a few. These concerns highlight the importance of developing AI technology in a responsible and transparent way that prioritizes security and ethical considerations.


Where do you see the future of Cybersecurity consulting headed? What will consultants be called on to focus in the future? 

The cybersecurity consulting industry shows great promise for the future, fueled by the rising demand for services driven by increasing cyber threats, new technologies, and regulatory compliance requirements. However, the industry needs to remain adaptable and innovative to meet the changing needs of businesses and organizations in the years ahead. Here are five potential factors that could impact the industry in the coming years:

  • As cyber threats continue to evolve and become more complex, businesses of all sizes will need to invest in cybersecurity services to safeguard their networks, data, and assets. This will likely lead to a surge in demand for cybersecurity consulting services.

  • The emergence of new technologies, such as the Internet of Things and artificial intelligence, may create new cybersecurity risks and challenges, requiring specialized expertise and consulting services.

  • Heightened regulations and compliance requirements, such as the GDPR and CCPA, may generate a greater demand for cybersecurity consulting services to assist businesses in navigating intricate data privacy and security regulations.

  • The scarcity of cybersecurity professionals is projected to continue, creating an increasing demand for consulting services to help businesses address their cybersecurity needs and fill the gap.

  • As more businesses adopt remote work and cloud computing, cybersecurity consulting services will be essential to ensure the safety and security of these new technologies from cyber threats.


We understand you've also written a book, can you tell us more about that? 

In August 2020, I had the privilege of publishing a book titled “Feet of Clay: Democracy, Democratic Values & Destructive Influences." It is a compilation of essays that explores how and why democratic values are now being threatened by social issues that have been neglected for years, such as gender and income inequality, poverty and unemployment, civil rights violations, racial discrimination, and crime, among others. As an immigrant who came to the U.S. in 2012, I became interested in the similarities and differences in the social issues in Nigeria, my home country, and the U.S. Those personal observations, in addition to the knowledge I gained from academic and non-academic sources, as well as my extensive travels to all 50 U.S. states over time, culminating in these reflections on democracy, democratic values, and their potentially destructive impacts.


Name one piece of technology you couldn’t live without and why?

My most valuable gadget is undoubtedly my smartphone. Its versatility allows me to easily communicate with others, access information, perform a variety of tasks, and stay connected with the world. Moreover, it helps me stay organized, productive, and entertained with a plethora of applications and features available at my disposal. Consequently, my smartphone has become an essential tool that I cannot imagine living without.

Recent Posts

See All
bottom of page