BarCode

Follow BarCode
Share on
Copy link to clipboard

Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who will greet and walk us through making an exceptional yet easy-to-make beverage right from the comfort of your own home. It's Cybersecurity straight up, no chaser.

Chris Glanden


    • Jun 3, 2025 LATEST EPISODE
    • every other week NEW EPISODES
    • 50m AVG DURATION
    • 129 EPISODES

    5 from 26 ratings Listeners of BarCode that love the show mention: chris, topics, informative, great.


    Ivy Insights

    The BarCode podcast, hosted by Chris Glanden, is a highly informative and engaging show that delves into current cybersecurity topics and features discussions with notable personalities in the field. With his expertise shining through, Chris provides listeners with valuable insights and analysis on various aspects of cybersecurity. One unique and enjoyable aspect of this podcast is the addition of special drinks for each episode, adding a fun twist to the informative content.

    One of the best aspects of The BarCode podcast is the depth of knowledge and expertise that Chris brings to each episode. As an expert in cybersecurity, he is able to provide detailed explanations, analysis, and perspectives on a wide range of topics. This makes for highly educational content that is accessible even to those who may not have a strong background in cybersecurity.

    Furthermore, the caliber of guests featured on this podcast is truly fantastic. Chris manages to attract top industry professionals and thought leaders who provide unique insights and experiences that listeners can learn from. This adds immense value to each episode and ensures that listeners are exposed to diverse perspectives within the field.

    However, one potential downside of The BarCode podcast is that some episodes may be too technical or advanced for those who are new to the world of cybersecurity. While Chris does an excellent job at breaking down complex concepts into understandable terms, there may still be instances where listeners without prior knowledge might struggle to fully grasp certain discussions.

    In conclusion, The BarCode podcast stands out as an exceptional resource for anyone interested in staying informed about current cybersecurity topics. Chris Glanden's expertise shines through in each episode as he engages listeners with informative content and intriguing discussions with industry experts. While some episodes may be more challenging for beginners, overall, this podcast offers valuable insights into the ever-evolving world of cybersecurity.



    Search for episodes from BarCode with a specific topic:

    Latest episodes from BarCode

    The Chosen One

    Play Episode Listen Later Jun 3, 2025 54:38


    In this conversation, FIlipi Pires shares his journey into cybersecurity, reflecting on his experiences at HackSpaceCon and discussing the importance of community and continuous learning. He emphasizes the critical issue of misconfigurations in identity management and the need for organizations to understand their vulnerabilities, particularly with legacy systems. Felipe also highlights the evolving nature of threats and the importance of being proactive in security measures. He provides insights into the future of red teaming and offers guidance for aspiring professionals in the field. In this conversation, Filipi Pires discusses the journey of growth in the cybersecurity field, emphasizing the importance of patience and continuous learning. He shares insights about his role at Segura, a company focused on identity solutions, and highlights the significance of community engagement. The discussion also touches on cultural aspects, including Brazilian cuisine and personal preferences, showcasing Filipi's vibrant personality and passion for his work.00:00 Introduction to Filipi Pires02:09 Reflections on HackSpaceCon05:03 Felipe's Journey into Cybersecurity11:01 Learning and Skill Development in Cybersecurity17:02 Current Trends and Misconfigurations in Cybersecurity19:38 Staying Current in Cybersecurity22:52 Understanding Threats and Attack Vectors28:46 The Future of Red Teaming32:46 Guidance for Aspiring Red Teamers36:44 The Journey in Cybersecurity43:59 Understanding Segura and Its Mission45:12 Connecting with the Community50:07 Cultural Insights and Personal PreferencesSYMLINKS[Filipi Pires - Official Website] - https://filipipires.comFilipi Pires' personal website, showcasing his professional background, speaking engagements, research, and cybersecurity insights. It serves as a central hub for his content, blog posts, and community contributions.[Filipi Pires on GitHub] - https://github.com/philip86Filipi Pires' GitHub profile where he shares open-source tools, projects, and potentially his upcoming event schedule. It's a place to follow his latest contributions to the cybersecurity community.[Filipi Pires on LinkedIn] - https://www.linkedin.com/in/filipipiresFilipi's professional profile for connecting with him and following his cybersecurity insights, talks, and global engagements.[Filipi Pires on YouTube] - https://www.youtube.com/@filipi-piresFilipi's YouTube channel featuring his recorded conference talks and cybersecurity presentations in Portuguese, Spanish, and English.[Burp Suite Academy] - https://portswigger.net/web-securityA free, hands-on learning platform created by PortSwigger that teaches web application security using the Burp Suite tool. Recommended by Filipi Pires as a foundational resource for aspiring red teamers and web security professionals.[TryHackMe] - https://tryhackme.com An interactive platform offering cybersecurity labs and learning paths focused on offensive and defensive security. Filipi recommends it for hands-on practice in red teaming and hacking fundamentals.[Hack The Box] - https://www.hackthebox.comA cybersecurity training platform that allows users to practice penetration testing skills in virtual environments. Mentioned as a useful resource for practical skill development in red teaming and ethical hacking.

    Worldwide Security

    Play Episode Listen Later May 7, 2025 44:22


    In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool's Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] -  https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world's largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.

    Soulware

    Play Episode Listen Later Apr 30, 2025 42:49


    In this conversation, Matthew Chavira, CEO of Profits of AI,discusses his journey in the AI industry, particularly focusing on the evolution of humanoid robots like Sophia. He explores the rapid advancements in humanoid robotics, the integration of AI capabilities, and the public's perception of these technologies. Chavira emphasizes the importance of trusted information regarding AI's societal impact and highlights the role of artists in communicating the significance of AI advancements. In this conversation, Matthew Chavira discusses the intersection of art and artificial intelligence, highlighting a unique AI sculpture that allows interaction with the history of African American women. He emphasizes the importance of evaluating AI experts and the need for unique perspectives in the field. The discussion also covers the significance of live events in sharing unconventional ideas, the ethical implications of AI, and concerns regarding transformative AI technologies. The conversation concludes with a light-hearted exchange about unique experiences and aspirations in the AI and cybersecurity landscape. 00:00 Introduction to AI and Humanoid Robotics04:42 The Evolution of Sophia and Humanoid Robots07:46 The Future of Humanoid Robotics10:25 AI and Humanoid Integration13:21 The Challenge of Distinguishing AI from Reality16:01 Public Perception of Humanoids18:47 Profits of AI: Bridging the Gap in AI ThoughtLeadership21:40 The Role of Artists in AI and Society25:11 The Intersection of Art and AI28:41 Evaluating AI Experts and Perspectives31:43 The Importance of Unique Perspectives in AI33:06 The Power of Live Events36:23 Ethics in AI and Cybersecurity38:18 Concerns About Transformative AI41:44 Unique Experiences and Future Aspirations SYMLINKS:[Prophets of AI – Official Website]https://prophetsofai.comThe official site of Prophets of AI, founded by Matthew Chavira. It serves as a platform to connect organizations with leading AI experts across various disciplines, offering insights into the evolving landscape of artificial intelligence. ​ [Matthew Chavira – LinkedIn Profile]https://www.linkedin.com/in/matthewchavira/Matthew Chavira's professional LinkedIn profile, detailing his roles as Founder and CEO of Prophets of AI, Global Director of AI Partnerships at the International Advertising Association, and Head of Strategic Partnerships atHanson Robotics. [Hanson Robotics – Official Website]URL: https://www.hansonrobotics.comThe company behind Sophia the robot. Hanson Robotics is a Hong Kong-based AI and robotics company dedicated to creating socially intelligent machines. Sophia has been presented at over 100 events globally and is a central figurein Chavira's career.[Time Magazine's 100 Most Influential People in AI 2024]https://time.com/collection/time100-ai-2024/An annual list by Time Magazine highlighting the most influential figures in artificial intelligence, including innovators, leaders, and thinkers shaping the future of AI. ​ [Techstrong TV – Profits of AI Videos]https://techstrong.tv/video-tag/profits-of-aiA collection of videos featuring Matthew Chavira discussing the impact of generative AI on various industries, sustainability, and the rise of virtual avatars. ​ [HOPE Global Forums – Matthew Chavira Speaker Profile]https://hopeglobalforums.org/speaker/matthew-chavira/Matthew Chavira's speaker profile at HOPE Global Forums, detailing his expertise in AI and his role in connecting companies with thought leadership and educational programs. ​ [Thinking Heads – Matthew Chavira Speaker Profile]https://thinkingheads.com/en/speakers/matthew-chavira/A speaker profile highlighting Matthew Chavira's contributions to AI, his leadership at Prophets of AI, and his involvement in strategic partnerships at Hanson Robotics.

    DELTA K

    Play Episode Listen Later Apr 11, 2025 56:34


    In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscussion also delves into thin calculus and the category theory of things, emphasizing the need for an external truth to build sound mathematical systems. In this conversation, the speakers delve into the concepts of agentic calculusand Delta K, exploring their implications for artificial general intelligence (AGI) and the future of the economy. They discuss the observer-dependent nature of reality and how different perspectives can lead to varied interpretations ofthe same phenomena. The conversation also touches on the potential of the agentic economy to revolutionize ownership and economic dynamics, as well as the philosophical implications of waveform collapse in quantum mechanics.Overall, the discussion highlights the need for a new understanding of cognitive processing and the role of agents in shaping future interactions and economies. TIMESTAMPS:00:00 - Introduction to the Guests and Their Expertise02:16 - Recent Developments in AI and Technology04:50 - Understanding Large Language Models10:53 - Delta K and Its Limitations16:24 - Thin Calculus and the Category Theory of Things19:19 - Understanding Agentic Calculus22:27 - Delta K and Its Implications for AGI28:59 - Cognitive Processing and States of Being36:09 - The Agentic Economy: A New Paradigm40:25 - Waveform Collapse and Delta K43:20 The Future of Agentic Interactions SYMLINKS:[LinkedIn - Charlie Northrup] - https://www.linkedin.com/in/charlie-northrup-1b73b051Charlie Northrup is a technology innovator at Neewer Sciences, contributing pioneering research in agentic AI systems, thing calculus, and distributed digital ecosystems. He shares updates and insights about his work on LinkedIn.[LinkedIn - Keenan Hale] - https://www.linkedin.com/in/keenandewayne/Keenan Hale is recognized for his interdisciplinary contributions bridging theoretical mathematics and cryptographic systems. He connects with others inthe AI and cryptography communities through LinkedIn and shares research updates and discussions.[LinkedIn - Mike Elkins] - https://www.linkedin.com/in/elkinsmike/Mike Elkins is the Chief Human and Information Security Officer at Banffist, actively involved in discussions about cybersecurity, digital transformation, and AI-driven enterprise operations. He also speaks at major conferences like BlackHat, RSA, and SecureWorld.

    MikeHacksThings

    Play Episode Listen Later Mar 25, 2025 31:38


    In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements.TIMESTAMPS:00:00 - Introduction to Cybersecurity Journey03:23 - The Path to OSCP Certification06:13 - Transitioning to Consulting in Cybersecurity09:14 - Understanding Client Needs in Cybersecurity11:56 - Leadership in Red Team Village14:32 - NCAE Cyber Games and CTF Design17:26 - Creating Effective CTF Challenges20:04 Resources for Aspiring CTF Participants22:57 Content Development for Cybersecurity Education25:49 Unique Experiences in Cybersecurity Events28:25 Closing Thoughts and Future Engagements SYMLINKS:[Maltek Solutions Website] - https://malteksolutions.com/A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi.[Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends.[Red Team Village (RTV) Website] - https://redteamvillage.ioA nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences.[Red Team Village Discord] - https://discord.com/invite/redteamvillageThe official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities.[Red Team Village X (Twitter)]- https://twitter.com/redteamvillage_RTV's official social media account for announcements, event updates, and cybersecurity-related discussions.[MetaCTF Website] - https://metactf.comA platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges.[CTF Time Website] - https://ctftime.orgA website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors.[Hack The Box Website] - https://www.hackthebox.comA cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills.[TryHackMe Website] - https://tryhackme.comAn interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners.CONNECT WITH US ⁠www.barcodesecurity.com⁠ Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com

    Silent War

    Play Episode Listen Later Mar 16, 2025 63:08


    In this conversation, Chris Glanden interviews Derek Fisher, a cybersecurity expert with nearly 30 years of experience. They discuss Derek's background, the evolving landscape of cybersecurity with the advent of AI and cloud computing, the importance of threat modeling, and the challenges in the security hiring process. Derek emphasizes the need for a secure design in cybersecurity and the impact of AI on threat modeling, while also addressing the difficulties job seekers face in a competitive market. In this conversation, Derek Fisher discusses the current state of the cybersecurity job market, emphasizing the frustrations faced by both job seekers and employers. He provides insights on how individuals can break into the industry, highlighting the importance of aligning personal interests with market demands. Derek also addresses the gap between academic education and real-world skills, advocating for more practical experiences for students. He shares his experience writing children's books to inspire the next generation about cybersecurity and discusses the challenges parents face in navigating technology with their kids. Finally, he explores future trends in technology, including robotics and quantum computing, and shares a fun concept for a cybersecurity-themed bar.TIMESTAMPS:00:00 Introduction to Cybersecurity and Derek Fisher's Background10:09 The Impact of AI and Cloud on Cybersecurity19:19 Understanding Threat Modeling in Cybersecurity27:47 Navigating the Security Hiring Process35:48 Navigating the Job Market in Cybersecurity36:40 Breaking into Cybersecurity: Finding Your Path44:16 Bridging the Gap: Academia vs. Industry47:24 Inspiring the Next Generation: Writing for Kids50:46 The Challenges of Parenting in a Digital Age54:08 Future Trends in Cybersecurity and Technology56:52 Creating a Cybersecurity-Themed Bar: A Fun ConceptSYMLINKS:[Derek Fisher's LinkedIn Profile ]- https://www.linkedin.com/in/derek-fisher-sec-archConnect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity.[Securely Built Website] - https://www.securelybuilt.com/Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. [Secure Work Coach] - https://www.secureworkcoach.com/aboutAccess specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering [Derek Fisher's Udemy Instructor Profile] - https://www.udemy.com/user/derek-fisher-8/Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation.[Ultimate Cybersecurity Course & CISSP Exam Prep] - https://www.udemy.com/course/ultimate-cyber-security-course/Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher.[The Application Security Program Handbook] - https://www.securelybuilt.com/mediaLearn about building an application security program through this comprehensive guide authored by Derek Fisher.[Alicia Connected Series ] - https://www.aliciaconnected.com/Discover the "Alicia Connected" children's book series by Derek Fisher, focusing on safe technology usage for kids.[Securely Built YouTube Channel] - https://www.youtube.com/@securelybuiltWatch cybersecurity tutorials and discussions on the Securely Built YouTube channel.[Derek Fisher's Articles on SecureWorld News] - https://www.secureworld.io/industry-news/author/derek-fisherRead articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.

    Reality Defaced

    Play Episode Listen Later Mar 7, 2025 62:14


    In this conversation, Perry Carpenter discusses the evolution of misinformation and disinformation in the age of AI and deepfakes. He explores the psychological principles that make individuals susceptible to deception, the ongoing arms race between detection and deception, and theregulatory landscape surrounding these issues. Carpenter emphasizes the importance of understanding narratives and cognitive biases in combating misinformation while also highlighting the challenges posed by rapidlyadvancing technology. In this conversation, Perry Carpenter discusses the implications of deepfakes and AI in cybersecurity, emphasizing the concept ofthe liar's dividend, the need for cognitive awareness training, and the ongoing arms race between AI-generated deception and truth verification. He highlights the erosion of trust in media and the necessity of understanding themotivations behind AI-generated content. Carpenter also shares insights on the future of deepfakes, ethical challenges, and the importance of focusing on the'why' behind AI technologies. TIMESTAMPS:00:00 Introduction to Perry Carpenter and His Work02:37 The Evolution of Misinformation and Disinformation06:42 The Arms Race: Detection vs. Deception12:00 The Impact of Deepfakes on Society17:41 Psychological Principles Behind Deepfakes23:16 Regulatory Landscape and Future Implications34:59 The Liar's Dividend and Its Implications36:09 Defending Against AI-Powered Threats40:06 The Arms Race of AI and Cybersecurity46:17 Erosion of Trust in Media52:38 The Future of Deepfakes and Society57:38 Understanding the Why Behind AI and Deception SYMLINKS:[LinkedIn – Perry Carpenter Profile] - https://www.linkedin.com/in/perrycarpenter/Perry Carpenter's professional LinkedIn profile details his background in cybersecurity, his work on AI-generated deception, and his industry engagements. It serves as a hub for networking and accessing more informationon his projects.[X (formerly Twitter) – Perry Carpenter Profile] - https://x.com/perrycarpenter?lang=enPerry Carpenter's profile on X is where he shares real-time insights, commentary on cybersecurity trends, and updates related to his work in AI and digital deception. [Perry Carpenter's Book “FAIK”] - https://www.thisbookisfaik.com/This global retailer offers Perry Carpenter's book, Fake:A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deception, which explores modern digital deception andcybersecurity.[YouTube – The Fake Files Channel] - https://www.youtube.com/@theFAIKfilesYouTube hosts Perry Carpenter's channel, “The Fake Files,” where he shares AI tutorials, deepfake detection tips, and cybersecurity insights related to synthetic media.

    Statline

    Play Episode Listen Later Feb 25, 2025 23:49 Transcription Available


    In this engaging conversation, Chris Glanden interviews Mariano Mattei, VP of Cybersecurity and AI at Azure Solutions. Mariano shares his extensive background in software engineering and cybersecurity, emphasizing the importance of metrics in communicating security risks to executive teams. He discusses the challenges organizations face in quantifying security effectiveness and adapting metrics to the rapidly evolving threat landscape, particularly with the rise of AI. The conversation also explores the intersection of creativity and cybersecurity, highlighting Mariano's passion for filmmaking and innovation. As they wrap up, they touch on future projects and the importance of maintaining a balance between work and creative pursuits.TIMESTAMPS:00:00 Introduction to Cybersecurity and AI01:44 Mariano's Journey into Cybersecurity04:34 The Importance of Metrics in Cybersecurity08:57 Challenges in Quantifying Security Effectiveness12:04 Adapting Metrics to Evolving Threats14:31 Creativity in Cybersecurity and Filmmaking18:51 Finding Balance Between Work and Creativity22:25 Future Plans and Projects24:40 Closing Thoughts and Fun IdeasSYMLINKS:Mariano A. Mattei - LinkedIn - https://www.linkedin.com/in/mariano-a-matteiThe professional LinkedIn profile of Mariano A. Mattei, offering insights into his career, experiences, and professional connections.Security Metrics – Mastering the Data Behind Cybersecurity - https://www.manning.com/books/security-metricsA comprehensive guide authored by Mariano Mattei, focusing on data-driven approaches to cybersecurity. Available through Manning Publications.Mattei InfoSec - https://matteiinfosec.com/A consulting firm founded by Mariano Mattei, specializing in Chief Information Security Officer (CISO) services and data-driven information security solutions.Security Metrics - Manning Publications - https://www.manning.com/books/security-metricsA comprehensive guide on quantifying cybersecurity efforts, helping organizations measure, improve, and communicate the value of their security programs.Sacrum Vindictae Official Website - https://sacrumvindictae.com/The official site for the film "Sacrum Vindictae," providing information on the storyline, cast, crew, and upcoming events related to the movie.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.comCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    NeuroVector

    Play Episode Listen Later Feb 17, 2025 44:57 Transcription Available


    In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understanding cognitive attacks and their implications for both humans and AI systems. In this conversation, Chris Glanden and Matt Canham delve into the evolving landscape of cognitive security, emphasizing the need for security practitioners to adopt a systems-thinking approach. They discuss the implications of AI and direct neural interfaces on security practices, the role of DeepSeek in shaping AI interactions, and insights from the Cognitive Security Institute's meetings. The conversation also touches on emerging trends in cognitive warfare and concludes with a thematic drink inspired by the complexities of the field.TIMESTAMPS:00:00 Introduction to Deep Fakes and AI Technology02:28 Understanding Cognitive Security09:58 Differentiating Cognitive Security from Social Engineering19:05 Exploring the OSI Model and Cognitive Security Layers21:48 Bringing Security Back to Earth24:26 The Role of Cognitive Security in Modern Threats25:02 AI's Impact on Security Practices30:36 DeepSeek and Its Implications33:47 Insights from the Cognitive Security Institute41:28 Emerging Trends in Cognitive Warfare45:43 The Complexity Cocktail: A Thematic ConclusionSYMLINKS:Dr. Matthew Canham – Home – https://www.canham.ai/The official website of Dr. Matthew Canham, showcasing his expertise in human–AI integration, cognitive security, and updates on his latest projects and research. Research – https://www.canham.ai/researchA dedicated section highlighting Dr. Canham's research initiatives and academic contributions in the field of human–AI integration and cognitive security.LinkedIn – https://www.linkedin.com/Dr. Canham's professional networking profile where you can learn more about his career achievements, collaborations, and thought leadership.Cognitive Security: Exploring the Human Layer w/ Dr. Matthew Canham | CSI Talks #1 – https://youtu.be/OGmvoj5Dj_AA YouTube video where Dr. Canham elaborates on cognitive security and human–AI integration, aligning closely with the conversation's focus on evolving security threats.Cognitive Security – Army Cyber Institute – https://cyber.army.mil/Research/Research-Labs/Cognitive-Security/An official U.S. Department of Defense page describing research into cognitive security—protecting decision-making under adversarial conditions. This resource underscores the growing institutional focus on the subject.Apple's Mind-Blowing Invention: AirPods That Can Read Your Thoughts – https://digialps.com/apples-mind-blowing-invention-airpods-that-can-read-your-thoughts/]An article that examines Apple's patent for AirPods designed to detect brain signals, diCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Torque

    Play Episode Listen Later Feb 11, 2025 41:40 Transcription Available


    Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stanley's 400-person Cyber Security Division, later holding executive roles at Bank of America and Goldman Sachs. Now a trusted advisor to C-suites and boards, Curt shares how the lessons of engineering, military strategy, and high-stakes cyber defense all come down to maintaining control under pressure.TIMESTAMPS:00:00 Curt Vincent's Journey to Cybersecurity14:40 Building Cybersecurity at Morgan Stanley28:39 Cultural Shifts in Cybersecurity Practices29:24 The Disconnect Between Cybersecurity and Business32:13 Accountability and Consequences in Cybersecurity35:12 Communication and Leadership in Cybersecurity38:40 Connecting with the Audience: The Role of Analogies39:14 Unique Experiences and Cultural PerspectivesSYMLINKS:Curt Vincent's Website - https://curtvincent.comCurt Vincent's speaker website where he shares insights on cybersecurity, leadership, and consulting.KnowBe4 - https://www.knowbe4.comA cybersecurity awareness training platform that specializes in phishing simulation and security education to help organizations mitigate human-related risks.Proofpoint - https://www.proofpoint.comA cybersecurity company providing threat intelligence, email security, and phishing prevention solutions to protect organizations from cyber threats.Morgan Stanley Cybersecurity - https://www.morganstanley.com/Morgan Stanley's approach to cybersecurity includes best practices and risk management strategies for businesses and individuals.Widener University - https://www.widener.eduThe university where Curt Vincent pursued his degree before re-entering the military and advancing in his cybersecurity career.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Ghost Protocol

    Play Episode Listen Later Feb 3, 2025 64:18 Transcription Available


    In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking, raising questions about the intersection of technology and the paranormal. In this conversation,they discuss the fascinating intersection of psychic abilities and cybersecurity. They discuss a blackbox experiment designed to test psychic phenomena, revealing surprising results and implications for security. The conversation explores how psychics can inadvertently gather information, the potential dangers of psychic hacking, and the importance of imagination in cybersecurity. Scotch shares insights on developing psychic abilities, future research projects, and personal experiences with haunted locations, culminating in a creative discussion about a hypothetical cybersecurity-themed bar.TIMESTAMPS:00:00 - Introduction to Scotch Wichmann and His Journey09:52 - The Intersection of Cybersecurity and Paranormal Experiences19:33 - Exploring the U.S. Government's Stargate Program28:15 - Psychic Hacking: A New Frontier in Cybersecurity34:10 - The Black Box Experiment35:28 - Psychic Insights and Surprising Results39:53 - Collusion and Confidence in Psychic Abilities42:11 - Developing Psychic Abilities44:30 - The Dangers of Psychic Hacking46:14 - Cybersecurity Implications of Psychic Phenomena49:49 - Defending Against Psychic Attacks56:36 - Imagination in Cybersecurity59:53 - Future Research and Projects01:01:29 - Connecting with Scotch Witchman01:02:34 - Haunted Bars and Personal Experiences01:04:35 - Creating a Cybersecurity-Themed BarSYMLINKS:Scotch Wichmann's Website - https://www.scotchwichmann.comA personal website featuring Scotch Wichmann's work, including cybersecurity insights, performance art, and paranormal research.Psychic Hacking Experiment - https://www.psychicexperiment.orgA website detailing Scotch Wichmann's experiment on psychic hacking, including methodologies, results, and raw data for public review.Stargate Project - http://en.wikipedia.org/wiki/Stargate_Project_(U.S._Army_unit)Wikipeida page based on a secret U.S. Army unit established in 1977[1][2] at Fort Meade, Maryland, by the Defense Intelligence Agency (DIA) and SRI International (a California contractor) to investigate the potential for psychic phenomena in military and domestic intelligence applications.CIA Declassified Documents on Remote Viewing -https://www.cia.gov/readingroom/The CICONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    OSXploit

    Play Episode Listen Later Jan 28, 2025 27:08 Transcription Available


    In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on security and offers advice for those looking to specialize in macOS security.TIMESTAMPS:00:00 Introduction to Cybersecurity and Slava's Journey07:03 Understanding macOS Security and Threat Landscape11:38 ThreatLocker's Zero Trust Approach16:36 Evolving Threats and Social Engineering21:23 Advice for Aspiring macOS Security Professionals26:04 Closing Thoughts and RecommendationsSYMLINKS:ThreatLocker Official Website - https://www.threatlocker.com The official site for ThreatLocker, a cybersecurity company specializing in zero-trust security solutions.Zero Trust World 2025 Conference - https://zerotrustworld.threatlocker.com/ An immersive cybersecurity event scheduled for February 19-21, 2025, in Orlando, Florida, featuring hands-on hacking labs, expert sessions, and networking opportunities.Zero Trust World 2025 Agenda - https://ztw.com/agenda Detailed schedule of sessions, including keynotes, breakout sessions, and hands-on labs for the Zero Trust World 2025 conference.Zero Trust World 2025 FAQ - https://zerotrustworld.threatlocker.com/faq Frequently asked questions providing information on event details, registration, and accommodations for the Zero Trust World 2025 conference.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Syntax

    Play Episode Listen Later Jan 21, 2025 55:25 Transcription Available


    In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of navigating the job market today. In this engaging conversation, Chris Glanden and Syntax delve into various topics surrounding cybersecurity, innovative uses of technology, and the vibrant hacker community. They discuss the intricacies of Windows language packs and their implications for security, the creative use of Twitch as a command and control platform, and the importance of community-driven conferences. Syntax shares his experiences with unique venues and bars across the country, culminating in a humorous discussion about the concept of a cybersecurity-themed bar, complete with signature drinks that reflect hacker culture.TIMESTAMPS:00:00 - Introduction to Brandon Prince03:52 - Early Life and Hacking Beginnings06:33 - Navigating the Hacker Community08:59 - The DJ Journey and DefCon Experience11:22 - Incorporating Hacking into Music14:01 - Motorbike Racing Adventures16:35 - Current Job Market Insights19:14 - Unique Hacking Experiences26:46 - Resume Hacking29:35 - Exploring Windows Language Packs and Exploits31:39 - Innovative Use of Twitch as a C237:25 - Upcoming Conferences and Events39:37 - Preference for Community-Based Conferences46:29 - Unique Venues and Bar Experiences51:29 - Conceptualizing a Cybersecurity-Themed BarSYMLINKS:Syntax on Twitch - https://twitch.tv/Syntax976Syntax's official Twitch channel where he streams music, sim racing, and hacker-themed content.Syntax on SoundCloud - https://soundcloud.com/Syntax976SoundCloud profile featuring Syntax's original tracks, including contributions to Defcon soundtracks.DEF CON Media Server - https://media.defcon.orgOfficial media server for DEF CON, hosting soundtracks, talks, and other resources.Meow Wolf Official Website - https://meowwolf.comInteractive and immersive art experiences, including Meow Wolf venues mentioned by Syntax.CactusCon Official Website - https://cactuscon.comDetails about the CactusCon conference in Phoenix, Arizona, where Syntax may perform.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Compliance Catalyst

    Play Episode Listen Later Jan 10, 2025 45:39 Transcription Available


    Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul's Security Weekly podcast. His efforts also extend to organizing BSides Delaware, further cementing his influence and dedication to the cybersecurity community.He shares his diverse career journey from law enforcement to tech support and finally into cybersecurity leadership. Listeners gain insight into his work with compliance frameworks like CMMC and SPDX, and his strategic approach at Cyturus, focusing on "dynamic risk monitoring" as a forward-thinking solution for mitigating risks. This episode also delves into the global regulatory landscape, comparing U.S. frameworks with those abroad and discussing AI regulation insights. As always, the conversation is enriched with amusing anecdotes and expert advice, making it not only educational but also engaging.TIMESTAMPS:0:00 - Exploring Security, Compliance, and Innovation3:05 - Reviving In-Person Tech Conferences Post-COVID Challenges11:58 - From Tech Support to Cybersecurity and Compliance19:12 - The Challenges and Importance of Software Bill of Materials24:25 - The Global Regulatory Landscape and Its Impact on AI Development28:37 - HIPAA Compliance Challenges for Lawyers and Medical Startups30:00 - Dynamic Risk Monitoring as a Compliance and Revenue Driver34:32 - The Impact of Podcasts on the Cybersecurity Community40:14 - Exploring Unique Bars and Crafting Cybersecurity-Themed CocktailsSYMLINKSCyturus Website - https://cyturus.comOfficial website for Cyturus, a leader in compliance process products and solutions, focusing on dynamic risk monitoring and governance.Josh Marpet on LinkedIn - https://www.linkedin.com/in/joshuaviktor/Josh Marpet's professional LinkedIn profile for networking and insights.Paul's Security Weekly - https://securityweekly.comOne of the top cybersecurity podcasts, providing news, insights, and discussions on emerging threats and best practices in security.SPDX (Software Package Data Exchange) - https://spdx.devOfficial resource for SPDX, an ISO-certified standard for managing Software Bill of Materials (SBOM).CycloneDX - https://cyclonedx.orgA standard designed for the SBOM, with a focus on integration with CI/CD pipelines and automated systems.Executive Order 14028 - https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/U.S. Executive Order mandating the use of Software Bill of Materials (SBOM) for federal software contracts to improve cybersecurity.Helen Oakley - https://www.linkedin.com/in/helen-oakley/Profile and resources related to Helen Oakley, a professional working on AI Bill of Materials.NIST AI RMF (Risk Management Framework) - https://nist.gov/ai/rmfU.S. NationCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE on Rendezvous Yacht II

    Play Episode Listen Later Oct 18, 2024 17:40 Transcription Available


    SESSION TITLE: BCP LIVE on Rendezvous Yacht IIRECORDED: 9/26/24VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/LOCATION: Philadelphia, PAGUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of PhiladelphiaSPONSOR: Philly Tech CouncilABOUT GUESTS:​Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previously served as the CISO for the Philadelphia International Airport for five years, where he honed his skills in monitoring and securing a vast array of technological systems in both the public sector and critical infrastructure.Jessica Hoffman plays a pivotal role in Philadelphia's cybersecurity landscape, working side by side with Damian Oreves. With experience in both private and public sectors, Jessica brings a comprehensive understanding of cybersecurity and is keenly focused on safeguarding citizens and workforce digital environments. Her expertise encompasses both tactical implementation and strategic oversight, demonstrating her dedication to making a difference in her community.Key Takeaways:Scrutinizing the broad scale of city-level cybersecurity necessitates efficient, automated asset inventory management.The public sector is distinctly impacted by regulatory entities, and cybersecurity officers uphold a crucial role in maintaining not only digital safety but also public trust.Engaging with city departments on cybersecurity imperatives fosters greater buy-in and alignment with defensive measures.The team stresses balancing innovation with caution, especially in the realm of emerging technologies like AI, to maintain operational security.There is inherent cultural importance in municipal service roles, reflecting a deeper connection to meaningful cybersecurity contributions.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Leading Edge

    Play Episode Listen Later Oct 17, 2024 49:23 Transcription Available


    Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she shares her holistic approach to leadership. A distinguished speaker and thought leader in the Philadelphia cybersecurity community, Klotz actively engages with various initiatives and forums to inspire future leaders.Her book highlights 25 essential qualities for leaders across any industry. Focusing on traits like empathy, grace, and self-awareness, the book underscores the growing importance of these soft skills in building resilient, high-performing teams—crucial to modern leadership. The "TTIPPC" Framework emphasizes the need for transparency, inclusion, and consistency in fostering united and productive teams. Through engaging career stories, Klotz offers valuable insights into navigating professional challenges while balancing personal life with a compassionate and determined leadership approach.TIMESTAMPS:0:16 - Leading With Empathy and Building High-Performing Teams2:18 - Cybersecurity Leadership Across Industries and Unique Challenges7:15 - Balancing Leadership, Family, and Community Involvement17:02 - Empathy and Grace: Essential Leadership Qualities for Success25:03 - Building High-Performing Teams Through Positive Energy and Collaboration 37:04 - Leading With Empathy and Grace Through the TTIPPC Framework 45:25 - Cybersecurity Conversations and Creative Bar ConceptsSYMLINKSLeading with Grace and Empathy - https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573URL where Tammy Klotz's book Leading with Empathy and Grace is available for purchase. LinkedIn - https://www.linkedin.com/in/tammyklotz/Platform where Tammy Klotz is available for professional networking. Redstone Grill - https://redstonegrill.comTammy's go-to restaurant in Plymouth Meeting,PA with a great atmosphere and outdoor patio. Frequently used for professional dinners and happy hours. Trinseo - https://www.trinseo.comTammy's current employer, where she is focused on improving the cybersecurity program with a particular emphasis on OT security. DRINK INSTRUCTIONEmpathy Elixer2 oz Bourbon1 oz Elderflower Liqueur1/2 oz Lemon JuiceDash of BittersOptional: Lemon TwistCombine all ingredients in a shaker with ice. Shake thoroughly, then strain into a glass. Optionally, garnish with a lemon twist.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Cyborg

    Play Episode Listen Later Oct 7, 2024 69:58 Transcription Available


    Len Noe, the world's first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era.Len shares his personal and professional evolution, describing the cutting-edge technologies that allow him to boost human abilities through cybernetics. He explores the future of biohacking, touching on the legal, ethical, and social questions raised by integrating tech into our bodies. From the potential security risks to the thrill of becoming a cyborg, Len offers a clear look at a future where technology and humanity are more closely connected than ever before.TIMESTAMPS: 0:16 - Exploring Transhumanism and Cybersecurity with Len, the Transhumanist Hacker 5:24 - A Gen Xer's Journey Through the Evolution of Computers 12:01 - From Outlaw to Cybersecurity: A Journey of Transformation 19:05 - Exploring Transhumanism and Its Philosophical Divergence 21:49 - Pioneering Biohacking and Implantable Technology Innovations 35:53 - The Painful Process of Implant Procedures Without Anesthesia 39:54 - Body Modification and the Search for a Skilled Mechanic 42:43 - Advanced Implant Technology for Security and Cyber Attacks 52:23 - The Future of Augmented Humans and Technological Integration 1:06:10 - Unique Bars, Cybersecurity Themes, and Signature DrinksSYMLINKSDangerous Things - https://dangerousthings.comWebsite where Len purchased implantable technology for biohacking.Grindhouse Wetware - https://en.wikipedia.org/wiki/Grindhouse_WetwareHistorical reference to the pioneering group that developed consumer-grade implantable technology and led the biohacking movement.Pineapple Tangaroa (Body Mechanic) - https://www.austintattoo.com/pineapple-tangaroa.htmlPineapple is Len's body mechanic based in Austin, TX, specializing in body modifications like RFID and NFC implants.Magnavox Odyssey 2 - https://en.wikipedia.org/wiki/Magnavox_Odyssey%C2%B2Len's first gaming system, sparking his curiosity in technology.Newsweek Article (Tesla Key Implant) - https://www.newsweek.com/man-implants-chip-unlock-tesla-wave-1478879Newsweek published an article about Pineapple Tangaroa implanting a Tesla car key into a human.FM-2030 (Cryonics Pioneer) - https://en.wikipedia.org/wiki/FM-2030FM-2030 was a key figure in the cryonics movement and transhumanism.Rich Lee (DIY Cyborg) - https://golden.com/wiki/Rich_Lee_(Biohacker)Rich Lee is known for his biohacking experiments, including magnetic ear implants and the Lovetron 9000 device.RSA Conference - https://www.rsaconference.comOne of the major cybersecurity conferences where Len has presented.DEF CON (Biohacking Village) - CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BarCode @ Barcode 2 LIVE

    Play Episode Listen Later Aug 16, 2024 47:31 Transcription Available


    In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.TIMESTAMPS: 00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey04:17:00 - AI's Impact on Job Automation and Cybersecurity09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation17:29:00 - The Future of AI: Security, Ethics, and Human Impact28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes34:05:00 - The Future of Humanity and AI Integration SYMLINKSBarCode Security: https://barcodesecurity.com/BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/X Foundation: https://xfoundation.org/ Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/ ThreatLocker: https://www.threatlocker.com/ Exploit Security: https://www.exploitsecurity.io/ Ironwood Cyber: https://www.ironwoodcyber.com/Sevn-X: https://www.sevnx.com/  The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/ TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing AI Trust Council: https://aitrustcouncil.org/ VFX Los Angeles: https://vfxlosangeles.com/ Inspira AI: https://inspira.ai/ PsyberLabs: https://psyber-labs.com/DRINK INSTRUCTIONKeep it 1001 oz Captain Morgan 100 proof1/2 oz Coffee Liqueur1/4 oz Simple Syrup1 ½ oz EspressoAdd all ingredients to a shaker and shake. Strain into a coupe glass.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Paradox

    Play Episode Listen Later Aug 7, 2024 44:11 Transcription Available


    A reputable human systems engineer and PhD candidate, Lisa Flynn's background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.TIMESTAMPS:00:16:00 - Navigating the AI Paradox: Innovation and Danger 07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate 12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon 19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development 26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape 31:36:00 - AI's Impact on Jobs and Cybersecurity 38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions 41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in VegasSYMLINKSLinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/ConnectCon: https://www.connectcon.world/C&C Generative AI Policy - DRINK INSTRUCTIONm.AI t.AI1 1/2 oz White Rum3/4 oz Orange Curacao3/4 oz Lime Juice1/2 oz Orgeat Syrup1/2 Dark RumAdd the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    War Machine

    Play Episode Listen Later Jun 12, 2024 43:27 Transcription Available


    Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust.The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, and the risks of rapid AI development. Chris explains the concept of Artificial General Intelligence (AGI) and its potential to reshape human existence, emphasizing the need for regulated and ethically aligned AI systems. He also highlights the AI Trust Council's mission to promote a pro-human future amidst technological advancements. This discussion provides listeners with a comprehensive, and often not heard, understanding of the challenges and opportunities in the AI landscape.TIMESTAMPS:00:00:00 - Chris Wright's Mission to Combat AI Corruption00:04:39 - The Future of AI and Its Societal Implications00:14:12 - The Impending Impact of AI and the Singularity00:19:10 - Political Corruption and Corporate Influence in AI Legislation00:21:10 - The Psychological Impact of AI Relationships and Their Realism00:24:00 - The Impact of Chatbots on Mental Health and Society00:27:08 - Tech Engineers' Fascination with AI's Potential World-Ending Future00:28:25 - AI-Driven Drone Warfare and Its Rapid Evolution00:32:44 - Building Trust in AI Through a Pro Human Network00:40:41 - Exploring AI, Vegas Venues, and Cybersecurity-Themed BarsSYMLINKSLinkedIn (personal): https://www.linkedin.com/in/christopherwrightaitc/AI Trust Council: https://www.theaitc.com/DRINK INSTRUCTIONFallen Angel2 oz Dry Gin1 oz Lemon Juice2 tsp Creme De Menthe2 tsp Simple Syrup2 dashes Aromatic BittersCombine all ingredients in a shaker with ice. Shake well for 15-20 seconds for maximum chill, and then strain into a cocktail glass. Optionally, garnish with mint.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Human Element

    Play Episode Listen Later May 9, 2024 34:30 Transcription Available


    Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecurity, is widely recognized and respected. In addition to her corporate achievements, Dr. Barker has also recently been honored with an MBE (Member of the Order of the British Empire) for services to cybersecurity, cementing her status as a leading voice and advocate in the field. Our discussion focuses on the human element of security breaches and the importance of cultivating a culture of cybersecurity awareness within organizations. Dr. Barker shares her journey into the world of cybersecurity and discusses the evolving landscape of cyber threats, including the use of AI by cybercriminals for social engineering and deepfake technology. We highlight the significance of leadership commitment and values congruence in cultivating a robust cybersecurity culture.  The effectiveness of gamification in training, a practical aspect, is also explored. The segment concludes with a personal touch, as Jessica shares her experience of receiving an MBE at Windsor Castle from Prince William. She then provides insights on her new book "Hacked: The Secrets Behind Cyberattacks".TIMESTAMPS:00:02:53 - From Civic Design to Cybersecurity: A Human-Centric Journey00:06:21 - AI's Escalating Role in Cybercrime and Social Engineering00:09:18 - Strategies for Enhancing Digital Critical Thinking00:13:00 - Cultivating Successful Cybersecurity Cultures in Organizations00:16:57 - Rethinking Security Culture and Training Effectiveness00:20:27 - Dreamlike Investiture: Receiving an MBE from Prince William00:22:15 - Royal Recognition for Cybersecurity Expertise00:25:40 - Demystifying Cybersecurity Through Engaging Stories and Practical Advice00:31:20 - Discovering Local Vegas Gems and Cybersecurity Bar ConceptsSYMLINKSLinkedIn (personal): https://www.linkedin.com/in/jessica-barker/Twitter (personal): https://twitter.com/drjessicabarker Twitter (organization): https://twitter.com/CygentaHQCygenta (company): https://www.cygenta.co.uk/Hacked: The Secrets Behind Cyber Attacks (book): https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703Las Vegas Arts District (location): https://dtlvarts.com/DRINK INSTRUCTIONPurple Haze2 oz Gin1 oz Violet Liqueur1 oz Fresh Lemon Juice1/2 oz Honey Syrup1 Dash Orange BittersCombine all ingredients in ashaker with ice. Shake well and straininto a chilled glass. Optionally, garnishwith a twist of lemon peel or a sprig of lavender.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE at WiCys Career Fair

    Play Episode Listen Later May 8, 2024 53:00 Transcription Available


    SESSION TITLE:WiCys Delaware Valley Career FairRECORDED: 4/25/24VENUE: Chestnut Hill College - www.chc.ed LOCATION: Philadelphia, PAGUEST: Job Seekers, Hiring Organizations, and Recruiters SPONSOR: WiCys Delaware Valley - LinkedIn PageABOUT WICYS AND GUESTS:​WiCys Delaware Valley -  A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their knowledge and expertise to support one another in their career advancement and personal development. By cultivating strong relationships and creating a supportive environment, The organization aims to empower its members to achieve their professional goals and enhance their skills. The organization welcomes the participation of male allies who share the same vision of promoting diversity and inclusivity in the workplace. Pam King - A faculty member and director of the cybersecurity program at Chestnut Hill College, Pam King has played a pivotal role in establishing a robust cybersecurity and digital forensics education curriculum. With both undergraduate and graduate programs under her leadership, King has overseen the implementation of accelerated and online offerings to advance cybersecurity education.Alex Pickenich - A recent graduate with a double major in computer science and data science and a minor in cybersecurity, Alex Pickenich is actively pursuing a career where she can merge his passion for data science with the field of cybersecurity.Manasa Pisipati - As a second-year grad student at Penn State University Park and the president of the Women in Cybersecurity student chapter there, Manasa Pisipati leads efforts to create a supportive community for women in the cybersecurity field and to provide them with opportunities for professional development.Yvonne Brown - A professional seeking a transition into cybersecurity, Yvonne Brown has a background in project management and shares her interest in consulting within cybersecurity, emphasizing the need for mentorship and support in new roles.Jessica Sylvester - A risk and cybersecurity division lead for TekSystems, Jessica Sylvester has years of experience in tech staffing and professional services, and she provides insight into the recruitment process and the qualities that make candidates stand out.Emily Rose Nunez -  Software Engineer at Leidos, designs, develops, and deploys scalable and secure software solutions for diverse clients, leveraging tools like Jenkins and Jira to automate processes and collaborating with cross-functional teams to deliver innovative, high-quality solutions that meet stakeholder and end-user requirements and expectations.  Tyler Yeagor-  IT Client Relations partner at Ark, leverages his strong background in technology services, client relations, and certifications in Sandler Foundation, Microsoft 365 Fundamentals, and AWS Cloud Practitioner to assist businesses with their IT obstacles, projects, and initiatives through consultative insight and timely execution, while passionately creating new and better experiences for customers and partners, and continuously learning and collaboratiCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Unreal

    Play Episode Listen Later Apr 12, 2024 56:26 Transcription Available


    Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflows. Izzy shares his journey from early fascination with green screen magic to his pioneering role in adapting deepfake technology. He provides insights into how deepfakes are disrupting the film industry and ignites discussion on the consequences of this powerful technology, from ethical implications to its rapid integration into advertising and beyond, painting a thought-provoking picture of AI's burgeoning role in content creation.TIMESTAMPS:00:00:16 - Introduction to deepfakes and their impact on perception00:02:19 - Background in film and visual effects00:11:23 - Interest in AI and learning coding00:14:02 - Increase in deepfake inquiries and major deals00:16:53 - Responsibility of AI developers in shaping the ethical advancement of deepfake tools00:20:23 - Simplifying the deepfake production process00:24:30 - Concerns about AI's impact on the filmmaking process00:26:42 - Narrow application in AI leading to powerful outcomes00:31:28 - Lack of identity safeguards for actors in the entertainment industry00:35:03 - Potential benefits of actors adopting deepfake technology00:39:55 - Potential impact of deepfakes on politicians and lawmakers00:41:00 - Potential for real-time deepfakes and their applications in scams and fraud00:44:30 - Company focus on predicting behavior, implementing AI managers, and automating high leverage tasks00:50:23 - Benefits of a hybrid approach combining AI and human management00:51:53 - Utilizing AI for detecting user behavior anomalies and insider threat detectionSYMLINKSVFX LA (company): https://vfxlosangeles.com/ Sin City (movie): https://www.imdb.com/title/tt0401792/After Effects (software): https://www.adobe.com/products/aftereffects.htmlUCLA Extensions (educational institution): https://www.uclaextension.edu/Ender's Game (movie): https://www.imdb.com/title/tt1731141/University of Texas (educational institution): https://www.utexas.edu/SSRN Paper: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4739430#Inspira AI (website): https://www.inspira.ai/Han Barbecue (restaurant): https://www.yelp.com/biz/han-bbq-burbankScum and Villainy Cantina (bar): https://scumandvillainycantina.com/Buena Vista Cigar Lounge (bar): https://www.yelp.com/biz/buena-vista-cigar-club-beverly-hillsDRINK INSTRUCTIONThe Replicant1.5 oz Vodka3/4 oz Midori3/4 oz Lemon Juice1/2 oz Lemon JuiceCombine all ingredients into a shaker with ice. Shake well and strain into a chilled cocktail glass.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Iceman

    Play Episode Listen Later Mar 4, 2024 50:34 Transcription Available


    Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understandable, and he continues to contribute actively to the field.TIMESTAMPS:00:02:27 - Introduction of Iceman, RFID hacker and contributor to the Proxmark project00:07:23 - Explanation of Proxmark device capabilities and the development of the Iceman fork00:14:13 - Formation of the RFID research group and transitioning from a hobby to a public figure00:17:49 - Introduction of new RFID tools, concepts, and weaponizing RFID readers for unauthorized access00:20:40 - Effectiveness of RFID wallets and the cat-and-mouse game with weaponized readers00:24:06 - Development of magic cards for RFID hacking and the potential impact of AI on RFID research00:28:29 - Participation in RFID hacking competitions, CTFs, and the importance of forums and Discord for knowledge sharing00:34:42 - Flipper Zero as a well-made tool with an ecosystem for extending functionality00:35:57 - The future of RFID hacking, including secure communications, advanced crypto, and chip implants by Dangerous Things00:39:38 - Iceman's experience with metal detectors, TSA, and the exciting future of RFID for hackers and end users00:42:52 - The need for vendors to allow legal copying of items and the importance of disrupting tracking and logistics systems00:45:07 - Iceman's recommendations for following his work and joining relevant Discord serverSYMLINKSX: https://twitter.com/herrmann1001/YouTube: https://youtube.com/@iceman1001/Discord: https://discord.com/invite/QfPvGFRQxH/Proxmark3: https://proxmark.com/Iceman Fork: https://github.com/RfidResearchGroup/proxmark3/Dangerous Things: https://dangerousthings.com/Flipper Zero: https://flipperzero.one/IceDev: icedev.seDRINK INSTRUCTIONWildcard1 oz Cardamaro1 oz Genever1 oz CynarAdd all ingredients to a shaker filled with ice. Stir until chilled and properly diluted. Strain into a lowball glass filled with fresh ice. Optionally garnish with a sprig of rosemary or an orange peel.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Hutch with Justin "Hutch" Hutchins

    Play Episode Listen Later Feb 12, 2024 67:00 Transcription Available


    Hutch, an expert in AI and cybersecurity, discusses his early interest in using AI for algorithmic trading and automating social engineering attacks with chatbots. He highlights two main cyber risks of advanced AI - the ability to manipulate people and autonomously execute attacks. Hutch and Chris explore issues like commercialization of AI versus proprietary chatbots, and tech companies' ethical duties to reduce AI risks through testing and responsible development. They delve into potential weaponization of AI in lethal autonomous weapons and "flash wars", as well as risks from intelligent humanoids. The need for global AI partnerships is discussed, but challenged by current geopolitics. Private sector researchers and companies have a key role in addressing AI safety and risks. However, adversaries likely have an edge in exploiting AI vulnerabilities, underscoring the importance of innovative defense strategies. TIMESTAMPS:00:02:14 - Introduction to Justin Hutchins (Hutch) and his background00:03:43 - Hutch's interest in AI and cybersecurity00:08:43 - Discussion on GPT-4 and its key risks00:15:21 - Comparison between different AI platforms00:20:28 - Viability of weaponizing emerging technologies00:25:10 - Viability of embedding AI into realistic form factors00:30:53 - Psychological effects of chatbots on humanity00:35:48 - The need for global partnerships to regulate AI00:40:36 - Adapting AI capabilities for weaponization00:47:30 - Adversarial threat actors and their adaptation to AI00:50:46 - AI systems circumventing security controls00:53:48 - The concept of singularity in AISYMLINKSLinkedin: https://www.linkedin.com/in/justinhutchens/X: https://twitter.com/sociosploit/status/1546218889675259904The Language of Deception- Weaponizing Next Generation: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/Socioploit: https://www.sociosploit.com/Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcastDRINK INSTRUCTIONThe Hallucination1 oz Elderflower Liqueur1 oz Absinthe1 oz Fresh Lemon JuiceGuava SodaAdd ice into a chilled cocktail glass. Add the Elderflower Liqueur, Absinthe, and lemon juice into a cocktail shaker without ice. Shake vigorously. Strain into the glass with ice. Top off with guava soda.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Wirefall with Dustin "Wirefall" Dykes

    Play Episode Listen Later Feb 2, 2024 53:02 Transcription Available


    Wirefall is an Air Force veteran and cybersecurity expert. Wirefall shares his journey into hacking, from his early days of electronics tinkering to his career in security consulting. He also discusses the founding of the Dallas Hackers Association and the importance of community in the cybersecurity field. Wirefall explores the evolving cyber threat landscape and the potential impact of AI on hacking. Plus, he reveals how his newfound passion for improv has helped him overcome fear and become a better communicator.  TIMESTAMPS:0:03:37 - Wirefall's early exposure to technology and computers0:06:06 - How Wirefall started hacking and manipulating computer systems0:10:50 - Wirefall's curiosity about the World Wide Web and exploration of the internet0:12:40 - Transitioning from a network technician to a security consultant during the dot-com boom0:14:23 - The need for security on the enterprise level and the awareness of professionals0:19:31 - The desire for a different format of talks at local cybersecurity groups0:23:11 - The meetup is held at encore family karaoke0:28:26 - The threat landscape has remained similar over the years0:30:22 - Wirefall's transformation and interest in AI and machine learning0:35:19 - Wirefall's experience with improv and its parallels to hacking0:41:33 - Improv helps with pivoting and redirecting0:47:46 - Finding Wirefall on social mediaSYMLINKSTwitter: @DHAholeLinkedIn Profile: https://www.linkedin.com/in/wirefall/Telesploit: https://www.telesploit.com/DHA (Dallas Hackers Association): https://www.meetup.com/dallas-hackers-association/DC214:https://www.meetup.com/dc214dfw/DRINK INSTRUCTIONLone Ranger1 1/2 oz Blanco Tequila3/4 oz Freah Lemon Juice1/2 oz Simple Syrup2 oz Sparkling WineLemon TwistFill a shaker with ice. Add in tequila. lemon juice and simple syrup. Shake well and then strain into an ice filled glass. Top with sparkling wine. Optionally garnish with a lime twist.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Guerrilla Theory with Peter Schawacker

    Play Episode Listen Later Jan 11, 2024 39:41 Transcription Available


    Peter Schwacker is a cybersecurity thought leader with over 25 years of experience. Peter shares his unconventional journey in the industry, his passion for continuous learning, and his belief in the power of curiosity. He also discusses the importance of community building and the need for a deeper understanding of the roots of cybersecurity. With his unique perspective, Peter challenges the status quo and offers insights into the future of the industry. TIMESTAMPS:0:03:06 - Discussing Peter's background and journey to Mexico0:08:47 - Differences between US and Mexican cyber culture0:11:28 - The impact of niche knowledge in today's world0:13:15 - Peter's fascination with technology and the concept of magic0:14:51 - Peter's eclectic approach to security0:17:38 - The establishment of a Linux user group and practical activities0:20:19 - The size and structure of the community0:23:23 - The importance of hands-on experience and practical training0:25:36 - The significance of software development skills in cybersecurity0:27:08 - The need to understand the history and foundations of security0:30:07 - The essential characteristic of security: an intelligent, malicious adversary0:32:02 - The potential for security to learn from other industries0:35:03 - The power of the human mind and skepticism towards AI0:38:38 - Where to find Peter and connect with him onlinePSYMLINKSPeter Schwacker's LinkedInNearshore Cyber WebsiteBooks and Literature Mentioned:Communist ManifestoAnthony Trollope's workArthur C. Clark's worksPaolo Freire and Bell Hooks for education philosophyDRINK INSTRUCTIONPaloma2 oz Blanco Tequila1/2 oz Fresh Lime Juice1/2 oz Simple Syrup1/4 cup Grapefruit JuiceSparkling waterIceFill a glass with ice. Add in tequila,lime juice, simple syrup and grapefruitjuice. Top off with sparking water. Optionally garnish with a lime.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE with John Dwyer

    Play Episode Listen Later Dec 26, 2023 37:30 Transcription Available


    SESSION TITLE: IBM X-FORCERECORDED: 12/13/23VENUE: City WineryLOCATION: Philadelphia, PAGUEST: John Dwyer  SPONSOR: IBMABOUT THE GUEST:​John Dwyer - John Dwyer is the Head of Research for IBM Security X-Force. He has extensive experience in cybersecurity research, threat actor behavioral modeling, immersive incident response simulations, and integrated security technologies. John is a highly regarded speaker at industry events and has expertise in AI, threat hunting, and detection engineering.John Dwyer discusses the impact of artificial intelligence (AI) on the threat landscape and the changing role of AI in security tools. He emphasizes the importance of understanding the goals and objectives of attackers and how AI can be used to enhance security measures. John also highlights the need for proactive risk reduction strategies and the potential of AI in threat detection and response automation. He concludes by discussing the future possibilities of fully immersive deception and the importance of training and awareness in the face of evolving cyber risks.TIMESTAMPS:00:01:00 - Introduction and thanks to sponsor IBM00:02:28 - Introduction of guest, John Dwyer00:08:28 - Discussion on how AI is changing the threat landscape00:11:33 - AI's impact on security tools and risks introduced00:13:48 - Commercial vs proprietary LLMs for organizations00:15:06 - Predicting attack surfaces in AI and importance of security fundamentals00:16:17 - Differentiating between credible threats and hype threats00:18:13 - Goals of financially motivated threat actors00:20:35 - Phishing attacks and the need for better defense strategies00:24:17 - Altering security awareness stance for employees00:26:09 - AI capabilities in threat detection, response automation, and vulnerability analysis00:29:11 - Need to invest in infrastructure and innovation to combat crime00:30:15 - Guidance for proactive risk reduction outside of AI00:33:57 - IBM Xforce Threat Intelligence index provides year in review00:37:08 - Closing remarks and thank yousEVENT PHOTOSCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE @ Lone Star Cyber Circus

    Play Episode Listen Later Dec 15, 2023 79:51 Transcription Available


    SESSION TITLE: LONE STAR CYBER CIRCUSRECORDED: 12/7/23VENUE: Hop & StingLOCATION: Grapevine, TXGUESTS: Cyber Distortion, Phillip Wylie, Wirefall, Juneau Jones, NEURAL PHANTOM, Justin "Hutch" Hutchins, and Quentin Rhoads-Herrera SPONSORS: Cyberstrike and Trace3  ABOUT THE GUESTS:​Cyber Distortion - Security leaders Kevin Pentecost and Jason Popillion joined forced to create " Cyber Distortion", a leading security podcast which they describe as their own way of paying back an industry that has been so amazing to them over the past couple of decades. They believe that as cybersecurity experts, we all play a critical role in protecting businesses and individuals from cyber threats. Phillip Wylie - Phillip is an offensive security professional with over 25 years of passion and experience in information technology and cybersecurity specializing in penetration testing, assessments, application security, and threat and vulnerability management. An international speaker and author, Phillip shares his expertise by hosting The Hacker Factory Podcast and Phillip Wylie Show while also serving as a penetration tester, instructor, and founder of the DEFCON Group 940.Wirefall - As a military and law enforcement veteran, local security community advocate, and entrepreneur behind Telesploit, Wirefall has over 25 years of experience, including founding the Dallas Hackers Association while consulting on attack and penetration tests, having previously served on the boards of BSides DFW and TheLab.MS.Juneau Jones- Raised in the Alaskan wilderness where she developed her love of hacking through building and breaking things, Juneau later studied computer science and economics before moving to Dallas, Texas and finding her place in the local hacker community where she now works as an adversarial analyst while continuing her cybersecurity research.NEURAL PHANTOM- @hacknotcrime advocate/Marine Corps Veteran/CISO/Leader of @Hack_FtW/Mentor/Public Speaker/Hacker/Gamer/Meiklejohnian absolutist.Justin "Hutch" Hutchins - Industry leader in the fields of cybersecurity, artificial intelligence, and technical risk management. He is the creator of Sociosploit, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology. He is the host of Cyber Cognition, a podcast focused on trends and risks related to emerging artificial intelligence and machine learning technologies. And he is the author of "The Language of Deception: Weaponizing Next Generation AI." Hutch has also spoken at multiple conferences to include HouSecCon, Texas Cyber Summit, ISSA, ToorCon, DEFCON, and RSA ConferenceQuentin Rhoads-Herrera - Seasoned information security professional with over 15 years of experience leading security teams and safeguarding organizations. Expertise includes security analysis, risk assessments, penetration testing, and physical security implementations. Instrumental in building and maturing security programs for Fortune 500 companies, mitigating risks, and protecting critical assets.​The Barcode podcast welcomes cybersecurity leaders and ethical hackers to the Lone Star Cyber Circus LIVE in Grapevine, TX. The guest panel, comprised of Texas-based cybersecurity professionals, discusses the growth ofCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Cyber Distortion with Kevin Pentecost and Jason Popillion

    Play Episode Listen Later Nov 24, 2023 69:17 Transcription Available


    Kevin Pentecost and Jason Poppillon, hosts of the Cyber Distortion podcast, stop by BarCode to share their experiences and insights in the field of cybersecurity. We discuss topics such as ransomware, social engineering, and the CISSP. Their podcast combines technical expertise with a fun and engaging approach, making it accessible to both technical and non-technical audiences. They also highlight the importance of networking and building relationships in the cybersecurity industry. TIMESTAMPS:0:00: Introductions and cybersecurity importance0:05: Hosts' backgrounds0:07: Ransomware attack experience0:09: Lessons learned0:11: Preparedness0:15: How hosts met0:24: CDP - Goals and approach0:29: Content delivery balancing0:31: Episode output0:34: Memorable guests0:42: Production workflow0:47: Process improvements0:50: Future topics0:55: CDP future plans1:08: Where to connect with CDPSYMLINKSCDP - YOUTUBEKevin - LinkedinJason - LinkedinDRINK INSTRUCTIONCrooked Tree2 oz Bourbon3/4 oz Lemon Juice3/4 oz Honey SyrupCombine all ingredients into a shaker with ice. Shake it and then fine strain into a rocks glass.CONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    X-Factor with Vivek Ramachandran

    Play Episode Listen Later Nov 2, 2023 51:56 Transcription Available


    Vivek Ramachandran is a cybersecurity professional and the founder of SquareX, a browser-based cybersecurity solution. He is known for his groundbreaking Wi-Fi attack discoveries, best-selling hacking books, and trainings for cybersecurity professionals worldwide. Vivek is also the creator of the hacker comic book series, "Hackers: Superheroes of the Digital Age."Vivek stops by the bar to to discuss his background in cybersecurity and his journey to becoming an entrepreneur. He shares how his curiosity and passion for technology led him to teach himself programming and eventually specialize in cybersecurity. He also talks about the inspiration behind VRN Comics, and the importance of demystifying hacking for the general public. Vivek then delves into the concept of SquareX, a deterministic cybersecurity solution that aims to provide productivity-first protection by isolating and disposing of potentially malicious files and websites. He explains how SquareX uses containerization and cloud-based technology to ensure that users can safely open documents and visit websites without the risk of infection. Vivek concludes by discussing the future of malware and the role of AI in cybersecurity, emphasizing the need for deterministic security solutions like SquareX to combat evolving threats. TIMESTAMPS:0:00:00: Introduction to Barcode and Elite consulting services 0:01:20: Introduction to Vivek Ramachandran and his achievements 0:02:56: Introduction to the Superhero Sipper cocktail 0:03:34: Vivek's background and journey into cybersecurity 0:08:54: Vivek's experience in college and internships 0:12:37: Vivek's internship opportunity in wireless LAN security 0:13:38: On-site internship at a university in Zurich 0:14:24: WLAN security and lack of practical experience 0:15:03: Early stages of WLAN security and network administration 0:15:37: Learning WLAN and WLAN security quickly 0:16:49: Joining Airtight Networks and getting a lucky break 0:17:49: Getting the opportunity to speak at Defcon and Black Hat 0:18:43: Transitioning from practitioner to entrepreneur 0:19:38: Creating SecurityTube and initial discouragement 0:21:08: Positive feedback and growing readership 0:23:33: Quitting job to pursue research and training full-time 0:26:05: Perseverance and hard work in cybersecurity 0:27:03: Creating VRN comics to demystify hacking 0:29:36: Changing the negative perception of hackers0:34:55: Identifying the need for a new cybersecurity solution 0:36:21: Problems with existing endpoint security solutions 0:37:50: Moving from probabilistic to deterministic security 0:38:18: SquareX's productivity-first approach to endpoint security 0:39:44: SquareX's seamless user experience and isolation solutions 0:40:40: SquareX's freemium model for both consumers and enterprises 0:43:29: AI's potential to supercharge malware and phishing attacks 0:46:26: SquareX's deterministic security approach in the face of AI threats 0:47:44: Vivek's love for meeting motivated individuals and exchanging ideas 0:48:30: Vivek's unique experience at Black Hat Abu Dhabi 0:50:55: Connect with Vivek and learn more about SquareX at sqrx.comSYMLINKSVivek - LinkedinVivek - XSquareX - LinkedinCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE with Philly CISOs

    Play Episode Listen Later Oct 30, 2023 35:00 Transcription Available


    SESSION TITLE: BELOW DECKRECORDED: 10/26/23VENUE: Rendezvous (Private Yacht) LOCATION: Philadelphia, PAGUEST: David Lingenfelter, Anahi Santiago and Tammy KlotzSPONSOR: N/AABOUT THE GUESTS:​David Lingenfelter - VP of Information Security at Penn Entertainment, with a 30-year career in cybersecurity.Anahi Santiago - CISO at Christiana Care, the largest health system in Delaware, with a passion for healthcare cybersecurity.Tammy Klotz - CISO at Trinzio, with 7 years of experience in cybersecurity in the manufacturing industry.​By way of an invation sent by VP of IT for Visit Philadelphia, Keith McMeniman, Chris  hosts a live podcast on a yacht with three esteemed Philadelphia based security leaders: David Lingenfelter, Anahi Santiago, and Tammy Klotz. They discuss the current state of cybersecurity, the challenges they face in their respective industries, and the importance of educating and raising awareness among end users. They also touch on the potential of AI in cybersecurity and the need for collaboration between different stakeholders in the organization.TIMESTAMPS:0:00:06 - Introduction to the podcast and the guests 0:04:18 - Priorities in different industries: manufacturing, healthcare, and gaming 0:08:32 - Lessons learned from recent breaches and social engineering attacks 0:13:18 - Importance of continuous cybersecurity training and awareness 0:14:51 - Innovations on the horizon to combat cyber risks 0:14:51 - Introduction to the topic of cyber risks and new technologies 0:15:39 -  Buzz around artificial intelligence and its potential 0:17:28 -  Recognition of innovative cybersecurity startups 0:18:43 -  Discussion on the adoption and governance of AI technologies 0:21:22 -  Importance of user awareness and education 0:22:03 -  AI's role in enabling end users to understand risks 0:25:26 -  Engaging with end users and understanding their needs 0:27:08 -  AI's impact on healthcare diagnosis and complex cases 0:28:38 - Collaboration between cybersecurity and clinical experts 0:30:20 - Conclusion on the need for collective decision making in AI implementation 0:30:18 - Discussion about the need for a team to solve problems 0:30:39 - Importance of involving stakeholders in conversations 0:31:48 - Question about favorite bar in Philadelphia 0:32:26 - David talks about his basement bar, the Underground Cantina 0:32:55 - David's bourbon of choice 0:33:17 - Anahi's preference for watching the Super Bowl in Las Vegas 0:33:26 - Anahi's favorite bar, St. Stephen's Green 0:33:47 - Tammy mentions she doesn't have a favorite Philly bar 0:34:03 - Chris mentions Barcode Security and its advisory services EVENT PHOTOSCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    The Barcode with Paul V. McEnroe

    Play Episode Listen Later Oct 16, 2023 55:48 Transcription Available


    Paul V. McEnroe is an award-winning engineer and former IBM executive who played a pivotal role in the development of the universal product code (UPC), also known as the barcode. With over two decades of experience at IBM, McEnroe led a team that created one of the most influential technologies of our generation. He is the author of the business memoir titled "The Barcode," which tells the story of his journey and the development of the barcode. McEnroe shares his background, from being adopted as a child to his education and career at IBM. He discusses how he became involved in the development of the barcode and the challenges he faced along the way. McEnroe also reflects on the unexpected uses and impact of the barcode, such as its role in Amazon's operations. He emphasizes the importance of teamwork and mentorship in achieving success and offers advice for structuring effective teams. TIMESTAMPS:0:01:27: Introduction to Paul V. McEnroe and his role in developing the barcode0:02:20: Paul's background and journey to IBM0:04:09: Paul's role in starting a new business at IBM0:06:21: Choosing the point of sale industry for barcode implementation0:08:43: The selection of IBM's barcode as the industry standard0:10:15: The complexity of developing the barcode system0:12:05: The technological challenges and innovations in barcode implementation0:14:32: The unexpected impact and innovative uses of the barcode0:14:51: Conclusion and final thoughts on the barcode's legacy0:15:23: Jeff Bezos made money on barcodes through Amazon automation0:16:39: Barcode technology wiped out traditional stores like Macy's.0:17:49: 18 states passed laws against barcodes, causing legal issues0:19:19: Paul had to become a lobbyist to explain barcode benefits0:20:59: Canadian woman found barcode system helpful for price comparison0:22:14: IBM lawyers worried about eye safety and laser suicide0:25:04: Paul became president of Trilogy after leaving IBM0:27:49: QR codes were a natural evolution of barcode technology0:29:10: QR codes offer more data but may not compete with barcodes0:30:06: Reading barcodes at high speeds was a challenge in development0:30:33: Paul recalls the CEO's skepticism about the barcode project0:31:11: The CEO tests the barcode's functionality and is amazed0:32:18: Barcodes are still relevant and have magnetic encoding for retail0:34:18: Paul shares his motivation for writing a memoir about the barcode0:37:18: Paul emphasizes the importance of teamwork in achieving goals0:39:14: Paul discusses the composition of his barcode development team0:41:11: Paul adds more engineers to his team to cover various expertise0:43:31: Communication and leadership are crucial for a successful team0:45:16: Problem with the code: it needed to be small0:46:03: X scan for the barcode0:48:10: Importance of teamwork in creating the barcode0:49:06: Mentorship played a pivotal role in Paul's successSYMLINKSENTREPRENEUR.COMThe Barcode: How a Team Created One of the World's Most Ubiquitous TechnologiesDRINK INSTRUCTIONThe U.P.C.1 oz Unaged Rum1 oz Peach Liquor1 oz Cranberry JuiceCombine all ingredients in a glass wiCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Entitle with Ron Nissim

    Play Episode Listen Later Sep 27, 2023 38:26 Transcription Available


    Ron Nissim, co-founder and CEO of Entitle IO, joins Chris at the bar to discuss identity and access management (IAM) in the cloud. They explore the differences between traditional IAM and cloud IAM, as well as the pain points organizations commonly face with access requests and approval processes. Ron shares a specific incident that sparked the idea for Entitle IO and explains how their platform has helped organizations improve their IAM efforts. He also discusses the future of IAM and upcoming features from Entitle IO. TIMESTAMPS:0:00:16 - Introduction to IAM and its importance in security 0:01:49 - Differences between traditional IAM and cloud IAM 0:05:33 - The need for cloud IAM due to common access management issues 0:08:18 - Pain points in traditional access requests and approval processes 0:11:49 - Success story of a company implementing Entitle IO 0:12:45 - Rapid deployment of Entitle IO 0:13:12 - Importance of cloud native approach and reducing administrative privileges 0:14:59 - Difficulty of calculating ROI in security 0:16:14 - Overcoming resistance to change in organizations 0:19:07 - Strategies for organizations hesitant to transition to new methodologies 0:22:19 - Features and differentiators of Entitle IO as an innovative solution 0:26:17 - Change management policy and attribute-based model for access provisioning. 0:27:20 - Automated governance and visibility into access and permissions. 0:28:15 - Future of privileged access management (PAM) for cloud resources. 0:29:03 - Evolving aspects of PAM: connectivity, authentication, authorization, and session recording. 0:31:43 - Entitle IO's upcoming open source project for connectivity and authentication. 0:33:12 - Importance of collaboration and feedback from industry professionals. 0:33:54 - Contact information for Ron Nistam and Entitle IO.SYMLINKSRon Nissim - LinkedinEntitle.io - LinkedinEntitle.ioDRINK INSTRUCTIONGOTHAM MARTINI2 oz Vodka1 splash Blackberry Schnapps1 splash Black SambucaIn a cocktail shaker filled with ice,combine all ingredients. Shakevigorously for 10-15 seconds.Strain into chilled glass.EPISODE SPONSOREntitle.ioCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Under The Rose with Mike Petrie

    Play Episode Listen Later Aug 31, 2023 51:09 Transcription Available


    Mike Petrie, a pioneer in the fraud investigative industry, discusses his journey into the field and the evolution of investigative techniques. He emphasizes the importance of social media intelligence and the role it plays in uncovering fraud. Mike also highlights the need for education on protecting personal information and the integration of AI in fraud detection and prevention. He shares advice for aspiring investigators and discusses the concept of Webutation, a platform for protecting online reputations. Discover the hidden truths, covert operations, and the art of undercover work that define the intriguing realm of sub rosa AKA "Under The Rose" investigations. TIMESTAMPS:0:00:16 - The role of private investigators 0:02:15 - Mike's background and interest in investigative work 0:04:24 - Getting started in the private investigation industry 0:06:12 - Opening a startup in the investigative field 0:07:40 - Working on fraud cases in the insurance industry 0:09:06 - The methodology used pre-internet for gathering evidence 0:11:37 - Challenges and dangers faced during field surveillance 0:13:11 - Pretexting and social engineering as methods of gathering information 0:13:44 - Ensuring personal safety in dangerous situations 0:13:36 - Gaining intel pre-OSINT and pre-social media 0:14:06 - Ensuring personal safety through preparation and blending in 0:15:56 - Transitioning to leverage OSINT as an intelligence tool 0:20:45 - Educating individuals about the criticality of protecting personal data 0:24:35 - Fraud techniques evolving and the need to inform others 0:25:14 - The impact of removing metadata on investigators and using OSINT 0:26:33 - The abundance of social network sites and their usefulness0:26:54 - Discussion on the deep web and illegal activities 0:27:40 - Warning about dangerous chat room sites for kids 0:29:15 - Integration of AI in fraud detection and prevention 0:30:09 - Use of facial recognition software in investigations 0:31:46 - Limitations of relying on Google for investigations 0:32:53 - AI's role in analyzing images, videos, and data 0:35:49 - Importance of human involvement in research 0:36:32 - Advice for aspiring investigators and learning resources 0:40:53 - Mike's expertise and public speaking engagements 0:41:24 - Building and selling a search platform 0:41:53 - Importance of online reputation and its impact on trust 0:42:37 - Social media intelligence gathering for critical decision-making 0:43:40 - Advocating for thorough gun purchase background checks 0:44:39 - Webutation benefits both individuals and businesses 0:45:08 - Webutation's URL: webutation.io 0:46:03 - Special thanks to family, business partner, and mentors 0:46:49 - Favorite bars in Philadelphia and outside of Philly 0:48:06 - Recommended bar in Mumbai and recent favorites in Miami SYMLINKSLinkedInWebutationDRINK INSTRUCTIONTHE SHADOW2 Oz Gin1 Oz Chilled Earl Gret Tea1/2 Oz Creme De Violette1/2 Oz Fresh Lemon JuiceLemon Twist (Optional)In a cocktail shaker, combine gin,chilled Earl Grey tea, Crème deViolette, and fresh lemon juice.Fill the shaker with ice, and shakevigorously. Strain into chilled glass.Optionally, garnish with a lemon twist.EPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE with Winn Schwartau

    Play Episode Listen Later Aug 19, 2023 33:44 Transcription Available


    SESSION TITLE: METAWARRECORDED: 8/10/23VENUE: Virgil's Real BBQ LOCATION: Las Vegas, NVGUEST: Winn SchwartauSPONSOR: SayersTIMESTAMPS: 0:02:30 - Introduction to the METAWAR Project and the challenge of reality distortion 0:04:00 - Explanation of the six steps of the METAWAR thesis 0:05:58 - Discussion on immersive experiences and reality distortion 0:09:37 - Explanation of reality distortion and the difference between disinformation and misinformation 0:15:38 - Discussion on the addictive nature of rewards in the metaverse 0:18:02 - Exploration of the potential benefits of the metaverse 0:20:50 - Conversation on the impact of the metaverse on mental and physical health 0:26:48 - Discussion on the fluid nature of the metaverse and the potential for involuntary addiction 0:28:49 - Explanation of compliance and the need for governance in the metaverse 0:30:45 - Fun question about opening a metaverse-themed bar and signature drinks EVENT VIDEOEVENT PHOTOSCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE with FC

    Play Episode Listen Later Aug 19, 2023 24:52 Transcription Available


    SESSION TITLE: How I Rob BanksRECORDED: 8/9/23VENUE: BAR CODE BURGER BARLOCATION: Las Vegas, NVGUEST: FC (Freaky Clown)SPONSOR: Cyber Job AcademyTIMESTAMPS: 0:00:22 - Introduction and discussion about FC's book "I Rob Banks" 0:01:12 - Reconnaissance and the importance of overplanning 0:02:07 - Digital recon and the limitations of Google Maps 0:03:36 - The value of extensive recon and avoiding people 0:04:21 - Possibility of book adaptation into a feature film 0:05:00 - Speculation on who would play the author in a movie 0:06:04 - The author's best skill in social engineering: avoiding people 0:06:34 - Successfully getting into secure areas without physical tools 0:07:09 - Exploiting cultural tendencies in social engineering 0:08:34 - The importance of the letter of authority in social engineering 0:10:57 - A dangerous encounter with armed guards during an engagement 0:12:42 - The shift in physical security assessments at Cygenta 0:16:04 - The limitations of AI in recon and information gathering 0:18:18 - Organizations' trust in AI as a potential vulnerability 0:19:20 - Where to find the author online 0:20:32 - The author's go-to beverage for decompressing 0:21:20 - Discussion on opening a cybersecurity-themed bar 0:22:57 - Filming a documentary and closing remarksEVENT VIDEOEVENT PHOTOSCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Infosec Sherpa with Tracy Z. Maleeff

    Play Episode Listen Later Jul 28, 2023 64:49 Transcription Available


    In the unpredictable landscape of the digital mountains, a remarkable group of Sherpas thrives as guides, offering vital information during expeditions. Among them, Tracy Z. Maleeff stands out as a cybersecurity expert, leading and inspiring others on their journey. Her story takes her from the humble setting of a library to the forefront of cybersecurity, where she provides essential guidance and support, navigating through the peaks and valleys of the cyber realm.TIMESTAMPS:0:03:25 - Tracy's journey from law firm librarian to cybersecurity 0:08:33 - Tracy's transition into the technology field 0:17:26 - Tracy's experience with tech meetups and finding her niche 0:22:41 - The importance of putting in the work to transition careers 0:33:59 - The value of diversity of thought in the cybersecurity industry 0:40:00 - Tracy's passion for creating a culture of diversity and inclusion 0:51:57 - The importance of approachability and empathy in cybersecuritySYMLINKSLinktr.eeLinkedInTwitterMediumDRINK INSTRUCTIONNON-FICTION1 1/2 Oz Gin3/4 Oz Elderflower Liqueur1/2 Oz Fresh Lemon Juice1/2 Oz Lavender Syrup2 Dashes Orange BittersSprig of Fresh LavenderINTERVIEWERSChris GlandenRohan LightEPISODE SPONSORCrowdSecCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    The Cheat Code with Colleen Lennox & Jason Brooks

    Play Episode Listen Later Jul 17, 2023 44:53 Transcription Available


    Cybersecurity professionals are essential for keeping organizations safe from potential threats and ensuring business continuity. According to recent studies, the demand for cybersecurity professionals has surged significantly, and this trend is expected to continue. Unfortunately, qualified people are still having a hard time breaking into the industry, although it's not impossible. And there is help from insiders that are here to help with the process.Colleen Lennox, founder of Cyber Job Central, and Jason Brooks, co-founder of Relative AI, discuss the challenges faced by aspiring professionals trying to break into the cybersecurity industry. They introduce Cyber Job Academy, a platform that offers courses taught by industry experts to help individuals prepare for a career in cybersecurity. They also highlight the benefits of using AI technology, such as Relative.ai's avatar, ARIA, to practice and improve interview skills. The goal is to provide individuals with the tools, resources, and cheat codes needed to succeed in the cybersecurity field.TIMESTAMPS: 0:02:46 - Challenges faced by aspiring professionals in breaking into the cybersecurity industry 0:09:39 - Overview of Cyber Job Academy and its role in addressing these challenges 0:11:38 - Introduction to Relative AI and its role in enhancing interview skills 0:14:15 - Discussion on ARIA, the avatar used in the Cyber Job Academy 0:16:59 - The ability of ARIA to pivot responses based on applicant input 0:23:00 - Advantages of Cyber Job Academy for students 0:27:30 - The potential of AI to eliminate bias in the hiring process 0:34:03 - Where to find more information about Cyber Job Central and the Academy 0:41:41 - The best bar in Philly and favorite drinks for Colleen and JasonSYMLINKSLinkedin - Jason BrooksLinkedin - Colleen LennoxCyber Job CentralRelativ.aiDRINK INSTRUCTIONAVATAR1 Oz Vodka1/2 Oz Blue Curacao1/2 Cup Lemonade1/4 Cup Orange JuiceIcePour all ingredients over ice into a glass and top off with Orange Juice.INTERVIEWERSChris GlandenEPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Snake Eyes with Allen Woods

    Play Episode Listen Later Jun 27, 2023 54:37 Transcription Available


    Often, risk and reward collide. Corporate giants and high-stakes gamblers unknowingly walk parallel paths. Their worlds may seem separate to outsiders, although fate has a way of intertwining their destinies. Both are driven by ambition, chasing triumph. But as their desires for success grow, a hidden truth begins to reveal itself. LLMs, like the roll of Snake Eyes in a dice game, hold the power to shape kismet and shatter dreams. The line between success and ruin is as fragile as the edge of a dice. As corporate entities collide with the ultimate risktakers, a new game emerges.Allen Woods served as a soldier in the British Army, primarily with Infantry battalions. Afterwards, he made a pivotal decision to enter into the world of computing. He devoted himself to studies, and eventually reached the esteemed level of a degree . He is a Charter member of the British Computer Society, and has extensive experience in building information management frameworks. He stops by BarCode to share his incredible journey of transformation, risk, and lifelong pursuit of knowledge. We focus on software development, Cybernetics, LLMs and fragility within data relationships.TIMESTAMPS:0:06:12 - Military IT Career and Knowledge Sharing0:12:43 - The Value of Connecting Databases0:17:45 - Incorporating Cybernetics in Software Development0:21:02 - Technological Economy's Low Equilibrium State0:27:01 - Importance of Due Diligence0:32:03 - Exploiting Relationships in Network Science0:38:59 - The UK Post Office's Horizon System0:42:47 - Limits of Probability Testing in AI0:48:28 - LLMs in Small BusinessesSYMLINKSLinkedInBritish Computer SocietyLudwig von Bertalanffy's “General Systemology”"Autopoiesis and Congition: The Realization of the Living"  by Humberto Maturana"Brain of the Firm" by Stafford Beer "The Heart of Enterprise" by Stafford Beer"Living Systems" by James Greer Miller Stephen Wolfram WritingsCommon Crawl DatasetProject GutenbergNetwork Science by BarabásiUK Post Office Horizon Case"The Age of Surveillance Capitalism" by Shoshana ZuboffDRINK INSTRUCTIONTHE LAST MECHANICAL ART3/4 Oz Mezcal3/4 Oz Cynar3/4 Oz Sweet Vermouth3/4 Oz CampariStir all ingredients in an ice-filled mixing glass and strain into a chilled coupe.  Optionally garnish with an Orange twist.INTERVIEWERSChris GlandenRohan LightMike ElkinsEPISODE SPONSORTUXCARECONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Darkside with Larry Herzog

    Play Episode Listen Later Jun 8, 2023 48:47 Transcription Available


    Embark on a captivating journey as we venture into the enigmatic and clandestine world lurking below the surface of the internet. Prepare to explore the depths of cybercrime, illicit trades, and covert activities that take place in the digital underworld.Larry Herzog, a Senior Sales Engineer for Thales, joins me at the bar to discuss the origins of the Darkweb, the technological underpinnings, aestetics, diverse marketplace services and the potential pitfalls of using it.TIMESTAMPS:0:02:56 - An Overview of Its Architecture and Anonymity Features 0:09:14 - Tails OS and Privacy Tools 0:11:11 - Understanding the Risks of Cash Access, Credit, and Debit Services 0:13:16 - The Risks of Credit Card Fraud and How to Protect Yourself 0:17:13 - Dark Web Search Engines: Exploring User Friendliness and Functionality 0:19:01 - Search Engines, Illegal Drugs, and Contract Killers 0:22:20 - Cybercriminal Services and "As-A-Service" Price Points 0:24:33 - Exploits, RaaS, and Crowdfunding 0:29:35 - Bitcoin Mixing and Tumbling Services 0:32:20 - Obtaining Services, Equipment, and New Identities 0:34:05 - An Overview of Marketplace Services and Cybercrime Networks 0:38:20 - The Risk of Operating on the Dark Web 0:40:42 - Exit Node Monitoring and Social Engineering0:42:13 - Ransomware Protection MechanismsSYMLINKSLinkedInTwitterInternet 2Freenode IRCTORTails OSAlphaBayDream MarketSilk RoadDRINK INSTRUCTIONLABYRINTH1 Part Rye Bourbon1/2 Part Oloroso Sherry1/4 Part Amaretto3 dashes Angostura Bitters.Stir all ingredients with ice. Strain into a rocks glass over a large cube.Optionally, garnish with an orange peel and a cherry.INTERVIEWERSChris GlandenEPISODE SPONSORTHALESCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Shadow Warrior with Ric Prado

    Play Episode Listen Later May 26, 2023 78:42 Transcription Available


    In the covert world of intelligence and espionage, where shadows merge with reality, there exists a select group of individuals who operate on the razor's edge between life and death. Among them is a man named Ric Prado, AKA the "Shadow Warrior."Ric's story is a testament to the indomitable human spirit and the unyielding pursuit of justice in the face of adversity. A true warrior with a heart of steel, Ric has spent his entire life on the frontlines of some of the most dangerous and classified missions the world has ever seen. His esteemed career spans over three decades, defined by his unwavering commitment to national security and counterterrorism. From his early years as a military officer to his exceptional service in the CIA, Ric's expertise in counterterrorism and intel operations is unparalleled.TIMESTAMPS:0:03:09 - Impact of the Cuban Revolution on Private Businesses and Education 0:05:38 - Operation Peter Pan and Ric's journey to the US 0:10:46 - Transition from an Orphanage to Hialeah, FL 0:12:34 - From High School Troublemaker to Elite Pararescueman 0:14:47 - A Professional Diver's Journey to Becoming a Pararescueman and Joining the Central Intelligence Agency 0:16:26 - CIA Recruitment and President Reagan's Latin American Policy 0:22:27 - Ric's Journey from Miami to Honduras and Beyond 0:29:09 - Entry into the Counterterrorist Center 0:31:08 - Plank Owner of the Bin Laden Task Force 0:34:35 - Billy Waugh: Legendary Green Beret and CIA Paramilitary Operations Officer 0:36:10 - Ric's Experiences in North Africa and Korea with the Bin Laden Task Force 0:40:38 - The Mental and Physical Fortitude Required for High-Risk Missions 0:42:21 - Recounting Near-Death Experiences 0:46:07 - CIA Operations Officer's Dedication to the Mission 0:47:37 - Unwavering Love of Country: The Challenges of Counterterrorism in the 21st Century 0:52:31 - Private Military Contractors and the Rise of ISIS 0:56:31 - Blackwater's Role in Saving the Polish Ambassador's Life 0:57:44 - The Use of Private Military Contractors in the Ukraine Conflict 1:02:06 - Cybersecurity and His New Book "Black Ops: The Life of a CIA Shadow Warrior 1:07:53 - The Benefits of Responsible Training 1:14:00 - The Proper Usage of Handguns for Effective SecuritySYMLINKSLinkedInRic Prado - Black OpsBlack Ops: Life of a CIA Shadow WarriorOperation Peter PanCofer BlackBilly WaughBuzzy KrongardErik PrinceBlackwaterFour BranchesDRINK INSTRUCTION4 BRANCHES BOURBONFounder's BlendPour 2 oz of Bourbon into a whiskey glass. Swirl, smell the aromas, take small sip, savor the flavors, swallow and then exhale.Enjoy slowly.INTERVIEWERSChris GlandenDoug GotayEPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Icon with Phillip Wylie

    Play Episode Listen Later May 11, 2023 41:16 Transcription Available


    Philip Wiley, AKA The Hacker Maker, is an experienced pentester, educator, author and speaker. He has been invited to give presentations at countless cons. He currently hosts the top ranked podcast, "Hacker Factory" and his self-titled podcast, "Philip Wiley Show", recently launched.He returns to the bar to talk all things CON, including his own experience, CFP differentiators, structuring a talk, defeating imposter syndrome, and more.TIMESTAMPS:0:03:18 - Experience with Conference Presentations 0:05:26 - Reflections on Public Speaking and Ethical Hacking 0:07:37 - Getting Started in Pen Testing and Public Speaking 0:09:19 - Conveying Complex Technical Concepts to a Non-Technical Audience 0:11:12 - Explaining Acronyms and Incorporating Real-World Examples into Presentations0:12:40 - Positioning Yourself as a Conference Speaker: Tips for Differentiating Yourself from Other Applicants 0:14:25 - Tips for Submitting a Successful Conference Talk Proposal 0:21:05 - Conquering Nerves and Building Confidence for Public Speaking 0:22:42 - Engaging Presentations, Measuring Success, and His New Podcast 0:31:49 - Content Creation and Personal Branding with Streamed Podcasts 0:33:12 - Combining Different Passions in Cybersecurity 0:35:07 - The Philip Wiley Show and Sharing Resources SYMLINKSLinkedinTwitterToastmastersThe Pentester BlueprintThe Hacker FactoryPhillip Wylie ShowYouTubeDRINK INSTRUCTIONTEXAS TORNADO1 part SoCo1 Part Pineapple Juice1 Part SpriteCombine all ingredients in shaker. Shake, then pour into a rocks glass with ice. Leave it for a few minutes to chill. Seek shelter.EPISODE SPONSORTuxCareCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Unmasked with Nelson Santos

    Play Episode Listen Later May 5, 2023 38:23 Transcription Available


    Pentera is a company that specializes in automated security testing and vulnerability management. Its platform uses a combination of automated and manual testing techniques to identify and prioritize security vulnerabilities in an organization's infrastructure. By doing so, Pentera helps unmask hidden vulnerabilities and provide visibility into potential security threats. Their "Automated Security Validation" component continuously validates cyber defenses. It's a method of testing that is becoming increasingly more popular as attackers have become more sophisticated. In fact, it was recently recognized by Gartner as its own category.Nelson Santos, a Senior SE with Pentera, is a security professional with years of experience in both attack and defense teams. He holds multiple top-tier security certifications and has trained under some of the best known researchers in the field. His interests range from exploit development and vulnerability research to machine learning and artificial intelligence.We engage in a discussion that defines automated security validation, and why it's different from traditional methods of security testing.TIMESTAMPS:0:03:29 - Automated Security Validation: Benefits, Vendor Landscape, and Trends0:05:29 - Effect of Automated Security Validation in the Age of COVID-190:07:11 - Challenges and Best Practices0:12:39 - The Impact of Automated Security Validation Tools on DevOps Workflows0:15:54 - Automated Security Tools for Mid-Sized Enterprises0:17:22 - Automated Security Validation Tools for Enterprises 0:22:09 - Pentera's History0:23:41 - Pentera's Security Validation and Differentiators for Success0:28:07 - Trends in Cybersecurity and Threat Intelligence Integration0:30:15 - Pentera's Rap Battle at RSA and Black Hat Conferences SYMLINKSNelson's LinkedInPentera's - LinkedInPentera's - TwitterPentera's WebsiteDRINK INSTRUCTIONSCANALYZER1 oz Gin3/4 oz Lime JuiceTonic WaterFill a glass with ice. Pour in the gin and lime juice. Top off with Tonic Water.EPISODE SPONSORPenteraCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    BONUS: BCP LIVE at SecureWorld Philadelphia 2023

    Play Episode Listen Later Apr 28, 2023 40:17


    SESSION TITLE: CISOs Riff on the Latest in CybersecurityRECORDED: 4/19/23LOCATION: Valley Forge Casino and Event CenterGUESTS: David Lingenfelter (VP, Information Security, PENN Entertainment), Krista Arndt (CISO, United Musculoskeletal Partners) and Bistra Lutz (Director of Global Information Security Operations, Crown Holdings)CONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Freaky Clown with FC

    Play Episode Listen Later Apr 14, 2023 63:00 Transcription Available


    FC has gone through extreme adversity and has come out stronger on the other side.  He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent, one that is both a gift and a curse: hypervigilance. He refused to allow his past define him and instead, leveraged the state of increased alertness to fuel his passion for security. FC talks with us about his breakthrough into ethical hacking and physical security assignments, his 100% success rate at breaking into banks and other highly secured government facilities, the reason physical security engagements are NOT helpful to the business, uniting digital/physical/human-factor for optimal security, and the risk of investing in new tech. FC also details some truly insane stories, including the time he kidnapped the guard at a facility protected by ex-military Gurkhas. Finally, he reveals his advice for aspiring hackers and details on his soon to be released book, "How I Rob Banks: And Other Such Places". TIMESTAMPS0:03:49 - The Origin of an Ethical Hacker0:05:49 - Early Computing and Hacking Experiences0:10:04 -The Cursed Gift of Hypervigilance0:13:25 - Social Engineering and Physical Security Assessments0:20:30 - The Inevitability of Security Breaches0:22:38 - The Lack of Focus on Human and Physical Security in Organizations0:24:35 - Challenges of Adopting Cutting Edge Technology0:26:53 - The Impact of AI on Ethical Hacking0:34:16 - Methods of Social Engineering0:36:29 - Identifying Entry Points and Planning an Attack0:42:07 - Security Breach Simulation at a Data Center protected by Ex-Military Gurkhas0:44:31 - Advice for Aspiring Security Professionals0:48:46 - Cybersecurity Education and CertificationsSYMLINKSLinkedInTwitterCygentaHacktheboxTryhackmePentest AcademyBook: Breaking into Information Security: Learning the Ropes 101Book: How I Rob Banks: And Other Such PlacesDRINK INSTRUCTIONKOMBUCHA MOJITO1 Cup Kombucha1 TBSP Honey8-10 Mint Leaves1/2 Lime (Juiced)Club SodaMuddle 8-10 mint leaves and 1/2 a lime, juiced. Add 1 tbsp of honey and 1 cup of kombucha. Pour mixture into a highball glass. Top with club soda and stir gently.EPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Grit with Andres Andreu

    Play Episode Listen Later Mar 10, 2023 76:38 Transcription Available


    Grit in the context of behavior is defined as “firmness of character; indomitable spirit.” Andres Andreu, a NYC bred leader, has a career built on grit and sheer perseverance with experience spanning from the D.E.A. to corporate America.Co-Host, and cybersecurity sales veteran Doug Gotay and I post up with Andres and talk about overcoming adversary as a youth, his time within the D.E.A., his mastery in the judo philosophy, and traversing his unique skillset and mentality into success in the boardroom. TIMESTAMPS0:03:46 - Reflection on Growing Up in Queens in the 1980s0:07:30 - The Judo Philosphophy: Discussion on Physical and Mental Strength Resilience for Life and Business 0:15:10 - Transitioning from NYC to the DEA 0:19:05 - Reflections on the DEA Hiring Process and Title Three Intercepts0:23:07 - Self-Taught Technology and Creative Problem Solving 0:27:49 - The Origins of Blockchain Technology 0:29:27 - Analytical thinking in Government Investigations 0:31:47 - The Impact of Intelligence Sharing on Drug Enforcement Coordination 0:33:45 - Threat Intelligence and its Role in Cybersecurity 0:36:05 - Proactive Security Strategies 0:38:34 - Understanding the Global Dynamics of Information Sharing 0:40:47 - Human Trafficking and Technology's Role in Prevention 0:43:30 - Analysis of Metadata and Its Impact on Law Enforcement Investigations  vs. Cybersecurity Investigations 0:48:52 - Personal Security During Time at the DEA 0:51:01 - The Benefits of Adapting to Different Situations 0:54:39 - The Human Element of Sales 0:56:17 - Understanding the Need for Key Man Insurance Policies 0:58:15 - Executive Kidnapping and the Need for Balance in Business and Physical Fitness 1:01:23 - Executive Protection and Cybersecurity Transitioning 1:04:26 - The need for Soft Skills and Technical Chops 1:07:46 - Finding Balance in Professional Development 1:09:06 - The Importance of Self-Growth and Seeking Help for SuccessSYMLINKSLinkedInGalleryWebsiteDRINK INSTRUCTIONpicEPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Sociotechnical Exploitation with Bruce Schneier

    Play Episode Listen Later Mar 3, 2023 24:42 Transcription Available


    The Sociotechnical Theory is an organizational theory that emphasizes the importance of both social and technical factors in designing and managing systems. Sociotechnical systems are deeply embedded within society and prone to "hacking", a term meaning to subvert a systematic rules in unintended way.  In his most recent book, "A Hacker's Mind", Bruce Schneier takes hacking beyond computer systems and uses it to analyze the systems that underpin our society.He stops by and we define the true definition of hacking, who has the edge in the endless arms race, revealing who the world's best hackers are, how AI will impact the future of hacking, and the truth about AI democratization. TIMESTAMPS0:02:37 - Exploring the Hacker's Mindset and How to Bend Society's Rules0:04:53 - The Importance of System Hacking in Today's World0:06:42 - The Inevitability of System Hacks and the Impact of AI0:14:41 - Digital Simulation Technology on Policy and Legal Code0:16:21 - Impact of Hacking on Existing Inequalities0:18:21 - Hacking Resources and LoopholesSYMLINKSA Hacker's MindSchneier on Security Blog"Security Engineering" by Ross Anderson"Threats" by Adam ShostackDRINK INSTRUCTIONpicEPISODE SPONSORTuxCareCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Eras Of Dialect with John Miller

    Play Episode Listen Later Feb 23, 2023 44:04 Transcription Available


    As a large language model trained by OpenAI, ChatGPT has been designed to understand and generate human-like text based on a massive amount of data. From writing creative stories and poetry to answering complex questions and providing personalized recommendations, ChatGPT seems to be running on all cylinders, and still accelerating.The possibility of ChatGPT extends beyond text, via Voice AI. John Miller, Co-Founder of Launchvox stops by to about ChatGPT's potential, mainstream adoption, ethics, and security implications through the lens of a creator.TIMESTAMPS0:03:31 - Reflection on the Artistic Experience of the Renaissance Era0:07:51 - War and Innovation in the 19th Century0:12:50 - Ransomware and the Russian Revolution0:14:16 - The Evolving Landscape of Security and Hacking0:18:03 - The Future of Cybersecurity and the Use of Chat GPT and Resemble AI0:19:53 - Voice Synthesis and Audio Processing0:21:10 - Utilizing Virtual Voice Actors and Mastering Processes for Content Production0:23:15 - Exploring the Ethical Implications of AI-Generated Voice Replication in the Entertainment Industry0:27:50 - Security and Ethics in AI Development0:30:52 - The Impact of Chat GPT on Business and Personal Use Cases0:36:04 - The Need for Accuracy in Fact Checking with Chat GPT0:38:03 - AI and Immersive Technologies with LaunchvoxSYMLINKSLaunchvoxLinkedIn - LaunchvoxLinkedIn - John MillerStable DiffusionChatGPTGetty | Stable Diffusion Lawsuit ResembleAdobe AuditionDRINK INSTRUCTIONpicEPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Harkness with Jason Brooks and Keenan Hale Jr.

    Play Episode Listen Later Feb 3, 2023 85:02 Transcription Available


    The Harkness method is a discussion-based learning style that emphasizes student centric discussion and active participation in a classroom setting. The goal is to create an environment where students can share their thoughts and perspectives, engage in meaningful conversations, and learn from each other.Jason Brooks, a native of South Central Los Angeles, taught Mandarin, Spanish & Mathematics for 18 years. During COVID-19, as he tracked student interaction by hand, he quickly recognized the potential for artificial intelligence to fuel better meeting performance. In October 2021, he founded HARKNESS.AI, an early stage startup whose vision is to empower everyone - on every team - to meaningfully contribute their voice at work, in school, or any other group... free from friction, fear or bias. Co-founder Keenan Hale Jr. graduated from Syracuse University as a Big East Conference Football Champion & 2-time bowl winner with a degree in Communications and Rhetorical Studies. He began his career as a Chief of Staff and Campaign Manager for Mayoral Candidate Rochelle Robinson in Douglasville, GA.  He later served as Legislative Assistant and senior advisor to Congressman Al Green. Most recently, Keenan worked as a registered lobbyist advising and providing political & regulatory insight to multiple trade associations and Fortune 500 clients.Co-hosts Rohan and Mike join us to discuss the conversation trust factor, targeting miscommunication and how that corrodes trust and team, their aim to promote self-awareness within the team structure, and the ability to help people ask hard cultural questions safely.TIMESTAMPS0:03:28 - The Genesis of Harkness AI: A Story of Overcoming Adversity and Finding Success in Education0:05:20 - Harnessing the Power of Data Science to Transform School Culture During the Pandemic0:06:57 - Exploring Ed Tech Innovation in the Pandemic0:13:14 - The Benefits of Adult Online Learning Platforms0:14:45 - The Use of AI-Powered Technology in Business, Couples Therapy, and Dispute Resolution0:17:45 - The Impact of Technology on Trust and Acceleration of Artificial Intelligence0:20:02 - AI Ethics: Combining Soft and Hard Skills for Business Success0:21:35 - AI-Powered Real-Time Coaching for Improved Communication in the Workplace0:24:41 - The Promise of AI to Transform the Way We Do Things0:27:00 - The Potential of AI to Mitigate Miscommunication and Conflict0:29:09 - Exploring the Humanistic Approach to AI0:31:56 - The Power of Language and AI to Connect People and Transform Lives0:34:34 - Cultural and Communication Differences0:36:18 - Awareness to Physical Presence in Meetings0:37:56 - Incorporating Team Members for Maximum Efficiency0:45:31 - Voice Suppression in the EdTech and Workforce Surveillance Risk Areas0:47:46 - Establishing Trust and Ethics in the Digital Age0:50:41 - Virtual Observers and Their Impact on Communication0:53:14 - Benefits of Using Data to Make Decisions in the Workplace0:54:57 - Creating a Culture of Respect and Clarity0:58:11 - Exploring Cross-Cultural Communication1:02:57 - Benefits of Leveraging Harkness to Improve Team Dynamics1:09:54 - Connecting People Across Different Use Cases1:14:56 - Combining Visual and Auditory LearningSYMLINKSHarkness.aiDRINK INSTRUCTIONpicEPISODE SPONSORTUXCARECONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Adrenaline Rush with Jim Lawler

    Play Episode Listen Later Jan 20, 2023 65:43 Transcription Available


    Jim "Mad Dog" Lawler is a national security consultant, serving as the Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. He served for 25 years as a CIA case officer and is a noted speaker on Insider Threat within the government sector. He stops by and we discuss CIA war stories, Misconceptions of the Agency, Espionage, Counter Intelligence, Detecting Insider Threats and Spy Novels.TIMESTAMPS0:04:08 - The roots of a CIA operative0:05:43 - Reflections on a Career Path Not Taken0:09:01 - Exploitation, Subvertion, and Corruption0:10:47 - Reflecting on 25 Years of Living Undercover and Clandestine Operations0:15:58 - Experience with a Potential Spy0:20:28 - Counterintelligence Analysis of Espionage Motivations0:22:02 - Polygraph for Recruited Asset0:24:04 - Recruiting People for Espionage and Preventing Insider Threats0:27:44 - Preventing Employee Straggling Through Fair Treatment andUnderstanding0:29:49 - Preventing Insider Threats in the Workplace0:33:08 - Employee Monitoring and Performance Feedback0:35:06 - Discrepancies Between Outside Perceptions and Reality of CIA Case Officers0:39:22 - CIA Operations and Challenges Overcome0:41:21 - Recruiting Intelligence Officers: The Power of Patience and Perseverance0:45:07 - Balancing Personal Feelings and Mission Objectives0:46:53 - Spy Recruitment: Strategies for Successful Case Officers0:48:48 - Ethical Decision Making0:51:36 - The Commitment to Protect Covert Assets0:53:15 - Origin of the Alias "Mad Dog"0:54:42 - Espionage, Iranian Nuclear Weapons Program, and Novels0:56:25 - "Living Lies," "In The Twinkling of an Eye," and "A Traitor's Tale"SYMLINKSLinkedInThe Clandestine ServiceMICERSpies, lies and nukes conferenceLiving LiesIn The Twinkling of an EyeDRINK INSTRUCTIONMAD DOG 20/20Ready to serveEPISODE SPONSORCISCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

    Claim BarCode

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel