Join the Lee Signore as she discuss her views on cybersecurity, technology advancements, and situational awareness. She will also be discussing everything related to becoming the best version of yourself.
Lee answers four questions from one of her viewers. How did you get into tech/cybersec and what keeps you motivated? What does a typical day for you look like? What are some watch outs being a career changer into IT from a marketing background I should know of? I'd like to get into a cybersecurity bootcamp in early Spring and be 'all-in' but I don't know what I can expect. What would you recommend is the most effective way to stay focused and motivated since this would require significant time? Do you have a question that you would like for me to address? Send me an email at contact@cyber-misfits.comand I will answer your questions. -Lee Signore
Lee answers four questions from one of her viewers. How did you get into tech/cybersec and what keeps you motivated? What does a typical day for you look like? What are some watch outs being a career changer into IT from a marketing background I should know of? I'd like to get into a cybersecurity bootcamp in early Spring and be 'all-in' but I don't know what I can expect. What would you recommend is the most effective way to stay focused and motivated since this would require significant time? Do you have a question that you would like for me to address? Send me an email at contact@cyber-misfits.comand I will answer your questions. -Lee Signore
About this episode Lee and Chance discusses the use and conviences of biometrics, the latest hacks that you should be aware of as well as the fecal tainted touchscreens at McDonalds. Remember: Subscribe on iTunes, Google Play, or your favorite podcast app, to catch-all of the episodes as they go live. Check us out on www.cyber-misfits.com! Thanks for listening! References https://www.delish.com/food-news/a25337533/mcdonalds-touchscreen-fecal-bacteria/?utm_medium=social-media&utm_campaign=socialflowFBWH&utm_source=facebook&fbclid=IwAR075nFrvJ46Z50-nlbjstMFxUDkbZulweJF1vfbYwvQ2-7QePNfu0TPSY4 https://www.bbc.com/news/technology-46401890?ns_campaign=bbcnews&ns_mchannel=social&ocid=socialflow_facebook&ns_source=facebook https://thehackernews.com/2018/11/usps-data-breach.html
Podcast Episode #11 Let me guide you in your career Lee discusses the new services that Cyber Misfits will be providing. Lee will be mentoring and coaching professionals throughout their career. Finding a mentoring or coach is already hard enough, so why not make it easier on yourself and have someone in your corner rooting for you to succeed.
Equifax Breach and Alphabet soup intimidation About this episode Lee discusses the aftermath of the Equifax breach and how very little was done as well as Alphabet Soup intimidation. Remember: Subscribe on iTunes, Google Play, or your favorite podcast app, to catch-all of the episodes as they go live. Thanks for listening! Episode Links https://qz.com/1383810/equifax-data-breach-one-year-later-no-punishment-for-the-company/ https://splinternews.com/a-year-after-they-lost-everyones-data-equifax-is-doing-1828937938 https://www.ftc.gov/equifax-data-breach https://www.equifaxsecurity2017.com/ http://fortune.com/2018/09/07/equifax-data-breach-one-year-anniversary/ T-Mobile Hacked! Fear Sells Security
Technology Addiction THE GROWING EPIDEMIC About this episode Lee discuss a growing epidemic, technology addiction. Technology is slowly becomes an everyday need to our daily functionality in society. As technology made our lives easier, it is sometimes hard for some to realize that you can actually form an addiction. Remember: Subscribe on iTunes, Google Play, or your favorite podcast app, to catch-all of the episodes as they go live. Thanks for listening! Episode Links https://www.psychologytoday.com/us/blog/modern-mentality/201802/could-you-be-addicted-technology http://theconversation.com/debunking-the-6-biggest-myths-about-technology-addiction-95850 https://www.samhsa.gov/find-help/national-helpline https://www.medicalnewstoday.com/articles/278530.php https://virtual-addiction.com https://csignore.com/walmart-files-patent-for-audio-surveillance-technology/
Women in IT Part 2 of 2 About this episode Lee and Chance continues this podcast episode by analyzes the TED talk episode by Tracee Ellis Ross titled "A Women's Fury Holds A Lifetime of Wisdom". We also tackled the age-old question,"How do we change a century long battle of men helping themselves to women?" As expected, Chance delivers an interesting twist to the conversation. You do not want to miss this one. Remember: Subscribe on Apple Podcast, or your favorite podcast app, to catch-all of the episodes as they go live. Thanks for listening! Episode Links https://www.ted.com/speakers/tracee_ellis_ross https://csignore.com/beauty/
How can I write a quality resume for a cyber security job with no work experience? “I am trying to switch careers and get into the cybersecurity field. My issue is that I do not know how to word my résumé because I have little to no experience. What do I do?” This is a question that I get very often. If you have earlier work experience then it is actually easier than you think to tie in IT or cybersecurity experience. I have reviewed several resumes and assisted in the hiring of some very qualified professionals. I have also hired people who have the great potential and their résumé demonstrates that they are capable of learning new skills quickly. So, how do I decide if a person has potential? I review their past work experience and decide their knowledge as well as their ability to learn. When I speak with them in the interview process, I also decide what can this person could bring to the team. Within this podcast, I will cover a few steps that person can do to make their résumé stand out, even without a strong cybersecurity background. Remember: Subscribe on Apple Podcast, YouTube Channel, or on Google Play store to catch-all of the episodes as they go live. Make sure that you comment as I would love to hear what you have to say. Thank you again for listening. Lee https://csignore.com/a-duel-on-the-world-stage/ https://csignore.com/cybersecurity-versus-information-security/
Women in IT Part 1 of 2 About this episode Lee analyzes a TED talk episode featuring Tracee Ellis Ross titled "A Women's Fury Holds A Lifetime of Wisdom." During the podcast Lee talks reviews the age-old question, "How do we change a century long battle of men helping themselves to women?" Remember: Subscribe on Apple Podcast, or your favorite podcast app, to catch-all of the episodes as they go live. Thanks for listening! Episode Links https://www.ted.com/speakers/tracee_ellis_ross https://csignore.com/beauty/
Alexa and Google Lee and Chance tackle a much needed discuss over Artificial Intelligence. We talk about eavesdropping Alexa and Google's new AI technology. As always if there is anything that you would like for us to discuss leave a comment below. Remember: Subscribe on Apple Podcast, YouTube Channel, or on Google Play store to catch all of the episodes as they go live. Thank you again for listening. Episode Links https://www.huffingtonpost.com/entry/alexa-eavesdropping-portland-familiy_us_5b0727cae4b0fdb2aa51b23e https://www.msn.com/en-us/money/careers/googles-assistant-can-place-phone-calls-and-fool-humans/vi-AAwYdqW
SECURING YOUR INFORMATION In this podcast episode, I come to you from Hawaii. It is important to make sure that the facilities that use your personal information are doing all that they can to do to keep your information secured. How many times have you been to the doctor's office and when they step out of the room they leave their computer screen up...this happened to me too many times for me not to mention it.
About this Episode Introducing Chance Corley as a co-host for this episode. We dive into some cool things about Denver, Colorado, blockchain technology, hyper loops, and bitcoins. Follow the show on Twitter @cyber_misfits, on the website, or on Facebook @cybermisfits.
About this Episode Chance Corley co-host for this episode as we discuss physical security within organizations. Many facilities have everything in place on paper and during audit season, but do they really carry out their own physical security policies? Follow the show on Twitter @cyber_misfits, on the website, or on Facebook @cybermisfits.