Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are pr
Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.
Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn't disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.
When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.
Criminals don't seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.
Part 2 of this two-part episode looks at the flip side of criminal hacks —the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.
In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you'll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you'll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty… Join your host Mitch Mayne, IBM X-Force Public Information Officer and former journalist and, together, let's venture into the breach.