The ONLY time that people hear about cybersecurity or hacking is when the VILLAINS win! The Unsung Cyber Hero Adventures TV Network is dedicated to all of the amazing people who toil in anonymity to keep us safe at work, home and school while online!
An Interview with Rajiv Dholakia one of the technical giants behind the FIDO Alliance and NokNok Labs.
Listen and learn from America's Veterans who continue to protect and defend us in the Digital Universe and how YOU can have a great career in cybersecurity!
Today's show focuses on answering the question: Why are Information Sharing and Analysis Centers...ISACS... the key to winning the battle in the digital universe?Let's begin by saying THANK YOU to today's panel of unsung cyber heroes who represent the countless people who toil in anonymity to keep us safe at home, work and school!.Denise Anderson currently serves as Chair of the National Council of ISACs and she is President of the Health Information Sharing and Analysis Center (H-ISAC). Prior to H-ISAC, she was a Vice President of FS-ISAC (Financial Services) where for almost nine years she helped the ISAC grow and achieve its successful status in the information sharing community. She has over 25 years of executive management level experience in the private sector.Scott Algier is the Executive Director of the Information Technology – Information Sharing and Analysis Center (IT-ISAC), and Executive Director of the Industry Consortium for Advancement of Security on the Internet (ICASI).Scott works at the intersection of cybersecurity policy and operations. He is the Founder, President and CEO of the cybersecurity consulting firm Conrad, Inc.Faye Francy is the Executive Director of the Auto I-SAC. She has over 30 years of diverse experience in government and industry specializing in forensic chemistry, aviation, security, and networked systems. Faye and her team serve the global automotive industry through the analysis and sharing of trusted and timely cyber threat information about existing or potential cyber-related threats and vulnerabilities for on-road vehicle electronics and associated networks.Last but not least, Carlos Kizzee is the Vice President of Intelligence at Retail & Hospitality Information Sharing and Analysis Center. Carlos has significant government-to-government, and government-to-industry legal and policy interpretation and development experience in the areas of information technology; knowledge managment; sensitive information sharing; and sensitive information protection.We're going to learn a lot about what all of our guests do, but even more importantly, WHY do they do it? What are their missions? We'll learn what is Critical Infrastructure and about CISA (the Cybersecurity Infrastructure Security Agency).We'll assess the state of vehicle, healthcare, retail and hospitality cybersecurity? We'll discuss the importance of Diversity & Inclusion.What about small to medium sized businesses? All of that and MUCH more on today's show!To connect with our guests: Denise Andersonhttps://h-isac.orghttps://www.nationalisacs.orgFaye Francywww.automotiveisac.comwww.nationalisacs.orgScott Algierwww.it-isac.org.Twitter @ITISACIf YOU would like to be a guest on our show, please send an email to gary@cyberheroescomics.com
Today's show focuses on answering the question: How do organizations Secure the Office of the Future?Businesses demonstrated that they can quickly shift their workforces from on-premise to remote - with 73% of executives calling it a success, based on PwC’s recent remote work survey. However, many admit that they have much more to do to prove that their remote-work arrangements are secure.And there isn’t much time - with 62% expecting risks from use of non-enterprise devices and software in the next six months due to remote work according to PwC’s Digital Trust Insights Pulse Survey.CISOs face a unique opportunity to both secure and enable their businesses, but must make strategic investments with budgets likely to remain flat for the foreseeable future.Should the transition to the (remote) office of the future come with the price of a cyber attack?Some companies are considering remote work as a permanent arrangement for some of their employees. What steps do CISOs/cyber professionals need to take to enable workers to switch seamlessly between home and office for both themselves and with their co-workers while keeping adequate security controls?You will learn about the biggest threats facing companies with newly remote workforces?What are the common pitfalls in the shift to a remote work environment? How have cyber professionals/CISOs responded, and where are the opportunities for them?What should employers and employees keep in mind in terms of cyber awareness and training?With budgets unlikely to grow, what investments should cyber professionals/CISOs prioritize now to secure a remote work environment? What cyber investments should they prioritize to help companies usher in a new digitally agile environment?We haver a fantastic panel of unsung cyber heroes who represent the countless people who toil in anonymity to keep us safe at home, work and school!.Sean Joyce is PwC's Global and US Cybersecurity, Privacy & Forensics Leader, working with clients in various sectors providing strategic guidance, leading transformational initiatives, and advising on incident breach response and how to use cybersecurity and resiliency as business enablers.Sean previously served as the Deputy Director with the FBI, and had daily oversight of the 36,000 men and women of the FBI and its $8 billion annual budget.Emily Staff is PwC’s Cybersecurity, Privacy and Forensics Integrated Solutions Leader, specializing in incident & threat management, crisis management, cybersecurity strategy and product & service strategy and leadership.Ms. Stapf serves as a strategic advisor to commercial clients for complex cybersecurity investigations, cybersecurity strategy, trust, resilience and business enablement solutions, and regulatory and litigation matters involving sensitive information.Dr. Deniz Caglar is a leading practitioner in strategic cost transformation for Strategy&, PwC's strategy consulting business, based in Chicago. He has deep expertise in organization design, corporate function efficiency and effectiveness, shared services, and outsourcing/offshoring.He primarily focuses on Consumer Packaged Goods and Retail industries and also has extensive experience in Automotive, Healthcare, and Financial Services industries. Stay tuned and you will get answers to these questions and more on today's show!
Today's show focuses on answering the question: What is the state of the credit and risk management cybersecurity ecosystem?We have a GREAT panel including Ian Cohen, CEO of Apomaya.com. Apomaya gives companies control over third-party data and risks so they can protect their customers’ privacy. Prior to his current role, he was the General Manager at Experian’s Consumer Services Division and Chief Executive Officer of Credit.com from 2009-2015.Ofer Israeli leads Illusive Networks and he is a pioneer of deception-based cybersecurity. They are known as a company at the forefront of the next evolution of cyber defense. Prior to establishing Illusive Networks, Ofer managed development teams based around the globe at Israel’s seminal cybersecurity company Check Point Software Technologies and was a research assistant in the Atom Chip Lab.And finally, we have Andrew Robinson, who is the Chairman of Apomaya. Andrew has been at the forefront of networking for over 30 years, previously serving in executive roles at Akamai and Bluecoat.We'll learn about the history in the credit sector and our thought leader's opinions about the current "credit and risk management" environment?What are the strengths and weaknesses regarding cybersecurity within the Financial Services sector?Are they seeing an increase in the number and nature of attacks?What about ransomware and cyber insurance?For more information: Apomaya.comContact: ian@apomaya.com Illusive Networks, visit www.illusivenetworks.com, contact them at info@illusivenetworks.com or follow on LinkedIn, Twitter and Facebook. If you would like to be a guest on our show, please send an email to gary@cyberheroescomics.com
Today's show focuses on answering the question: Assuming that Cybersecurity IS National Security: How do we get our house in order? We have a great lineup including:Sam Visner is the Director, National Cybersecurity Federally Funded Research and Development Center at MITRE and a Board Member at the Space ISAC. He's also a Professor at Georgetown University and he worked at the NSA as well!Lauren Zabierek is the Executive Director of the Cyber Security Project at Harvard University's Belfer Center. She is a Recorded Future Alum. National Geospacial Intelligence Alum. United States Air Force Veteran and a Former DoD civilian intelligence analyst with multiple deployments.Retired Brigadier General Greg Touhill was the first Federal Chief Information Security Officer of the United States government. Now President of AppGate Federal, he serves as a faculty member at Carnegie Mellon University's Heinz College and on the ISACA board of directors. General Touhill also serves on the Federal Advisory Boards of Splunk and Intel corporations. We'll learn about the central role that cybersecurity plays across the social, economic and political aspects of life in a highly-connected digital universe.What are the strengths and weaknesses of our current defense postures across the DHS Critical Infrastructure sectors.What are the best practices to understand the motivations and techniques that hackers including criminal gangs, nation states and lone wolfs.We'll learn first-hand about the challenges of becoming the FIRST federal government CISO?All that and MORE on today's show!Here is the contact information for our guests:Sam Visnersvisner@mitre.orghttps://www.mitre.org/centers/national-cybersecurity-ffrdc/who-we-arehttps://www.georgetownjournalofinternationalaffairs.org/online-edition/spotlight-on-cyber-vi-the-cybersecurity-storm-front-forces-shaping-the-cybersecurity-landscape-a-framework-for-analysishttps://www.mitre.org/sites/default/files/publications/pr-19-3594-recommended-security-controls-for-voter-registration-systems.pdfhttps://collaborate.nist.gov/voting/pub/Voting/VVSG20DraftRequirements/vvsg-2.0-2019-10-29-DRAFT-requirements.pdfhttps://squint.mitre.org/ Lauren Zabierekhttps://www.belfercenter.org/person/lauren-zabierekGreg Touhillwww.appgate.comgary@cyberheroescomics.com
Hello Unsung Cyber Heroes! Today's show focuses on answering the questions: What is THE most devastating cybercrime perpetrated against organizations of ALL sizes and... what happens next?We have two incredible guests on today's show.Stephanie Snyder is the SVP & Commercial Strategy Leader of Cyber Solutions at Aon. Her industry focus includes technology companies, manufacturers, retailers, life sciences companies, and financial institutions. She has experience with Cyber and E&O coverage as both a broker and underwriter.Daniel Tobok is the CEO at Cytelligence, an Aon Cyber Solutions Company. Cytelligence is THE elite force of global cyber security. Daniel is a seasoned and serial entrepreneur with extensive expertise in cyber security and he has personally participated in more than 2,500 digital forensic investigations after or during cyber attacks!We'll discuss...The CURRENT state of Ransomware.What are the key findings from the 2020 Cybersecurity Risk Report?Has there been an increase in attacks or the severity of the attacks or both?What about Incident Response and Restoration?What are the trends in incidence response? New or emerging threats?How important is it to pick the right incident response firm to solve a breach?What are the common mistakes clients make selecting the wrong firm?What’s happening from the carriers’ perspectives? Are attacks driving an increase in claims which are then driving an increase in rates?How has ransomware, restoration, and dilemma of paying a ransom changed the breach business?How do you work with the insurer to determine when or if to recommend a client pays the ransom?How are insurers viewing ransomware attacks and the trade off between attempted recovery and paying a ransom?How are insurers adjusting policies to deal with these threats?Are insurers beginning to require more of the insured – incident response readiness, proactive work, threat scanning, etc.?To learn more visit: https://www.aon.com/cyber-solutionsIf you would like to be a guest on our show, please send an email to gary@cyberheroescomics.comGary Berman, Host
Today's show focuses on answering the questions: How do we collectively protect our nation's critical infrastructure? Does A rising information tide actually lift all ships?We have an incredible guest on today's show, Scott. Algier.Scott works at the intersection of cybersecurity policy and operations. He is the Founder, President and CEO of cybersecurity consulting firm Conrad, Inc.Scott is the Executive Director of the Information Technology – Information Sharing and Analysis Center (IT-ISAC), and Executive Director of the Industry Consortium for Advancement of Security on the Internet (ICASI).What you'll learn from today's show...What is the definition of Critical Infrastructure?What is the mission of CISA (Cybersecurity Infrastructure Security Agency).What are the sectors of American life are affected by critical infrastructure cybersecurity?Which sector(s) are most vulnerable?What is the role of the IT-ISACWhat about your leadership role with the other I-SACS such as the healthcare?All that and MORE on today's show!To connect with Scott, send an email to: scott@conradinc.biz, visit www.conradinc.biz or on Twitter @ConradCyber.If you would like to be a guest on our show, please send an email to gary@cyberheroescomics.comWe hope this helps! Gary Berman
Hello and welcome to the "Unsung Cyber Hero Adventures" TV Network,Today's is a SPECIAL one-hour episode that focuses on answering the questions:What is disinformation and what purposes does it serve?”What must the US and other democracies do to insure fair and accurate elections and…How will the cybersecurity and IT Community help insure a fair and accurate election and combat disinformation?What about societal resilience?What influence does fake news have on politics?How broad is the reach of untrustworthy sites?Is the Internet making things worse – for example, increasing polarization – or is increased polarization a reflection that things are getting worse?We'll discuss the backfire effect and echo chambers and the value of fact-checking social media partners.We have three great guests on today's show...John Bambenek is Vice-President for Security Research and Intelligence at ThreatSTOP and an incident handler with the Internet Storm Center. He is also an adjunct lecturer at the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity.He has been researching security threats and criminal organizations for 18 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.Our next guest is Dave Piscitello. Dave has been involved in Internet technology for over 40 years. He has authored books on internet and remote access, including Understanding Voice over Internet Protocol Security.Dave publishes articles regularly on security, DNS, anti-phishing, malware, Internet policy and privacy. He maintains a highly active, insightful, and entertaining info site as The Security Skeptic. Dave is a Partner at Interisle Consulting Group.Llewelyn King is the Co-creator and host of the PBS Show, The White House Chronicles, a weekly news and current affairs program known for its originality, crisp thinking, humor and panache. He created the program in 1997, and he produces and host it with journalist Linda Gasparello. The show focuses on what is impacting the way we live and work now -- including science, technology, medicine, energy, environment, books -- and contributing to policy.We hope this helps...Gary Berman, Host
Today's show focuses on answering the question: How will a security architect apply his skills to architect a more competent, secure and diverse cybersecurity and information technology future?Our special guest is Ron Eddings. Ron is the Manager and Security Architect at Palo Alto Networks.As a Security Architect leader, he's responsible for facilitating growth for others and consistently creating a pipeline of security leaders. His team is highly effective when planning, designing, and implementing security controls for enterprise organizations.In addition, his team of security architects are leaders in creating security policies, standards, and guidelines.During implementation, our team assists enterprise organizations with :• Detection engineering• Case management• Creating and automating incident responses processes• Creating automation via Python and Javascript• Threat Intel ManagementHe assists organizations scale security controls while reducing complexities that analyst and engineers face and he works closely with analysts, engineers, and enterprise stakeholders to provide production security workflows that are measurable and can grow at scale.Ron is committed to consistently advocating for team success and he considers himself to be a lifetime learner who is constantly finding ways to hone his craft in technology.As if that wasn't enough, he's the co-host of Hacker Valley Studio, a GREAT podcast.If YOU would like to be a guest on our show, please email: gary@cyberheroescomics.com
We have a special SOLO guest on today's show, Tobias Whitney-VP Energy Solutions at Fortress Information Security.At Fortress, Tobias Whitney leads sales and marketing as the Vice President of Energy Security Solutions. He is a recognized leader in control systems security solutions with over 20 years of critical infrastructure security experience, which includes founding the security practice at Burns & McDonnell and a focus on regulatory compliance, supply chain, and cloud security.Most recently, Whitney spent two years as Technical Executive at the Electric Power Research Institute (EPRI), evaluating risks in supply chain cybersecurity for utilities, developing solutions to address security architecture for utility cloud-based solutions, as well as researching "grid edge" technologies, such as electric vehicle charging and distributed energy infrastructure. Whitney spent six years at NERC, where he led a team that helped deliver CIP-V5 cybersecurity standards, evaluated compliance across the power utility industry, and worked with utilities to ensure effective adoption. This experience uniquely positions him to help Fortress and its customers adapt to changing security and compliance requirements.We'll discuss the unique challenges facing the energy sector including dealing with all of the various stakeholders in the public and private sector. Tobias will share his vast experience in regulating portions of the energy sector and in navigating the sometimes competing interests. He'll share best practices to protecting the energy ecosystem and real-life stories of attempted and successful cyber attacks. All of that and more on today's episode!i hope this helps...Gary Berman
We have a GREAT panel today including Joseph Rosenbaum, a Partner at Rimon Law. Among many other things, Joe is a thought leader regarding Cybersecurity, Data Protection, Rights of Privacy and Publicity and he is a nationally recognized expert in digital and mobile marketing, media and entertainment law.Steven Teppler is a Partner and Chair of the Cybersecurity and Data Privacy Practice at Mandelbaum Salzburg, P.C. Steve is the Co-chair of the Electronic Discovery and Digital Evidence Committee of the Science and Technology Section of the American Bar Association.Steve and Joe will share real-life stories of cybercrime and the challenges of complying with GDPR and the patchwork of state regulations regarding data privacy and related matters.We'll begin by hearing our guests origin stories and learn about their missions. Then, we'll share and discuss real-life stories answering three questions regarding data privacy and cybersecurity law:What are the risks and consequences?Why does it matter?What should you do?We'll discuss the best practices and practical tips on how to protect and respond to the myriad of legal challenges and the risks – legal, financial and operational - facing large enterprises and small to medium sized businesses.All of that and more on today's episode...
Our first guest is Joseph Davis, the Chief Security Advisor at Microsoft for US Health & Life Sciences, where he advises payors, providers, pharmaceuticals, lab sciences, medical devices and various research organizations https://www.microsoft.com/security/blog/.Prior to Microsoft, Joseph lead North America Security Advisory for Avanade/Accenture.He spent over a decade at Covidien (now Medtronic) building their information and security practices including traditional IT Security (SOC, Incident Response & Forensics), Security Architecture, Identity and Access Management, Enterprise IT Risk, IT Compliance and Data Privacy. As if that was NOT enough, he also built a world-class Global Security Operations Center.Our next guest is Nina Alli. For the past five years, Nina has served as the Executive Director of the Biohacking Village overseeing the phenomenal growth of the Device Lab, Speaker Track, and Hands On Lab. Nina hosts White Hats and Lab Coats: The Biohacking Village podcast: https://whitehatslabcoats.org.Prior to that, Nina spent 16 years in healthcare, building/breaking/securing Electronic Medical Records, connected medical IoT devices, and working in the Citizen Science area on microfluidics.We'll discuss why the healthcare sector is the MOST vulnerable?How are cyber criminals leveraging Covid-19 to deploy ransomware and other cybercrimes?What about the issues regarding legacy systems?Are medical devices safe from hackers?What can you do to protect your Personal Health Information (PHI).All of that and much more on today's show.I hope this helps...Gary Berman
We have a great panel today including Jeff Shaffer, VP of Client Engagement and Business Development at Aon Cyber Solutions who will share stories of real-life insider threats during his time with both Aon and 25 years with the U.S. Secret Service and much more.We are SO fortunate to have Lynn Mattice, Managing Director of Mattice and Associates LLC, President of the National Economic Security Alliance and a Distinguished Fellow at the Ponemon Institute who will share best practices based upon his extensive experience in the Defense and Intelligence Community.We'll begin by hearing our guest's "origin stories" and learn about their "missions". Then, we'll cover the motivations behind insider threats and share real-life stories answering three questions:1. What happened?2. What were the consequences?3. What were the lessons learned?We'll discuss the best practices to prevent, detect and respond to insider threats and related issues.All of that and more on today's episode...
Our first guest is Christaan Beek. He manages threat intelligence research within McAfee's Office of the CTO. He leads research in advanced attacks and assists in cyberattack take-down operations. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, Intel Security’s forensic services arm.Our next guest is Dave Piscitello. Dave has been involved in Internet technology for over 40 years. He has authored books on internet and remote access, including Understanding Voice over Internet Protocol Security. Dave publishes articles regularly on security, DNS, anti-phishing, malware, Internet policy and privacy. He maintains a highly active, insightful, and entertaining info site as The Security Skeptic. Dave is a Partner at Interisle Consulting Group.Our guests will share their incredible experiences dealing with ransomware and related cybercrime. Watch and learn about real-life stories of ransomware answering three questions,1. What happened?2. What were the consequences?3. What were the lessons learned?You'll enjoy hearing about how cyber criminals are leveraging Covid-19 to deploy ransomware which sectors are the MOST vulnerable and why, should a victim pay the ransom?All of that and more on today's show.We hope this helps...Gary Berman
We have two great thought leaders on today's show!Sandy Silk is the Director of Information Security and Consulting at Harvard University. Sandy leads a team of information security specialists who consult with researchers, faculty and departments on security risks and controls for the high risk data, technology, and vendors they use within their projects. Her team also manages the annual information security self-assessment across the University, coordinates the annual review process for the Information Security Policy, and produces the security awareness campaign and related IT Academy training courses.Our next guest is Joan Ross, the Chief Intelligence Officer at InsightCyber. Joan is a Global technologist focused on cyber security, machine learning, AI, threat analysis, secure design, global services, incident response, software defined networking, encryption key management, privacy, infrastructure reliability, and successful technical implementation of industry leading cyber security strategy.
We have a GREAT show today including Andrew Shikiar, the Executive Director and CMO of the FIDO Alliance, who will provide details on a brand new initiative from FIDO that is focused on establishing a consumer logo – the I-Mark - for sites that are replacing passwords with simpler and safer means of user logins.The timing of our next guest, Dr. George Antoniou is amazing because just LAST WEEK he was awarded a U.S. Patent for a breakthrough innovation in identity access management utilizing the blockchain ecosystem to improve cybersecurity.We'll begin by hearing our guest's "origin stories" and learn about their "missions". Then, we'll cover the rationale to re-imagine passwords and identity management and share real-life stories of cybercrime answering three questions:1. What happened?2. What were the consequences?3. What were the lessons learned?We'll discuss the best practices regarding identity management and how to keep yourself safe while online.All of that and more on today's episode...
Our special guest, Chris Cochran is a highly-successful, cybersecurity professional and leader, with extensive experience building strong cybersecurity programs. He has a deep understanding of risk analysis, threat hunting, and threat intelligence tradecraft across industry sectors and organizations to identify and mitigate attack vectors, trends and cyber threat actors. He is known to be a trusted advisor for security leadership from the boardroom to the SOC floor. Along with his co-host, Ron Eddings, Chris hosts The Hacker Valley Studio Podcast where they focus on the whole human and not just the cybersecurity or tech dimension of a person. On today's show, Chris has shared his unique perspectives on the state of cybersecurity, the future of our children, the effects of Covid-19 and much more.It's ONLY going to get better...enjoy!
Today, we have a special, solo guest.Kevin Tierney, Vice President of Global Cybersecurity, General Motors!Nobody could have imagined that Kevin and his team would be at the epicenter of our battle against Covid-19...as a team of General Motors people have done a PIVOT that will be written about in history books by launching Project V, a highly successful effort to manufacture ventilators. We'll learn about that and ...How GM leadership, including their CEO Mary Barra communicated the pivot to create medical devices? What are Kevin's thoughts regarding the cybersecurity of digital medical devices? We'll discuss how Kevin developed a passion for cybersecurity and how General Motors is handling the rapid shift to working from home (non-manufacturing team members), We'll also learn about GM's focus on cybersecurity, about their supply chain and how to manage the increasing threat landscape. We'll gain insight into the Auto-ISAC and how the industry has come together to share information and best practices based upon their motto "An Attack on One is an Attack on All".All of that and much more...on todays episode...
On today's show, we're fortunate to have two amazing thought leaders who will share their experiences and perspectives on one of the most insidious, dangerous and destructive cyber crimes that continue to haunt EVERY person who is online, from birth to death...IDENTITY THEFT!Adam Levin is the Chairman and Founder of Cyber Scout and co-founded Credit.com. A global industry leader in identity theft resolution and education, identity management and data breach response, CyberScout has a client base of more than 700 institutions and 800,000 small businesses. More than 45 million people participate in one or more of its resolution, life stage management or breach response programs.On an enrollment basis, Cyber Scout is the identity theft service provider to over 10 percent of the households in the United States. Over 45 million people participate in one or more of its resolution, life stage management or breach response programs.Bob Sullivan is a veteran journalist and the author of five books, including New York Times Best-Sellers, Gotcha Capitalism and Stop Getting Ripped Off! He has won the Society of Professional Journalists Public Service Award, a Peabody award, and the Consumer Federation of America Betty Furness Consumer Media Service Award.He spent nearly two decades working at MSNBC.com and NBC News, and he still appears on TODAY, NBC Nightly News, and CNBC. He’s now a syndicated columnist and frequent TV guest. He is also co-host of the podcast / audio documentary “Breach“, which examines history’s biggest hacking stories, and co-host of the weekly podcast “So, Bob,” which tackles stories about the unintended consequences of technology.His newest book, The Barstool MBA: Why Running a Bar Beats Running to Business School, was published in July 2019.
Today, we'll listen and learn from an amazing group of thought leaders discussing cyber security and dealing with the Federal government including:Kristina Tanasichuk, CEO of the Government Technology Services Coalition and Founder of Homeland Security Today.General Greg Touhill was the FIRST CISO of the Federal Government and is currently the President of AppGate Federal Group.Dave Gardy is Chairman and CEO of TV Worldwide and is the creator of Cybersecurity TV.net.And Oliver Tavakoli is the CTO of Vectra Networks and a thought leader regarding "Flipping the Game" via artificial intelligence and machine learning.On this show, we'll cover topics like:The current state of cybersecurity within the Federal Government.The sectors of the federal government which may be most vulnerable to cyber attacks. We'll talk about the Cybersecurity Maturity Model Certification (CMMC) initiative from the Department of Defense and if small businesses are prepared to meet those standards.And the communication strategies needed to articulate a winning cyber security strategy.All this and more on today's episode.
Managed Service Providers (MSP's) play a vital role in cybersecurity, especially for the Small/Medium Business (SMB) sector. On todays episode, we'll hear from incredible thought leaders including:Corey Munson, Vice President, Sales & Marketing, PC Matic.Charlie Tupitza, Cybersecurity & Data Protection Lead in U.S. & Territories, Americas Small Business Development Centers.Blake Dowling, CEO, Aegis Business Technologies. On today's episode, we'll listen and learn about:What's keeping them up at night about the current state of cybersecurity of small/medium businesses?What role does a Managed Services Provider play in protecting their clients?What are some of the uniques challenges facing MSP's?What are the standards that they use or recommend such as the Cybersecurity Maturity Model Certification (CMMC) being developed by the Department of Defense?Given the new normal of working at home, how have their organizations adapted to this rapidly changing environment and how are they working to enhance cybersecurity for other organizations?From a communications perspective, both internally and externally, how's it going?All this and more...
On today's episode, we've invited an amazing group of thought leaders who work at the nexus of education and cyber security:Davina Pruitt-Mentle, Academic Lead for the National Initiative for Cybersecurity Education (NICE).Kelvin Coleman, Executive Director of the National Cybersecurity Alliance.Heather Ricciuto, Academic Outreach Leader for IBM andRichard Guerry, CEO of the Institute for Responsible Online and Cellphone Communication. (IROC2.ORG)We'll discuss the future of online education and answer some important questions, such asHow do we navigate the transition to online learning?How do we best protect children while they're online?What can we do to address online learning needs in under-served communities?What is the best way to inspire students to pursue STEM classes and careers in cybersecurity?How do we, as the cybersecurity community, address the need for more diversity and inclusion?Here are some great resources...www.ibm.com/academichttps://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content
Today's guests, Richard Henderson from Lastline and Mario Vuksan of ReversingLabs share their incredible insights into the complex ecosystem that is the Internet. They share real-life stories of cybercrime and the engineering and human challenges of Defending the Digital Universe. They are great examples of "Unsung Cyber Heroes".
Samuel S. Visner is the director of the National Cybersecurity Federally Funded Research and Development Center (NCF), which MITRE manages in support of the NIST National Cybersecurity Center of Excellence (NCCoE).In this role, Visner oversees efforts to bring together experts from industry, government, and academia to demonstrate integrated cybersecurity solutions that are cost-effective, repeatable, and scalable. The FFRDC is the first of its kind dedicated to cybersecurity.In today's episode, Sam shares his thoughts about a wide range of issues and opportunities facing the Digital Universe!
The world is being disrupted. Everything is changing faster than at almost any time in modern history and the our methods of communicating are working hard to not only keep pace, but to get ahead of the increasing demand for faster, more reliable and most importantly, more secure digital communications.Today's show features Keith Fuentes, V.P. of Customer Success | B2B Sales | Samsung Electronics America. Keith has over 20 years of experience in technology in general in security in particular. Keith will share how Samsung is staying ahead of the "Black Hats" to insure the Digital Universe!Terry Dunlap, Founder of Refirm Labs will talk about his incredible journey from his youthful Black Hat adventures to becoming a thought leader and expert on both offensive AND defensive cyber security. He share's an amazing story about Chinese government efforts to include "back-doors" in various communications products and his cautionary tales will make you take notice...and continue on YOUR mission!
Hello Real-Life "Unsung CyberHero Adventurers"! Like you, I've heard many panels at conferences about the lack of Diversity & Inclusion (D&I) within the information technology and cybersecurity Community. On today's episode, we listen and learn (and get PUMPED UP) from 5 amazing "Unsung CyberHero Adventurers" who provide their unique perspectives as women in this sector. We begin with pioneer Anita D'Amico, founder of Code Dx. Anita shares her experience being "the only woman in the room," to the present-day, more inclusive and welcoming ecosystem.Davina Pruitt-Mentle from the National Initiative for Cybersecurity Education discusses the challenges facing the rapidly-changing learning environment as the the world instantly moves to online learning. Jen Holtvluwerfrom Spirion.com shares her thoughts on best practices to insure data privacy and the ability to balance being a great mom at the same time.Aileen Cosmano discusses the challenges of communication and distilling complicated tech and cybersecurity information into fun, engaging and informative messaging.Niamh O'Connor shares her experience as an intern with our team at CyberHero Adventures and in her FIRST assignment at Cybereason.
Given the rapidly changing world of Covid-19, how do enterprises, small & medium businesses and government agencies prepare for and manage the risks associated with telecommuting, compliance with legislation such as GDPR, CCPA etc?Today's guests include Jeff Shaffer from aon.com/cyber-solutionsStacy Shaddon and Tom Kelley with McGrath | North and Bob Kardell from Baird Holm.If YOU or the other "Unsung Heroes" want to discuss appearing on our show...please send an e-mail to: gary@cyberheroescomics.com.
Recently, after a speech that I gave at the NIST Software & Supply Chain Assurance Meeting, at Mitre, I had the opportunity to listen and learn from some of America's cybersecurity thought leader regarding the Cybersecurity Maturity Model Certification (CMMC). The mission of the CMMC is to create a culture of cybersecurity, standards and certifications for the more than 300,000 suppliers to the Department of Defense.An important part of that discussion focused on America's small and medium businesses and the challenges and opportunities that they face regarding the CMMC, according to today's guest, Charlie Tupitza. from the ASBDC.There are a number of reasons that these businesses make attractive targets to hackers including: 1. Many do not have the resources, both technical and/or financial to properly defend themselves and 2. They don't think that they have anything worthwhile to attract the attention of hackers. Both are false. We'll listen and learn why and what small and medium businesses can do to protect themselves and how ASBDC can help!
The ONLY time that most people hear about cybersecurity or hacking is when the Black Hats win. Until NOW! This podcast will shine the light and amplify the unsung heroes who toil in anonymity to keep us safe online at work, home and school.The majority of interviews were conducted at RSA 2020 and are UNEDITED, so please ignore the sound.If you would like to shine the light on an unsung hero within the Community, please send an email to: gary@cyberheroescomics.com