POPULARITY
“Keep it to yourself” is not a great tag line when it comes to your mental health. It's even less healthy when you're a police officer and deal with trauma daily. Adam Meyers discusses his work and the crisis that led him to addressing his and others' mental health. Adam has been a Police Officer in Wisconsin for 23 years. He is also a Certified Peer Specialist in Wisconsin and founder of “Stop the Threat - Stop the Stigma.” Adam and “Stop the Threat - Stop the Stigma” can be reached at https://stopthethreatstopthestigma.org/ The views and opinions of the guests on this podcast are theirs and theirs alone and do not necessarily represent those of the host, Westwords Consulting or the Kenosha County Substance Abuse Coalition. We're always interested in hearing from individuals or organizations who are working in substance use disorder treatment or prevention, mental health care and other spaces that lift up communities. This includes people living those experiences. If you or someone you know has a story to share or an interesting approach to care, contact us today! Follow us on Facebook, LinkedIn, and YouTube. Subscribe to Our Email List to get new episodes in your inbox every week!
In this deeply personal and courageous episode, Chuck welcomes Captain Adam Meyers, a law enforcement veteran with over two decades of service. Adam shares his powerful story — from dreaming of becoming a police officer as a young boy to the critical incident in 2016 that changed everything. After using deadly force in a life-threatening situation, Adam faced years of mental health struggles, addiction, and eventually, an identity crisis that nearly cost him everything. What makes Adam's story so compelling is not just the tragedy he endured, but the triumph that followed. Through raw honesty and vulnerability, he opens up about how PTSD, anxiety, and depression crept into his life after the incident, and how support from his family, faith, therapy, and the decision to speak openly about mental health led him to a new mission: helping others heal. Adam is the founder of Stop the Threat – Stop the Stigma, a platform dedicated to law enforcement wellness and reducing the stigma around mental health in high-stress professions. His story is a powerful reminder that healing is possible — and that no one is ever alone in their struggle. This episode is a must-listen for anyone working in law enforcement, first responders, or anyone carrying the weight of past trauma and looking for a path forward. Adam's transparency is refreshing, his message is filled with hope, and his comeback is nothing short of inspiring. LINKS: www.thecompassionateconnection.com www.warriorsunmasked.com Join Chuck's Text Community: 251-418-7966 Episode Minute By Minute: 00:00 – Introduction + Chuck sets the stage 02:26 – Welcome to Captain Adam Meyers 03:43 – Adam's childhood dream to become a police officer 06:09 – The critical incident in April 2016 10:00 – Processing the trauma and the immediate aftermath 17:00 – Returning home and the emotional impact 23:00 – Coping mechanisms and how they led to destructive habits 30:00 – The stigma around asking for help in law enforcement 34:38 – Adam's breaking point and beginning the journey to healing 38:00 – Therapy, diagnosis, and termination from his department 42:00 – Being silenced and facing rejection from leadership 44:38 – Launching Stop the Threat – Stop the Stigma 47:45 – Messages of hope and support from those he's helped 50:00 – Rebuilding his life and career, finding purpose again 53:00 – Final thoughts: You are not alone, it's okay to ask for help 56:00 – Chuck's reflections and call to action for listeners
CrowdStrike's Adam Meyers testifies before congress. The State Department is set to provide nearly $35 million in foreign aid to strengthen global cybersecurity. Foreign adversaries claim ongoing access to presidential campaign documents. Researchers warn of critical vulnerabilities in fuel tank monitoring systems. Hackers claim a Chrome 2FA feature bypass takes less than ten minutes. Exploiting ChatGPT's long-term memory. Politicians and staffers find personal data exposed on the dark web. A critical vulnerability in Ivanti's Virtual Traffic Manager is being actively exploited. On our CertByte segment, Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's CompTIA Project+ Practice Test. Don't click the PDiddy links. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's CompTIA Project+ (PK0-005) Practice Test. This exam is targeted for candidates who have about 1-2 years of project management experience. This is not an actual test question, but an example of one that covers an objective for the 5th version of the exam, which came out in November 2022. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Selected Reading CrowdStrike Apologizes for IT Outage, Defends Microsoft Kernel Access (Infosecurity Magazine) Exclusive: State Department cyber bureau preps funding blitz aimed at boosting allies' defenses (The Record) Iranian-linked election interference operation shows signs of recent access (CyberScoop) FEC expands campaign spending rules to allow for physical, cybersecurity purchases (CyberScoop) Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities (SecurityWeek) New Chrome Alert After Hackers Claim 2FA Security Cracked In 10 Minutes (Forbes) Hacker plants false memories in ChatGPT to steal user data in perpetuity (Ars Technica) Proton warns that data of thousands politicians leaked on the dark web (Beyond Machines) Third Recent Ivanti Vulnerability Exploited in the Wild (SecurityWeek) PDiddySploit Malware Hidden in Files Claiming to Reveal Deleted Diddy Posts (Hackread) Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks (Veriti) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Markets react to China's stimulus. Its Chinas biggest stimulus since the global pandemic in 2020 Crowdstrike gets a grilling from US regulators. Senior executive Adam Meyers told a US Congressional committee that Crowdstrike ensures it could never happen again. Airstrikes have continued for a second day in Lebanon, we look at how it's affecting air travel.
CrowdStrike moet zich twee maanden na de wereldwijde computerstoring gaan verantwoorden voor het Amerikaanse Huis van Afgevaardigden. Leden van het Comité van Homeland Security willen de schade van de storing in kaart brengen en garantie krijgen dat het niet nog eens fout gaat. Niels Kooloos vertelt erover in deze Tech Update. Door de wereldwijde computerstoring hielden zo'n 8,5 miljoen Windows-computers er op vrijdag 19 juli plotseling mee op. De oorzaak was een foutieve software-update voor de Falcon-software van CrowdStrike die computers in een zogeheten bootloop bracht. Hoeveel de storing precies gekost heeft is niet duidelijk, maar verzekeraars schatten gezamenlijk in dat de schade kan oplopen tot 10 miljard dollar. Daarom moet CrowdStrike-bestuurder Adam Meyers vandaag in Washington verschijnen om uit te leggen wat CrowdStrike doet om een nieuwe storing te voorkomen. Verder in deze Tech Update: Economie-minister Dirk Beljaarts wil minder beperkingen van de VS in de handel met China OpenAI's X-account is gehackt en promoot crypto-scams See omnystudio.com/listener for privacy information.
The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division after a cyber attack. Ivanti warns of another critical vulnerability. Researchers find hundreds of vulnerable Firebase instances. Microsoft phases out weaker encryption. Formula One fans fight phishing in the fast lane. Glassdoor is accused of adding real names to profiles without user consent. Our guest is Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it's an increasingly popular attack surface. And Pwn2Own winners take home their second Tesla. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it's an increasingly popular attack surface – especially as more companies implement AI. For more information, check out CrowdStrike's 2024 Global Threat Report. Selected Reading House unanimously passes bill to block data brokers from selling Americans' info to foreign adversaries (The Record) Treasury Sanctions Actors Supporting Kremlin-Directed Malign Influence Efforts (US Treasury Department) China warns foreign hackers are infiltrating ‘hundreds' of business and government networks (SCMP) International freight tech firm isolates Canada operations after cyberattack (The Record) Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution (Security Affairs) 19 million plaintext passwords exposed by incorrectly configured Firebase instances (Malwarebytes) Microsoft deprecates 1024-bit Windows RSA keys — now would be a good time to get machine identity management in order (ITPro) Users ditch Glassdoor, stunned by site adding real names without consent (Ars Technica) Famous Spa GP F1 race comms hijacked by phishing scammers (Cyber Daily) Security Researchers Win Second Tesla At Pwn2Own (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Energy analyst Adam Meyers joins Jeff Schulze to discuss the latest in the energy sector, including his takeaways from recent large mergers in oil and gas, the prospects of upstream producers versus oilfield services, and what oil and gas companies are doing to lower their emissions and play a role in the energy transition.
Behind every cyberattack, there is an adversary. These adversaries target organizations large and small, across all industries, to steal money, information and more from their victims. Understanding these adversaries can help you protect your business — and we're here to help. In the first episode of the Adversary Universe Podcast, we introduce you to our expert hosts, Adam Meyers and Cristian Rodriguez, and begin to tell the story of modern adversaries: who they are, how they're tracked, and why you should learn more about them. Additional resources: Learn more about the podcast: https://www.crowdstrike.com/adversaryuniversepodcast Download your copy of the 2023 Global Threat Report: https://www.crowdstrike.com/global-threat-report/ Get your custom threat landscape: https://www.crowdstrike.com/adversaries Read CrowdStrike's Research and Intel blogs: https://www.crowdstrike.com/blog/category/threat-intel-research/ Meet the adversaries that evade traditional AV: https://www.crowdstrike.com/resources/white-papers/modern-adversaries-and-evasion-techniques-ebook/
For over two decades, Adam served as a law enforcement officer in Wisconsin, facing the unimaginable challenges that come with the job. But one fateful day, he was involved in an officer-involved shooting. Although cleared of any wrongdoing, Adam's life took a harrowing turn.The aftermath of that incident plunged him into a dark abyss of despair, his mental health deteriorating rapidly. He resorted to dangerous coping mechanisms, even contemplating ending his own life. The sound of the pin striking as he drew the trigger became an eerie echo of his pain.But here's where the story takes an extraordinary turn. Adam, a true warrior, fought his way back from the brink. Today, he stands as a symbol of resilience, his scars transformed into a beacon of hope for others.Through his initiative, Stop the Threat - Stop the Stigma.org, Adam is determined to shatter the barriers surrounding mental health. He shares his raw and unfiltered experiences, leaving no detail untold, in the hopes of fostering understanding and empathy.Join me as we journey into the depths of Adam's story—a story of redemption and healing. We'll witness the darkest moments that threatened to consume him and the emotional turning points that propelled him towards recovery. Prepare to be moved as Adam Meyers, the embodiment of unwavering strength, shares his extraordinary tale of triumph over adversity.First responders play a critical role in keeping our communities safe. However, the stress and trauma of the job can take a toll on their mental health. Peer support and mental health professionals play a critical role in supporting first responders and addressing the stigma and shame associated with seeking help. If you're interested in peer support training, contact Jerry Lund at 435-476-6382 with The Complete First Responder Trainings or visit www.completefirstrespondertrainings.com. Let's work together to support our first responders and ensure they have the resources they need to maintain their mental health and well-being.
Cl0p ransomware hits Hitachi Energy. The US Department of Justice investigates ByteDance in alleged surveillance of journalists. A Hacktivist auxiliary hits Indian healthcare records. Pirated software is used to carry malware. The Effects of cyberattack on Latitude persist. Adam Meyers from CrowdStrike shares findings from the 2023 CrowdStrike Global Threat Report. Rick Howard has the latest preview of CSO Perspectives. And Pompompurin is arrested for an alleged role in BreachForums. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/53 Selected reading. Hitachi Energy confirms data breach after Clop GoAnywhere attacks (BleepingComputer) Hitachi Energy Group hit by cyber-attack, says network operations not compromised (cnbctv18.com) Justice Department Probes TikTok's Tracking of U.S. Journalists (Wall Street Journal) The FBI And DOJ Are Investigating ByteDance's Use Of TikTok To Spy On Journalists (Forbes) KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks (Azure Network Security Team) Pro-Russia hackers are increasingly targeting hospitals, researchers warns (Record) Russian hacktivist group targets India's health ministry (CSO Online) Russian Hacktivist group Phoenix targets India's Health Ministry Website (Threat Intelligence | CloudSEK) Ukraine warns that hacked software can be infected with Russian viruses (Kyiv Independent) Russian hackers spread infected software through torrents (SSSCIP) Australia's Latitude takes systems offline, Federal Police investigate cyberattack (Reuters) FBI targets notorious cybercrime market with teen's arrest (Washington Post) Dark Web ‘BreachForums' Operator Charged With Computer Crime (Bloomberg) Feds arrest alleged BreachForums owner linked to FBI hacks (The Verge) NY Man Charged as 'Pompompurin,' the Boss of BreachForums (KrebsOnSecurity) Breach Forums Admin 'Pompompurin' Arrested in New York (Cyber Kendra) Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York (The Hacker News)
When Russia invaded Ukraine a year ago, many security experts braced for an unprecedented escalation in cyberwarfare in addition to the physical assault. For years before the large-scale invasion, Ukraine was hit by massive cyberattacks that disrupted financial systems, transportation, energy and politics — disruptions that were expected to only intensify. But things haven’t exactly played out that way, according to Adam Meyers, chief of intelligence at the cybersecurity firm CrowdStrike.
When Russia invaded Ukraine a year ago, many security experts braced for an unprecedented escalation in cyberwarfare in addition to the physical assault. For years before the large-scale invasion, Ukraine was hit by massive cyberattacks that disrupted financial systems, transportation, energy and politics — disruptions that were expected to only intensify. But things haven’t exactly played out that way, according to Adam Meyers, chief of intelligence at the cybersecurity firm CrowdStrike.
An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike's Adam Meyers. If you say you're going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, and the agency has also added an entry to its Known Exploited Vulnerabilities Catalog. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/18 Selected reading. Cybercriminals stung as HIVE infrastructure shut down (Europol) U.S. Department of Justice Disrupts Hive Ransomware Variant (U.S. Department of Justice) Director Christopher Wray's Remarks at Press Conference Announcing the Disruption of the Hive Ransomware Group (Federal Bureau of Investigation) Taking down the Hive ransomware gang. (CyberWire) US hacks back against Hive ransomware crew (BBC News) Cyberattacks Target Websites of German Airports, Admin (SecurityWeek) Delta Electronics CNCSoft ScreenEditor (CISA) Econolite EOS (CISA) Snap One Wattbox WB-300-IP-3 (CISA) Sierra Wireless AirLink Router with ALEOS Software (CISA). Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers (CISA) Rockwell Automation products using GoAhead Web Server (CISA) Landis+Gyr E850 (CISA) Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) CISA Has Added One Known Exploited Vulnerability to Catalog (CISA)
The Vice Society may be upping its marketing game. Royal ransomware may have a connection to Conti. Royal delivers ransom note by hacked printer. KillNet goes after healthcare. CISA's Stakeholder Engagement Strategic Plan. Adam Meyers from CrowdStrike looks at cyber espionage. Giulia Porter from RoboKiller does not want to talk to you about your car's extended warranty. And holiday wishes to all. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/245 Selected reading. Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development (SentinelOne) Vice Society ransomware gang switches to new custom encryptor (BleepingComputer) Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks (Trend Micro) Researchers Link Royal Ransomware to Conti Group (SecurityWeek) Major Australian university dealing with suspected cybersecurity attack (7NEWS) Printers at Queensland's second-largest university spit out ransomware messages after cyber attack (ABC) Pro-Russian Hacktivist Group ‘KillNet' Threat to HPH Sector (HC3) HHS alert warns KillNet hacktivist group targeted US healthcare entity (SC Media) HC3 Analyst Note TLP Clear Pro-Russian Hacktivist Group Killnet Threat to HPH Sector December 22, 2022 | AHA (American Hospital Association) Strategic Plan for Stakeholder Engagement (CISA)
In this episode, Julia is joined by cybersecurity expert Adam Meyers, the senior vice president of intelligence for CrowdStrike. Meyers looks after CrowdStrike's intelligence gathering and cyber-adversarial monitoring activities, which include around 185 adversaries. With more than twenty years of experience in cybersecurity, Meyers has a talent for breaking down incredibly complex and nuanced concepts in cyber for everyday folks. In this wide-ranging conversation, they discuss Chinese cyber economic espionage, the greatest transfer of wealth. The discussion also touches on North Korea's targeting of cryptocurrency and decentralized financial systems for revenue generation meant to increase state wealth. The discussion explores data weaponization by hackers and the worrisome trend of making that data easily searchable and accessible. Meyers sheds light on cyber threats from Russia and details the growing threat of election meddling.
Cyber risk is changing, shifting from ransomware to data extortion - and Australian businesses are being targeted. Legislation has changed, but is it enough?Adam Meyers, the Senior Vice President of Intelligence at CrowdStrike, talks to Sean Aylmer from Washington DC, with a fascinating insight into the criminal groups behind the attacks.Support the show: https://fearandgreed.com.au/all-episodesSee omnystudio.com/listener for privacy information.
Prologue We've covered "threat intelligence" on the show a few times now, but the evolving nature of what threat data is, how it's useful, and how it enables defenders of a specific type identify malicious activity keep it interesting. This time around Adam Meyers of CrowdStrike joins Rafal to discuss threat intelligence, threat hunting, and clarifies some of the mis-conceptions and utilities around the topic. A good conversation for those defending their infrastructure and useful data points from someone who is a recognized expert. Adam joins us from his bunker, with all the elements you'd expect from Adam, so it's definitely worth your time to listen closely. Check out Fal.Con, where you can catch the cutting-edge on CrowdStrike kit, industry knowledge, and hear some great industry speakers. Rafal will be there speaking on the topic of operationalizing and making the SOC more effective and efficient at small scale, check it out (link below). Guest Adam Meyers LinkedIn: https://www.linkedin.com/in/adam-meyers-7a58481/ CrowdStrike: https://www.crowdstrike.com Fal.Con: https://www.crowdstrike.com/events/fal-con/
Steve sits down with stand ups John Adam Meyers and Eleanor J. Kerrigan at the historic Zanies in Nashville to break down stand up from Jim Breuer, Brian Holtzman and Mark Maron. Live Dates - www.stevebyrnelive.com IG - instagram.com/stevebyrnelive Twitter - twitter.com/stevebyrnelive Facebook - Facebook.com/stevebyrnelive
Steve sits down with stand ups John Adam Meyers and Eleanor J. Kerrigan at the historic Zanies in Nashville to break down stand up from Jim Breuer, Brian Holtzman and Mark Maron. Live Dates - www.stevebyrnelive.com IG - instagram.com/stevebyrnelive Twitter - twitter.com/stevebyrnelive Facebook - Facebook.com/stevebyrnelive
In this special mini series of Hacker Valley Red, hosts Ron and Chris are joined by the Senior Vice President of Intelligence at CrowdStrike, Adam Meyers, to review and highlight elements shared in CrowdStrike's 2022 Global Threat Report. In the final episode of this series Ron, Chris and Adam discuss threats to cloud infrastructure and how to better secure the gaps. Adam explores how the adoption of cloud technology has expanded our attack surface, how the digital transformation has placed significant strain on asset management and observability, and why identity protection and zero trust protocols might be your biggest defense against data breaches. He takes a deep dive into the Log4J vulnerability and its massive impact on cybersecurity teams all over the world. Finally, the trio examine the intersection of cloud and supply chain security and its implications on security operations. Guest Bio: Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee and SVP on the executive team at CrowdStrike Inc., a global provider of security technology and services focused on identifying advanced threats and targeted attacks. A sought-after thought-leader, Adam conducts speaking engagements and training classes around the world on the topics of threat intelligence, reverse engineering, and data breach investigations. Links: Stay in touch with Adam Meyers on LinkedIn and Twitter Follow CrowdStrike on LinkedIn and Twitter and learn more about what CrowdStrike has to offer on their website Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon Continue the conversation on our Discord Thanks to our friends at CrowdStrike for sponsoring this episode!
In this special mini series of Hacker Valley Red, hosts Ron and Chris are joined by the Senior Vice President of Intelligence at CrowdStrike, Adam Meyers, to review and highlight elements shared in CrowdStrike's 2022 Global Threat Report. In episode two of this series Ron, Chris and Adam take a deep dive into APTs – how it's changed over the years and where we stand on the matter today. Adam uncovers the motivations behind nation-state attacks, how APTs are becoming more sophisticated in conducting espionage, and what we need to know about supply chain attacks. Lastly, he explores how APTs are utilizing the cloud and current events to further their operations. Guest Bio: Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee and SVP on the executive team at CrowdStrike Inc., a global provider of security technology and services focused on identifying advanced threats and targeted attacks. A sought-after thought-leader, Adam conducts speaking engagements and training classes around the world on the topics of threat intelligence, reverse engineering, and data breach investigations. Links: Stay in touch with Adam Meyers on LinkedIn and Twitter Follow CrowdStrike on LinkedIn and Twitter and learn more about what CrowdStrike has to offer on their website Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon Continue the conversation on our Discord Thanks to our friends at CrowdStrike for sponsoring this episode!
In this special mini series of Hacker Valley Red, hosts Ron and Chris are joined by the Senior Vice President of Intelligence at CrowdStrike, Adam Meyers, to review and highlight elements shared in CrowdStrike's 2022 Global Threat Report. In episode one of this series Ron, Chris and Adam take a deep dive into understanding the state of ransomware today and how it's shaping the cybersecurity landscape as we know it. Adam explores the evolution of ransomware from a targeting and technical perspective, how data extortion has impacted day-to-day operations and services in our industry, and the risks cloud/SaaS environments present in today's threat climate. Adams shares a glimpse into the creation of the Global Threat Report and how CrowdStrike is uniquely poised in providing actionable intel to help safeguard your data and operations. Lastly, he gives his advice on how to properly ingest the information provided in the report. Guest Bio: Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee and SVP on the executive team at CrowdStrike Inc., a global provider of security technology and services focused on identifying advanced threats and targeted attacks. A sought-after thought-leader, Adam conducts speaking engagements and training classes around the world on the topics of threat intelligence, reverse engineering, and data breach investigations. Links: Stay in touch with Adam Meyers on LinkedIn and Twitter Follow CrowdStrike on LinkedIn and Twitter and learn more about what CrowdStrike has to offer on their website Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon Continue the conversation on our Discord Thanks to our friends at CrowdStrike for sponsoring this episode!
Before Russian forces began pounding parts of Ukraine with artillery, they are believed to have inundated the country with an arsenal of cyberattacks that picked away at its infrastructure. With the invasion, what’s the rest of the world to expect on the cyber front? To help answer that question, we spoke to Adam Meyers, Senior Vice President of Intelligence at the cybersecurity firm CrowdStrike. Diane Swonk discusses the behavior of the markets with us. World leaders are planning a round of stronger sanctions against Russia.
Before Russian forces began pounding parts of Ukraine with artillery, they are believed to have inundated the country with an arsenal of cyberattacks that picked away at its infrastructure. With the invasion, what’s the rest of the world to expect on the cyber front? To help answer that question, we spoke to Adam Meyers, Senior Vice President of Intelligence at the cybersecurity firm CrowdStrike. Diane Swonk discusses the behavior of the markets with us. World leaders are planning a round of stronger sanctions against Russia.
LinkedIn Live stream (recorded): https://www.linkedin.com/video/event/urn:li:ugcPost:6895440886222643201/ DtSR LinkedIn Page (subscribe here!): https://www.linkedin.com/company/down-the-security-rabbithole-podcast/ Prologue This week is a slightly longer (oops) episode of the DtSR Podcast with a three-timer, Adam Meyers of Crowdstrike. Adam joins James and Rafal to talk about the latest Global Threat Report and all the trends and insights. There is a lot of good insight here, and if you want to catch the LIVE (recorded) video you can get that too! Don't forget to subscribe to our DtSR page on LinkedIn to get all the latest content. Guest Adam Meyers LinkedIn: https://www.linkedin.com/in/adam-meyers-7a58481/ Twitter: https://twitter.com/adam_cyber
Adam Meyers - "2 Timothy: Persecution" - 2 Timothy 3
Howard University senior Erica England explains why students are protesting at one of the most prestigious historically Black colleges and universities in the country. And, analysts say the Chinese-made C919 jet is another example of China's industrial espionage. Adam Meyers, senior vice president of intelligence at cybersecurity firm CrowdStrike, talks about the plane's history.
Adam Meyers- "3 Equals 1 Holy Spirit"
This Week we talk to Tony Celano, an animator in the Los Angeles comedy scene. He has worked with comics such as Tom Segura, Adam Meyers, Adam Ray and many more. Host: Ryan Demarest, Steve J Rodgers Intern: Michael Delgado Guest: Tony Celano Ryan Demarest: Social Media Pages............................................ ................................................ www.facebook.com/ryan.demarest www.facebook.com/ryanpdemarest/ www.instagram.com/ryanpdemarest www.youtube.com/user/ryanpd90 www.youtube.com/user/ryanpd90 Steve J Rodgers: Social Media Page................................................. ........................................................ www.instagram.com/stevejrodgers/ Tony Celano Social Media Page.......................................... ...................................... https://www.instagram.com/tonyjcelano/ https://www.instagram.com/tonycelanoart/ Hit The Mics Podcast Page: ............................................ ............................................. directory.libsyn.com/shows/view/id/hitthemics FamCast Media Page: www.facebook.com/groups/FamcastMedia/ www.facebook.com/FamcastMedia/ Theme Music by: Solar Haze Buy the Theme song here: solarhaze.bandcamp.com/track/hit-the-mics-jingle
This Week we talk to Tony Celano, an animator in the Los Angeles comedy scene. He has worked with comics such as Tom Segura, Adam Meyers, Adam Ray and many more.
Adam Meyers wraps up the "Out of the Box" Series with "Just Go" Matthew 28:18-20.
This week I sit down with Adam Meyers, former Sound Engineer from Maxwell's in Hoboken, NJ. Maxwell's was the #1 stop for musicians outside of New York City. Adam's journey and stories are one of a kind, and give you an outlook from music behind the board. His broad view on music and things alike are a refreshing taste on the industry. Great man, great stories, and a great time.
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ Intelligence Analysis: A Target-Centric Approach by Robert M. Clark: https://www.amazon.com/Intelligence-Analysis-Target-Centric-Robert-Clark/dp/154436914X For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: www.crowdstrike.com/ For more on cybersecurity, visit us at cybersecurityventures.com/ For all of our podcasts, visit us at cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: linkedin.com/company/cybercrime-magazine/ Twitter: twitter.com/CybersecuritySF
Sponsored by: https://www.crowdstrike.com/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
In late April, workers at a water pumping station in central Israel noticed a warning alert on their computer screens. Then, water pumps started to malfunction, turning off and on without control. It took a few hours to figure out what was wrong: The system that regulates the water at the facility had been hacked. According to reports, Iran was behind the attack and used American servers to carry it out.As the eyes of the world are set on COVID-19 and global outrage over police brutality, in the shadows, Iran and Israel continue to fight — allegedly using cyberweapons.Related: Israeli plans for annexation weigh heavily on Jordan Valley residentsThe cyber breach at the water pumping station was apparently fixed before any real damage was done. Israeli officials have not gone on the record with what they know, and Iran denies it was responsible for the attack. But, according to a story in the Financial Times, the goal was to boost the chlorine levels in the water supplied to Israeli homes. That could have made hundreds, if not thousands of people sick. “What the Iranians did is, in a way, crossing international red lines,” said Ya’akov Amidror, a former Israeli national security adviser. He says that targeting critical civilian infrastructure, like a water station, was unprecedented for Iran.“For them, civilian targets are legitimate,” said Amidror. “The Iranians did it in the past by proxies, using Hezbollah, Hamas. But here, it’s the state directly. In a way, you know, it’s terrorism run by a state.”Israel’s prime minister, Benjamin Netanyahu, has accused Iran of conducting failed cyberattacks in the past. “Iran attacks Israel on a daily basis,” Netanyahu said at a cybersecurity conference last year. “We monitor these attacks, we see these attacks and we thwart these attacks. All the time. We’re not oblivious to these threats, they don’t impress us. Because we know what our power is, both in defense and in offense," he said. Related: A cyberattack could wreak destruction comparable to a nuclear weaponMilitary experts consider cyberspace to be the fourth significant battleground after land, air and sea. But the line that distinguishes military and civilian targets is easily blurred.Israel's response to the water station attack came on May 9, when operations at the Iranian port of Shahid Rajaee were disrupted. According to news reports, Israel hacked the facility’s computer system. Traffic jams and hold-ups with shipping containers stalled activity at the port for days. This was a serious disruption for a country that is already suffering from crippling economic sanctions as well as the coronavirus pandemic. “The Iranians have downplayed the damage and some Iranian outlets have also said that there has been no such attack,” said Meir Javedanfar, a Middle East analyst based in Tel Aviv. He was born in Iran, but moved to Israel in 2004.Javedanfar says this latest round of cyber tit-for-tat between the two regional rivals has been escalating for over a decade. “Especially starting over the Iranian nuclear program, where allegedly Israel and the United States attacked Iran’s nuclear installation in [the Iranian city of] Natanz with the ‘Stuxnet’ virus,” Javedanfar explained.Stuxnet is a malicious computer worm discovered in 2010, considered to be one of the world’s first sophisticated cyberweapons ever to be used between countries. Related: The history of US-Iran relations: A timelineAdam Meyers, senior vice president of intelligence at cybersecurity company CrowdStrike, said the discovery of Stuxnet was a watershed moment for Iran. “This is something that awoke the Iranian thinking around cyber and the capabilities of what you could do with a cyber operation.”Meyers says Iran has recently stepped up cyberattacks against the West, beyond Israel. He notes that in 2013, authorities in Rye, New York, detected an attempt by Iranian hackers to take control over a dam. That attack failed because the dam was under repair and offline.“We don’t always know what their intention is if it gets stopped, right?” said Meyers. “So the Rye [dam], in New York, example, they had conducted some targeting of this dam, and that may have been opportunistic, it may have been very targeted. It’s hard to say for certain, but because it was stopped, we don’t know necessarily what the outcome would have been.”Amidror says moves to target civilian infrastructure is dangerous for the future of cyberwarfare.“The decision to cross the line was a big mistake by the Iranians,” he said. “From now on it’s an open question how Israel will retaliate.”
Adam Meyers - "got faith? - Moses" - Hebrews 11:24-27
As the corona virus, known as COVID-19 sweeps the world, Target USA speaks with Robin Simcox, from Britain, Lao Petrilli of Italy and Eeva Eek Pajuste of Estonia to hear how they are impacted, and what the U.S. should expect. We also spoke to cyber security experts Rachel Tobac of Social Proof Security and Adam Meyers of Crowdstrike about measures teleworkers can take to protect themselves and their homes.
During a week of high drama between the U.S. and Iran, a top Iranian general was assassinated by the U.S. Americans on military bases in Iraq had to run for cover from Iranian launched ballistic missiles, and the leaders of both nations have warned that more attacks could be coming. But what kind of attacks could Iran be planning? Alireza Jafarzadeh, deputy director of the Washington office of the National Council of Resistance of Iran, and Adam Meyers of Crowdstrike break down the threat for us.
This week Seth (@fftheathomedad) is joined by special guest Adam Meyers (@AdamTMeyers) from Full Press Coverage - Patriots (@FPC_Pats). They breakdown last week, talk about the injury fallout and healthy hopefuls as well as last week's winners and losers. The booze bet is a Pats v. Cowboys showdown. And of course, don’t miss your opportunity to enter for your FREE CMC jersey!
One of the most troublesome forms of cyber attack, ransomware famously hit Baltimore earlier this year. City services came almost to a halt. Ransomware attacks against governments at all levels are on the rise. For some statistics and what to do about these attacks, Federal Drive with Tom Temin turned to the Vice President of Intelligence at Crowdstrike, Adam Meyers.
This week Adam Meyers joins James & Rafal to talk about the Crowdstrike Mobile Threat Landscape Report 2019 - https://www.crowdstrike.com/resources/reports/mobile-threat-report-2019/ and the learnings and lessons therein. Highlights from this week's episode include... Adam gives us the lowdown on adversaries, in 2019 Adam bakes some bread Rafal asks who the biggest and baddest attackers are So much more... check out the link above, read the report! Guest: Adam Meyers - https://www.linkedin.com/in/adam-meyers-7a58481/ - VP, Intelligence at Crowdstrike. We'll let him explain the rest...
This is the 25th episode of my Dungeons and Dragons advice and discussion podcast! We are very proud members of the Nerdsmith network! Find out more at www.nerdsmith.org Each episode, I sit down with a different DM in order to discuss, debate, and hopefully answer your D&D related questions! Today I sit down with Adam Meyers, president of Drop dead studios and Author for the Spheres of Power magic system. We discuss re-skinning monsters, pacifist players, and homebrew restrictions.
Adam Meyers from Story Martial Arts shares his sprint from 0-250 students in 12 months. .IN THIS EPISODE, YOU WILL LEARN: How checking the population and demographics has helped Adam grow his school. Building a connection with parents for improving customer retention. Being humble enough to admit that you're not always the best person to […] The post 70 – How To Scale Your Martial Arts Business Through The Mathematics Of Kindness appeared first on Martial Arts Marketing For Martial Arts Business | Martial Arts Media™.
This week Scott and Mike welcomed our old friend and hotel-buddy Adam Meyers onto the show! The publisher of Drop Dead Studios gives us the down-low from another RPG industry veteran, one that had their feet on the ground at PaizoCon 2017!
Daryl and Brandon took JR Brow to the Tulsa BBQ spot Burn Co Barbecue. JR was a pleasure to break bread with! He's been on Comedy Central's "Live at Gotham" and CBS’s "Late Late Show with Craig Ferguson." We enjoy copious amounts of smoked meat and talked with Burn Co BBQ's owner Adam Meyers. We're still thinking about those ribs. ENJOY!
This week The Cipher Brief's Executive Producer Leone Lakhani speaks to Adam Meyers from the cyber-security firm CrowdStrike. As the Vice President of Intelligence, Adam heads a team that identifies the perpetrators of cyber-crimes, both in the private and public sectors. CrowdStrike helped to identify the hackers behind the Democratic National Committee's email leaks last year, and more recently the mastermind behind the Kelihos Botnet. Leone speaks to Adam about the challenges and procedures in identifying these cyber criminals.