Podcasts about analysis center

  • 85PODCASTS
  • 123EPISODES
  • 35mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 17, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about analysis center

Latest podcast episodes about analysis center

The DownLink
Space Money: IonQ & Capella CEOs on the $318m Deal, Plans & Vision

The DownLink

Play Episode Listen Later May 17, 2025 42:43


The $318 million IonQ purchase deal to acquire Capella Space is bringing together two worlds in a high-stakes bid to radically change satellite-to-satellite and satellite-to-ground communications and computing at the edge. At least that's what the CEOs are saying. Are they right? Also, up top in this episode is a space threats update. Laura Winter speaks with Niccolo de Masi, IonQ's President and CEO; Frank Backes, CEO of Capella Space; and Hector Falcon, the Space Information Sharing and Analysis Center's Watch Center Director.

Cybercrime Magazine Podcast
Cybersecurity Industry Associations. Auto-ISAC - Automotive Information Sharing & Analysis Center.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 23, 2025 0:54


Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the Automotive Information Sharing and Analysis Center, otherwise known as Auto-ISAC. Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the global automotive industry, including light- and heavy-duty vehicle OEMs, suppliers and the commercial vehicle sector. To learn more, visit https://automotiveisac.com. See the full list of associations at https://cybersecurityventures.com/cybersecurity-associations.

The DownLink
Space Power: Trump's New “Star Wars” Executive Order

The DownLink

Play Episode Listen Later Jan 31, 2025 49:01


This week President Donald Trump issued an executive order called “The Iron Dome For America”, which calls for a space-based missile shield. This order is expected to have huge ramifications for arms control in space, technology development, and the U.S. Space Force, should the U.S. Congress fund what would be a technically challenging and expensive program. Laura Winter speaks with Joel Mozer, who retired from a decades-long career in government service after serving as the first United States Space Force Director of Science, Technology and Research; and Peter Garretson, a Senior Fellow at the American Foreign Policy Council, and co-Author of the book “The Next Space Race: A Blueprint for American Primacy”, but after a special Space Threat update from Hector Falcon, Watch Center Director, Space Information Sharing and Analysis Center.

Federal Drive with Tom Temin
Energy Threat Analysis center aims to protect U.S. power networks

Federal Drive with Tom Temin

Play Episode Listen Later Nov 12, 2024 7:20


The Energy Department worries about cyber attacks on U.S. power networks. DOE's Office of cyber security, energy security and emergency response, CESER has the job of addressing those risks. It's now putting into operation a test project to share more cyber threat data with the energy sector. It's called the Energy Threat Analysis center, Federal News Network's Justin Doubleday spoke with the director of the Center. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Federal Drive with Tom Temin
Energy Threat Analysis center aims to protect U.S. power networks

Federal Drive with Tom Temin

Play Episode Listen Later Nov 12, 2024 8:05


The Energy Department worries about cyber attacks on U.S. power networks. DOE's Office of cyber security, energy security and emergency response, CESER has the job of addressing those risks. It's now putting into operation a test project to share more cyber threat data with the energy sector. It's called the Energy Threat Analysis center, Federal News Network's Justin Doubleday spoke with the director of the Center. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Data Security Decoded
Building a Cyber Resilient Healthcare System with Anahi Santiago, Chief Information Security Officer at ChristianaCare

Data Security Decoded

Play Episode Listen Later Oct 1, 2024 33:27


Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our guest host, Rick Bryant, Field CTO for Healthcare at Rubrik, is joined by Anahi Santiago, Chief Information Security Officer at ChristianaCare, a healthcare organization centered on improving health outcomes, making high-quality care more accessible, and lowering health care costs. She is also a Member Board of Directors at Health-ISAC (Health Information Sharing and Analysis Center), a global, non-profit, member-driven organization where health sector stakeholders coordinate, collaborate and share vital physical and cyber threat intelligence and best practices with each other. Anahi serves as an Advisory Council Member at CISO ExecNet, a peer-to-peer learning community for Chief Information Security Officers. Join Rick and Anahi as they explore the challenges facing healthcare cybersecurity, the need for regulatory frameworks, and the role of information sharing in improving security measures. Episode Highlights: 00:00 - Intro 02:13 - Anahi's introduction to cybersecurity 04:11 - The most pressing issues facing healthcare systems 05:47 - Risk management 07:41 - Managing data growth 11:21 - Fostering a culture of cybersecurity awareness 14:47 - Organizational resiliency 19:28 - The next five years 24:47 - More regulations vs better enforcement of existing regulations

The DownLink
Space Competition: How To Better De-Risk Adversarial Threats To Space Systems' Value

The DownLink

Play Episode Listen Later Sep 28, 2024 35:21


Space Competition: How To Better De-Risk Adversarial Threats To Space Systems' Value This episode was recorded before a live audience at the Space Information Sharing and Analysis Center's Value of Space Summit, convened in Colorado Springs, Colorado. The discussion focuses on threat trends, the lack of insurance cover for certain types of attacks; and how to better secure the value of space systems. Laura Winter speaks with Chris Kunstadter, President at Triton Space; Tomas Peña, Chief Technologist for Cyber Operations at L3Harris Technologies; and Sam Visner, the Space-ISAC Chairman.

Beyond the News WFLA Interviews
Marci Andino-AI and the 2024 election

Beyond the News WFLA Interviews

Play Episode Listen Later Sep 25, 2024 6:59


Newsradio WFLA's Read Shepherd talks with Marci Andino, VP-Elections Infrastructure, Information Sharing and Analysis Center, about the impact of Artificial Intelligence on the 2024 elections.

Making Sense with Sam Harris - Subscriber Content
#380 - The Roots of Attention

Making Sense with Sam Harris - Subscriber Content

Play Episode Listen Later Aug 23, 2024 98:58


Share this episode: https://www.samharris.org/podcasts/making-sense-episodes/380-the-roots-of-attention Sam Harris speaks with Amishi Jha about attention and the brain. They discuss how attention is studied, the failure of brain-training games, the relationship between attention and awareness, mindfulness as an intrinsic mental capacity, the neurological implications of different types of meditation, the neural correlates of attention and distraction, the prospects of self-transcendence, the link between thought and emotion, the difference between dualistic and nondualistic mindfulness, studying nondual awareness in the lab, the influence of smartphones, the value of mind wandering, and other topics. Dr. Amishi Jha, PhD, is a professor of psychology at the University of Miami. She serves as the Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative, which she cofounded in 2010. She received her PhD from the University of California, Davis, and did postdoctoral training at the Brain Imaging and Analysis Center at Duke University. Her work has been featured at NATO, the World Economic Forum, and the Pentagon, and she’s been covered in The New York Times, NPR, Time magazine, and Forbes. With grants from the Department of Defense and several private foundations, she leads research on the neural bases of attention and the effects of mindfulness-based training programs on cognition, emotion, resilience, and performance. Dr. Jha’s national bestseller, Peak Mind, describes her work with a variety of high-demand groups, from special forces, elite athletes, and first responders, to teachers, business and medical professionals, and students. Her forthcoming app, Pushups for the Mind, will be available to U.S. military service members in the fall of 2024, and for public release in early 2025. Website: https://amishi.com/ Twitter: @amishijha Learning how to train your mind is the single greatest investment you can make in life. That’s why Sam Harris created the Waking Up app. From rational mindfulness practice to lessons on some of life’s most important topics, join Sam as he demystifies the practice of meditation and explores the theory behind it.

Grieving Out Loud: A Mother Coping with Loss in the Opioid Epidemic
Expert insights on preventing substance abuse

Grieving Out Loud: A Mother Coping with Loss in the Opioid Epidemic

Play Episode Listen Later Aug 7, 2024 36:14 Transcription Available


Not only is the United States battling its deadliest drug epidemic in history, but an increasing number of Americans are also struggling with substance use disorder. According to survey data from the U.S. Department of Health and Human Services, nearly 49 million people in the US aged 12 and older – more than one in six – have a substance use disorder.How can we turn the tide on this growing crisis? Today's guest, Rodney Wambeam, is a senior research scientist at the Wyoming Survey and Analysis Center. He has also served as a health and human services advisor to the governor of Nebraska and has devoted much of his life to figuring out how to prevent substance use and abuse.In this episode of Grieving Out Loud, Wambeam shares crucial advice on preventing substance misuse and addiction. His insights are especially vital for parents, grandparents and teachers navigating the challenges of the opioid epidemic, offering hope and practical strategies to protect their families and communities.Support the Show.For more episodes and to read Angela's blog, just go to our website, emilyshope.charityWishing you faith, hope and courage! Podcast producers: Casey Wonnenberg & Michael Geheren

Big Think
If your attention span has been hijacked, here's how to take it back. | Amishi Jha

Big Think

Play Episode Listen Later Aug 2, 2024 6:48


Where do you place precious brain resources? The human brain's attention system is the success story of what makes us unique as human beings. Because attention fuels our ability to think, to feel, and connect, what we pay attention to is our life. For a long time, throughout our evolutionary history, the brain began to suffer from a very big problem which is that there's far more information out in the environment than could be fully processed. Attention ended up becoming a very useful solution because it allows us to prioritize information, but there are qualities of the human experience that disable attention. Given how powerful attention is, we need to really respect where we place this precious brain resource. Chapters For Easier Navigation:- 0:00 introduction 1:27 power of attention 2:38 the challenges of attention 4:38 what is meta awareness Up Next ► How to enter ‘flow state' on command   • How to enter ‘flow state' on command ...   ---------------------------------------------- About Amishi Jha: Dr. Amishi Jha is a professor of psychology at the University of Miami. She serves as the Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative, which she co-founded in 2010. She received her Ph.D. from the University of California–Davis and postdoctoral training at the Brain Imaging and Analysis Center at Duke University. Dr. Jha's work has been featured at NATO, the World Economic Forum, and The Pentagon. She has received coverage in the The New York Times, NPR, TIME, Forbes and more. ---------------------------------------------------------------------------------- About Big Think | Smarter Faster™ ► Big Think The leading source of expert-driven, educational content. With thousands of videos, featuring experts ranging from Bill Clinton to Bill Nye, Big Think helps you get smarter, faster by exploring the big ideas and core skills that define knowledge in the 21st century. Go Deeper with Big Think ►Become a Big Think Member Get exclusive access to full interviews, early access to new releases, Big Think merch and more ►Get Big Think+ for Business Guide, inspire and accelerate leaders at all levels of your company with the biggest minds in business ---------------------------------------------------------------------------------- Learn more about your ad choices. Visit megaphone.fm/adchoices

Big Think
Why your brain believes everything | Neuroscientist Amishi Jha

Big Think

Play Episode Listen Later Aug 1, 2024 3:56


How to see through the lies that surround us. Up Next ► How to catch a liar (assuming we want to)   • How to Catch a Liar (Assuming We Want...   The world today feels like it's a constant VUCA environment: Volatile, Uncertain, Complex, and Ambiguous. The shifting landscape, the bombarding of information toward us, and always having to work in sort of a 24/7 environment. This is problematic because we feel like we're all in a collective crisis of attention. So it's very important that we, as citizens of the world, understand what is true and what is false. A question that should be on our minds these days is: 'What is the role of attention in minimizing truth bias?' ---------------------------------------- About Amishi Jha: Dr. Amishi Jha is a professor of psychology at the University of Miami. She serves as the Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative, which she co-founded in 2010. She received her Ph.D. from the University of California–Davis and postdoctoral training at the Brain Imaging and Analysis Center at Duke University. Dr. Jha's work has been featured at NATO, the World Economic Forum, and The Pentagon. She has received coverage in the The New York Times, NPR, TIME, Forbes and more. ----------------------------------------------------------- Go Deeper with Big Think: ►Become a Big Think Member Get exclusive access to full interviews, early access to new releases, Big Think merch and more ►Get Big Think+ for Business Guide, inspire and accelerate leaders at all levels of your company with the biggest minds in business ---------------------------------------------------------------------------------- Learn more about your ad choices. Visit megaphone.fm/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip Huff

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 27, 2024 60:58


Podcast: PrOTect It AllEpisode: Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip HuffPub date: 2024-06-24Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor. Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts. The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems. Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors. Key Moments: 00:10 Early career challenges prepare for real-world demands. 04:35 Degree's purpose is knowledge and skill acquisition. 08:17 Promoting cyber-informed engineering principles in community colleges. 11:32 Small private school in Texas prioritizes practical engineering. 14:48 Trade skills in high demand, apprenticeships offered. 17:33 Community colleges offer efficient curriculum changes for workforce. 23:12 Team's success attributed to aligning schedules with peers. 26:57 Company and employee benefit from long-term commitment. 28:46 Aligning learning outcomes with career competencies is crucial. 31:44 Retooling professionals for new careers and skills. 36:13 Value education based on future job prospects. 37:35 Integration of AI in education needs balancing. 42:52 Transforming education to align with real learning. 46:28 Transforming classroom for positive shared learning experiences. 49:57 Unused industrial equipment turned into educational tools. 52:10 Learn troubleshooting, not just following instructions. 56:07 Excitement and fear about accessible AI advancements. 59:12 Developing cyber engineering education standards at Idaho National Labs. About the guest : Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP. How to connect with Philip: https://www.linkedin.com/in/philip-huff-65012621/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.coThe podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip Huff

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 27, 2024 60:58


Podcast: PrOTect It AllEpisode: Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip HuffPub date: 2024-06-24Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor. Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts. The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems. Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors. Key Moments: 00:10 Early career challenges prepare for real-world demands. 04:35 Degree's purpose is knowledge and skill acquisition. 08:17 Promoting cyber-informed engineering principles in community colleges. 11:32 Small private school in Texas prioritizes practical engineering. 14:48 Trade skills in high demand, apprenticeships offered. 17:33 Community colleges offer efficient curriculum changes for workforce. 23:12 Team's success attributed to aligning schedules with peers. 26:57 Company and employee benefit from long-term commitment. 28:46 Aligning learning outcomes with career competencies is crucial. 31:44 Retooling professionals for new careers and skills. 36:13 Value education based on future job prospects. 37:35 Integration of AI in education needs balancing. 42:52 Transforming education to align with real learning. 46:28 Transforming classroom for positive shared learning experiences. 49:57 Unused industrial equipment turned into educational tools. 52:10 Learn troubleshooting, not just following instructions. 56:07 Excitement and fear about accessible AI advancements. 59:12 Developing cyber engineering education standards at Idaho National Labs. About the guest : Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP. How to connect with Philip: https://www.linkedin.com/in/philip-huff-65012621/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.coThe podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Hill Country Institute Live: Exploring Christ and Culture
General Robert Neller Interviewed on Hill Country Institute Live

Hill Country Institute Live: Exploring Christ and Culture

Play Episode Listen Later Apr 28, 2024 58:00


In this fascinating interview, Larry talks with General Robert Neller about  Just War Theory; the increasing security risks our country faces from the alliance of China, Russia, and Iran; the importance of Allies to the United States; and our commitment to Ukraine from the time they gave up nuclear weapons.General Neller served in the U.S. Marine Corps for forty-four years. He was the 37th Commandant of the United States Marine Corps and served as member of the Joint Chiefs of Staff of the U.S. Military. General Neller also served as Deputy Commanding General, I Marine Expeditionary Force (Forward) during Operation IRAQI FREEDOM (05-07); Assistant Division Commander for 1st and 2d Marine Divisions; and President of Marine Corps University.His Joint assignments include service in the Policy Division of Supreme Headquarters Allied Powers Europe in Belgium, and as the Director of Operations (J-3) of the Joint Staff in Washington, D.C.General Neller's many honors include having The Marine Corps Wargaming and Analysis Center named after him. It will be called the “General Robert B. Neller Center for Wargaming and Analysis” when it is completed in 2025. Neller Center will be a world-class facility for Marines to wargame in a secure, centralized location and will provide next-generation technologies to facilitate wargaming and analysis across multiple levels of classification, with a host of coalition and joint partners. General Neller is a Distinguished Senior Fellow of the Strauss Center for International Security and Law and a Distinguished National Security Fellow at the Clements Center. Both centers are located at the University of Texas. He is a Board Member of Bridge to Mobility, which provides access to wheelchair accessible vehicles. 

Growing Harvest Ag Network
Morning Ag News, April 22, 2024: Protecting the ag industry

Growing Harvest Ag Network

Play Episode Listen Later Apr 22, 2024 2:58


The Food and Agriculture – Information Sharing and Analysis Center released its first annual report on ransomware incidents in the U.S. food and agriculture sector.See omnystudio.com/listener for privacy information.

From The Green Notebook
Dr. Amishi Jha- How to Perform When Life Stresses You Out

From The Green Notebook

Play Episode Listen Later Apr 20, 2024 58:39


Dr. Amishi Jha joins Joe to discuss her book, Peak Mind: Find Your Focus, Own Your Attention, Invest 12 Minutes a Day . Amishi sheds light on the complexities of the brain's attention system to help us understand how we can navigate and enhance our focus in stressful and demanding jobs. In this episode Joe and Amishi discuss: How our attention shapes everything from emotions to relationships Challenges in maintaining attention in an information-saturated ageHow the attention system works The vulnerability of attention to stress and its impact on performanceInsights into memory and emotional regulation How mindfulness training helps strengthens our attention system A practical approach to mindfulness training for enhancing attention Whether you're struggling to stay present, looking to enhance your memory, or seeking solace in the whirlwind of the digital age, this episode promises to turn the light of your attention onto pathways that could lead to a calmer, more focused state of being. Learn more about Amishi's research in military cohorts here.Dr. Amishi Jha, PhD is Director of Contemplative Neuroscience and Professor of Psychology at the University of Miami. Prior to her current post, she was an Assistant Professor at the Center for Cognitive Neuroscience at the University of Pennsylvania.She received her B.S in Biological Psychology from the Universityof Michigan, her Ph.D in Psychology (Cognitive Neuroscience) from the University of California–Davis, and her post-doctoral training at the Brain Imaging and Analysis Center at Duke University in functional neuroimaging.Learn more about her work here.Special thanks to this week's sponsors!Veteran-founded Adyton. Connect Leadership With Action Across Distributed Formations With Mustr by Adyton. Mustr is your digital knife-hand for daily and rapid personnel accountability, real time response data visibility, and automated reporting. Learn more about what Mustr can do for your formation here! My favorite coffee is veteran-owned Alpha Coffee and I've been drinking it every morning since 2020! They make 100% premium arabica coffee. Alpha has donated over 22k bags of coffee to deployed units and they offer a 10% discount for military veterans, first responders, nurses, and teachers! Try their coffee today. Once you taste the Alpha difference, you won't want to drink anything else!  Learn more here.   

ITSPmagazine | Technology. Cybersecurity. Society
Global Collaboration for Financial Security: The Role of FS-ISAC in Safeguarding Financial Stability | A Conversation with Cameron Dicker | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 17, 2024 35:46


Guest: Cameron Dicker, Director of Global Business Resilience at FS-ISAC [@FSISAC]On LinkedIn | https://www.linkedin.com/in/cameron-dicker-74804959/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in a conversation with Cameron Dicker, the Director of Global Business Resilience at FS-ISAC (Financial Services Information Sharing and Analysis Center). The discussion delves into the critical role of FS-ISAC in enhancing business resilience within the financial services sector.Cameron Dicker provides insights into the extensive global program he oversees at FS-ISAC, focusing on conducting exercises for members and fostering a community of practitioners in risk, resilience, crisis management, and business continuity. The organization serves as a platform for members to share experiences, assess risks, and collaborate on addressing operational challenges collectively.The conversation expands to highlight the unique positioning of FS-ISAC as a global node network, comprising over 5,000 member organizations across 75 countries. The organization's pillars of intelligence, resilience, and security work in unison to collect, analyze, and disseminate valuable information to bolster members' resilience and security measures.Furthermore, Sean and Cameron discuss the increasing challenges posed by third-party services in the financial sector, emphasizing the need for standardized reporting practices among multinational banks. The episode underscores the importance of continuous learning and adaptation in response to evolving cybersecurity threats.The episode includes a call to action for increased engagement within the FS-ISAC community, encouraging members to actively participate in discussions and initiatives aimed at strengthening the sector's resilience to cybersecurity challenges. Through a blend of real-world insights and strategic foresight, the episode offers a comprehensive overview of the vital role played by FS-ISAC in safeguarding the financial services industry against emerging cyber threats.Top Questions AddressedWhat are the challenges posed by third-party services in the financial sector?How does FS-ISAC foster global collaboration among members?What role does intelligence sharing play in bolstering business resilience within the financial services sector?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Global Collaboration for Financial Security: The Role of FS-ISAC in Safeguarding Financial Stability | A Conversation with Cameron Dicker | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Apr 17, 2024 35:46


Guest: Cameron Dicker, Director of Global Business Resilience at FS-ISAC [@FSISAC]On LinkedIn | https://www.linkedin.com/in/cameron-dicker-74804959/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in a conversation with Cameron Dicker, the Director of Global Business Resilience at FS-ISAC (Financial Services Information Sharing and Analysis Center). The discussion delves into the critical role of FS-ISAC in enhancing business resilience within the financial services sector.Cameron Dicker provides insights into the extensive global program he oversees at FS-ISAC, focusing on conducting exercises for members and fostering a community of practitioners in risk, resilience, crisis management, and business continuity. The organization serves as a platform for members to share experiences, assess risks, and collaborate on addressing operational challenges collectively.The conversation expands to highlight the unique positioning of FS-ISAC as a global node network, comprising over 5,000 member organizations across 75 countries. The organization's pillars of intelligence, resilience, and security work in unison to collect, analyze, and disseminate valuable information to bolster members' resilience and security measures.Furthermore, Sean and Cameron discuss the increasing challenges posed by third-party services in the financial sector, emphasizing the need for standardized reporting practices among multinational banks. The episode underscores the importance of continuous learning and adaptation in response to evolving cybersecurity threats.The episode includes a call to action for increased engagement within the FS-ISAC community, encouraging members to actively participate in discussions and initiatives aimed at strengthening the sector's resilience to cybersecurity challenges. Through a blend of real-world insights and strategic foresight, the episode offers a comprehensive overview of the vital role played by FS-ISAC in safeguarding the financial services industry against emerging cyber threats.Top Questions AddressedWhat are the challenges posed by third-party services in the financial sector?How does FS-ISAC foster global collaboration among members?What role does intelligence sharing play in bolstering business resilience within the financial services sector?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

@BEERISAC: CPS/ICS Security Podcast Playlist
Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott Algeier

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 26, 2024 37:57


Podcast: Bites & Bytes PodcastEpisode: Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott AlgeierPub date: 2024-03-21In this episode of Bites and Bytes Podcast, we're joined by Scott Algeier, an influential figure navigating the crucial intersection of cybersecurity, IT, policy, and operations.  As the founder of Conrad, Inc. and the executive director for IT-ISAC and Food and Ag-ISAC (Information Sharing and Analysis Center), Scott brings unparalleled expertise in building bridges between organizations to help fortify their defenses against cyber threats. Holding a Master's degree in International Relations and European Studies from the University of Kent and an honors graduate from Gettysburg College, Scott's journey into cybersecurity is as unique as it is inspiring.  This episode explores the foundational stories behind the Food and Ag ISAC and IT-ISAC and highlights the pivotal role of cross-industry information sharing in building a resilient cybersecurity infrastructure. Engage with us in this compelling dialogue that offers a deep dive into the mechanisms of securing our critical agricultural infrastructure through collective effort and strategic partnerships.  Learn about the innovative measures Scott Algeier is spearheading to safeguard our food and agriculture sectors from cyber threats, ensuring a secure future for all.  Join us for an exploration of how thoughtful collaboration and expert leadership are shaping the future of cybersecurity in agriculture, making our world safer, one byte at a time. Key Episode Highlights: (02:44 - 03:44) Formation of Food and Ag-ISAC (05:48 - 06:53) Memorable Food Experiences and Recommendations (12:13 - 14:02) Sharing Cybersecurity Insights With Smaller Businesses (23:54 - 24:37) Importance of Collaboration With Academia (28:44 - 30:25) Long-Term Success in Cybersecurity Industry (31:22 - 32:35) Community and Security in IT Learn More: Food and Ag-ISAC IT-ISAC Connect with Scott on LinkedIn Scott's company, Conrad, Inc. Also, connect with Scott at RSAConference 2024 for his panel discussion Water Sector discussion information: EPA calls off cyber regulations for water sector Cyberattacks are hitting water systems throughout US, Biden officials warn governors White House Convenes States to Discuss Water Sector Breaches  

@BEERISAC: CPS/ICS Security Podcast Playlist
Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott Algeier

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 26, 2024 37:57


Podcast: Bites & Bytes PodcastEpisode: Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott AlgeierPub date: 2024-03-21In this episode of Bites and Bytes Podcast, we're joined by Scott Algeier, an influential figure navigating the crucial intersection of cybersecurity, IT, policy, and operations.  As the founder of Conrad, Inc. and the executive director for IT-ISAC and Food and Ag-ISAC (Information Sharing and Analysis Center), Scott brings unparalleled expertise in building bridges between organizations to help fortify their defenses against cyber threats. Holding a Master's degree in International Relations and European Studies from the University of Kent and an honors graduate from Gettysburg College, Scott's journey into cybersecurity is as unique as it is inspiring.  This episode explores the foundational stories behind the Food and Ag ISAC and IT-ISAC and highlights the pivotal role of cross-industry information sharing in building a resilient cybersecurity infrastructure. Engage with us in this compelling dialogue that offers a deep dive into the mechanisms of securing our critical agricultural infrastructure through collective effort and strategic partnerships.  Learn about the innovative measures Scott Algeier is spearheading to safeguard our food and agriculture sectors from cyber threats, ensuring a secure future for all.  Join us for an exploration of how thoughtful collaboration and expert leadership are shaping the future of cybersecurity in agriculture, making our world safer, one byte at a time. Key Episode Highlights: (02:44 - 03:44) Formation of Food and Ag-ISAC (05:48 - 06:53) Memorable Food Experiences and Recommendations (12:13 - 14:02) Sharing Cybersecurity Insights With Smaller Businesses (23:54 - 24:37) Importance of Collaboration With Academia (28:44 - 30:25) Long-Term Success in Cybersecurity Industry (31:22 - 32:35) Community and Security in IT Learn More: Food and Ag-ISAC IT-ISAC Connect with Scott on LinkedIn Scott's company, Conrad, Inc. Also, connect with Scott at RSAConference 2024 for his panel discussion Water Sector discussion information: EPA calls off cyber regulations for water sector Cyberattacks are hitting water systems throughout US, Biden officials warn governors White House Convenes States to Discuss Water Sector Breaches  

ITSPmagazine | Technology. Cybersecurity. Society
How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2024 31:08


Guest: Sidney Pearl, Executive Director at AI-ISACOn Linkedin | https://www.linkedin.com/in/sidney-pearl/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesWelcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.Key Insights Provided:What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Feb 19, 2024 31:08


Guest: Sidney Pearl, Executive Director at AI-ISACOn Linkedin | https://www.linkedin.com/in/sidney-pearl/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesWelcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.Key Insights Provided:What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Security Detail
Ep. 4: Elections with Marci Andino, senior director, Election Infrastructure Information Sharing and Analysis Center (EI-ISAC)

The Security Detail

Play Episode Listen Later Feb 14, 2024 23:43 Transcription Available


In this episode of The Security Detail, we explore the complex domain of election cybersecurity with Marci Andino, senior director of the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). From international interference threats to localized phishing attacks, discover the varied challenges election offices face and the strategies deployed to safeguard the integrity of electoral processes.   Resources: EI-ISAC Resources: https://www.cisecurity.org/ei-isac Marci Andino Bio: https://safeelections.org/marci-andino/ EI-ISAC's Essential Guide to Election Security: https://essentialguide.docs.cisecurity.org/en/latest/index.html How Investigators Solved the Biden Deepfake Robocall Mystery (Bloomberg): https://www.bloomberg.com/news/newsletters/2024-02-07/how-investigators-solved-the-biden-deepfake-robocall-mystery Splunk research on generative AI spear phishing email translation: https://www.splunk.com/en_us/blog/security/old-school-vs-new-school.html  

The DownLink
Space Tech: The Threat Landscape, A Cyber Vulnerability, And Ransoming A Satellite

The DownLink

Play Episode Listen Later Feb 10, 2024 52:07


Space Tech: The Threat Landscape, A Cyber Vulnerability, And Ransoming A Satellite This month, two years ago, Russia's unprovoked invasion of Ukraine started with a cyber attack that changed everything and yet nothing for the U.S. commercial space sector. This is the second in a series of episodes examining cyber attacks and space systems. Laura Winter speaks with Greg Falco, an Assistant Professor at the Sibley School of Mechanical and Aerospace Engineering and the Systems Engineering Program at Cornell University; Ang Cui, Founder and CEO of Red Balloon Security; and Hector Falcon, a Cyber and Space Intelligence Integrator at the Space Information Sharing and Analysis Center.

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More
Health Stealth Radio: Denise Anderson, CEO of Health Information Sharing and Analysis Center

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Play Episode Listen Later Feb 3, 2024 24:56


S1E1: Hack-tivisim: How Turmoil In The Middle East And Ukraine Have Increased Cyber Risk In The Healthcare Segment Host: Frank Cutitta Guest: Denise Anderson, President/CEO of Health Information Sharing and Analysis Center (Health-ISAC) To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

Big Think
Revive your attention span in 12 minutes with neuroscientist Amishi Jha

Big Think

Play Episode Listen Later Jan 26, 2024 8:24


A neuroscientist explains how to master your focus. There is far more information in the environment than our brains can fully process. Our ability to maintain "attention" allows the brain to prioritize those parts of the environment that are most relevant. Attention is much more than just focusing. It fuels our ability to think, feel, and connect. ------------------------------------------------------------------------ About Amishi Jha: Dr. Amishi Jha is a professor of psychology at the University of Miami. She serves as the Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative, which she co-founded in 2010. She received her Ph.D. from the University of California–Davis and postdoctoral training at the Brain Imaging and Analysis Center at Duke University. Dr. Jha's work has been featured at NATO, the World Economic Forum, and The Pentagon. She has received coverage in the The New York Times, NPR, TIME, Forbes and more. Follow And Turn On The Notifications To Never Miss New Episodes From The Worlds Greatest Thinkers. --- Send in a voice message: https://podcasters.spotify.com/pod/show/bigthink/message Learn more about your ad choices. Visit megaphone.fm/adchoices

Constellations, a New Space and Satellite Innovation Podcast
Special Release - Threat Tracking, Information Sharing & the Watch Center

Constellations, a New Space and Satellite Innovation Podcast

Play Episode Listen Later Oct 17, 2023 23:03


On the Constellations Podcast, we'll discuss the Watch Center at the Space Information Sharing and Analysis Center or Space ISAC. During this episode, guests Joel Francis, Watch Center lead at Space ISAC, and Kevin Coggins, Senior Advisor to Space ISAC will discuss the purpose of the Watch Center and the types of data brought into the Watch Center for analysis. The Watch Center looks to monitor, analyze, and report information for its members, for example, the recent cyberattacks targeting ground segments and enterprise networks. Hear about the four primary data sources and the Space ISAC's role in facilitating the exchange of knowledge from all sources so that people can provide and benefit from the Watch Center. 

The CyberWire
Susie Squier: You're never alone. [President] [Career Notes]

The CyberWire

Play Episode Listen Later Oct 8, 2023 9:46


Susie Squier, President of the Retail and Hospitality ISAC, or Information Sharing and Analysis Center, sits down to share her incredible story starting to get her into the cyber community. She first started getting into PR through an internship she did in college, then moved around a few times gaining experience everywhere she went. Susie shares some wise advice, discussing not only her managing style, but also how she handles situations, along with how she deals with adversity. She says "I also have realized over time that I'm never in this alone, whether that's your personal life or your work life and even here, uh, in addition to a great team, all great team." She hopes people will jump in to the world of cyber with an open mind, and though it may be frightening at first, she says you just need to dive in anyway and not be afraid to try new things. We thank Susie for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Susie Squier: You're never alone. [President]

Career Notes

Play Episode Listen Later Oct 8, 2023 9:46


Susie Squier, President of the Retail and Hospitality ISAC, or Information Sharing and Analysis Center, sits down to share her incredible story starting to get her into the cyber community. She first started getting into PR through an internship she did in college, then moved around a few times gaining experience everywhere she went. Susie shares some wise advice, discussing not only her managing style, but also how she handles situations, along with how she deals with adversity. She says "I also have realized over time that I'm never in this alone, whether that's your personal life or your work life and even here, uh, in addition to a great team, all great team." She hopes people will jump in to the world of cyber with an open mind, and though it may be frightening at first, she says you just need to dive in anyway and not be afraid to try new things. We thank Susie for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Road Home
Protecting Your Cargo: Insights from J.J. Coughlin on Theft and Shipment Misdirection

The Road Home

Play Episode Listen Later Oct 3, 2023 23:30


My guest this month brings a wealth of experience in transportation security.www.swtsc.com – Southwest Transportation Security Councilwww.tapaonline.org – Transported Asset Protection Associationwww.nicb.org – National Insurance Crime BureauJ.J. Coughlin conducts business through Corporate Security Solutions – Texas (CSS-T) as its principal owner, providing consulting, investigative, and solution services along with GPS response and recovery services with a focus on supply chain security. Since 2016, JJ has performed audits, assessments and conducted investigations for J&J through his consulting company. In 2020, JJ became a Pinkerton dedicated professional (PDP) assigned to Johnson &Johnson as the North American Supply Chain Security Manager primarily working with the RTO and IRTE vaccine shipments. In 2023, JJ assumed the duties of Director – Global Supply Chain Security for Johnson & Johnson Pharma/Med Tech. J. J. also serves as the Chairman of the Southwest Transportation Security Council (www.swtsc.com), which facilitates the sharing of information through a BOLO/Alert program and maintains a working network with law enforcement and the private industry throughout the US and Canada.The SWTSC also hosts an annual cargo theft summit for industry and law enforcement partners. Prior to starting CSS-T, JJ spent nine years as VP of Services for LoJack Supply Chain Integrity (SCI) and Director of the Supply Chain Information Sharing and Analysis Center. Prior to SCI, JJ spent ten years in the Transportation Industry as a Regional Security Manager for CNF/Conway (Now XPO), a national Transportation and Logistics company. Prior to joining CNF/Conway, he spent twenty-one years with the Dallas, Texas Police Department. Seventeen of those years he was assigned as a Detective or Detective Supervisor in areas including Assaults, Homicide, Intelligence, and Public Integrity. JJ has also instructed classes in Interview and Interrogation Techniques and numerous Supply Chain and Cargo Transportation-related subjects. JJ is a US Army Ist Cav Vietnam Veteran.JJ also authored the book, Cargo Crime: Security and Theft Prevention which was published by Taylor and Francis in October of 2012.The primary purpose of this podcast is to connect and help professional drivers out on the road, especially independent contractors. If you enjoy the content we are creating, share and subscribe.Be safe and enjoy this month's show!With 12,000+ members, the Truckers Service Association (TSA) knows what truckers need. Founded in 1995, TSA is a non-profit association dedicated to improving the profitability of owner-operators and Motor Carriers. Insurance marketing is provided by TrueNorth Companies.For more informationhttps://tsatruck.org/For comments or suggestions for show guests and topics that concern the professional driver drop a note to john@pipertransportation.com You can also leave a voicemail for the show at (214) 702-8745

Rod Arquette Show
Rod Arquette Show w/Greg Hughes - Live from St. George; Discussion on Tim Ballard Allegations

Rod Arquette Show

Play Episode Listen Later Sep 22, 2023 98:25


Coming up at 4 pm today on the Rod Arquette Show with Greg Hughes on Talk Radio 105.9 KNRS, Tanner Jensen, Director of the Statewide Information and Analysis Center for the Utah Department of Public Safety joins the show for a conversation about Utah's fentanyl problems. Plus, Kristen Tate of The Hill and a contributor to The Messenger joins the show for a conversation about her piece on the crime trend that nobody is talking about – random attacks on people minding their own business. See below for a full rundown of today's program.Rod Arquette Show with Greg Hughes Rundown – Thursday, September 21, 20234:20 pm: Tanner Jensen, Director of the Statewide Information and Analysis Center for the Utah Department of Public Safety joins the show for a conversation about Utah's fentanyl problems.5:05 pm: Utah County Sheriff Mike Smith joins Rod and Greg to discuss a variety of topics related to law enforcement in Utah, including the battle against fentanyl and the recruitment of perspective new officers.6:38 pm: Kristen Tate of The Hill and a contributor to The Messenger joins the show for a conversation about her piece on the crime trend that nobody is talking about – random attacks on people minding their own business.

Public Power Now
Benefits of Participating in Grid Security and Resilience Exercise Detailed by NPPD's Tim Pospisil

Public Power Now

Play Episode Listen Later Aug 28, 2023 19:06


In the latest episode of Public Power Now, Tim Pospisil, Director of Security Technology Outreach & Chief Security Officer at Nebraska Public Power District, details how utilities can benefit from participating in the Electricity Information Sharing and Analysis Center's seventh biennial grid security and resilience exercise – GridEx -- on November 14-15, 2023 and also discusses NPPD's participation in the exercise.

Bipartisan Commission on Biodefense
Solving the Puzzle: Biological Intelligence and Information Sharing

Bipartisan Commission on Biodefense

Play Episode Listen Later Aug 2, 2023 214:46


As the biological threat continues to evolve, biological intelligence gathering, analysis, and dissemination activities must increase to keep pace with the advances of our adversaries. At this upcoming meeting, the Commission intends to further explore the expanding nature of the biological threat, the federal biological intelligence enterprise, and information sharing with non-federal governments. See here for more information: Solving the Puzzle: Biological Intelligence and Information Sharing - Bipartisan Commission on Biodefense (biodefensecommission.org) Speakers include: The Honorable Kenneth L. Wainstein – Under Secretary for Intelligence and Analysis, Department of Homeland Security Dr. Paul Friedrichs – Special Assistant to the President and Senior Director for Global Health Security & Biodefense, National Security Council, The White House; former Joint Staff Surgeon, Department of Defense Marina Mayo – Section Chief, Countermeasures and Mitigation, Weapons of Mass Destruction Directorate, Federal Bureau of Investigation Dr. William T. “Thom” Burnett – Chief Scientist, National Center for Medical Intelligence, Department of Defense Dr. Chris Rodriguez – Director, District of Columbia Homeland Security and Emergency Management Agency  Joshua Bushweller – Director, Delaware Information & Analysis Center, Delaware State Police                                 Colin Mulloy – Deputy Director, Kansas Intelligence Fusion Center Judith Harrison – Assistant Chief, Counterterrorism Division, New York City Police Department

UnPACKed with PMMI
Protecting our Food Supply Chain

UnPACKed with PMMI

Play Episode Listen Later Jul 26, 2023 19:37 Transcription Available


There is no end to the evolving sophistication of bad actors in the cyber world, and now they have turned their attention to our food producers. The Food and Agriculture Information Sharing and Analysis Center or ISAC has proactively reconvened to help food and beverage processing companies in the event of a cyber-attack. Scott Algeier and Paul Hershberger join unPACKed to discuss how companies like Conagara, PepsiCo, and Oracle have come together to share information to help prevent, or, when necessary, help food and beverage processing under attack and restore their cyber health.Come to see, hear, touch and discuss the solutions and innovations shaping the future of packaging and processing. Discover how they'll transform your products, your lines and your company. Innovation begins here so register today: packexpolasvegas.comSupport the showRegister for PACK EXPO Las Vegas today!

Phishy Business
CIS Roundtable – Keeping the Public Sector Secure

Phishy Business

Play Episode Listen Later Jul 18, 2023 35:47


In this episode of Phishy Business, we feature a roundtable discussion with three members from the Center for Internet Security. Mimecast CMO Norman Guadagno hosts this wide-ranging discussion that covers many topics including cybersecurity trends in the public sector and why information sharing is essential to keeping our connected world safe. Our special guests are Sean Atkinson, CISO, Randy Rose, CIS Sr. Director of Security Operations and Intelligence & Karen Sorady, VP of MS-ISAC Member Engagement (and former NY State CISO). The trio shares the mission and background of CIS. Plus, their experiences and learnings from years working with the public sector.   In ‘CIS Roundtable – Keeping the Public Sector Secure' we discuss: Are we in better or worse shape in terms of cybersecurity than we were 20 years ago?  What is the Multi State Information Sharing and Analysis Center and how does it work in the context of the US?  What is the reality of election security and threats?  How prioritized is cybersecurity at the local government level?   What's it like being a CISO of a large US state? How can the tabletop exercise model be optimized?   Why is cybersecurity a great field for recent and upcoming graduates?

The Gate 15 Podcast Channel
The Gate 15 Interview EP 36: Chris Anderson, Lumen Technologies on ‘working hard, trying to make a difference,' the wild west days of DHS, private-public partnership, the glory of coffee, and more!

The Gate 15 Podcast Channel

Play Episode Listen Later Jun 25, 2023 57:36


In this episode of The Gate 15 Interview, Andy Jabbour visits with Chris Anderson, Principal Advisor, National Security & Emergency Preparedness, Lumen Technologies. Chris Anderson is an incident management and infrastructure protection expert with three decades of government, military, and private sector experience. He is currently the Principal Advisor for National Security & Emergency Preparedness at Lumen. In addition to his role at Lumen, he is the 2023 Industry Chair of the Communications Sector Information Sharing and Analysis Center.Chris previously held a variety of emergency management and national security positions at the Federal Communications Commission and US Department of Homeland Security. He served as the FCC's Chief of Operations and Emergency Management, leading the Commission's incident management activities, operations centers, national security coordination, and Continuity of Operations programs. Prior to joining the Commission, Chris worked in critical infrastructure protection at the Department of Homeland Security, serving in a variety of leadership positions in the Office of Infrastructure Protection, including serving as Director of the National Infrastructure Coordinating Center. Chris began his career with a decade on active duty in the U.S. Navy as a helicopter pilot and retired from the Navy Reserve in 2016.Chris is a 2010 graduate of the National War College with a master's degree in National Security Strategy; he holds a second master's degree in Management Information Systems from Bowie State University and received his undergraduate degree from the University of Virginia. Chris's background, in the Navy, at DHS, at the FCC and today with Lumen. The wild west days of DHS and what has become CISA ‘working hard, trying to make a difference' Incident response Working in the public and private sector. Chris's thoughts on CISA and improving the private-public partnership Working with NATO. With shout outs to some great leaders and old friends including Bob Stephan, Linda Solheim, Bob Kolasky, Caitlin Durkovich, Steve Bieber, and others 4th of July celebrations, the glorious drink that is coffee, saving the world, and more!

The DownLink
The U.S.-China Moon Race Heats Up

The DownLink

Play Episode Listen Later Jun 3, 2023 34:11


The U.S.-China Moon Race Heats Up This week China announced that it intends to put taikonauts on the moon no later than 2030, the U.S. Department of State released a new diplomatic strategy for space, and Spain signed the U.S.-led Artemis Accords. To unwrap this week's events and provide a primer for what is at stake some 385,000 kilometers away on the lunar surface, Laura Winter speaks with Namrata Goswami, an independent scholar on space policy and great power politics and co-author of the book “Scramble for the Skies”; and from the Aerospace Corporation Senior Vice President of the Civil Systems Group Jim Myers, and Tech Fellow Sam Visner, who is also the Vice Chair of the Board of Directors of the Space Information Sharing and Analysis Center.

Control Loop: The OT Cybersecurity Podcast
Taking a look at cyber insurance in the industrial space.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later May 31, 2023 39:41


China's Volt Typhoon snoops into US infrastructure, with special attention to Guam. Is CosmicEnergy just red-teaming, or is it a threat straight out of Red Square? Siemens patches a vulnerability endemic to the energy sector. An update on the Vulkan Papers. A cyberattack leads Suzuki to shut down its Indian production line. BlackBasta conducts ransomware attack against Swiss technology company ABB, and claims responsibility for Rheinmetall attack. Food and Agriculture Information Sharing and Analysis Center stands up. Control Loop News Brief. China's Volt Typhoon snoops into US infrastructure, with special attention to Guam. People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Cybersecurity Advisory) Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft) Chinese hackers spying on US critical infrastructure, Western intelligence says (Reuters) CosmicEnergy, from Russia. COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant) This newly-discovered malware could disrupt power generation — and do physical damage (Washington Post) Siemens patches a vulnerability endemic to the energy sector. Command Injection Vulnerability in CPCI85 Firmware of SICAM A8000 Devices (Siemens) An update on Russia's NTC Vulkan: SIGINT, EW, and cyber ops. 7 takeaways from the Vulkan Files investigation (Washington Post) Russian Software Programs Threatening Critical Civilian Infrastructure (Dragos) A cyberattack leads Suzuki to shut down its Indian production line. Suzuki Motorcycle India plant shut down after cyber attack, production affected (Hindustan Times) Suzuki motorcycle plant shut down by cyber attack (Bitdefender) BlackBasta conducts ransomware attack against Swiss technology company ABB. Multinational tech firm ABB hit by Black Basta ransomware attack (BleepingComputer) BlackBasta claims responsibility for Rheinmetall attack. Arms maker Rheinmetall confirms BlackBasta ransomware attack (BleepingComputer) Food and Agriculture Information Sharing and Analysis Center stands up. The food and agriculture industry gets a new center to share cybersecurity information (Washington Post) Control Loop Interview. The interview is with Gerry Glombicki of Fitch Ratings talking about cyber insurance and his opinions on industrial space. Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos Principal Adversary Hunter Kyle O'Meara and Dragos Principal Intelligence Technical Account Manager Michael Gardner to continue their discussion on threat hunting.  Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

The DownLink
Software Drives Printed Rocket Motors, GSaaS, and New Calls for Collective Cyber Security for Space

The DownLink

Play Episode Listen Later May 12, 2023 34:31


Software Drives Printed Rocket Motors, GSaaS, and New Calls for Collective Cyber Security for Space This is the second episode in a month-long series looking at various, crosscutting aspects of the state of the space industrial base. Space and cyber leaders in the United States and Europe are now looking to create systems of collective cyber security for the 21st Century, covering assets on orbit, on the ground, and in production. The push to develop cyber-security information-sharing alliances is intensifying, as software, the cyber warrior's attack surface, is increasingly driving the printing of space components, including solid rocket motors. Laura Winter Speaks with Samuel Visner, Vice Chair of the Board of Directors of the Space Information Sharing and Analysis Center; and Erin Miller, who is the Space ISAC's Executive Director.

The Cybersecurity Defenders Podcast
#27 - Intel Chat: Apple zero-days to the end of the Genesis Market. And a dive into OT security with Dave Cullen, Field CTO of OTORIO

The Cybersecurity Defenders Podcast

Play Episode Listen Later Apr 12, 2023 72:56


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.Emergency security updates issued by Apple: CVE-2023-28206 & CVE-2023-28205 .Check Point researchers have unveiled a new sophisticated and fast acting ransomware.eFile.com, an IRS-authorized e-file software service provider used by many for filing their tax returns, has been caught serving JavaScript malware.The CrowdStrike Falcon OverWatch team recently observed threat actors exploit WinRAR self-extracting archives.FBI, Europol and the Dutch Police have disrupted the infamous browser cookie market known as Genesis Market. Microsoft's Digital Crimes Unit along with a cybersecurity software company Fortra and Health Information Sharing and Analysis Center are taking technical and legal action to disrupt cracked, legacy copies of Cobalt Strike.And then we dive into OT security with Dave Cullen, Field CTO for OTORIO.As mentioned in the podcast, here is a link to the “So you want to be a SOC Analyst?” by Eric Capuano.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.

Brakeing Down Security Podcast
3CX supply chain attack, Mark Russinovich and Sysinternals, CISA ransomware notifications, and emotional intelligence

Brakeing Down Security Podcast

Play Episode Listen Later Apr 8, 2023 84:50


Show Topic Summary (less than 300 words) 3CX supply chain attack, Mark Russinovich and Sysinternals, ransomware notifications from CISA, and emotional intelligence Youtube VOD: https://www.youtube.com/watch?v=afZHiBUr-2g  Questions and potential topics (5 minimum): https://www.straitstimes.com/tech/downloading-a-cracked-version-of-fifa-23-or-hogwarts-legacy-for-free-it-s-probably-malware  https://leadershipfreak.blog/2023/03/27/the-7-powers-of-questions/  https://securityintelligence.com/articles/is-it-time-to-hide-your-work-emails/  https://www.lollydaskal.com/leadership/what-remote-leaders-do-differently-to-be-successful/  https://www.lollydaskal.com/leadership/the-role-of-emotional-intelligence-in-leadership-why-it-matters/  https://www.cybersecuritydive.com/news/3cx-mandiant-investigate-supply-chain-attack/646543/  https://www.bleepingcomputer.com/news/security/openai-chatgpt-payment-data-leak-caused-by-open-source-bug/  https://www.cybersecuritydive.com/news/cisa-pre-ransomware-notification/646041/  https://www.sentinelone.com/labs/the-life-and-times-of-sysinternals-how-one-developer-changed-the-face-of-malware-analysis/    Additional information / pertinent Links (would you like to know more?): https://unit42.paloaltonetworks.com/3cxdesktopapp-supply-chain-attack/  https://www.orangecyberdefense.com/global/blog/research/3cx-voip-app-supply-chain-compromise  https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/ https://www.linkedin.com/feed/update/urn:li:activity:7047156405715300352/  Sigma Rule - https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_malware_3cx_compromise_susp_children.yml  https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center  https://www.cisa.gov/news-events/news/cisa-establishes-ransomware-vulnerability-warning-pilot-program  https://www.fda.gov/media/166614/download  https://www.amazon.com/Windows-Internals-Part-architecture-management/dp/0735684189  https://medium.com/@martin-thissen/llama-alpaca-chatgpt-on-your-local-computer-tutorial-17adda704c23    Show Points of Contact: Amanda Berlin: @infosystir @hackershealth  Brian Boettcher: @boettcherpwned Bryan Brake: @bryanbrake @bryanbrake@mastodon.social Website: https://www.brakeingsecurity.com Twitch: https://twitch.tv/brakesec Youtube: https://www.youtube.com/c/BDSPodcast  Email: bds.podcast@gmail.com 

The CyberWire
CISA Alert AA23-075A – #StopRansomware: LockBit 3.0.

The CyberWire

Play Episode Listen Later Mar 18, 2023 2:39


CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023. AA23-075A Alert, Technical Details, and Mitigations Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts. Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide. No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment. See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center's DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.

The CyberWire
CISA Alert AA23-074A – Threat actors exploit progress telerik vulnerability in U.S. government IIS server. [CISA Cybersecurity Alerts]

The CyberWire

Play Episode Listen Later Mar 16, 2023 2:48


CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity Advisory to provide IT infrastructure defenders with TTPs, IOCs, and methods to detect and protect against recent exploitation against Microsoft Internet Information Services web servers. AA23-074A Alert, Technical Details, and Mitigations AA23-074A STIX XML MAR-10413062-1.v1 Telerik Vulnerability in U.S. Government IIS Server Telerik: Exploiting .NET JavaScriptSerializer Deserialization (CVE-2019-18935) ACSC Advisory 2020-004 Bishop Fox CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI Volexity Threat Research: XE Group GitHub: Proof-of-Concept Exploit for CVE-2019-18935 Microsoft: Configure Logging in IIS GitHub: CVE-2019-18935 No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment. See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center's DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.

Awakin Call
Amishi Jha -- How We Pay Attention and Tame Our Minds

Awakin Call

Play Episode Listen Later Mar 11, 2023


"Pay attention to your attention." Amishi P. Jha came to her pathbreaking work studying the neuroscience of mindfulness and attention when, as a young professor of cognitive neuroscience at the University of Pennsylvania, she lost feeling in her teeth. She had been grinding them as a profound stress response to burnout from her responsibilities as a wife, mother, and tenure-track professor. Knowing from her academic work that the brain can change, she told herself at the start of summer, “before I quit my own career, let’s see if I can get my own brain to change.” She had just heard a talk about the power of meditation to change brain images from another neuroscientist. And although she had grown up in a Hindu family, born in the Indian city of Gandhi’s ashram – where meditation practice was “in the air” – she had never discussed it or practiced it (and her scientific mind had earlier dismissed some spiritual practices from her youth). But that summer, determined to see if she could change her brain, she bought a book by Jack Kornfield, Meditation for Beginners, with an accompanying CD. “I committed to reading a chapter each day and doing one of the practices, probably between eight and fifteen minutes. Within a couple of months, I was more present, more engaged. It got me thinking that there was something about doing this thing every day that was reacquainting me with my life. … Instead of being foggy and distracted, I was aware and connected. So I thought to myself, hey, wait a minute; I study attention. I need to figure out how this works.” She went to look at the scientific attention literature and found almost nothing.  So she decided to “put mindfulness meditation to the test and research it rigorously in the lab.” This was in 2004, “before mindfulness was even a thing in our popular culture, and people in my department warned that I’d be committing career suicide by researching this topic,” she recalls. She launched the first-ever study to offer mindfulness training tools to active-duty military service members as they prepared for deployment. What she has discovered is that without intervention, attention is compromised, and attentional lapses increase. Yet, with mindfulness training, attention can be strengthened and protected. As one of the first scientists to research the links between mindfulness and attention, she is known for her pioneering mindfulness work with soldiers, firefighters, medical trainees, and others for whom attention is a matter of life and death. With her book, Peak Mind, she has started bringing her healthy-attention message to parents, CEOs, accountants, teachers, managers—essentially anyone whose work and decision-making feels like life and death. Jha studies how we pay attention: the process by which our brain decides what's important out of the constant stream of information it receives. Both external distractions (like stress) and internal ones (like mind-wandering) diminish our attention's power, Jha says -- but some simple techniques can boost it and train it for greater focus and less distractibility. "Pay attention to your attention," Jha says in a TEDx talk that has more than 5 million views. Jha is a Professor of Psychology at the University of Miami, and Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative. Working with the U.S. Army and others in extremely high-stress occupations, Jha uses functional MRI, electroencephalography (EEG) and other neurobehavioral measures to study how the brain pays attention, the mental effects of stress, and ways to optimize attention.  In addition to her own published body of research, her work has been featured in many outlets including TED.com, NPR, and Mindful Magazine. In addition, she has been invited to present her work to NATO, the UK Parliament, the Pentagon, and at the World Economic Forum. She received her PhD from the University of California–Davis, and received her postdoctoral training at the Brain Imaging and Analysis Center at Duke University in functional neuroimaging. She studies the neural bases of attention and the effects of mindfulness-based training programs on cognition, emotion and resilience. Acknowledging the tension between offering mindfulness tools (founded on Buddhist principles of nonviolence) to active military, Jha recalls her own Gandhian roots: “Nonviolence is part of my core philosophical thread. Yet nonviolence does not mean inaction. It doesn’t mean you do nothing. Sometimes what you do to reduce violence and suffering is take action. ,,, [I]f a soldier has a machine gun that can destroy an entire village, I want to make sure that person has the capacity to really know what they’re doing and have full control over their faculties, to be able to withhold as appropriate, not be reactive. So a super soldier in many ways is one that can control when to not pull the trigger, not to just pull the trigger.” Please join Stephanie Nash and Birju Pandya in conversation with this researcher using her gifted scientific mind for action to help reduce suffering.

The LIUniverse with Dr. Charles Liu
Space Telescopes with Dr. Alexandra Greenbaum

The LIUniverse with Dr. Charles Liu

Play Episode Listen Later Feb 18, 2023 29:04


Are we living in a golden age of space telescopes? As our minds are being collectively blown by the images of our universe beginning to come from the JWST, our host Dr. Charles Liu and co-host Allen Liu explore the next space telescope on the horizon, the Nancy Grace Roman Space Telescope, with our guest, astronomer Dr. Alexandra Greenbaum, PhD.   Dr. Greenbaum is an astronomer at Caltech working on the NGRST, which is set to launch in 2027. Named after Nancy Roman, who created NASA's space astronomy program and is known to many as the “Mother of Hubble,” it's a NASA observatory designed to unravel the secrets of dark energy and dark matter, search for and image exoplanets, and explore many topics in infrared astrophysics.   As always, though, we jump into the day's joyfully cool cosmic thing, the incredible first picture of Sagittarius A Star, (Sgr A*), the supermassive black hole at the center of our Milky Way galaxy taken by the Event Horizon Telescope. Dr. Greenbaum explains that the EHT uses signals from many telescopes around the world to gather the data that is combined into images like this stunning photo.   Alexandra works at IPAC, the Infrared Processing and Analysis Center at Caltech, on the Roman Telescope's coronagraph instrument, which is going to pave the way for future space photography of exoplanets. The coronagraph eliminates the glare that stars produce and allows astronomers to directly image planets in orbit around them. It will be far more powerful than any other coronagraph ever flown, seeing planets that are almost a billion times fainter than their host star.   Our first question this week comes from Isaac, who asks how the JWST differs from the Hubble. Dr. Greenbaum explains how the JWST's mirror is made of 18 different mirror segments, whereas Hubble has a single mirror. Also, JWST is an infrared telescope, while Hubble functions primarily with the optical and ultraviolet portions of the spectrum. That means that JWST can see the light from stars stretching back to the earliest periods of our universe.   Chuck and Alex also discuss how the NGRST differs from Hubble and the JWST. It primarily features a wide-field instrument that can look at a huge portion of the sky with different kinds of detectors. The coronagraph instrument is actually a technology demonstration that will help us develop the optical systems to see planets that are otherwise obscured by the overpowering light of the sun they orbit. Dr. Greenbaum also worked on the JWST, and she explains how each one worked to remove solar interference from planets or brown dwarfs orbiting stars.   For our second question, Jayla from North Andover wants to know what's most exciting about Alexandra's job as an astronomer. She describes traveling to telescopes all around the world as an observational astronomer before the pandemic, and how wonderfully open and collaborative the field of astronomy is.    Last but not least, Chuck, Alexandra, and Allen talk about what she's just read: “Parable of the Sower” by Octavia E. Butler, and how that book helped strengthen her commitment to her career studying the universe.   If you'd like to know more about Dr. Greenbaum's work and keep up on the developments with the Nancy Grace Roman Space Telescope, you can check out roman.ipac.caltech.edu.   We hope you enjoy this episode of The LIUniverse, and, if you do, please support us on Patreon. 

The CyberWire
CISA Alert AA22-249A – #StopRansomware: Vice Society.” [CISA Cybersecurity Alerts]

The CyberWire

Play Episode Listen Later Sep 6, 2022 3:23 Very Popular


CISA, the FBI, and the Multi-State Information Sharing and Analysis Center, or MS ISAC, are releasing this advisory to disseminate indicators of compromise and TTPs associated with Vice Society actors and their ransomware campaigns. The FBI, CISA, and the MS-ISAC have recently observed Vice Society actors disproportionately targeting the education sector with ransomware attacks. AA22-249A Alert, Technical Details, and Mitigations Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts. Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide. No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment. All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

The CyberWire
CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suite. [CISA Alert]

The CyberWire

Play Episode Listen Later Aug 17, 2022 2:31


CISA and the Multi-State Information Sharing & Analysis Center, or MS-ISAC are publishing this joint Cybersecurity Advisory in response to active exploitation of multiple Common Vulnerabilities and Exposures against Zimbra Collaboration Suite, an enterprise cloud-hosted collaboration software and email platform. AA22-228A Alert, Technical Details, and Mitigations Volexity's Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925 Hackers are actively exploiting password-stealing flaw in Zimbra CISA adds Zimbra email vulnerability to its exploited vulnerabilities catal… CVE-2022-27925 detail Mass exploitation of (un)authenticated Zimbra RCE: CVE-2022-27925 CVE-2022-37042 detail Authentication bypass in MailboxImportServlet vulnerability CVE-2022-30333 detail UnRAR vulnerability exploited in the wild, likely against Zimbra servers Zimbra Collaboration Kepler 9.0.0 patch 25 GA release Zimbra UnRAR path traversal Operation EmailThief: Active exploitation of zero-day XSS vulnerability in… Hotfix available 5 Feb for zero-day exploit vulnerability in Zimbra 8.8.15 All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

The Human Upgrade with Dave Asprey
How Focus and Attention Powers Your Mind – Amishi Jha, Ph.D. : 940

The Human Upgrade with Dave Asprey

Play Episode Listen Later May 24, 2022 75:47 Very Popular


WE APPRECIATE OUR PARTNERS. CHECK THEM OUT!Trigger Autophagy: https://spermidinelife.us/dave, use code DAVE25 for 25% off your first month's orderMeat Sticks! All the Good Stuff-No BS: https://paleovalley.com/DAVE, use code DAVE to get 15% off your first orderSleep Better on Natural Memory Foam: https://myessentia.com, use code DAVEVIP to get an exclusive discountIN THIS EPISODE OF THE HUMAN UPGRADE™...…you're going to find out why you're missing 50% of your life to fractured attention and distraction and what it's doing to your brain. Podcast guest Amishi Jha, Ph.D., a neuroscientist and professor of psychology at the University of Miami, researches how people pay attention. She co-founded the Contemplative Neuroscience for the Mindfulness Research and Practice Initiative at the University of Miami and serves as its director. For more than 25 years, she's researched the science of attention through intensive work with the U.S. Military, first responders, medical professionals, business leaders, and elite sports teams.She's found that attention Is both your superpower and your kryptonite. As a superpower, attention allows you to time-travel in your mind (future and past), highlights what's important, helps you problem solve, and shuts out distractions, she explains in her book, “Peak Mind: Find Your Focus, Own your Attention, Invest 12 Minutes a Day.” When attention is compromised, it's your kryptonite because it impacts your cognitive function, social engagement, and emotional balance, she points out. The three main forces that degrade attention include, 1) the amount of stress you're under (and how you're managing it); 2) being in a crappy mood; and 3) threats real or imagined.And when your attention gets fractured, you often default to tactics that fail to pull it back together. Amishi's got great insights in her book that allow you to understand why this happening. When you know what's going on, it's easier to find your focus.It's absolutely possible to change your brain to become more attentive, present, and productive through mindful techniques and daily focusing practices. Amishi's research shows that mindfulness gives you a sense of control over your mind and allows you to stop negative thinking before it hijacks your brain and body.The type of mindfulness practice you choose isn't as important as how consistently you actually do it. The minimum effective dose equals 12 minutes a day, five days a week.Listen on to a conversation that gives you practical tips on how to re-capture your attention, train your brain and perform at your peak.More about Amishi Jha, Ph.D.: Amishi earned a Bachelor of Science degree in Biological Psychology then went on to earn a Ph.D. in Psychology (Cognitive Neuroscience) from the University of California–Davis. She completed post-doctoral training at the Brain Imaging and Analysis Center at Duke University in functional neuroimaging. She leads research on the neural bases of attention and the effects of mindfulness-based training programs on cognition, emotion, resilience, and performance. Her work has been featured at NATO, the World Economic Forum, and the U.S. Pentagon. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The One You Feed
483: Dr. Amishi Jha on Peak Mind and Attention Training

The One You Feed

Play Episode Listen Later Mar 18, 2022 50:38


Dr. Amishi Jha is a professor of psychology at the University of Miami. She serves as the Director of Contemplative Neuroscience for the Mindfulness Research and Practice Initiative, which she co-founded in 2010. She received her Ph.D. from the University of California–Davis and postdoctoral training at the Brain Imaging and Analysis Center at Duke University. Dr. Jha's work has been featured at NATO, the World Economic Forum, and The Pentagon. She has received coverage in The New York Times, NPR, TIME, Forbes, and more. In this episode, Eric and Dr. Amishi Jha discuss her new book, Peak Mind: Find Your Focus, Own Your Attention, Invest 12 minutes a DayBut wait – there's more! The episode is not quite over!! We continue the conversation and you can access this exclusive content right in your podcast player feed. Head over to our Patreon page and pledge to donate just $10 a month. It's that simple and we'll give you good stuff as a thank you!Dr. Amishi Jha and I Discuss Peak Mind and Attention Training and...Her book, Peak Mind: Find Your Focus, Own Your Attention, Invest 12 minutes a DayDefining "peak mind" and the distinction between thinking and doingThe doing mode and being modeThe being mode is being observant and receptive to what is happeningWisdom is both reflection and actionThe different modes of the brain and their functionsHow we prioritize information based on our goals that then guide how we interact with our mind and environmentHow our attention itself isn't the problem, but rather how we monitor our attention that is problematicThe effectiveness of 12 minutes of a mindfulness practice every dayS.T.O.P. practice: Stop, Take a breathe, Observe, ProceedUnderstanding our framework and how we can reframe and deframe our experiences The problem with positive psychology tactics when you're depletedHow negative feelings or conflict is an opportunity to observe and course correctThe various microstates of the mind and their contingency on our next thoughts and actionsDr. Amishi Jha Links:Amishi's WebsiteTwitterInstagramFacebookExplore the science behind weight loss and partner with your healthcare provider for a healthy approach to your weight management, visit truthaboutweight.comWhen you purchase products and/or services from the sponsors of this episode, you help support The One You Feed. Your support is greatly appreciated, thank you!If you enjoyed this conversation with Dr. Amishi Jha you might also enjoy these other episodes:Stolen Focus and Attention with Johann HariHow to Focus and Accomplish Goals with Emily BalcetisSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.