POPULARITY
When you think of rock music anchored by piano, there are only a few standouts. But outside of Elton John, perhaps the best known rock pianist is New York's Billy Joel. Born in the Bronx and growing up in Long Island, Joel got his start early (at age 4) with piano lessons and dropped out of high school to pursue music full time. After joining a couple of short-lived bands, Joel started his solo career and released his debut album, "Cold Spring Harbor" in 1971.It was his second album which would be remembered as his true nationwide debut. Piano Man was his first release from Columbia Records, and came out while Joel was still dealing with legal issues from his former label. Many of the tracks exhibit a story telling approach common in the early 70's. Although Joel was in his mid-20's when the album was released, it had a maturity about it that made it do well both on the pop and adult contemporary charts. Despite this being his breakthrough album, Joel would struggle to find success in his follow-up albums. He was in danger of being dropped by the record label when he hit it big once again in 1977 with "The Stranger." From that time on, Billy Joel would be an A-list performer, capping off a long career with a decade-long residency at Madison Square Garden.Wayne takes us through this breakthrough album for this week's podcast. Piano ManThe title track was written while Billy Joel was working at The Executive Room piano bar in Los Angeles, and is loosely based on the patrons that came through the bar told from the perspective of the piano player. It would become both his signature song and synonymous with Joel. "Son, can you play me a memory...I'm not really sure how it goes, but it's sad, and it's sweet, and I knew it complete when I wore a younger man's clothes."You're My HomeThis song was the B-side of the "Piano Man" single, so it did get some air play. The song has a country feel, and was written for Joel's first wife. He could not afford to buy her anything while in California between record deals, and he wrote it as a Valentine's present. The Ballad of Billy the KidIf the last song was country, this next song is the Western. This is an epic that pays tribute to a fictionalized Billy the Kid, telling a story of an outlaw in the Wild West. The last verse switches to modern times, with Billy Joel taking the place of Billy the Kid, looking forward to new exploits. Captain JackAn early live radio performance of this song is what got the attention of Columbia Records in the first place. Joel wrote the song when living in Oyster Bay, Long Island, in an apartment from which he could see drug deals going down. "Captain Jack" is the local drug dealer, and the song reflects the sadness that comes from a life in the grip of heroin. ENTERTAINMENT TRACK:Gypsy Woman by Bill Dean (from the motion picture "The Lords of Flatbush")This movie starred Henry Winkler and Sylvester Stallone before they became famous for playing The Fonz and Rocky respectively. STAFF PICKS:For the Love of Money by the O'JaysBruce starts the staff picks with a well known funk tune that went to number 9 on the Billboard Singles chart. This song takes its title from I Timothy 6:10, "For the love of money is a root of all kinds of evil, for which some have strayed from the faith in thier greediness, and pierced themselves through." It also was Donald Trump's WWE entrance music.Benny and the Jets by Elton JohnLynch brings us another piano artist, singing about a fictional glam-rock band. "Oh, but they're weird and they're wonderful. Oh, Bennie, she's really keen. She's got electric boots, a mohair suit, you know I read it in a magazine." The lyrics are told from the perspective of a fan at a concert.Rikki Don't Lose that Number by Steely DanRob's staff pick is the lead track to Steely Dan's third album, "Pretzel Logic." It is also their most commercially successful single, peaking at number 4 on the Billboard Hot 100. The inspiration for this jazz-infused rock song was a New York writer and artist named Rikki Ducornet. Future Eagles alum Timothy B. Schmit provides backing vocals.Bad Company by Bad CompanyWayne features a song that is from the self-titled album AND the self-titled group. The inspiration for this song was a Clint Eastwood western, and it is both a lament and a celebration. "Rebel souls, deserters we are called. Chose a gun, and threw away the sun...". INSTRUMENTAL TRACK:Tubular Bells by Mike OldfieldWe close out to a song that was both a hit at the time, and would be immortalized in the horror film "The Exorcist." Thanks for listening to “What the Riff?!?” NOTE: To adjust the loudness of the music or voices, you may adjust the balance on your device. VOICES are stronger in the LEFT channel, and MUSIC is stronger on the RIGHT channel.Please follow us on Facebook https://www.facebook.com/whattheriffpodcast/, and message or email us with what you'd like to hear, what you think of the show, and any rock-worthy memes we can share.Of course we'd love for you to rate the show in your podcast platform!**NOTE: What the Riff?!? does not own the rights to any of these songs and we neither sell, nor profit from them. We share them so you can learn about them and purchase them for your own collections.
#THATSWHATUP Show! ON THE CAMPAIGN TRAIL w#Trista4SenateGov&Prez! #comedy #music #politics
Let's go, #ohio! Speaking of ohio, y'all should really stage sit-ins in the office of Reps Melanie Miller of #ashland, Bill Dean in #xenia; and any other Republican lunatic who decided to eschew the will of the voters on issue 1! SHAME ON YOU GOD DAMN INSURRECTIONIST MOFOS! VOTERS OF OHIO - WHOM YOU WORK FOR! VOTED 55% TOO PROTECT OUR RIGHT TO CHOOSE IN THE STATE'S CONSTITUTION! IF YOU CAN'T HONOR THAT THEN GET THE HELL OUT OF POLITICS! RESIGN! STEP DOWN YOU ARE UNFIT, OBVIOUSLY! If I were Ohio #young-democrat, for sure I would help organize sit-ins for justice! Get a group of people to sit in around the clock in these people's offices until they RESIGN! AND DON'T TAKE NO FOR AN ANSWER! THESE DEMONS NEED TO BE DRIVEN OUT OF OFFICE! They will never resign unless they are booted & very publicly shamed into doing the right thing or bare minimum the appropriate thing which is to f* RESIGN!! Things are hotting up in my presidential race! LOL
Cougar takes the reins of the ROTB show for a treat for him and all of you. Bill Dean comes in to talk his vintage experience, Greenfield village, engineering, swimming the 5 Great Lakes in the same day and how he doesn't like cheese!?
This week, the Idiots open with the worst “news” article ever written. Mya Abraham, writing for Vibe, managed to write an article that contained absolutely zero information. A great clickbait headline was followed with nothing pertaining to said headline. It's amusing, in a way, that such bad “journalism” was published. Next up, in a move that would make Aaron Persky proud, a judge released Ron Jeremy from jail, into a care facility. Why? Because Ron is sick, and that's bad, so why force a horrible human being to suffer? (One: that last sentence was dripping with sarcasm. Two: If you've forgotten, Persky is the pos who let Brock Turner off with a slap on a wrist for his horrific actions. I'm avoiding certian words here on purpose, given the nature of the YouTube algorithm.) Ron Jeremy allegedly (the most important word in the legal language) assaulted over 100 women. But hey, they're all probably lying, right? I guess that's what the judge was thinking. Moving on: victim blaming is a bad thing, but sometimes it's absolutely deserved. Raynesha Cummings, of Baton Rouge, Louisiana, thought it would be a great idea to ship her kids off to a private “school” without doing a single bit of research on the facility, including using her eyeballs. John Oliver did a great segment on how awful private “schools” can be, and this one should've absolutely made the list of worst of the worst. Continuing: Oh, George Santos, we hardly knew ye. Santos used campaign donations for botox and Only Fans, and was defiant to the end, claiming that even though he's a horrible human being, he's somehow justified in his actions. (Huh. Wonder why that is? It's almost like we just had a president in office who lied about everything under the sun, and was never held to task for it.) Finally, an Ohio Republican and Russia have something in common: they both hate women. Yes, Ohio legislator Rep. Bill Dean believes that wives have no rights, and are basically the property of men. Russia, then, like many Republicans and false evangelicals, believe that women are second class citizens who don't deserve to make decisions about their own healthcare. Shocking. Idiots on Parade: we mock the news, so you don't have to. Tune in and get your giggle on. Find Jake at @jakevevera Find nathan at nathantimmel.com
In this episode we talk to members of the sound teams from some recent animated features, about the art of sound design for this tricky genre. Julian Slater (The Bad Guys/Puss in Boots: The Last Wish), Justin Davey (My Father's Dragon), Bill Dean & Jesse Pariseau (DC League of Super-Pets) and Jay Jennings (The Bad Guys/Puss in Boots: The Last Wish/My Father's Dragon) all tell us about their adventures making these films sound amazing. Show Notes & Full Transcript: https://tonebenderspodcast.com/231---sound-design-for-feature-animation-roundtable/ Podcast Homepage: https://tonebenderspodcast.com Tonebenders Hosts This Episode: Timothy Muirhead
Dr. Bill Dean, Associate Professor of History at the Air Command and Staff College at Maxwell Air Force Base, helps us understand the Russian Invasion of Ukraine in this episode on In Focus on Troy Public Radio.
Do you know the average payout organizations are hit with for every attack? William Parks and Bill Dean discuss a service dedicated to helping your organization (big or small) withstand a ransomware attack. Bill and his team are ready to help you and your organization obtain peace of mind when it comes to these advanced threats. Questions for Bill? Find him here: bill.dean@lbmc.com
Hosted by Bill Dean, Little Steve, and Shorts Guy
Ed O'Malley is the Founder of the Kansas Leadership Center, President and CEO of the Kansas Health Foundation, and the author of four books, including his latest, “When Everyone Leads.” Ed discusses how leadership differs from authority, and that authority is required to lead. He explores the disruptive aspects and the risks of leadership. Ed explains the type of problems authority solves and the challenges that require unleashing the leadership of the whole team to move forward. Listen in for how to move forward when faced with daunting challenges. https://bit.ly/TLP-346 Key Takeaways [3:25] In Ed's book, When Everyone Leads, the key is getting people to separate leadership from authority. In some situations, the reliance on authority gets in the way of progress. We need people to know that even if you're not the captain of the team or boss, the toughest challenges require your leadership, also. The book is about how you unleash that in everybody. [4:45] Ed talks about over-reliance on authority. Authority is necessary, but it's not sufficient for making progress on our biggest problems. Challenges between people need to be resolved by the people involved. [6:14] On our toughest challenges, none of us know exactly the way forward. Trust that the collective is stronger than one person's idea. If we unleash the leadership of others, so they feel empowered to exercise that leadership, then we start making more progress. [6:49] If we assume that we have the answers and we know the best way forward, that conveys a lack of trust in the collective. The toughest challenges get solved by people working together. [8:46] The book is about the toughest challenges. A prerequisite for unleashing leadership in more people is to help people break apart the idea of leadership from the idea of authority. They are different things and people know this intuitively. Ed uses the example of Rosa Parks showing leadership by choosing her seat on the bus. [10:20] Ed wants people to be conscious of the differences between authority, leadership, people holding positions of authority, and people exercising leadership. Sometimes people in authority exercise leadership. Sometimes People not in authority exercise leadership. Sometimes nobody does. If people see it separately, it opens up a conversation about what the exercise of leadership looks like for them. [11:22] Jim cites Jim Detert, author of Choosing Courage, regarding the courage it takes to step up and face big problems. [12:08] Julia McBride, Ed's co-author on the book, would say it's all about clarity of purpose. Those who exercise effective leadership are clear in their deep purpose, and clear on the purpose for the meeting they're walking into and the role they play in that meeting. They're clear on the purpose of the project they're a part of. [12:46] A lot of people's purpose is to keep their boss happy. Our toughest challenges are usually about something a lot bigger than that. Leadership is motivating others to make progress on daunting challenges and it hardly ever happens. [14:24] Ed cites the work of authors Ron Heifetz and Marty Linsky who pioneered the concept of the Zone of Productivity, where there is enough conflict that people are uncomfortable enough to change the status quo, but there is not enough conflict to shut people down. If you don't have enough conflict, nothing is changing. If you have a lot of heat at work, consider if progress is being made in the work. [15:32] If the conflict or heat from the top is not leading to progress, then it's time to ask questions and intervene in the lack of progress. [16:52] An executive team needs a common language to talk about the dynamics of productivity. [17:30] Leadership is always about disrupting things. Ed quotes Marty Linsky, “Leadership is disappointing your own people at a rate they can absorb.” When you're intervening up, you can't anger the boss too much; you might be out! But If you're just keeping the boss 100% happy, you might not be doing anything that looks like leadership. [18:02] Jan recalls Jeffrey Pfeffer's 7 Rules of Power. It's evidence-based, controversial, and makes people very uncomfortable. Two of the rules are “Break the rules,” and “Show up in a powerful way.” These are hard to do. You've got to know how far you can push a boss before you're damaging yourself. [18:36] Ed goes back to being clear about purpose. If your purpose is to get along, be secure, and not rock the boat, you will not get close to exercising leadership. If your purpose is “I want the best value for my clients,” or “I'm a sales leader and I'm taking the organization from this level to that level higher,” then you'll be willing to disrupt the norms. Leadership is always disruptive and risky. [19:18] Ed says all of our research is showing if you get lots more people exercising leadership and intervening to create more progress it makes it more likely you'll get the progress. It's too tough for one or two people to do alone because it's too disruptive. [20:01] A chapter in the book explores the clash of values. Our toughest challenges are often about value clashes. You may have a value of gaining market share and a clashing value of playing it safe and not developing new products because you have a legacy product that has been winning for so long. Leadership is always about helping a system elevate one value over another. There is loss in that. [21:31] Anyone can ask powerful questions. Ed explains that a powerful question comes from deep curiosity and it's open-ended. A question that has an exact technical answer is not a powerful question, it's a fact-based question. Powerful questions help everyone learn. “What's our greatest aspiration for our organization?”, “What concerns us the most?”, “What makes progress so hard on those things?” [22:56] Big open-ended questions are powerful and are often game-changing. Powerful questions often make us uncomfortable. They should force us to slow down a little bit and reflect differently. [24:33] Ed interviewed a sage one time who told him, “Ed, that's a great question! And it's a great question because it doesn't have any answers!” If there's an easy answer, it might not be a good question. [25:01] If what you're working on isn't a daunting challenge; if it's run-of-the-mill stuff; if you've got a deadline and the work is technical, and you've got to meet it, you're going to drive everybody crazy if you're walking around asking big, open-ended questions all the time! It's when you're trying to focus people on the things that matter most that these powerful questions are so needed. [26:10] Less senior people may be granted some grace in asking open-ended questions to reveal less knowledge of the organization's purpose. More senior people may ask powerful questions that tend to shape expectations: “How will we respond to some inevitable failure in our attempts to do X?” This introduces the concept of being adaptive. [28:49] The book discusses technical problems vs. daunting adaptive challenges. If you have the authority, say, “We're solving this technical problem this way.” But it is a mistake to treat a daunting adaptive challenge as if it were technical. Those types of challenges where the problem is poorly defined and the answer is unknown cannot be solved by your authority alone. You won't get progress. [30:34] Jan tells about Bill Dean. They would be at a problem situation and Bill would say, “OK.” It meant he acknowledged, he understood, and they would step back and pause before trying to find out what the issue was. He said OK, and everybody knew it was going to be OK. Jan learned to step back when people are hitting the Panic button. Ed says, on the toughest challenges, help people to go slow. [33:32] Have the awareness to discern when you're facing something adaptive where you don't know the way forward. In that situation, progress is about creating a system that can be iterative, that can be experimental, that can take smart risks, learn from them, and take bigger risks. If the situation doesn't call for that and we bring it, we're just going to create more problems. [34:10] There are a lot of big ideas in the book. One is knowing the difference between the technical problems and the adaptive challenges. They require you to lead differently. Another idea is that your authority is a resource but it is not enough to solve adaptive challenges, so you unleash leadership for others in an iterative, learning environment where risk-taking is expected. [36:25] There are expectations on those in authority. Ed repeats that leadership is disappointing your people at a rate they can absorb. People have expectations of those in authority and history is full of examples of what happens to people in authority if they disrupt those expectations too much. Live within the expectations, but push against them, as well. [37:04] Ed explores how those in authority successfully used leadership during the pandemic to be firm and specific about the process they would use to solve the issue without going into what the outcome of the issue would be. They used authority to help people feel safe and that there is some order to things. They talked about the timeline for bringing the best people together to solve the problem. [38:16] Jim compares how Jessica Chen from the previous podcast episode described the same situation of describing the process you are going through to arrive at an answer when dealing with ambiguity. Jim recommends listening to that episode, as this is a big and important concept. Ed agrees, it is important, but it is hard to practice. Go back to knowing whether it is an adaptive challenge or a technical problem. [39:31] If it's a technical problem and you are in authority, use your authority to solve the problem. For listeners who aren't in authority, Ed reminds you to break apart authority and leadership. If you connect them, it lets everybody off the hook, and it's the CEO's job. That puts too much pressure on those in authority. They can't deliver. The truth is, in the big tough challenges, we've all got a part in the mess. [40:25] Jack Welch said, “You can't scale complexity.” Ed's book leads toward simplifying our approach. Jan recommends listeners read Ed's book. It's easy to read and laid out in a way that's very pragmatic. [42:06] Ed's challenge to listeners: “I think we've got to get the bat off our shoulder and take some swings. … Learn how do you take those swings with confidence and skill so you can get a few more hits than you would otherwise.” [44:12] Closing quote: Remember, “Unity is strength… When there is teamwork and collaboration, wonderful things can be achieved.” — Mattie Stepanek Quotable Quotes “We need people to know that even if you're not the captain of the team, the boss, the CEO of the company, or the mayor of the town, the toughest challenges require your leadership, also.” “I think we have an over-reliance on authority. Authority is useful; it's necessary, but it's insufficient for making progress on our biggest challenges.” “A prerequisite for unleashing leadership in more people is to help people break apart the idea of leadership from the idea of authority. We've got to get people to see them as two different things. They are totally separate. And I think that intuitively, people know this.” “Authority is a role; it's a position, and leadership is an activity. And sometimes those in authority exercise it. But most of the time they don't. And sometimes people not in authority exercise leadership. But a lot of times, they don't.” “The book is counter-cultural, in that regard. We're trying to create a new norm for what leadership even is.” “Leadership is always about disrupting things.” “Leadership is so rare because it's risky; … it's disruptive, which is why all of our research is showing if you get lots more people exercising leadership; intervening to create more progress, it's … more likely you'll get the progress. It's too tough for one or two people.” “Big open-ended questions are powerful and they're often game-changing.” “If what you're working on isn't a daunting challenge; if it's run-of-the-mill stuff; if you've got a deadline and the work is technical, and you've got to meet it, you're going to drive everybody crazy if you're walking around asking big, open-ended questions all the time.” “It's when you're trying to focus people on the things that matter most that these curiosity-based, open-ended, powerful questions are so needed.” Resources Mentioned Theleadershippodcast.com Sponsored by: Darley.com Rafti Advisors. LLC Self-Reliant Leadership. LLC Ed O'Malley Kansas Leadership Center Kansas Health Foundation The Colorado Health Foundation When Everyone Leads: How The Toughest Challenges Get Seen And Solved, by Ed O'Malley and Julia Fabris McBride Todd Satterson U.S. Navy SEALS Jim Detert Choosing Courage: The Everyday Guide to Being Brave at Work, by Jim Detert Ron Heifetz Marty Linsky 7 Rules of Power: Surprising—but True—Advice on How to Get Things Done and Advance Your Career, by Jeffrey Pfeffer Jeffrey Pfeffer Jessica Chen Jack Welch
Hosted by Bill Dean, Shorts Guy, and Schwim
John Schneider directs and portrays an American veteran named Quint North in his new movie To Die For. His performance is nothing short of compelling in his new film. The movie is based on a true story about a man who is jailed for displaying the American flag. Schneider wrote, directed, and starred in the film which was produced by his wife and filmmaking partner, Alicia Allain. It features a score by Larry Hall and opens with a song by Bill Dean called That's Why We Stand. This gripping drama is one of the most impassioned performances of Schneider's career. John says he created this movie to honor the people who sacrificed for our freedoms and set the record straight about what matters in this country today. It is a thought-provoking commentary about pride, freedom, sacrifice, and the love of America. Tune into this episode of The Truckers Network Radio Show when Shelley Johnson and Tom Kelley interview him and feature the film and its great music. Be sure to subscribe to our podcast. It's free. https://www.cineflixdod.com/to-die-for/ https://live.johnschneiderstudios.com/ https://tncradio.live/ #JohnSchneider #JohnSchneiderStudios #ToDieFor #Movies #Film #Patriotism #America #AmericanFlag #ShelleyMJohnson #TomKelley #TNCRadioLive @TNCRadioLive #TheTruckersNetworkRadioShow
The script is flipped this week…instead of hosting a guest, Jamie is the guest. Occasionally, The Water Table Podcast host, Jamie Duininck, appears on other shows and we want to share those with you. This is the Farmland News Podcast with Bill Dean of KWLM and Kristine Fladeboe-Duininck with Fladeboe Land. Jamie joins them to talk farmland, tiling and the future of agriculture. (And how Jamie met his wife…)Watch the full episode on YouTube!https://youtu.be/AEplzKWGx28About the hosts of Farmland News with KWLM: Bill Dean with KWLM radio and Kristine Fladeboe-Duininck with Fladeboe Land join forces the first Thursday of each month to discuss issues impacting agriculture and farmland. Kristine Fladeboe-Duininck is a world-class auctioneer and farmland specialist. With 20+ years of broker experience, Kristine is owner of Fladeboe Land, a second-generation family owned business specializing in farmland. Bill Dean has been with Lakeland Broadcasting since 1973. Born and raised in West Central Minnesota, Bill has done just about everything at KWLM and currently hosts a morning show called The Morning Brew and the Farmland News Podcast with Fladeboe Land.Check out Farmland News with Fladeboe Land Podcast:https://www.willmarradio.com/podcasts/fladeboe/Want more? Check out these related episodes from The Water Table: #51: Why Farmland Values Have Never Been Higher with Kristine Fladeboe-Duininck#23: How Tiling is Driving Today's Land Values with Kristine Fladeboe-DuininckFollow us on social media! FB: https://m.facebook.com/thewatertableag/ Twitter: https://twitter.com/thewatertableag/Website: https://www.watertable.ag/the-podcast/Find us on Apple Podcasts: https://podcasts.apple.com/podcast/id1538507698Subscribe to our Spotify: https://open.spotify.com/show/001MKyL5nMw6jUpuuz9aGdListen on Google Podcasts: https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8xMzg5OTEwLnJzcw== Episode Topics: 0:16 Welcome Kristine1:33 Every dollar counts3:20 The land market is strong3:50 Tremendous yields4:30 Upcoming auctions10:10 Special guest – Jamie Duininck11:12 How they met…12:00 The importance of water management13:00 Time for farmers to make improvements13:35 Call 811 before you dig!14:38 It's really dry…15:45 What soils should you tile?16:20 It's an investment17:44 The Water Table Podcast19:00 Tile vs. impervious surface20:00 Convey, treat, store; and urban solution21:22 Go Minnesota! We have the water…22:15 Wrap upMore Episodes & Water Management Education:https://www.watertable.ag/the-podcast/
In this episode of the I Am A Champion Show, the guys are joined by Bill Dean and Morgan Koth to discuss how we develop holistic wellness with athletes Morgan Koth is the Founder of Accentus Health and the STAR mental health support mobile app and organizational platform. The STAR platform uses data and research to improve people's mental well-being and support within Organizations, Athletic Departments, Students, and Student-Athletes. Fields of focus include leadership, work-life balance, team-life balance, building resilience, and mental health. Previously C.E.O. of Advanced Industrial Machining, a specialty service company within the building industry for 13+ years. As C.E.O. at A.I.M., we increased revenue by 650% in less than seven years through organizational development. Morgan has also brought two health and fitness apps to market - the S.T.A.R. Mental Health Support app along with the Optimum U Health & Wellness coaching app. He believes in the strength of soft skills in leadership, such as courage, integrity, communication, and empathy. Connect with Morgan on Linkedin here https://www.linkedin.com/in/morgan-koth-star/ Bill Dean has enjoyed 24 years of success in the Behavioral/Mental Health and Coaching professions. At Can't Out Scheme Mental Health we partner with Parents of Student Athletes to provide support, tools and coaching directly to families in creating a Mental Health Safe Environment and developing Forever Maintenance plans. As a result, dreams, goals and outcomes are achieved by our Student Athletes & their Families as they learn to manage and apply their playbooks in Social, Academic and Athletic settings!!!! #KeepPracticing #MentalHealth #COSMH Connect with Bill Dean on LinkedIn Here https://www.linkedin.com/in/cosmh-billdean/ --- Send in a voice message: https://anchor.fm/4dathletes/message
Welcome LIFE OF EMERALD is a spiritual organization empowering millennials and generation X to stand (wake) up to the universal truth grounded in oneness with a creation based on love, peace, and harmony (Be true to yourself). We focus on emotional intelligence and mental health solutions. The global movement MAKE MENTAL HEALTH A NORM in 2022 invites dynamic international speakers who courageously speak about our story of mental health hero's journey! Shall we normalize mental health together?! . Sponsor this organization to make content advocating for your family's mental health here on GoFundMe. . Bill can be found on Linkedin. . Kate Lee CEO can be found Linkedin | Company Linkedin | Instagram | TikTok | Home #SDG3 #esg #mentalhealthtalk #stigmafree #socialimpact --- Send in a voice message: https://anchor.fm/lifeofemerald/message
CAN'T OUT SCHEME MENTAL HEALTH https://www.cosmh.fit/ PRE-ORDER: My Dads Advice At 5:04 AM www.mydadsadvicebook.com Blending The Family Coaching Program https://blendingthefamily.com/coaching-program/ My guest is the founder of "Can't Out Scheme Mental Health" Bill Dean. https://www.cosmh.fit/ Bill and I talk about mental health when it comes to youth sports. There is an eight-week curriculum that Bill explains how each week looks like for both the parents and the student. Bill also talks about "masking" feelings and how part of the COSMH training is about working with the students helping other students recognize signs of needing help. LINKS: Website: www.cosmh.fit Twitter: @COACHCOSMH LinkedIn: www.linkedin.com/in/cosmh-billdean email: cantoutschemementalhealth@gmail.com In the opening of our conversation, I bring up an article from Well + Good from writer Mercey Livingston; here is the link to the article and the three questions. https://www.linkedin.com/feed/update/urn:li:article:7444457619153332681/ Tommy Maloney is the Executive producer and host of the podcast Blending The Family, where you can find on Apple Podcasts, Iheart Radio, Spotify, and Stitcher Radio. Tommy has spoken at TEDx, Ignite Fort Collins, and Keynote Speaker at Everything Dad Convention. He even has won speaking awards through Toastmasters International. The author of the book "25 Tips For Divorced Dads." "Why not you, Why Not Me" and His new book, "My Dad's Advice At 5:04 AM," are coming out in 2021. He has written for magazines: The Good Men Project, Modern Gladiator, and Nurture Magazine. Plus, he has been a guest writer. Tommy enjoys a good red blend while writing or hiding from the family. A dad to Betsy, Becca, Connor, and Duke (RIP), Otis. A husband to Ann. Podcast music by Twisterium / freebackgroundtracks.net Contact him at Tommy@BlendingTheFamily.com TEDx Talk: https://youtu.be/azG2K47iz4Q Blog: http://blendingthefamily.com/blog/ Podcast: http://blendingthefamily.libsyn.com/ Apple Podcasts: https://itunes.apple.com/us/podcast/tommy-maloney/id958223196?mt=2 Stitcher: http://www.stitcher.com/podcast/tommy-maloney/blending-the-family Linked In: https://www.linkedin.com/in/thetommymaloney The Good Men Project: https://goodmenproject.com/author/tommy-maloney/ Medium: https://medium.com/@thetommymaloney Calendly: calendly.com/thomasdmaloneyjr PRE-ORDER: My Dads Advice At 5:04 AM www.mydadsadvicebook.com Anyone considering suicide should contact the National Suicide Hotline at 1-800-273-8255 or chat with someone live on its Website.
Trust can be built or broken at every phase of a construction project. Tune in to hear Bill Dean's expert advice about building a high trust culture.To get a copy of Bill Dean's ebook: Building Trust: A Primer on Building Trust in the Construction Industry reach out to me at sallyloveinspires.com
Au Royaume-Uni, dans les années 70. Janice, jeune femme fragile, est ramenée à ses parents par la police après avoir erré dans le métro londonien. Entre inquiétude et irritation, Vera et son mari poussent leur fille à consulter le docteur Donaldson, un psychiatre novateur. Mais la dureté de ses parents et la violence de l'acharnement médical vont conduire Janice dans une descente aux enfers.Avec : Sandy Ratcliff, Bill Dean, Grace Cave, Malcolm Tierney, Hilary Martin, Michael Riddall, Alan MacNaughtan, Johnny GeeBonus DVD (3h13min.) :Visiblement je vous aime, film de Jean-Michel CarréBeaucoup, passionnément, à la folie, documentaire de Jean-Michel CarréEntretien avec Claude Sigala, directeur du CoralVersion Originale sous-titrée FrançaisStéréo - Format 4/3DVD Pal Zone 2
Bill Dean Biography: http://archivesite.jetex.org/history/hall_of_fame/dean.html New Products: J&H Aerospace: https://jhaerospace.com/product/polly-b-glider/ Carl Rambo's Poly B Catapult or HLG - 17" in WS kit is $40. Design features a removable wing (for storage) and a screw type adjustment for wing incidence. Kit includes hand selected contest grade balsa. https://jhaerospace.com/product/mercury-short-kit-only/ New short kit of Albert Hatful's (Keil Kraft) 36" WS Mercury rubber model is available for $30; plans are $10 https://jhaerospace.com/product/maxout-ix-embryo-endurance-full-kit/ Maxout IX embryo full kit just released https://jhaerospace.com/product/half-scale-jabberwock-gollywock-combo-short-kit-w-plans/ Combo short kit for 1/2 size Gollywock and Jabberwock w/plans is $20. Flat WS is 15.75" https://jhaerospace.com/product/tornado-legal-for-2021-science-olympiad-helicopter-rules/ https://jhaerospace.com/product/twister-so-helicopter-kit/ Twister and Tornado helicopter kits for the Science Olympiad. Kits are $50 with parts for 3 helicopters and $60 with parts for 2 helicopters, respectively. Retro RC and Campbell's Custom Kits: http://retrorc.us.com/retroemoth-1-2-1-3-1-1-5-2-1-2.aspx New laser cut kit for the .020 replica of the 1941 Aerbo. Pylon configuration with a diamond cross section fusleage. Complete kit is $63, but both a short kit and the plans are available seperately Volare Products: https://volareproducts.com/blog/?product=yakovlev-yak-3-peanut-short-kit Peanut Scale, laser cut YAK-3 short kit (includes vacuum formed canopy and spinner) for $16. You can also download the printed tissue template from his website, no charge. Diel’s Engineering: https://www.dielsengineeringinc.com/laser-cut-kits.html Laser Cut version (kit #19-LC) of his 1/24 scale FOCKE-WULF TA-152H is now available. Model has 23-11/16” WS (Hal Cover's 1974 contribution to MB's series Flying Scale Models of WWII) Dumas Products: https://www.dumasproducts.com/product-category/plane-kits/new-release-planes/ #339 F4F Wildcat (30″ Wingspan) #341 Fairchild PT-19 (30″ Wingspan) #340 Ryan STA (30″ Wingspan) Stan Buddenbohm: Email: buddenbohms@gmail.com VEE 17 Redux CLG kit $55 each plus $9 shipping. Will combine shipping for up to 3 kits. GTS Free Flight (Sevak Malkhasyan): Email: gtsfreeflight@gmail.com GTS FreeFlight YouTube Channel: https://www.youtube.com/channel/UCLQLkEFwfeW95Kh8_hzYR9w GTS E-20 Kit $85. Features a built-up wing from laser cut balsa and bass ribs and a tapered carbon fiber boom. Ozark Model Aviation: New Website: https://www.ozarkmodelaviation.com/ Plans of Interest: Bill Dean's Supermarine 508 https://outerzone.co.uk/plan_details.asp?ID=6224 Bill Hannan's FAI Peanut https://outerzone.co.uk/plan_details.asp?ID=6095
Nancy Spizzo, Senior Manager at LBMC Information Security, joins Bill Dean to talk about HITRUST and the new LBMC Information Security HITRUST Guide being released later this fall.
In this episode Bill Dean and Stewart Fey discuss penetration testing for PCI compliance. Learn about the differences between penetration testing and vulnerability assessments, and what is needed to meet requirements for PCI compliance.
Pilot Episode 8: Bonestorm Hockey Takeover!Bill Dean, Little Steve, Schwim, and special guest host Shorts GuyLive In Primetime Radio Virtual Studio B
In this episode Nancy Spizzo joins Bill Dean to discuss re-entry to the workplace. They'll discuss what items you should consider from a security and technology perspective as organizations plan to reopen their facilities.
In this episode, Chelsea Smith talks with Bill Dean about the impact of remote work on IT audits during the COVID-19 pandemic.
LBMC Cybersecurity expert, Derek Rush, joins Bill Dean as they discuss the benefits and limitations of multi-factor authentication.
Billboard UpdateI had previously mentioned the billboard for Route 8, but the city was blocking it? At-large Councilwoman Linda Omobien and Ward 4 representative Russ Neal voted in favor of the billboard construction, which was defeated. James Hardy, deputy mayor for integrated development, said his staff would reach out to offer assistance to the business owner, who has previously told the Beacon Journal that the city doesn't care about him. Ohio Bill Puts the Ownership on DoctorsA new Ohio bill seeks to restrict gender identity medical treatments for transgender youths by penalizing the doctors who prescribe them. Republican Reps. Ron Hood of Ashville and Bill Dean of Xenia plan to introduce the “Protect Vulnerable Children Act” this week. Physicians could be charged with a third-degree felony for attempting therapeutic or surgical procedures intended to alter the gender of someone under age 18. Parents could also file civil lawsuits against physicians for providing treatment. LGBTQ advocacy group Equality Ohio plans to fight the legislation until the end of the session Beloved Morning Man Stan Piatt Dies at 68For 35 years Piatt reveled in anchoring a morning comedy show on radio station WNIR (100.1-FM), bringing laughter to thousands of Greater Akron listeners by utilizing a quirky cast of regular callers and his own relentless sense of humor. Goodyear Had a Poor 2019Goodyear ended 2019 with large losses for the fourth quarter and the full year, sending its shares plunging on Tuesday. The company did well in the United States but faces a challenging global environment and as a result, will continue to focus on cost control and working capital management, its top executive said. The Akron tire maker on Tuesday said it lost $392 million, or $1.68 per share, on revenue of $3.7 billion for the fourth quarter ending. Dec. 31. That compares to a profit of $110 million, or 47 cents per share, on revenue of nearly $3.9 billion a year ago. The Akron Airport is Closing One RunwayThere are two runways at what used to be known as Akron Fulton airport (now Akron Executive Airport) and one runway is going to be closed so that more development of the land can take place. Today, AKR services around 20,000 flights annually, including flights by pilots in training. The passengers on incoming and outgoing flights range from corporate employees to athletes to celebrities, many of whom include PGA golfers and country musicians. Children's Hospital utilizes the airport as a base for dispatching their helicopter and an ambulance. Lee Brice, Caroline Jones, and Bill Engvall at the Civic Next WeekBrice and Jones will bring their country music together on February 22nd, and Bill Engall will bring his stand up comedy on the 28th. For more information see https://www.akroncivic.com/ Start Your PodcastCheck out the School of Podcasting at www.schoolofpodcasting.com (www.schoolofpodcasting.com) Support this podcast ( http://www.buymeacoffee.com/davejackson ) Support this podcast at — https://redcircle.com/akron-podcast/donations
Kim Petters, Sam Chick, and Bill Dean, Local Marijuana advocates, explain many facets of the plant Marijuana: what the marijuana plant actually is, what THC and CBD are, Why it was made illegal, where the laws are Federally and on a State level here in Delaware, How it affects Second Amendment rights, What does decriminalization mean, and ultimately why it should be 100% legal. Both Terry and I were both really impressed with all of there contributions in this discussion; helping both of us understand the ins and outs as well as bringing us up to speed on things here in Delaware, and the corruption of bill HB110, which only gives 3 entities the ability to control the market here. I definitely agree with them that 100% legalization is far better than what we have now and is better for us as a State and a Nation.The reason we bring this information to our audience is that we know that many Christians use marijuana either recreationally or medicinally. We want them to do so as safely as possible; both understanding the laws and also having a safe supply and use of the plant. Our Guests Today:Sam Chick Delcanna President Kim PettersDelcanna Executive Director Bill DeanLocal Advocates & Connoisseur Check Out DelCanna @ https://delcanna.org/https://www.facebook.com/Delcanna.org/ Thanks for Listening!SUBSCRIBE! LIKE! SHARE! AND CONNECT WITH US ATwww.Acts2and42.com AND ON FACEBOOKhttps://www.facebook.com/acts2and42 And INSTAGRAM @Acts_2and42
How can business owners and freelancers can play a win-win role for veterans? Looking for insights on how to support and communicate to combat veterans inside your family and company? Bill Dean shares his insights of being a company founder, 30 years with Hewlett-Packard, and serving in Vietnam. His story includes how being part of a business was a life-saver for him. More information at arise2live.com
The Guru of Geek Marlo Anderson returns from his travels to discuss tech at work. Joining him are Tech Geezer Jim Walsh and special guest Bill Dean from Alliance Real Estate. Together, they look at how to leverage technology to benefit the workplace. Companies have used an employee schedule maker to help them create a […] The post TECH IN THE WORKPLACE appeared first on The Tech Ranch.
In this podcast, LBMC Information Security’s Bill Dean and John Dorling discuss some of the new tools available to help merchants who are trying to achieve PCI compliance.
2018 was one of the biggest years for data breaches to date, with more than 6,500 data breaches reported throughout the year. In this podcast, LBMC Information Security’s Bill Dean dives deeper into these recent data breach statistics and why it’s important to keep investing in the hard work involved with combating cyber-attacks to prevent data breaches in the days to come.
All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the data you generate or maintain? In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.
Since incident response issues are no longer just an IT issue and can often involve legal issues, it is important for organizations to develop an incident response team, seek outside expertise, and have an overall action plan in the event of an incident. In this podcast, LBMC Information Security’s Bill Dean discusses how a complex situation like incident response can be purely based on common sense.
In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on that approach, starting with the differences between attack simulation and conventional penetration tests. The methodology of attack simulation is the assumption that the network or a system will become compromised and the current controls will not prevent the infection. So, how does attack simulation differ from purple-teaming? With purple-teaming, everyone know what controls are being tested and when. The attack simulation is a bit different, asthe focus is the emulation of a specific attacker group and their methods of obtaining sensitive data. In this podcast, LBMC Information Security’s Bill Dean discusses attack simulation, or what some people label adversary simulation.
Most penetration testers are considered “red team,” while most defenders are considered “blue team.” Thus, the irony of a conventional penetration test is that these two groups are typically pitted against each other. When the red teams and blue teams are working together, you have what’s called a “purple team.” While purple-teaming has not always been a thing, it can be a win for both groups. Purple-teaming has now become somewhat of a buzzword. However, the effort behind it has great merit and value. In this podcast, LBMC Information Security’s Bill Dean helps purple-teaming, as well some of the benefits involved with the practice.
The question is not, “Will your employees will get your company hacked?” but rather “When will your employees get your company hacked?” A recent article from HITECH Answers highlights this sad reality of human-error being the most common reason for a cyber intrusion and data compromise. So, while employee actions can circumvent most every security control you have invested in, security awareness training is critical to prevent your employees from being your number one risk. Users are often the last line in your cyber-defense efforts, and there is no patch for people wanting to be helpful or wanting to do the right thing. In this podcast, LBMC Information Security’s Bill Dean explains why ongoing employee security training is crucial to ensuring employees know how to spot a hacking attempt, ultimately protecting your organization from a potential cyber-attack. Listen, and discover these key takeaways: Reasons why employees often do not realize how important they are to the process How not enabling multi-factor authentication on remote access to email allows hackers to easily access employee email accounts Why 91% of cyberattacks begin with a spear phishing email The importance of having strong passwords for employees Why backing up data is a must for protecting against cyber-attacks
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released research data indicating that over one-third of security incidents start with phishing emails or malicious attachments sent to company employees. In this podcast, LBMC Information Security’s Bill Dean digs into these research findings and shares some reasons why training employees to spot phishing emails, messages, and pre-texting calls can’t be done just once or once a year. Listen, and discover these key takeaways: Fascinating new research findings about phishing attacks Reasons for training employees about phishing attacks on an ongoing basis Why it only takes one user to follow the link in a phishing email for your network to be compromised New approaches that may be implemented into our menu of phishing schemes
When cloud-managed security was first introduced, there was some concern about the levels of security as compared to the security of data on an organization’s premises. Today, security professionals have implemented the appropriate controls to help could-based data management be safe and effective. As many organizations are now embracing and migrating to the cloud, it is important to know the risks and proper controls associated with the movement. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Sese Bennett discuss the effectiveness and concerns surrounding migrating to cloud-managed security measures and what organizations today should know. Listen, and discover these key takeaways: Why you should evaluate your current security frameworks and compare with cloud-managed controls A brief explanation of FedRAMP and FISMA Reasons to consider moving to cloud-managed security The potential risks associated with cloud frameworks if not implemented properly Why not to stop at the assessment phase
No matter the industry—government, healthcare, financial, or even smaller, mom-and-pop businesses—each deal with some type of sensitive customer information, and each has decisions to make when it comes to managing risk. Most security and audit frameworks (HIPAA, ISO, PCI, NIST, SOC 2, etc.) have requirements for risk assessment, making them one of the first things auditors or regulators ask for. Many companies are still using spreadsheets when it comes to performing risk assessments, which can be ineffective and insecure. Such a lack of functionality can keep a company from moving beyond assessment and into true risk management. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Mark Fulford discuss the importance of risk management, including the effectiveness of risk assessments and how BALLAST can help organizations automate the risk assessment process. Listen, and discover these key takeaways: Understanding what’s important to your organization when it comes to managing risks Reasons to consider more targeted risk assessments Why you shouldn’t just do gap assessments How to automate the risk assessment process Why not to stop at the assessment phase
In the information security world, we all wish we had more access to senior executives. Following that logic, if you’re responsible for security at your organization, and you are lucky enough to ride on the same elevator with a senior executive from your company, you should be prepared with your “elevator pitch” on what to say about improving the cybersecurity posture of the organization. When asked, you want to have your message fine-tuned and be able to communicate it clearly and succinctly (before the elevator reaches the parking garage). In this podcast, LBMC Information Security’s Mark Burnette discusses his elevator pitch to President Donald Trump with podcast host Bill Dean. While Mark hasn’t ridden on an elevator with the President, he doesn’t let that stop him from finding a way to articulate what the President should be doing to address cybersecurity issues at the federal level. Listen, and discover these key takeaways: Reasons cybersecurity initiatives at the federal government level are important Former and current administration actions on cybersecurity Reasons for establishing a national cybersecurity advisory committee The need for enforcing existing cybersecurity laws Why the ease and proliferation of cyber-attacks is too much to ignore
The AICPA Cybersecurity Working Group brought to life a new type of cybersecurity examination report in 2017 known as SOC (System and Organization Control) for Cybersecurity. These reports are intended to provide a consistent approach for evaluating and reporting on an entity’s cybersecurity risk management program and give management the ability to consistently describe its cybersecurity risk management program. Additionally, the flexibility of the reports allows management to use any recognized security framework as a baseline while enabling a CPA to provide independent assurance on the effectiveness of the program’s design. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Drew Hendrickson discuss SOC for Cybersecurity reports and what organizations and IT professionals should know about this new report and how it could help their organizations. Listen, and discover these key takeaways: A brief introduction to SOC for Cybersecurity Elements found within an SOC for Cybersecurity report The role of CPA firms in cybersecurity Differences in SOC 2 versus SOC for Cybersecurity An explanation of who needs SOC for Cybersecurity
Incident response consultants are often contacted by clients who are in complete shock that their systems or networks have been compromised. Many times, these clients are hoping our analysis will ultimately prove that the incident was just a “flesh wound” to their systems and that they didn’t experience an actual data breach. It’s quite common for organizations to assume that data breaches won’t happen to them, and consequently, they typically don’t have an incident response plan. Not only do organizations need an incident response plan, but they also need to test it via incident response tabletop exercises. In this podcast, LBMC Information Security’s Bill Dean shares five key reasons why organizations don’t detect cyber breaches, as well as some helpful tips for being prepared in the event of a cyber-attack. Listen, and discover these key takeaways: Reasons why organizations need to plan for a data breach and test the plan Understanding why it’s important for organizations to know where its sensitive data lives The importance of enlisting the assistance of skilled information security professionals The case in support of quality penetration testing
A recent report from cybersecurity firm, FireEye revealed that Chinese hackers have been actively targeting a shortlist of multinational law firms since at least June of 2017. This was an apparent effort to spy on lawyers and steal confidential information, proving that not only are law firms targets of nation states, but attackers are also keeping up with current news, using well-designed phishing campaigns that contain references to pertinent, high-profile U.S. news stories. Although law firm data breaches are not often in the news, they are happening at an alarming rate, and cybersecurity professionals need to be aware and equipped for knowing how to appropriately address such breaches. In this podcast, LBMC Information Security’s Bill Dean highlights some specific examples of law firm data breaches and why law firms are such large targets for cyber-thieves. Listen, and discover these key takeaways: Recent examples of law firm data breaches The efforts of hackers to use U.S. news stories and scandals in hacking Why law firms are cybersecurity targets Reasons law firms need to be prepared for potential data breaches
A key observation that can be made within the information security industry today is that cybersecurity is not extremely difficult, it is just hard and requires long-term dedication, focus, and commitment. Considering this observation, a key question all cybersecurity professionals must ask is, “If you don’t know where you are, how do you know where you need to improve?” Knowing the answer to this question is essential for beginning or enhancing an organization’s cybersecurity program. In this podcast, LBMC Information Security’s Bill Dean discusses some information security basics that many organizations are overlooking. Bill also walks through a series of basic questions that are good to ask when beginning or strengthening a cybersecurity program. Listen, and discover these key takeaways: Information about getting started and improving a cybersecurity program Reasons that cybersecurity is not about the latest product, but rather about people, processes, and technology Why products can’t help you avoid the hard work of cybersecurity basics
As operational technology (OT) networks are used with specialized Industrial Control Systems (ICS) to monitor and control physical processes such as assembly lines, mixing tanks, and blast furnaces, these networks have become ripe targets for adversaries. The lack of basic protections like antivirus can enable attackers to quietly perform reconnaissance before sabotaging these physical processes and compromising industrial devices. Once attackers have compromised an OT network, it is easier for them to learn how the equipment is configured and eventually manipulate it. In this podcast, LBMC Information Security’s Bill Dean discusses how the manufacturing and industrial sectors are prime targets for cyber-attackers. Listen, and discover these key takeaways: Reasons we don’t often hear about industrial and manufacturing network breaches Reasons for industrial and manufacturing attacks and what attackers are looking for Reasons industrial and manufacturing sectors should be concerned How NIST’s Cybersecurity Framework Manufacturing Profile can help Information about how third-party risk assessments are beneficial to manufacturers Subscribe to the Cybersecurity Sense Podcast on iTunes or listen to this podcast HERE. (insert link) To learn more about LBMC Information Security or to speak to one of our trusted professionals about our services, including how to avoid manufacturing and industrial sector attacks, contact us today!
Though not in the recent limelight, it’s no secret that espionage from nation states is happening once again. With sophisticated attacks on InfoSec supply chain companies in 2012, 2013—and as recently as the past few months—many people are left wondering who would target these specific companies? In the end, we know that despite agreements between countries, we have valuable intel within the United States that these attackers are seeking. In this podcast, LBMC Information Security’s Bill Dean offers valuable insight on attackers who focus on the InfoSec supply chain. Listen, and discover these key takeaways: Information about some of the most popular InfoSec supply chain attacks Potential InfoSec supply chain attackers and what information they are looking for Possible reasons supply chain attacks may become popular again
For the past 20 years, Kaspersky Lab has provided deep threat intelligence and security expertise for businesses, critical infrastructure, governments, and consumers around the globe. More than 400 million users benefit from protection services provided by Kaspersky, in addition to approximately 270,000 corporate clients. Recently, Kaspersky has found itself under question from the U.S. Government regarding accusations that the company is hiding backdoors into its software to help Russia spy on high-profile users. In fact, the U.S. Government removed Kaspersky from its approved vendor list, citing spying concerns as the reason. In this podcast, LBMC Information Security’s Bill Dean discusses Kaspersky’s current battle with the U.S Government, offering several helpful takeaways for cybersecurity professionals.
When an organization experiences a data breach, one would hope that a quick recovery is ideal, right? But, did you know that there are instances when a quick breach recovery can hurt an organization? For one healthcare facility, this was the case, as it fell prey to a ransomware attack. While the organization was able to quickly recover operations, it recovered so quickly that it failed to preserve needed evidence for proper forensic analysis. So, what did this organization do as a result? In this podcast, LBMC Information Security’s Bill Dean explains how quick breach recovery hurt this organization and the steps that can be taken to avoid it happening for your own organization.
Sadly, email data breaches continue to be an increasing problem for businesses and organizations who retain large amounts of sensitive client and customer data. In fact, more than 700 million email accounts and millions of associated passwords were recently leaked in the biggest spambot dump ever. Breaches of this scale and impact have happened to Dropbox, LinkedIn, and Adobe in the past few years. So, what is the risk to your organization? In this podcast, LBMC Information Security’s Bill Dean discusses the numerous ways these data breaches are also a risk to your organization. Take a listen, and discover these key takeaways: Information about one of the largest email data breaches that just hit the Internet Potential risks to your organization Obvious personal risks that you should address for yourself, your family, and your friends
Remote access to networks has become commonplace in today’s IT environments, as this access is mainly used for IT support, power users, and developers. While this capability can be provided in a safe and secure manner, it can also be deployed in a manner that leaves the organization at great risk. When Remote Desktop is enabled, attackers can brute force administrator credentials, because you can’t lock out the administrator account due to excessive failed logins. With this access, an organization’s entire network could be at risk of compromise and data theft. In this podcast, LBMC Information Security’s Bill Dean discusses the direct risks associated with remote access to Windows servers. Here’s what is covered within the podcast: Security risks involved with remote access to networks Recent statistics associated with Remote Desktop attacks LBMC Information Security’s experience with remote access attacks Ways to protect your organization from remote access attacks
Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel. The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it. Listen in, and learn about these key takeaways: Advanced attacks will often circumvent traditional static protections. This provides the ability for extensive “dwell time” of attackers on your network. Put in place additional network controls. If malware cannot communicate out, it cannot operate. “Hunt” for previously undetected malware on your systems.
Since January of 2015, all 50 of the United States have reported an increase in business email compromise (BEC) attacks—a 1,300 percent increase, to be exact. Even worse, organizations have reported a loss of nearly one billion dollars. With everyone now being a potential target, it’s been noted that reconnaissance, social media, and social engineering has played a crucial role, as cyber thieves monitor and learn an organization’s “system.” In this podcast, LBMC Information Security’s Bill Dean addresses BEC attacks and offers a few solutions for how to combat business email attackers. Listen in and you’ll learn about: BEC in the news (modern-day Nigerian money scams) Defining BEC The impact of BEC A brief overview of BEC Protections against BEC
It’s true—insider threat events are typically much less frequent than external attacks. However, insider threats often pose a much higher severity of risk for organizations when they do happen. As insiders are given access to sensitive information for work purposes, there’s a great potential for them to do a tremendous amount of damage to a business if they accidentally break policy or choose to steal. Even more, it has been reported that nearly a third of all organizations still have no capability to prevent or deter an insider incident or attack. In this podcast, LBMC Information Security’s Bill Dean addresses insider threats, while offering suggestions on how to combat them with digital forensics. Here’s what is covered in the podcast: Limiting the access to sensitive information to a “need to know” basis Understanding the value of digital forensics and knowing when to use it Being cautious about handling the analysis internally due to expertise
Bill Dean, W0OR, is a long time ham and contestor from Minnesota, where he has lived much of his life, even serving four terms in Minnesota’s legislature. Now a snowbird, who in his mid-seventies learns Spanish, does DXpeditions with friends, and operates from from a second home, high in the Andes mountains, in Ecuador, during Minnesota’s cold Winter months. Our subject today is Bill's ham radio story, operating, DXpeditions on a budget, and contesting.
A Salute to all Former Military and Today's Courageous Americans. Thank You for your Service. Bill Dean joins us today from New York. Bill is the editor of Our Missing News http://www.ourmissingnews.com. Have a Great Day Richie Marla and Bill
A very Relaxed Richie and Marla here. Bill Dean will back on Tuesday so check that out.http://www.ourmissingnews.com Former Gov. Eliot Spitzer, who resigned after prostitution scandal, to jump into race for city controller Currently, Scott Stringer is the front-runner. But Spitzer will start collecting petition signatures Monday. This is what he was Banging - Ashley Dupre, seen here in 2008, is the prostitute who brought down Spitzer. A county coroner said Sunday that his office is conducting an autopsy to determine whether one of the victims of the Asiana Airlines crash at San Francisco International Airport was run over and killed by an emergency vehicle. CHICAGO MURDERS SOAR: 67 SHOT, 11 KILLED OVER JULY 4 WEEKEND--SO FAR Kim K to get married in Egypt Enjoy the Show Renegade Nation Richie and Marla
Thanks goes out to Bill Dean and his daughter Melissa for this week's joke! Make it great, participate! Drop off a good joke that you'd like to see animated, or animate a joke yourself. Paper People Jokes is seeking collaborators for joke-telling and animating alike. Let's have fun together, spread some laughs! Paper is pretty neat. Facebook - facebook.com/paperpeople Twitter - twitter.com/paperjokes Email - joke@houstonedit.com