Podcasts about Black hat

  • 1,173PODCASTS
  • 2,950EPISODES
  • 49mAVG DURATION
  • 1WEEKLY EPISODE
  • May 12, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Black hat

Show all podcasts related to black hat

Latest podcast episodes about Black hat

Talking Billions with Bogumil Baranowski
Who You Can Trust? White Hat Capitalism: Dave Nadig on Finding Purpose in Finance

Talking Billions with Bogumil Baranowski

Play Episode Listen Later May 12, 2025 67:00


How a 30-year ETF veteran learned to prioritize human flourishing over profit maximizationGuest: Dave Nadig - 30-year veteran of the ETF industry, financial blogger, and advocate for pro-flourishing capitalismKey Moments:[03:13] Dave shares how his childhood on a farm shaped his financial mindset, developing a scarcity mentality from growing up poor that led him to finance and money management.[04:38] Dave explains his "Black Hat vs. White Hat" concept in finance - distinguishing between those who prioritize human flourishing (White Hats) versus those focused primarily on profit maximization (Black Hats).[07:01] Discussion of the Mad Magazine "Spy vs. Spy" cartoons as inspiration for his Black Hat/White Hat framework.[09:53] Dave emphasizes that people in the "Black Hat" business aren't necessarily evil, but have made different choices about their priorities.[15:50] Conversation about passive investing and its evolution from the 1980s through today, with Dave sharing his personal journey working at Wells Fargo on the first target date funds.[19:19] Dave reflects on becoming "a hard convert back to passive investing" after failing as an active fund manager.[20:14] Discussion of passive investing's impact on market dynamics, particularly how fund flows affect top equities and bond markets.[26:22] Examination of how capital formation now happens primarily in private markets, not public ones.[32:23] Dave shares his fascination with consciousness and the brain, discussing Dr. Ian McGillchrist's work on left brain/right brain dynamics.[34:47] Dave explores how meditation helps investors develop metacognitive awareness and recognize when their perception differs from reality.[38:39] Discussion of Dave's experiences at Zen Mountain Monastery and how meditation creates space to explore one's own thought processes.[44:52] Dave's emotional connection to flying, from childhood fascination to earning his pilot's license, and the devastating impact of losing it due to epilepsy.[53:49] Reflection on how most investors focus too much on narrow details while neglecting broader context and asset allocation decisions.[55:54] Dave shares how he uses AI tools like Perplexity to streamline research and Claude to assist with data analysis and coding tasks.[01:01:04] Discussion of how AI will continue to evolve, with the current state being "the worst it's ever going to be."[01:05:15] Dave's definition of success: having control over his own time rather than financial wealth.Podcast Program – Disclosure StatementBlue Infinitas Capital, LLC is a registered investment adviser and the opinions expressed by the Firm's employees and podcast guests on this show are their own and do not reflect the opinions of Blue Infinitas Capital, LLC. All statements and opinions expressed are based upon information considered reliable although it should not be relied upon as such. Any statements or opinions are subject to change without notice.Information presented is for educational purposes only and does not intend to make an offer or solicitation for the sale or purchase of any specific securities, investments, or investment strategies. Investments involve risk and unless otherwise stated, are not guaranteed.Information expressed does not take into account your specific situation or objectives, and is not intended as recommendations appropriate for any individual. Listeners are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance.

Risky Business News
Sponsored: What really goes down on Blackhat wifi networks

Risky Business News

Play Episode Listen Later May 11, 2025 15:35


In this Risky Bulletin sponsor interview James Pope, Director of Technical Enablement, talks to Tom Uren about his experience running networks and security centres at Black Hat conferences around the world. Pope talks about the challenges of running a SOC at a hacker conference, how conference networks around the world have a different character and talks about all the weird and wonderful security snafus he has found. Show notes

BarCode
Worldwide Security

BarCode

Play Episode Listen Later May 7, 2025 44:22


In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool's Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] -  https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world's largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.

ITSPmagazine | Technology. Cybersecurity. Society
RSAC 2025 Coverage is done! It's a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 3, 2025 5:12


RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We're working on it.” That exchange captured the spirit of the entire event — security is not a destination, it's an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. ___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage___________KEYWORDSsean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference___________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

A Quality Interruption
#447 L'Amour's DEAD MAN (1995)

A Quality Interruption

Play Episode Listen Later Apr 14, 2025 71:48


EPISODE #447-- After much hooting and hollering, we are back on the podcastin' trail with Jim Jarmusch's seminal DEAD MAN (1995) starign Gary Farmer, Robert Mitchum, and that guy from Pirates of the Caribbean. You know the one. The one with the texts. Anyways, fun movie. An important movie. We also ramble about the Oscar-winning documentary NO OTHER LAND (2024) (now available to rent and stream), BROOKLYN (2015), Michael Mann's BLACKHAT (2015), and the legacy sequel BEVERLY HILLS COP: AXEL F (2024). A solid bunch of movies. A strange bunch of movies. Join the cause at Patreon.com/Quality. Follow the us on on Bluesky at kislingconnection and cruzflores, on Instagram @kislingwhatsit, and on Tiktok @kislingkino. You can watch Cruz and show favorite Alexis Simpson on You Tube in "They Live Together." Thanks to our artists Julius Tanag (http://www.juliustanag.com) and Sef Joosten (http://spexdoodles.tumblr.com). The theme music is "Eine Kleine Sheissemusik" by Drew Alexander. Also, I've got a newsletter, so maybe go check that one out, too. Listen to DRACULA: A RADIO PLAY on Apple Podcasts, at dracularadio.podbean.com, and at the Long Beach Playhouse at https://lbplayhouse.org/show/dracula And, as always, Support your local unions! UAW, SAG-AFTRA, and WGA strong and please leave us a review on iTunes or whatever podcatcher you listened to us on!

BarCode
DELTA K

BarCode

Play Episode Listen Later Apr 11, 2025 56:34


In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscussion also delves into thin calculus and the category theory of things, emphasizing the need for an external truth to build sound mathematical systems. In this conversation, the speakers delve into the concepts of agentic calculusand Delta K, exploring their implications for artificial general intelligence (AGI) and the future of the economy. They discuss the observer-dependent nature of reality and how different perspectives can lead to varied interpretations ofthe same phenomena. The conversation also touches on the potential of the agentic economy to revolutionize ownership and economic dynamics, as well as the philosophical implications of waveform collapse in quantum mechanics.Overall, the discussion highlights the need for a new understanding of cognitive processing and the role of agents in shaping future interactions and economies. TIMESTAMPS:00:00 - Introduction to the Guests and Their Expertise02:16 - Recent Developments in AI and Technology04:50 - Understanding Large Language Models10:53 - Delta K and Its Limitations16:24 - Thin Calculus and the Category Theory of Things19:19 - Understanding Agentic Calculus22:27 - Delta K and Its Implications for AGI28:59 - Cognitive Processing and States of Being36:09 - The Agentic Economy: A New Paradigm40:25 - Waveform Collapse and Delta K43:20 The Future of Agentic Interactions SYMLINKS:[LinkedIn - Charlie Northrup] - https://www.linkedin.com/in/charlie-northrup-1b73b051Charlie Northrup is a technology innovator at Neewer Sciences, contributing pioneering research in agentic AI systems, thing calculus, and distributed digital ecosystems. He shares updates and insights about his work on LinkedIn.[LinkedIn - Keenan Hale] - https://www.linkedin.com/in/keenandewayne/Keenan Hale is recognized for his interdisciplinary contributions bridging theoretical mathematics and cryptographic systems. He connects with others inthe AI and cryptography communities through LinkedIn and shares research updates and discussions.[LinkedIn - Mike Elkins] - https://www.linkedin.com/in/elkinsmike/Mike Elkins is the Chief Human and Information Security Officer at Banffist, actively involved in discussions about cybersecurity, digital transformation, and AI-driven enterprise operations. He also speaks at major conferences like BlackHat, RSA, and SecureWorld.

Coaching for Leaders
728: Lower Your Risk of Being Hacked, with Qasim Ijaz

Coaching for Leaders

Play Episode Listen Later Apr 7, 2025 39:26


Qasim Ijaz Qasim Ijaz is the director of cybersecurity at a leading healthcare organization, overseeing detection, incident response, vulnerability management, purple teaming, and cybersecurity engineering. With a strong background in offensive security and risk management, he has helped organizations strengthen their defenses against evolving threats. He is also a dedicated educator, mentoring professionals and sharing his expertise at conferences such as BSides and Black Hat. You don't need to go far in the news these days to find out that another organization was hacked. Data breeches are a nightmare scenario for both leaders and the people they support. In this episode, Qasim and I explore what your team and you can do to be a bit more prepared. Key Points Use multi-factor authentication, passphrases, and a password manager. Freeze your personal credit reports. Do this for free directly with Experian, Equifax, and TransUnion. Leaders in bigger roles (executives, CEOs, board members) are larger targets for hackers due to their access and also their ability to occasionally side-step organizational guidelines. It's the non-technical pieces of a cyber response that organizations are least prepared for. Conduct incident response and disaster recovery tabletop exercises to uncover vulnerabilities before an attack. Regardless of organizational policy, employees will use AI. The best prevention assumes the inevitability of human behavior and works with it to improve systems. Resources Mentioned Recommended password managers: 1Password, Apple password app, Proton Pass Critical Security Controls by the Center for Internet Security Resources for Small and Medium Businesses by the Cybersecurity & Infrastructure Security Agency 2024 Data Breach Investigations Report by Verizon Business Related Episodes Dumb Things Smart People Do With Money, with Jill Schlesinger (episode 396) Where to Start When Inheriting a Team in Crisis, with Lynn Perry Wooten (episode 603) How to Use AI to Think Better, with José Antonio Bowen (episode 689) Discover More Activate your free membership for full access to the entire library of interviews since 2011, searchable by topic. To accelerate your learning, uncover more inside Coaching for Leaders Plus.

Planeta M - Tertulia de marketing digital
220. Todo lo nuevo en marketing, y lo no tan nuevo. AI & Machine Learning

Planeta M - Tertulia de marketing digital

Play Episode Listen Later Apr 4, 2025 38:29


Bienvenidos y bienvenidas al episodio 220 de Planeta M by DonDominio. Hoy haremos tertulia para hablar sobre AI y machine learning al servicio de tu negocio, pero también sobre estrategias tradicionales. Para hablar de este tema tan apasionante, ya está listo el equipo de Planeta M de hoy: Edu Laborda es co-fundador junto a Matt Romero del alegre y enigmático rincón del podcast y academia YinYangSEO, Edu es un apasionado del SEO Local que se divierte revolucionando rankings con una mezcla de creatividad y tácticas Black Hat. Con una debilidad por los torreznos y un talento peculiar para convertir ponys en unicornios digitales, nunca falta una chispa de humor en su enfoque innovador. Su usuario es @EduLabordaYYS. Marta Rodríguez Ruiz es consultora de marketing y comunicación desde hace casi 20 años. Ha sido directora de marketing digital y comunicación de empresas como Plátano de Canarias o Landmar Hotels. Puedes encontrarla en LinkedIn y en su newsletter donde habla sobre marketing, comunicación e Inteligencia Artificial aplicada a estos sectores. Mario Del Pozo trabaja en el departamento de Marketing de DonDominio en la gestión de colaboraciones y social media, además de moderar el podcast de Planeta M. Podéis ver las novedades de DonDominio en nuestras redes sociales con el usuario @dondominio y sobre el podcast en @PlanetaM7.

Insight is Capital™ Podcast
The ETF Industry's Hidden Risks with Dave Nadig

Insight is Capital™ Podcast

Play Episode Listen Later Mar 20, 2025 89:30


Is Wall Street turning investing into a casino? Dave Nadig reveals the hidden cracks in the ETF system, the explosive risks no one's prepared for, and what financial advisors must understand before it's too late. The ETF market has never been more innovative—or more dangerous. In this controversial conversation, industry veteran Dave Nadig breaks down the evolution of financial markets, the rise of speculative ETF products, and why unchecked leverage in the options market could be the next major financial disaster. Nadig also highlights Canada's unique role in ETF innovation, the psychological battle between retail FOMO and institutional stability, and why financial advisors need to filter out the "black hats" from the "white hats" in today's investing world. This is a must for investment professionals, advisors, and anyone trying to navigate an increasingly chaotic financial landscape. Chapters 0:00 – The ETF Industry's Hidden Risks 1:21 – Canada vs. U.S.: Who Leads in ETF Innovation? 3:32 – Financial Chaos: Why Markets Feel Like a Circus 4:34 – The Power Play Behind Market Volatility 9:51 – Black Hats vs. White Hats: The Real ETF Battle 14:29 – Retail Speculation: A Dangerous Game? 17:13 – Why Passive Investing Still Wins (For Now) 26:15 – How to Survive as an Advisor in a Speculative Market 39:55 – The ETF Market's Next Big Blow-Up 48:58 – Are Financial Regulators Being Dismantled? 53:40 – The ‘Buy The Dip' Mentality: Will It Ever Break? 1:05:04 – Final Takeaways for Investors & Advisors #Investing #ETF #Finance #Markets #WallStreet #FinancialAdvisors #PassiveInvesting #StockMarket #OptionsTrading #RiskManagement #Trading #WealthManagement #InvestSmart

Root Causes: A PKI and Security Podcast
Root Causes 476: The Need for Security KPIs

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Mar 10, 2025 16:34


Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.

UNSECURITY: Information Security Podcast
Unsecurity Episode 236: FRSecure Team Reflections w/ Mike Kongsjord

UNSECURITY: Information Security Podcast

Play Episode Listen Later Mar 5, 2025 42:50


In this lighthearted episode, Mike Kongsjord walks us through his professional journey and time at FRSecure as he and the group celebrate his retirement. Having an introduction to Evan Francen at his last position, Mike joined the FRSecure as an Information Security Consultant and has completed five years on the team. He reflects with Megan and Brad and discusses fun retirement plans.About FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Root Causes: A PKI and Security Podcast
Root Causes 473: Does Security Software Lack Creativity?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Feb 28, 2025 10:08


Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.

Junk Filter
TEASER - 201: Michael Mann: Blackhat (with James Slaymaker)

Junk Filter

Play Episode Listen Later Feb 21, 2025 5:18


Access this entire 70-minute episode (and additional monthly bonus shows) by becoming a Junk Filter patron for only $5.00 (US) a month! Over 30% of episodes are exclusively available to patrons of the show. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://www.patreon.com/posts/201-michael-mann-122785625James Slaymaker, the author of Time is Luck: The Cinema of Michael Mann, returns to the podcast for a show about Mann's much-maligned 2015 techno-thriller starring Chris Hemsworth as a blackhat hacker named Hathaway, granted release from prison by the FBI in a secret mission between American and Chinese police to track down the leader of an international cybercrime terror organization that is remotely manipulating the stock market to cause global chaos.Blackhat was a financial failure upon release that resulted in an eight year break between Mann's feature film works. James and I discuss the director's cut of the film (recently released on video) which addresses some of the theatrical cut's issues and James makes a case for the film as a misunderstood work that anticipated some of the next decade's concerns with technology and the real world consequences of living in a surveillance state, as Mann continues to explore the possibilities of digital cinema.Follow James Slaymaker on Twitter.James' book Time is Luck: The Cinema of Michael Mann, is now available in paperback and Kindle.Trailer #1 for Blackhat (Michael Mann, 2015)

UNSECURITY: Information Security Podcast
Unsecurity Episode 235: CMMC Updates w/ Scott Singer & Ryan Abraham

UNSECURITY: Information Security Podcast

Play Episode Listen Later Feb 19, 2025 38:05


With two guest features, Scott Singer from CyberNINES and FRSecure's own Security Information Consultant, Ryan Abraham, this week's episode focuses on CMMC's recent changes, enforcement, and compliance requirements.About FRSecure https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Cloud Security Podcast
Cloud Security Detection & Response Strategies That Actually Work

Cloud Security Podcast

Play Episode Listen Later Feb 4, 2025 57:58


We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives deep into: Why cloud security is NOT like on-prem – and how that affects incident response How attackers exploit APIs in seconds (yes, seconds—not hours!) The secret to building a cloud detection program that actually works The biggest detection blind spots in AWS, Azure, and multi-cloud environments What most SOC teams get WRONG about cloud security Guest Socials: ⁠⁠⁠⁠⁠⁠⁠Will's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠ If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠ AI Cybersecurity Podcast Questions asked: (00:00) Introduction (00:38) A bit about Will Bengtson (05:41) Is there more awareness of Incident Response in Cloud (07:05) Native Solutions for Incident Response in Cloud (08:40) Incident Response and Threat Detection in the Cloud (11:53) Getting started with Incident Response in Cloud (20:45) Maturity in Incident Response in Cloud (24:38) When to start doing Threat Hunting? (27:44) Threat hunting and detection in MultiCloud (31:09) Will talk about his BlackHat training with Rich Mogull (39:19) Secret Detection for Detection Capability (43:13) Building a career in Cloud Detection and Response (51:27) The Fun Section

ITSPmagazine | Technology. Cybersecurity. Society
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 4, 2025 11:39


ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.Key Industry EventsThe year's schedule includes cornerstone cybersecurity conferences such as RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.Expanding Coverage Beyond CybersecurityBeyond security-focused events, the team is covering NAMM 2025, a leading music and technology conference, and Legal Week in New York, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.Learn about Event Briefings: https://www.itspmagazine.com/event-coverage-briefingsLearn about the Event Coverage Sponsorship Bundle: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefingsHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliThis Episode's Sponsor: HITRUST: https://itspm.ag/itsphitwebResourcesThe Business Newsletter: https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-RSA Conference 2025: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageBlack Hat USA 2025: https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegasInfosecurity Europe 2025: https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverageAll of our planned On Location event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 4, 2025 11:39


ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.Key Industry EventsThe year's schedule includes cornerstone cybersecurity conferences such as RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.Expanding Coverage Beyond CybersecurityBeyond security-focused events, the team is covering NAMM 2025, a leading music and technology conference, and Legal Week in New York, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.Learn about Event Briefings: https://www.itspmagazine.com/event-coverage-briefingsLearn about the Event Coverage Sponsorship Bundle: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefingsHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliThis Episode's Sponsor: HITRUST: https://itspm.ag/itsphitwebResourcesThe Business Newsletter: https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-RSA Conference 2025: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageBlack Hat USA 2025: https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegasInfosecurity Europe 2025: https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverageAll of our planned On Location event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

UNSECURITY: Information Security Podcast
Unsecurity Episode 233: HERoic Hacks - Women in InfoSec w/ Tonya Barnes

UNSECURITY: Information Security Podcast

Play Episode Listen Later Jan 27, 2025 32:16


In this special Edition of Unsecurity, Key Account Manager Tonya Barnes speaks on the creation of HERoic Hacks, the infosec conference that empowers women in the field. About HERoic Hacks: Envisioned by Tonya, and supported by FRSecure, HERoic Hacks addresses the gap in representation by providing networking opportunities, expert speakers, and award recognition with notable infosec organizations and leaders! This year's HERoic Hacks will feature keynote speaker Connie Hiber, Director of Technology Governance at GreatClips! Interested in Sponsoring or Attending? 20% of sponsorship fees will support women-led organizations WiCys and MN Women in Tech! Visit the event page to register now and sign up to sponsor. Spots are limited!https://www.eventbrite.com/e/heroic-hacks-tickets-1083192711559?aff=oddtdtcreatorAbout FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Identity At The Center
#325 - Theorycrafting Modern Identity Architecture with Ian Glazer

Identity At The Center

Play Episode Listen Later Jan 13, 2025 69:17


Welcome to the Identity at the Center podcast! In this episode, hosts Jeff and Jim dive deep into modern identity architecture with guest Ian Glazer. They discuss topics such as the importance of policy, data orchestration, and the evolving landscape of identity and access management (IAM). Ian shares his thoughts on the future of IAM, the integration of various data sources, the role of events in IAM, and the potential for real-time identity solutions. They also touch on upcoming conferences, the European Identity and Cloud Conference 2025, and the significance of engaging with the identity community. Tune in for a thought-provoking discussion on the advancements and future directions of digital identity! Chapters 00:00 Introduction and Podcast Overview 00:11 Upcoming Plans and Challenges 01:03 Guest Invitation and Podcast Dynamics 03:31 Conference Announcements and Discounts 06:05 Welcoming the Guest: Ian Glazer 06:46 Fido Feud and Conference Experiences 16:29 Identity Market Trends and Innovations 19:19 Modern Identity Architectures 33:51 Identity First Security: A New Approach 34:50 Unified Data Tiers: Breaking Down Silos 36:14 Modern IAM: Opportunities and Challenges 37:02 Ephemeral Access and Zero Standing Privilege 39:18 Understanding Identity Data 41:30 Workforce Identity Data Platforms 47:14 Orchestration and Execution in IAM 51:09 Real-Time Event-Based Identity Systems 54:45 Future Directions and Community Engagement 59:03 Teaching and Sharing Knowledge 01:05:33 Closing Thoughts and Recommendations Connect with Ian: https://www.linkedin.com/in/iglazer/ Notional architecture for modern IAM: Part 3 of 4 (blog): https://weaveidentity.com/blog/notional-architecture-for-modern-iam/ 2025: The year we free our IAM data: https://weaveidentity.com/blog/2025-the-year-we-free-our-iam-data/ Learn more about Weave Identity: https://weaveidentity.com/ Digital Identity Advancement Foundation: https://digitalidadvancement.org/ Avoid the Noid! - https://en.wikipedia.org/wiki/The_Noid Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Ian Glazer, Weave Identity, Identity and Access Management, IAM, Modern Identity Architectures, Modern IAM, Data Tier, Events, Orchestration, Zero Trust, ZTNA, Shared Signals Framework, EIC, Gartner, Black Hat, RSA, Identibeer, Data Lake, OIDs, IANS

Fridays with Keenan's Cutting Edge
Civility and Professionalism with William Hagans

Fridays with Keenan's Cutting Edge

Play Episode Listen Later Jan 13, 2025 56:42


(This is a Replay)In our adversarial system, it can often be difficult to be civil and professional with the other side, especially if they are true Black Hats. Tune in to hear 2018 KTI Graduate and Texas attorney, William G. Hagans, share about how to keep the civility and professionalism in the courtroom. Contact William G. Hagans atPhone: (713) 222-2700Website: https://hagans.law/

@BEERISAC: CPS/ICS Security Podcast Playlist
Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 7, 2025 19:02


Podcast: PrOTect It All (LS 24 · TOP 10% what is this?)Episode: Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025Pub date: 2025-01-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHappy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems. He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/ With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together. Key Moments:  00:40 Resilience needs technology, people, and processes. 05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON. 09:01 Networking is crucial for career and growth. 11:42 Secure messaging suggests normal texting may be compromised. 16:04 Balance technical skills with essential soft skills. 17:11 Excellent professionals struggle in untrained management roles.   Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Affiliate Marketing Show
Episode 99 - Family Firsts, Lead Gen, Calls, Black Hat, Female Leadership (Featuring Karly Beachler - Founder of Bloom Calls)

The Affiliate Marketing Show

Play Episode Listen Later Dec 20, 2024 58:15


Josh Sebo (COO of OfferVault), Adam Young (CEO of Ringba), industry legend Harrison Gevirtz and special guest Karly Beachler (Founder of Bloom Calls) discuss: - Bloom Calls: The start of an empire - Family Firsts: 1st College Graduate & 1st Female Business Owner - 8+ Years in Lead Gen - Taking Campaigns Over Sea - How Black Hat Marketing better prepared Karly for White Hat - Being a female in a male dominated industry - Why Karly is pivoting into eCommerce, Lead forms & VSLs Follow Us: OfferVault: WEBSITE: https://www.offervault.com/ FACEBOOK: https://www.facebook.com/offervault INSTAGRAM: https://www.instagram.com/offervaultmarketing/ TWITTER: https://www.twitter.com/offervault LINKEDIN: https://www.linkedin.com/company/offer-vault/ Adam Young: RINGBA: https://www.ringba.com RINGBA's INNER CIRCLE: https://try.ringba.com/inner-circle/ FACEBOOK: https://www.facebook.com/ringba INSTAGRAM: https://www.instagram.com/adamyoung/ TWITTER: https://www.twitter.com/arbitrage LINKEDIN: https://www.linkedin.com/in/capitalist Harrison Gevirtz: INSTAGRAM: https://www.instagram.com/affiliate/ LINKEDIN: https://www.linkedin.com/in/harrisongevirtz/ Karly Beachler: BLOOM CALLS: https://www.bloomcalls.com/ INSTAGRAM: https://www.instagram.com/xbloomcalls/ LINKEDIN: https://www.linkedin.com/in/karly-beachler/

Cybercrime Magazine Podcast
Black Hat MEA 2024. Key Takeaways, Expert Insights & More. Jason Lau, CISO, Crypto.com.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 19, 2024 13:34


Black Hat MEA is one of the world's largest infosec events. This year's conference brought together global CISOs, elite ethical hackers & 14000+ visitors in Riyadh, Saudi Arabia. Jason Lau, CISO at Crypto.com, was in attendance. In this episode, he joins host David Braue to discuss his experience, sharing key takeaways and expert insights. Learn more about Black Hat MEA at https://blackhatmea.com. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Small Efforts - with Sean Sun and Andrew Askins
Prompt engineering and reflecting on 2024

Small Efforts - with Sean Sun and Andrew Askins

Play Episode Listen Later Dec 19, 2024 65:03


In this episode, Andrew talks about his recent deep dive on prompt engineering and the way the AI product landscape is shaking out. Sean talks about his recent trip to Philly for a cybersecurity marketing conference. Then the guys reflect on 2024 and their goals for 2025. Links:Andrew's Twitter: @AndrewAskinsAndrew's website: https://www.andrewaskins.com/MetaMonster: https://metamonster.ai/Sean's Twitter: @seanqsunMiscreants: http://miscreants.com/Sean's website: https://seanqsun.com/Worth Driving: https://worthdriving.com/For more information about the podcast, check out https://www.smalleffortspod.com/.Transcript:00:00:00.00Seantwo, one, happy birthday Austin, yay.00:00:02.11AndrewHappy birthday, Austin!00:00:05.29SeanHow was your recording last week? How'd it go?00:00:09.74AndrewI thought it went really well. um guess you tell me, have you had a chance to listen to it yet?00:00:13.54SeanYeah, my train from Pennsylvania, from Philadelphia to Virginia last week got very delayed, so.00:00:20.11AndrewOh no, I'm sorry.00:00:21.26Seansaid in the terminal and listened to it. was good. It was, yeah, thought he was super insightful.00:00:28.35AndrewYeah, Alex was awesome.00:00:28.63SeanI feel like he's beginning, you were a little, what is it like? like like starstruck felt like i was like wow didn't see me like this so before it was good i thought he gave you like really good feedback i thought but i mean there were things i learned from it being someone who's never looked at the stack in the brick stuff and yeah i think it was it was helpful and then i saw the new meta monster update today or that you sent down i was like wow it is way better than before00:00:36.26AndrewOh, that's funny. Yeah.00:00:57.50Seanand00:00:59.34AndrewWell, that's good. At least I'm taking what I'm being taught and internalizing it and not it's not just going in one ear and out the other.00:01:05.30SeanYeah.00:01:07.62SeanRight, right.00:01:08.30SeanLike our podcasts usually do.00:01:09.72AndrewYeah, I tried to also do some of the pulling the slingshot back, as Alex says, some of the anticipation building with the actual release of the podcast episode. So tried to like hype that up. Austin said it worked on him. I'm not sure it made a big difference on our analytics, I think. Yeah.00:01:33.43AndrewYou know, I think we had. You know, it's performing better than our average podcast episode, but I think that's as much about like Alex retweeting it as it is anything else. So, you know.00:01:46.91SeanWell, the real magic is, let's see how many people isn't today is right. So hello, new listeners. Austin is Andrew's co-founder, or I'm going to last name.00:01:51.97AndrewHey, that'd be cool.00:01:57.22AndrewYep. Austin's my co-founder on MetaMonster. He's the one responsible for making the product look great and function. Well, I'm just the guy who talks about it and is trying to talk about it better, trying to talk about it more good.00:02:13.12SeanYeah, hell yeah.00:02:14.59AndrewYeah. How was Philly?00:02:16.99SeanIt was good. I went to, so I went to cybersecurity marketing, the cyber marketing conference or cybersecurity marketing conference held by the cybersecurity marketing society. was good. A lot of, mean, no, this is the third time actually.00:02:27.82AndrewIs this their first time doing an in-person conference? Oh, wow. I thought they were all virtual before.00:02:34.02SeanThe society, sorry, this is their, this is their third conference. They've done a bunch of like in-person events. Yeah. The society's grown. There's like 500 people at this conference.00:02:42.76AndrewCool.00:02:43.91Seanyeah, I get to hang hang out with people that I don't usually get to see. And it's weird. It's, it's like the only conference I've ever been to. That's, I think that's i've ever, ever really been to that's not a security conference.00:02:54.04AndrewHmm.00:02:54.63SeanSo it's a whole other sort of vibe.00:02:56.73AndrewWait, but isn't it, I mean, it's still a security adjacent conference, right?00:03:01.68SeanFor sure.00:03:01.98AndrewBut it's not hackers talking about like the new vulnerabilities they discovered and like how they reverse engineered some crazy low level protocol or something.00:03:02.04SeanFor sure. For sure. But it's not like, you know, it's not like RSA. It's not like i can not be solid. It's yeah. Yeah.00:03:10.97SeanRight.00:03:14.32Seanright right exactly exactly and and it's not like it's also it's also not cyber security vendors trying to sell you on their product00:03:24.38AndrewRight.00:03:24.67Seanlike RSA and Black Hat.00:03:26.34AndrewOkay.00:03:27.48SeanAnd it's also, it's a society it's like a society conference, so it's not, I guess it's almost like the DEFCON, like in that case, like the DEFCON of cybersecurity marketing, like you don't really go to sell anything there, you're not, your customers, I mean, I guess my client customers are there, but I also try not to do any of that.00:03:32.18AndrewWhat does that mean?00:03:38.60AndrewHmm. Yeah. Yeah.00:03:48.90Seanyeah There's obviously vendors and sponsors and stuff. We're a sponsor as well. i I literally was just like, I don't want to, like I also would like to attend the conference. So I gave up my booth and switched it out with a 360 camera and just let people use a 360 camera there.00:04:02.45SeanAnd then went ahead and hung out with people there, but it was good.00:04:01.81AndrewOh, that'...

UNSECURITY: Information Security Podcast
Unsecurity Episode 230: What A CISO Wants for Christmas

UNSECURITY: Information Security Podcast

Play Episode Listen Later Dec 18, 2024 37:58


In this special holiday-themed episode, Gary Berger, Director of Information Security for Ogletree Deakins Law Firm, joins Megan to go over what a CISO wants for Christmas. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

OODAcast
Episode 124: The History and Future of Cyberwar with Matt Devost

OODAcast

Play Episode Listen Later Dec 17, 2024 61:34


In this episode of the OODAcast we turn the microphone over to Dr. Bilyana Lily, the world renowned cyber and geopolitical expert, who interviews OODA's CEO and co-founder Matt Devost. The session provides insights which can benefit any entrepreneur, board member, investor or cybersecurity practitioner. Bilyana reviews Matt's journey from a small-town in Vermont to becoming a global leader in cybersecurity, counterterrorism, and risk management and then dives into Matt's work founding groundbreaking companies like FusionX and the Terrorism Research Center, his insights into AI and cyber defense, and even his contributions to Hollywood films like Blackhat. Matt also explores the evolving hacker community, the future of augmented reality, and why exponential technological change will reshape our world. This is a must-watch for anyone interested in the nexus of technology, security, and innovation.

Risky Business
Risky Business #774 -- Cleo file transfer appliances under widespread attack

Risky Business

Play Episode Listen Later Dec 11, 2024 62:28


On this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Cleo file transfer products have a remote code exec, here we go again! Snowflake phases out password-based auth Chinese Sophos-exploit-dev company gets sanctioned Romania's election gets rolled back after Tiktok changed the outcome AMD's encrypted VM tech bamboozled by RAM with one extra address bit Some cool OpenWRT research And much, much more. This week's episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him! This episode is also available on Youtube. Show notes Cleo Software Actively Being Exploited in the Wild CVE-2024-50623 | Huntress Blue Yonder investigating data leak claim following ransomware attack | Cybersecurity Dive Snowflake to phase out single-factor authentication by late 2025 | Cybersecurity Dive Treasury Sanctions Cybersecurity Company Involved in Compromise of Firewall Products and Attempted Ransomware Attacks | U.S. Department of the Treasury Another teenage hacker charged as feds continue Scattered Spider crackdown | The Record from Recorded Future News Germany arrests suspected admin of country's largest criminal marketplace | The Record from Recorded Future News FCC, for first time, proposes cybersecurity rules tied to wiretapping law | CyberScoop Russian state hackers abuse Cloudflare services to spy on Ukrainian targets | The Record from Recorded Future News Cloudflare's pages.dev and workers.dev Domains Increasingly Abused for Romania annuls presidential election over alleged Russian interference | The Record from Recorded Future News EU demands TikTok 'freeze and preserve data' over alleged Russian interference in Romanian elections | The Record from Recorded Future News Research Note: Meta's Role in Romania's 2024 Presidential Election - CheckFirst Key electricity distributor in Romania warns of ‘cyber attack in progress' | The Record from Recorded Future News Backdoor slipped into popular code library, drains ~$155k from digital wallets - Ars Technica AMD's trusted execution environment blown wide open by new BadRAM attack - Ars Technica New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader – PT SWARM Telegram partners with child safety group to scan content for sexual abuse material Apple hit with $1.2B lawsuit after killing controversial CSAM-detecting tool - Ars Technica Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research How do I turn on the Do Not Track feature? | Firefox Help

UNSECURITY: Information Security Podcast
Unsecurity Episode 229: API Security w/ Baljeet Malhotra & Nicole Salazar

UNSECURITY: Information Security Podcast

Play Episode Listen Later Dec 9, 2024 43:52


This week, CEO, Nicole Salazar and Founder, Dr. Baljeet Malhotra of TeejLab join Megan and Brad to discuss all things Open Source and API Risk Management. Along with a brief review of Dr. Malhorta's background, the group discusses TeejLab's origins and discuss a new API workshop. About FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 5, 2024 35:02


Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech [@InformaTechHQ] and General Manager at Black Hat [@BlackHatEvents]On LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesLondon as the Backdrop for Innovation and CultureThe conversation kicked off with reflections on London's vibrant mix of history, culture, and modernity. Marco captured it perfectly, noting the city's knack for staying on the cutting edge of fashion, music, and movement. Sean chimed in, describing the city as a destination where “cool kids” converge. It's this ever-evolving energy that makes London the ideal host for forward-thinking gatherings like Black Hat.Sean and Marco's admiration for the city wasn't just about its aesthetics but also its role in shaping global conversations. London is a place where the local meets the global, a theme that would resonate throughout their discussion.Black Hat's Expanding Global ReachSean and Marco highlighted the global nature of the cybersecurity community, emphasizing Black Hat's international presence. Marco pointed out how the event has grown beyond its Las Vegas origins, with thriving editions in Europe, Asia, the Middle East, and beyond. This expansion reflects not only a growing need for cybersecurity collaboration but also the importance of tailoring conversations to regional contexts.Sean observed how each edition of Black Hat carries a unique flavor, shaped by local cultures and challenges. He praised the effort to include regional experts on review boards, ensuring that the content resonates with specific audiences. From Riyadh to Toronto, this approach has made Black Hat a truly global force.Celebrating Local Voices in Global ConversationsOne of the key takeaways from the conversation was the importance of amplifying local voices in global discussions. Marco commended Black Hat's dedication to fostering a sense of ownership among local cybersecurity communities. Sean agreed, noting how local insights enrich the broader, boundaryless research presented at these events.The duo discussed the balance between global trends, like AI and supply chain security, and region-specific concerns, such as policy-driven discussions in Europe or industrial focus in Canada. This nuanced approach ensures that every Black Hat event feels relevant, impactful, and inclusive.Sean and Marco's Chemistry: Informal Yet InsightfulBeyond the topics, the conversation was marked by the easy rapport between Sean and Marco. They navigated seamlessly from cybersecurity strategy to the lighter moments, like teasing each other about wardrobe choices for London's chilly December weather. Marco's love for local cuisine even sparked a playful detour into Italian titles for hardware hacking sessions.It's this blend of professional insight and personal charm that makes their discussions so engaging. Whether they're debating the merits of AI sessions or reminiscing about hallway chats at past events, Sean and Marco bring an authenticity that keeps listeners coming back.Looking AheadAs the conversation wrapped up, Sean and Marco hinted at their plans to keep “Chats on the Road” moving forward. While they may not make it to every event, their commitment to bringing the community's stories to light remains steadfast. Whether you're attending Black Hat in person or following along from afar, Sean and Marco ensure that the spirit of innovation and collaboration is accessible to all.Stay tuned as they continue to explore the intersections of technology, culture, and community, one conversation at a time.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesLearn more about Black Hat Europe 2024: https://www.blackhat.com/eu-24/Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Hacker Valley Studio
Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss

Hacker Valley Studio

Play Episode Listen Later Nov 26, 2024 40:21


Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they're sharing firsthand how organizations can prepare for adversaries in the wild. Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity. Impactful Moments: 00:00 - Introduction 01:25 - You Deserve To Be Hacked 03:05 - Emulating criminal behavior: The hive structure 07:55 - Social engineering tactics that really work 20:16 - Physical breaches: Pentesting in action 24:09 - Past the firewall: Second- and third-layer testing 29:14 - Digital exploits and real-world vulnerabilities 35:24 - Why organizations hesitate to invest in red teams 37:33 - Building muscle memory for security   Links: Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/ Learn more about CovertSwarm here: https://covertswarm.com/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Why Your Podcast Isn't Growing: A Get More Listeners Podcast For Podcasters
#218 | A Black Hat Strategy For Getting More Reviews For Your Podcast (Plus 2 Podcast Growth Tips)

Why Your Podcast Isn't Growing: A Get More Listeners Podcast For Podcasters

Play Episode Listen Later Nov 25, 2024 12:16


How can you break through the noise when 44 pitches flood into every podcast daily?If you're frustrated by slow podcast growth, struggling to rank on Apple or Spotify, or yearning for more reviews, this episode delivers actionable strategies to transform your efforts into results.In this episode, you will:1) Stand Out with Smart Pitches: Learn how to craft guest pitches that get noticed and accepted.2) Boost Discoverability: Unlock the secret to ranking on page one for your niche.3) Gain More Reviews: Discover a clever "black hat" strategy to increase your reviews without annoying your audience.Ready to supercharge your podcast growth? Hit play now and start applying these game-changing strategies today!More From Get More Listeners:Grab your FREE personalized audit + a copy of our bestseller Podcast Marketing.Or Visit https://getmorelisteners.com/bookView Client Results & Case Studies Here.https://getmorelisteners.com/studentsuccessOr Visit getmorelisteners.com/studentsuccessGet More Listeners Recommendations:Looking for a new hosting platform with amazing analytics?Try Captivate: Get a FREE 7-day Trial Here.

UNSECURITY: Information Security Podcast
Unsecurity Episode 228: Recon InfoSec with Andrew Cook

UNSECURITY: Information Security Podcast

Play Episode Listen Later Nov 21, 2024 34:06


This week, Unsecurity hosts are joined by CTO of Recon InfoSec, Andrew Cook. They discuss Andrew's journey into the InfoSec field and Recon InfoSec's approach and value. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 19, 2024 1:53


Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

ITSPmagazine | Technology. Cybersecurity. Society
SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 18, 2024 2:02


SecTor, Canada's largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.Show highlights for 2024 included:● Keynotes: This year's event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.● Business Hall: This year's Business Hall showcased the latest products and technologies from more than 140 of the industry's leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-EventLearn more and catch more stories from SecTor Cybersecurity Conference Toronto 2024: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

The Common Sense Show
BLACK HAT MILITARY OPPOSING TRUMP'S WHITE MILITARY FOR CONTROL OF USA! SCOTTY SACHS

The Common Sense Show

Play Episode Listen Later Nov 14, 2024 54:50


BLACK HAT MILITARY OPPOSING TRUMP'S WHITE MILITARY FOR CONTROL OF USA! SCOTTY SACHS

ITSPmagazine | Technology. Cybersecurity. Society
A New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation withChristine Dewhurst and Dr. Thomas Lee | On Location Coverage

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 9, 2024 26:55


Guests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:

Move Happy Movement
AT&T Black Hats By Erin Nicole

Move Happy Movement

Play Episode Listen Later Nov 7, 2024 74:49


This is a Holy Spirit inspired sermon about the evil in the world harming children and the tech hub that is involved. Listen, take notes, and share. If it adds value to you, donate as much as you feel led to give to: Erin Nicole Ministries 1477 Tiny Town Road #191, Clarksville, TN 37042. PS: Don't forget to tell someone you love them today

UNSECURITY: Information Security Podcast
Unsecurity Episode 227: Executive Security Decisions with Vanae Pearson & Randy Kaedar

UNSECURITY: Information Security Podcast

Play Episode Listen Later Nov 6, 2024 42:30


In this episode of the Unsecurity Podcast, FRSecure's CFO, Vanae Pearson, and Illumifin's Chief Security Officer, Randy Kaedar are guests. The group discusses how to prompt key decision makers and executive teams to make the most effective security decisions.Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com.About FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs.These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Book Bistro
Long Past The Witching Hour

Book Bistro

Play Episode Listen Later Nov 2, 2024 65:02


This week Brooke, Shannon, Stacy, and Georgina are back to share some more witchy reads. Titles mentioned include: Kayla Cottingham, Practical Rules for Cursed Witches Hailey Edwards, Black Hat, White Witch (Black Hat Bureau #1) Auryn Hadley, Magic In the Moonlight (Where the Wild Things Grow #1) Ivy Asher, The Bone Witch (The Osseous Chronicles #1) C.J. Cooke, The Book of Witching Quinn Cameron, Pulling Strings (Marionette #1) Alistair Reeves, A Spell for Heartsickness (Rune Tithe #1) Amanda M. Lee, Only the Lonely (Death Gate Grim Reapers #1) Lindsay Lovise, Perfectly Wicked Ciannon Smart, Witches Steeped In Gold (Witches Steeped In Gold #1) Kerri Maniscalco, Kingdom of the Wicked (Kingdom of the Wicked #1) Tegan Maher, Sweet Murder (Witches of Keyhole Lake #1) You can always contact the Book Bistro team by searching @BookBistroPodcast on facebook, or visiting: https://www.facebook.com/BookBistroPodcast/ You can also send an email to: TheBookBistroPodcast@gmail.com For more information on the podcast and the team behind it, please visit: https://podcasters.spotify.com/pod/show/book-bistro

ITSPmagazine | Technology. Cybersecurity. Society
Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 24, 2024 7:16


The latest episode of 7 Minutes on ITSPmagazine, recorded during the Black Hat Sector 2024 event in Toronto, Canada, brings insights from the dynamic world of cybersecurity training and education. Hosted by Sean Martin, the discussion features Rushmi Hasham, Director of Strategic Partnerships, and Vasu Daggupaty, Manager of Strategic Partnerships and Investments, both from Rogers Cybersecure Catalyst.Rogers Cybersecure Catalyst, a non-profit organization operated by Toronto Metropolitan University, serves as the university's national hub for cyber education. The organization's focus spans three primary areas: training individuals to become cybersecurity professionals, helping organizations to bolster their cyber safety measures, and assisting cybersecurity founders in bringing their innovative solutions to the market.Vasu Daggupaty explains that the Catalyst's training programs certify individuals with the necessary credentials to be employable in the cybersecurity field. Moreover, organizations receive guidance on enhancing their incident response strategies and other critical safety practices. An essential part of their mission is also supporting innovators in launching new cybersecurity products and services.The episode highlights a compelling story of Gina, a former nurse transitioning into a cybersecurity analyst role. This transformation exemplifies the success of the Catalyst's Accelerated Rapid Training Program. Rushmi Hasham elaborates on the program's design, which caters to mid-life career changers, providing a seven-month intensive course in collaboration with the SANS Institute. The program equips participants with hands-on skills, transitioning knowledge, and career development, ensuring they are job-ready upon completion.Additionally, the Catalyst's corporate training services include non-technical tabletop exercises to prepare executives for real-life cyber threats. They also offer a cyber range where clients can safely engage with live malware to elevate their technical response capabilities. This comprehensive approach is instrumental in addressing Canada's cybersecurity skills shortage and enhancing the nation's defensive posture. The episode concludes with an invitation to explore the Catalyst's investment initiatives aimed at fortifying cybersecurity innovations and talent development across Canada.Learn more about Rogers Cybersecure Catalyst: https://cybersecurecatalyst.ca/Note: This story contains promotional content. Learn more.Guests: Rushmi Hasham, Director of Strategic Partnerships, Rogers Cybersecure CatalystOn LinkedIn | https://www.linkedin.com/in/rushmi-hasham-9523554/Vasu Daggupaty, Manager, Partnerships & Investment, Rogers Cybersecure CatalystOn LinkedIn | https://www.linkedin.com/in/vdaggupaty/ResourcesLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Crucible - The JRTC Experience Podcast
076 S02 Ep 16 – Red Arrow Resilience and Lessons from the Les Terribles in Action at the JRTC w/MSG William Kocken

The Crucible - The JRTC Experience Podcast

Play Episode Listen Later Oct 23, 2024 38:42


The Joint Readiness Training Center is pleased to present the seventy-sixth episode to air on ‘The Crucible - The JRTC Experience.' Hosted by the Command Sergeant Major of Ops Group (CMOG), CSM Michael Hall. Today's guest is MSG William Kocken, which is the Operations Sergeant Major for 2nd Battalion, 127th Infantry Regiment.   The 2nd Battalion, 127th Infantry Regiment of the Red Arrow Brigade, 32nd Infantry Brigade Combat Team (IBCT) of the Wisconsin Army National Guard, has a distinguished history of service. Known for its long-standing tradition of excellence in both state and national missions, the battalion's motto, Les Terribles—meaning “The Terrible Ones”—reflects its fierce combat reputation earned during World War I. The Red Arrow Brigade, of which the 2-127th is a part, derives its name from its ability to pierce enemy lines during both world wars, symbolizing the unit's strength and perseverance. They have the Hollywood call-sign of “Black Hats” (the BCT's call-sign is “Red Arrow”), the nickname of “Wisconsin Volunteers,” and the brigade's motto of “Forward.”   In this episode we discuss the lessons learned at the battalion echelon for conducting large scale combat operations across multiple domains, particularly in logistics, communications, and standards of discipline. One of the key takeaways was the challenge of maintaining efficient communication across dispersed units, especially during large-scale combat operations (LSCO). Unlike Active Duty forces, the Army National Guard (ARNG) faces unique difficulties in ensuring smooth, real-time communication, which became a critical area for improvement. Additionally, the exercise exposed gaps in logistical sustainment, as ARNG units struggled with coordinating supplies, equipment, and personnel over extended operations. This highlighted the need for more robust logistical planning and the importance of developing a deeper understanding of how to sustain operations in high-intensity environments.   Best practices that emerged from the rotation included a renewed emphasis on “brilliance in the basics” and reinforcing standards and discipline. The importance of mastering fundamental soldiering skills, such as maintaining noise and light discipline, digging proper fighting positions, and ensuring basic field craft, became apparent. Leaders realized that gaps in these areas could have serious consequences in LSCO, where the margin for error is small. The exercise also demonstrated that success depends on rigorous preparation and adhering to the most basic tasks, which in turn allows units to perform better in more complex and dynamic scenarios. Commanders stressed the importance of repetitive training in these foundational areas to ensure that soldiers can respond effectively in high-pressure situations and adapt to modern battlefield demands.   Part of S02 “If I Would Have Only Known” series.   For additional information and insights from this episode, please check-out our Instagram page @the_jrtc_crucible_podcast   Be sure to follow us on social media to keep up with the latest warfighting TTPs learned through the crucible that is the Joint Readiness Training Center.   Follow us by going to: https://linktr.ee/jrtc and then selecting your preferred podcast format.   Again, we'd like to thank our guests for participating. Don't forget to like, subscribe, and review us wherever you listen or watch your podcasts — and be sure to stay tuned for more in the near future.   “The Crucible – The JRTC Experience” is a product of the Joint Readiness Training Center.

ITSPmagazine | Technology. Cybersecurity. Society
Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 22, 2024 7:08


In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today's fast-paced world. In closing, the emphasis on understanding one's maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.Note: This story contains promotional content. Learn more.Guest: Michael Mychalczuk, Director of Product Management at OpenText [@opentext]On LinkedIn | https://www.linkedin.com/in/michaelmychalczuk/ResourcesLearn more and catch more stories from OpenText: https://www.itspmagazine.com/directory/opentextLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Unveiling AI's Impact and Challenges at SECTOR 2024 | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Helen Oakley and Larry Pesce | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 10, 2024 22:44


Guests:Helen Oakley, Director of Secure Software Supply Chains and Secure Development, SAPOn LinkedIn | https://www.linkedin.com/in/helen-oakleyOn Twitter | https://x.com/e2hlnOn Instagram |https://instagram.com/e2hlnLarry Pesce, Product Security Research and Analysis Director, Finite State [@FiniteStateInc]On LinkedIn | https://www.linkedin.com/in/larrypesce/On Twitter | https://x.com/haxorthematrixOn Mastodon | https://infosec.exchange/@haxorthematrix____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesSean Martin and Marco Ciappelli kicked off their discussion by pondering the intricacies and potential pitfalls of the AI supply chain. Martin humorously questioned when Ciappelli last checked the entire supply chain of an AI session, provoking insightful thoughts about how people approach AI today.The conversation then shifted as Oakley and Pesce were introduced, with Oakley explaining her role in leading cybersecurity for the software supply chain at SAP and co-founding the AI Integrity and Safe Use Foundation. Pesce shared his expertise in product security research and pen testing, emphasizing the importance of securing AI integrations.Preventing the AI ApocalypseOne of the session's highlights was the discussion titled "AI Apocalypse Prevention 101." Oakley and Pesce shared insights into the potential risks of AI overtaking human roles and discussed ways to prevent a hypothetical AI apocalypse. Oakley humorously noted her experimentation with deep fakes and emphasized the importance of addressing the root causes to avert catastrophic outcomes.Pesce contributed by highlighting the need for a comprehensive Bill of Materials (BOM) for AI, pointing out how it differs from traditional software due to its unique reliance on multiple layers, including hardware and software components.AI BOM: A Tool for Understanding and ComplianceThe conversation evolved into a discussion about the AI BOM's significance. Oakley explained that the AI BOM serves as an ingredient list, akin to what you would find on packaged goods. It includes details about datasets, models, and energy consumption—critical for preventing decay or malicious behavior over time.Pesce noted the AI BOM's potential in guiding pen testing and compliance. He emphasized the challenges that companies face in keeping up with rapidly evolving AI technology, suggesting that AI BOM could potentially streamline compliance efforts.Engagement at the CISO Executive SummitThe speakers touched on SECTOR 2024's CISO Executive Summit, inviting senior leaders to join the conversation. Oakley highlighted the summit's role in providing a platform for addressing AI challenges and regulations. Martin and Ciappelli emphasized the value of attending such events for exchanging knowledge and ideas in a secure, collaborative environment.Conclusion: A Call to Be PreparedAs the episode wrapped up, Sean Martin extended an invitation to all interested in preventing an AI apocalypse to join the broader discussions at SECTOR 2024. Helen Oakley and Larry Pesce left listeners with a pressing reminder of the importance of understanding AI's potential impact.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:

ITSPmagazine | Technology. Cybersecurity. Society
A Sneak Peek into SecTor 2024: AI, Open-Source, and Cybersecurity Trends | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 9, 2024 23:55


Guest: Steve Wylie, Vice President, Cybersecurity PortfolioOn LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Black Hat SecTor Conference, scheduled for October 22-24, 2024, in Toronto, promises an array of discussions and insights into the cybersecurity domain. Steve Wylie, General Manager of Black Hat, joins ITSP Magazine's Sean Martin and Marco Ciappelli to preview the upcoming event. Wylie highlights the acquisition of SecTor by Black Hat in 2019, underscoring its unique focus on the Canadian cybersecurity community while maintaining global research standards.This year's event features three main components: summits, briefings, and a business hall. The summits, including a new AI summit, address various specialized topics, while the briefings provide in-depth research presentations. Keynote speakers like New York University's Omkhar Arasaratnam, who will discuss security in open-source platforms, further enrich the event. Arasaratnam's focus on the XZ Utils backdoor incident emphasizes the critical nature of open-source security, highlighting both risks and mitigation strategies.The agenda also includes a diverse range of sessions on AI, reflecting its significant role in current cybersecurity practices. Talks range from AI vulnerabilities to the protection and utilization of AI in enterprise security. Sessions such as "15 Ways to Break Your Co-Pilot" and discussions on deepfake image detection systems present real-world challenges and solutions in this area.Wylie also discusses the importance of community engagement, noting the sector's provisions for networking and collaboration. The founders of the original event continue to contribute actively, ensuring the event remains closely tied to its original mission of serving Canada's cybersecurity professionals. Martin expresses enthusiasm for meeting regional participants and learning about their unique challenges and solutions, emphasizing the value of shared knowledge and strategies. The event is positioned as a vital convergence point for both local and international cybersecurity insights and advancements.In summary, SecTor 2024 aims to foster a robust exchange of ideas and solutions, drawing from a wide array of expertise within the cybersecurity field. Attendees can look forward to engaging with high-profile speakers, participating in focused discussions, and exploring the latest industry innovations.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:

Becker Group C-Suite Reports Business of Private Equity
Black Hats, Scandals, Wars, and the Lost Art of Compromise 9-9-24

Becker Group C-Suite Reports Business of Private Equity

Play Episode Listen Later Sep 9, 2024 6:27


In this episode, Scott Becker delves into the complexities of global conflicts, scandals, and trade wars, emphasizing the need for a return to the lost art of compromise. From Russia-Ukraine tensions to U.S.-China trade relations, Scott explores how finding common ground is essential in navigating today’s challenges.

The CyberWire
Demo-lition derby: iVerify and Google clash over pixel app pitfalls.

The CyberWire

Play Episode Listen Later Aug 16, 2024 32:11


Google and iVerify clash over the security implications of an Android app. CISA has issued a warning about a critical vulnerability in SolarWinds Web Help Desk. Ransomware attacks targeting industrial sectors surge. Microsoft is rolling out mandatory MFA for Azure. Banshee Stealer is a new macOS-targeted malware developed by Russian threat actors. A popular flight tracking website exposes users' personal and professional information. San Francisco goes after websites generating deepfake nudes. Daniel Blackford, Director of Threat Research at Proofpoint, joins us to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states.  Scammers Use Google to Scam Google. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Daniel Blackford, Director of Threat Research at Proofpoint, joined us while he was out at Black Hat to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states.  Selected Reading Google to remove app from Pixel devices following claims that it made phones vulnerable (The Record) Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App (WIRED) SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day (SecurityWeek) Microsoft Mandates MFA for All Azure Sign-Ins (Infosecurity Magazine) New Banshee Stealer macOS Malware Priced at $3,000 Per Month (SecurityWeek) Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks (Industrial Cyber) CISA Releases Eleven Industrial Control Systems Advisories (CISA) FlightAware Exposed Pilots' and Users' Info (404 Media) AI-powered ‘undressing' websites are getting sued (The Verge) Dozens of Google products targeted by scammers via malicious search ads (Malwarebytes)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Daily Tech News Show
Black Hat 2024 Highlights - DTNS 4829

Daily Tech News Show

Play Episode Listen Later Aug 9, 2024 31:42


David Spark is here to give us the highlights from this year's Black Hat security conference. Plus Apple reveals a fee structure for apps that link to outside websites for purchase in the EU. And eVTOL air taxi startup Archer Aviation hopes to have its service up and running in Los Angeles by 2026.Starring Tom Merritt, Sarah Lane, David Spark, Roger Chang, Joe.Link to the Show Notes.

The CyberWire
The 18-year stowaway.

The CyberWire

Play Episode Listen Later Aug 9, 2024 29:14


Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports help unlock the truth. Rob Boyce of Accenture shares his thoughts live from Las Vegas at the Black Hat conference. These scammers messed with the wrong guy.  Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by podcast partner Rob Boyce of Accenture sharing his thoughts as our man on the street from the Black Hat USA 2024. Selected Reading ‘Sinkclose' Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections (WIRED) Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities (SecurityWeek) Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations (Cyber Security News) Microsoft: Iran makes late play to meddle in U.S. elections (CyberScoop) UN cybercrime treaty passes in unanimous vote (The Record) ADT confirms data breach after customer info leaked on hacking forum (Bleeping Computer) It's 2024 and we're just getting round to stopping browsers insecurely accessing 0.0.0.0 (The Register) Computer Crash Reports Are an Untapped Hacker Gold Mine (WIRED) USPS Text Scammers Duped His Wife, So He Hacked Their Operation (WIRED) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Cybersecurity leaders gear up for the ultimate test.

The CyberWire

Play Episode Listen Later Aug 8, 2024 33:02


Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the life of a calf and its mother. A look at job risk in the face of AI. In our Threat Vector segment, host David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. An alleged cybercrime rapper sees his Benjamins seized. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this Threat Vector segment, host David Moulton, Unit 42 Director of Thought Leadership, converses with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. They discuss the pressing challenges organizations face today and the pivotal shift from traditional defense strategies to a mindset that assumes breaches. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network.  Selected Reading US elections have never been more secure, says CISA chief (The Register) Black Hat USA 2024: vehicle head unit can spy on you, researchers reveal (Cybernews) AWS Patches Vulnerabilities Potentially Allowing Account Takeovers (SecurityWeek) Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say (TechCrunch) Exclusive: Massive Criminal Online Platform Disrupted (Court Watch) Web-Connected Industrial Control Systems Vulnerable to Attack (Security Boulevard) North Korea Kimsuky Launch Phishing Attacks on Universities (Infosecurity Magazine) Swiss cow and calf dead after ransomware attack on milking robot (Cybernews) AI Will Displace American Workers—When, How, and To What Extent Is Less Certain (Lawfare) Cybercrime Rapper Sues Bank over Fraud Investigation (Krebs on Security)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices