Podcasts about Black hat

  • 1,185PODCASTS
  • 2,966EPISODES
  • 49mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 19, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Black hat

Show all podcasts related to black hat

Latest podcast episodes about Black hat

POST Wrestling w/ John Pollock & Wai Ting
AEW Grand Slam Mexico 6/18/25 Review | RAD

POST Wrestling w/ John Pollock & Wai Ting

Play Episode Listen Later Jun 19, 2025 57:18


John Pollock & Wai Ting review AEW Grand Slam Mexico, a 2 1/2 -hour special event featuring MJF vs. Místico and The Death Riders & Young Bucks vs. Swerve, Ospreay & The Opps. 

POST Wrestling w/ John Pollock & Wai Ting
WWE Raw 6/16/25 Review | REWIND-A-RAW

POST Wrestling w/ John Pollock & Wai Ting

Play Episode Listen Later Jun 17, 2025 53:48


John Pollock and Wai Ting review WWE Raw with an unfortunate Liv Morgan injury, the return of Bill Goldberg, and the last opening round matches of the K/QOTR.Plus: Jey Uso vs. Bronson Reed vs. Sheamus vs. Rusev in the KOTR tournament, Asuka vs. Stephanie Vaquer vs. Raquel Rodriguez vs. Ivy Nile in the QOTR tournament, and Bayley calls out Becky Lynch. The XL Edition continues at POSTwrestlingCafe.com with News of the Day and Feedback, ad-free and timestamped. Today's stories:Jon Moxley & AEW sued over 2023 incident G1 Climax announcementsTripleMania Regia resultsFriday Night SmackDown ratings NXT & AEW Grand Slam Mexico lineups  POST Wrestling Café Schedule:Thursday: Book Club - Under the Black Hat by Jim RossSaturday: Collision Course FREE Shows:Tuesday: upNXTWednesday: Pollock & Thurston Wednesday: Rewind-A-Dynamite (XL in the Café)Friday: Rewind-A-SmackDown (XL in the Café)Photo Courtesy: WWE Rewind-A-Raw Theme by Colby John: https://soundcloud.com/colbyjohnBluesky: https://bsky.app/profile/postwrestling.comX: http://www.twitter.com/POSTwrestlingInstagram: http://www.instagram.com/POSTwrestlingFacebook: http://www.facebook.com/POSTwrestlingYouTube: http://www.youtube.com/POSTwrestlingSubscribe: https://postwrestling.com/subscribePatreon: http://postwrestlingcafe.comForum: https://forum.postwrestling.comDiscord: https://postwrestling.com/discordMerch: https://Chopped-Tees.com/POSTwrestlingOur Sponsors:* Check out Progressive: https://www.progressive.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Harold's Old Time Radio
Sleep No More 56-12-05 (04) Over the Hill - Man in the Black Hat

Harold's Old Time Radio

Play Episode Listen Later Jun 17, 2025 24:22


Sleep No More 56-12-05 (04) Over the Hill - Man in the Black Hat

Small Efforts - with Sean Sun and Andrew Askins
Black Hat deadline madness, AI-powered content tactics, and the auth provider dilemma

Small Efforts - with Sean Sun and Andrew Askins

Play Episode Listen Later Jun 12, 2025 44:22


Plastic Posse Podcast
Episode 118: Martin Kovac's New Façade Kit + Black Hat Scale Models + Inspiration & Overcoming Fear

Plastic Posse Podcast

Play Episode Listen Later Jun 11, 2025 159:20


Send us a textScott, TJ, and Grant fly a shortened route today as Jensen and JB are engaged elsewhere.We interview Stewart Rolfe, AKA Black Hat Scale Models and what an engaging conversation. Stewart talks to his motivations, his emphasis on traditional scratch building, and our mutual support for the Annual Model Officers' Mess 48 in 48 Event benefitting Model For Heroes.We also catch up with our Favorite Uncle, tearing him away from his latest project at the bench, and talk about his new Facade kit produced in conjunction with Faustus for RT Diorama. Martin gets into a lot of detail regarding the design and manufacturing of this new product, and hints that this might not be the only kit to be released...? We also discuss what Inspires us to initiate a project, to dive into something and pick that dusty model out of the stash and get going on it, and TJ leads us into a pep talk / discussion on overcoming fear and sharing our work with our peers, even at the best model shows in the world, and why this is a great idea! If you would like to become a Posse Outrider, and make a recurring monthly donation of $ 1 and up, visit us at www.patreon.com/plasticpossepodcast .Plastic Posse Podcast on Facebook: https://www.facebook.com/PlasticPossePlastic Posse Group on Facebook: https://www.facebook.com/groups/302255047706269Plastic Posse Podcast MERCH! : https://plastic-posse-podcast.creator-spring.com/Plastic Posse Podcast on YouTube:https://www.youtube.com/channel/UCP7O9C8b-rQx8JvxFKfG-KwOrion Paintworks (TJ): https://www.facebook.com/orionpaintworksJB-Closet Modeler (JB): https://www.facebook.com/closetmodelerThree Tens' Modelworks (Jensen): https://www.facebook.com/ThreeTensModelWorksRT Diorama: https://rt-diorama.de/Black Hat Scale Models YouTube: https://www.youtube.com/@BlackHatScaleModelsSPONSORS:Tankraft: https://tankraft.com/AK Interactive: https://ak-interactive.com/Tamiya USA: https://www.tamiyausa.com/Support the showSupport the show

Innovation in Compliance with Tom Fox
The Critical Importance of Mobile Application Security: Insights from Subho Halder

Innovation in Compliance with Tom Fox

Play Episode Listen Later Jun 10, 2025 27:59


Innovation comes in many areas, and compliance professionals need to not only be ready for it but also embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox visits Subho Halder, the CEO & Co-Founder of Appknox, to discuss the often-overlooked yet crucial topic of mobile application security in the corporate compliance world. Halder shares his extensive background in mobile app security, including developing the first mobile malware and presenting at prestigious conferences like Black Hat and DEF CON. The conversation covers the evolving market need for specialized mobile app security tools, the unique challenges faced by mobile applications compared to web applications, and the critical importance of integrating security early in the development lifecycle—a concept known as the ‘left shift' approach. Halder also explores AI-powered cyberattacks and how Appknox is utilizing AI to develop defensive strategies. The discussion highlights regulatory blind spots in the US regarding mobile security, the challenges of managing mobile app security in large multinational corporations, and best practices for ensuring robust mobile app security. Key highlights: Market Need and Opportunity for AppKnox Appknox Security Assessment of Perplexity's Android App Regulatory Blind Spots in US Cybersecurity Frameworks Engaging with Large Multinational Companies AI-Powered Cyber Attacks and Defensive Strategies Importance of the Left Shift Approach in Mobile App Security Resources: Subho Halder on LinkedIn Appknox Appknox Resources Page Appknox Blog: Is Perplexity AI Safe to Use? Security Flaws in the Android App Tom Fox Instagram Facebook YouTube Twitter LinkedIn

New Books in Economics
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Economics

Play Episode Listen Later Jun 1, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/economics

New Books Network
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books Network

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

New Books in Systems and Cybernetics
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Systems and Cybernetics

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/systems-and-cybernetics

New Books in Business, Management, and Marketing
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Business, Management, and Marketing

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices

New Books in Economic and Business History
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Economic and Business History

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices

New Books in Technology
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Technology

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/technology

False Start - College Football Podcast
Episode 179: Greg Sankey wears the black hat, Kirby Smart is big mad, Is Dan Lanning slipping?, What about the Matt Rhule pop year?

False Start - College Football Podcast

Play Episode Listen Later May 29, 2025 58:27


Reach out to Cody and Buhler to tell them what's up!Somebody has to be the villain of college football.For the time being, it is SEC commissioner Greg Sankey.By being willing to wear the black hat, it may keep us distracted from what is really going on.John Buhler (Lead Writer, FanSided.com) did his best to keep this wild and crazy episode of False Start on the tracks with Cody Williams (Content Director, FanSided.com) out and about doing alleged bachelor party things a few miles away from him in and around Atlanta.Buhler touched on Sankey, Kirby Smart being big mad over big money, Dan Lanning losing recruits and if the Matt Rhule pop year is going to happen in the middle of a cornfield.False Start is like a kernel, you never know when it is going to be popping off!

Autonomous IT
CISO IT – RSA 2025: Identity Is the New Threat Vector, E19

Autonomous IT

Play Episode Listen Later May 29, 2025 11:12


RSA 2025 revealed a shift: identity is now a primary threat vector in cloud security. In this episode, Jason Kikta breaks down the key takeaways from the conference—why identity has overtaken malware, how threat actors exploit service accounts and IDPs, and what this means for modern defense strategies. Plus, Jason shares observations on the evolving risk landscape and whether Black Hat will follow RSA's lead.Whether you're a CISO, CTO, or security architect, this episode is your briefing on where the industry is headed.

Darn IT Podcast
Confessions of a Hacker

Darn IT Podcast

Play Episode Listen Later May 23, 2025 17:55


What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. Join Darnley as he breaks it all down, asks the hard questions, and opens the floor to your thoughts. Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

Talking Billions with Bogumil Baranowski
Who You Can Trust? White Hat Capitalism: Dave Nadig on Finding Purpose in Finance

Talking Billions with Bogumil Baranowski

Play Episode Listen Later May 12, 2025 67:00


How a 30-year ETF veteran learned to prioritize human flourishing over profit maximizationGuest: Dave Nadig - 30-year veteran of the ETF industry, financial blogger, and advocate for pro-flourishing capitalismKey Moments:[03:13] Dave shares how his childhood on a farm shaped his financial mindset, developing a scarcity mentality from growing up poor that led him to finance and money management.[04:38] Dave explains his "Black Hat vs. White Hat" concept in finance - distinguishing between those who prioritize human flourishing (White Hats) versus those focused primarily on profit maximization (Black Hats).[07:01] Discussion of the Mad Magazine "Spy vs. Spy" cartoons as inspiration for his Black Hat/White Hat framework.[09:53] Dave emphasizes that people in the "Black Hat" business aren't necessarily evil, but have made different choices about their priorities.[15:50] Conversation about passive investing and its evolution from the 1980s through today, with Dave sharing his personal journey working at Wells Fargo on the first target date funds.[19:19] Dave reflects on becoming "a hard convert back to passive investing" after failing as an active fund manager.[20:14] Discussion of passive investing's impact on market dynamics, particularly how fund flows affect top equities and bond markets.[26:22] Examination of how capital formation now happens primarily in private markets, not public ones.[32:23] Dave shares his fascination with consciousness and the brain, discussing Dr. Ian McGillchrist's work on left brain/right brain dynamics.[34:47] Dave explores how meditation helps investors develop metacognitive awareness and recognize when their perception differs from reality.[38:39] Discussion of Dave's experiences at Zen Mountain Monastery and how meditation creates space to explore one's own thought processes.[44:52] Dave's emotional connection to flying, from childhood fascination to earning his pilot's license, and the devastating impact of losing it due to epilepsy.[53:49] Reflection on how most investors focus too much on narrow details while neglecting broader context and asset allocation decisions.[55:54] Dave shares how he uses AI tools like Perplexity to streamline research and Claude to assist with data analysis and coding tasks.[01:01:04] Discussion of how AI will continue to evolve, with the current state being "the worst it's ever going to be."[01:05:15] Dave's definition of success: having control over his own time rather than financial wealth.Podcast Program – Disclosure StatementBlue Infinitas Capital, LLC is a registered investment adviser and the opinions expressed by the Firm's employees and podcast guests on this show are their own and do not reflect the opinions of Blue Infinitas Capital, LLC. All statements and opinions expressed are based upon information considered reliable although it should not be relied upon as such. Any statements or opinions are subject to change without notice.Information presented is for educational purposes only and does not intend to make an offer or solicitation for the sale or purchase of any specific securities, investments, or investment strategies. Investments involve risk and unless otherwise stated, are not guaranteed.Information expressed does not take into account your specific situation or objectives, and is not intended as recommendations appropriate for any individual. Listeners are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance.

Risky Business News
Sponsored: What really goes down on Blackhat wifi networks

Risky Business News

Play Episode Listen Later May 11, 2025 15:35


In this Risky Bulletin sponsor interview James Pope, Director of Technical Enablement, talks to Tom Uren about his experience running networks and security centres at Black Hat conferences around the world. Pope talks about the challenges of running a SOC at a hacker conference, how conference networks around the world have a different character and talks about all the weird and wonderful security snafus he has found. Show notes

BarCode
Worldwide Security

BarCode

Play Episode Listen Later May 7, 2025 44:22


In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool's Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] -  https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world's largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.

Passwort - der Podcast von heise security
Security-News von ChoiceJacking bis Slopsquatting

Passwort - der Podcast von heise security

Play Episode Listen Later May 7, 2025 118:25


"Zumindest wird es nicht langweilig", könnte das April-Fazit aus IT-Security-Sicht lauten. Und den beiden "Passwort"-Hosts fällt es erneut leicht, spannende Sicherheitsgeschichten zu erzählen. Unter anderem geht es um eine neue Form der Supply-Chain-Attacke, die KI-Halluzinationen von Softwarebibliotheken ausnutzt. Aber auch eine trickreiche Umgehung der USB-Sperre von Mobilgeräten stellt Co-Host Christopher vor - und Sylvester ärgert sich über unvollständige Sicherheitsflicken beim Security-Appliance-Hersteller Fortinet. Einig sind sich beide allerdings wieder bei ihrem Dauerbrenner: Eine nun beschlossene Änderung in der WebPKI findet beider Beifall. - ChoiceJacking-Vortrag auf der BlackHat: https://i.blackhat.com/Asia-25/Asia-25-Draschbacher-Watch-Your-Phone.pdf - Offener Brief der EFF in der Causa Krebs: https://www.eff.org/press/releases/eff-leads-prominent-security-experts-urging-trump-administration-leave-chris-krebs - ckus (In-)Security Appliance Bingo: cku.gt/appbingo25 - Slopsquatting-Paper „We Have a Package for You“: https://arxiv.org/abs/2406.10279 - OpenCVE-Installationsanleitung: https://docs.opencve.io/deployment/ - Folgt uns im Fediverse: @christopherkunz@chaos.social @syt@social.heise.de Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

ITSPmagazine | Technology. Cybersecurity. Society
RSAC 2025 Coverage is done! It's a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 3, 2025 5:12


RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We're working on it.” That exchange captured the spirit of the entire event — security is not a destination, it's an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. ___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage___________KEYWORDSsean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference___________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

A Quality Interruption
#447 L'Amour's DEAD MAN (1995)

A Quality Interruption

Play Episode Listen Later Apr 14, 2025 71:48


EPISODE #447-- After much hooting and hollering, we are back on the podcastin' trail with Jim Jarmusch's seminal DEAD MAN (1995) starign Gary Farmer, Robert Mitchum, and that guy from Pirates of the Caribbean. You know the one. The one with the texts. Anyways, fun movie. An important movie. We also ramble about the Oscar-winning documentary NO OTHER LAND (2024) (now available to rent and stream), BROOKLYN (2015), Michael Mann's BLACKHAT (2015), and the legacy sequel BEVERLY HILLS COP: AXEL F (2024). A solid bunch of movies. A strange bunch of movies. Join the cause at Patreon.com/Quality. Follow the us on on Bluesky at kislingconnection and cruzflores, on Instagram @kislingwhatsit, and on Tiktok @kislingkino. You can watch Cruz and show favorite Alexis Simpson on You Tube in "They Live Together." Thanks to our artists Julius Tanag (http://www.juliustanag.com) and Sef Joosten (http://spexdoodles.tumblr.com). The theme music is "Eine Kleine Sheissemusik" by Drew Alexander. Also, I've got a newsletter, so maybe go check that one out, too. Listen to DRACULA: A RADIO PLAY on Apple Podcasts, at dracularadio.podbean.com, and at the Long Beach Playhouse at https://lbplayhouse.org/show/dracula And, as always, Support your local unions! UAW, SAG-AFTRA, and WGA strong and please leave us a review on iTunes or whatever podcatcher you listened to us on!

BarCode
DELTA K

BarCode

Play Episode Listen Later Apr 11, 2025 56:34


In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscussion also delves into thin calculus and the category theory of things, emphasizing the need for an external truth to build sound mathematical systems. In this conversation, the speakers delve into the concepts of agentic calculusand Delta K, exploring their implications for artificial general intelligence (AGI) and the future of the economy. They discuss the observer-dependent nature of reality and how different perspectives can lead to varied interpretations ofthe same phenomena. The conversation also touches on the potential of the agentic economy to revolutionize ownership and economic dynamics, as well as the philosophical implications of waveform collapse in quantum mechanics.Overall, the discussion highlights the need for a new understanding of cognitive processing and the role of agents in shaping future interactions and economies. TIMESTAMPS:00:00 - Introduction to the Guests and Their Expertise02:16 - Recent Developments in AI and Technology04:50 - Understanding Large Language Models10:53 - Delta K and Its Limitations16:24 - Thin Calculus and the Category Theory of Things19:19 - Understanding Agentic Calculus22:27 - Delta K and Its Implications for AGI28:59 - Cognitive Processing and States of Being36:09 - The Agentic Economy: A New Paradigm40:25 - Waveform Collapse and Delta K43:20 The Future of Agentic Interactions SYMLINKS:[LinkedIn - Charlie Northrup] - https://www.linkedin.com/in/charlie-northrup-1b73b051Charlie Northrup is a technology innovator at Neewer Sciences, contributing pioneering research in agentic AI systems, thing calculus, and distributed digital ecosystems. He shares updates and insights about his work on LinkedIn.[LinkedIn - Keenan Hale] - https://www.linkedin.com/in/keenandewayne/Keenan Hale is recognized for his interdisciplinary contributions bridging theoretical mathematics and cryptographic systems. He connects with others inthe AI and cryptography communities through LinkedIn and shares research updates and discussions.[LinkedIn - Mike Elkins] - https://www.linkedin.com/in/elkinsmike/Mike Elkins is the Chief Human and Information Security Officer at Banffist, actively involved in discussions about cybersecurity, digital transformation, and AI-driven enterprise operations. He also speaks at major conferences like BlackHat, RSA, and SecureWorld.

Coaching for Leaders
728: Lower Your Risk of Being Hacked, with Qasim Ijaz

Coaching for Leaders

Play Episode Listen Later Apr 7, 2025 39:26


Qasim Ijaz Qasim Ijaz is the director of cybersecurity at a leading healthcare organization, overseeing detection, incident response, vulnerability management, purple teaming, and cybersecurity engineering. With a strong background in offensive security and risk management, he has helped organizations strengthen their defenses against evolving threats. He is also a dedicated educator, mentoring professionals and sharing his expertise at conferences such as BSides and Black Hat. You don't need to go far in the news these days to find out that another organization was hacked. Data breeches are a nightmare scenario for both leaders and the people they support. In this episode, Qasim and I explore what your team and you can do to be a bit more prepared. Key Points Use multi-factor authentication, passphrases, and a password manager. Freeze your personal credit reports. Do this for free directly with Experian, Equifax, and TransUnion. Leaders in bigger roles (executives, CEOs, board members) are larger targets for hackers due to their access and also their ability to occasionally side-step organizational guidelines. It's the non-technical pieces of a cyber response that organizations are least prepared for. Conduct incident response and disaster recovery tabletop exercises to uncover vulnerabilities before an attack. Regardless of organizational policy, employees will use AI. The best prevention assumes the inevitability of human behavior and works with it to improve systems. Resources Mentioned Recommended password managers: 1Password, Apple password app, Proton Pass Critical Security Controls by the Center for Internet Security Resources for Small and Medium Businesses by the Cybersecurity & Infrastructure Security Agency 2024 Data Breach Investigations Report by Verizon Business Related Episodes Dumb Things Smart People Do With Money, with Jill Schlesinger (episode 396) Where to Start When Inheriting a Team in Crisis, with Lynn Perry Wooten (episode 603) How to Use AI to Think Better, with José Antonio Bowen (episode 689) Discover More Activate your free membership for full access to the entire library of interviews since 2011, searchable by topic. To accelerate your learning, uncover more inside Coaching for Leaders Plus.

Root Causes: A PKI and Security Podcast
Root Causes 476: The Need for Security KPIs

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Mar 10, 2025 16:34


Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.

UNSECURITY: Information Security Podcast
Unsecurity Episode 236: FRSecure Team Reflections w/ Mike Kongsjord

UNSECURITY: Information Security Podcast

Play Episode Listen Later Mar 5, 2025 42:50


In this lighthearted episode, Mike Kongsjord walks us through his professional journey and time at FRSecure as he and the group celebrate his retirement. Having an introduction to Evan Francen at his last position, Mike joined the FRSecure as an Information Security Consultant and has completed five years on the team. He reflects with Megan and Brad and discusses fun retirement plans.About FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Root Causes: A PKI and Security Podcast
Root Causes 473: Does Security Software Lack Creativity?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Feb 28, 2025 10:08


Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.

Junk Filter
TEASER - 201: Michael Mann: Blackhat (with James Slaymaker)

Junk Filter

Play Episode Listen Later Feb 21, 2025 5:18


Access this entire 70-minute episode (and additional monthly bonus shows) by becoming a Junk Filter patron for only $5.00 (US) a month! Over 30% of episodes are exclusively available to patrons of the show. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://www.patreon.com/posts/201-michael-mann-122785625James Slaymaker, the author of Time is Luck: The Cinema of Michael Mann, returns to the podcast for a show about Mann's much-maligned 2015 techno-thriller starring Chris Hemsworth as a blackhat hacker named Hathaway, granted release from prison by the FBI in a secret mission between American and Chinese police to track down the leader of an international cybercrime terror organization that is remotely manipulating the stock market to cause global chaos.Blackhat was a financial failure upon release that resulted in an eight year break between Mann's feature film works. James and I discuss the director's cut of the film (recently released on video) which addresses some of the theatrical cut's issues and James makes a case for the film as a misunderstood work that anticipated some of the next decade's concerns with technology and the real world consequences of living in a surveillance state, as Mann continues to explore the possibilities of digital cinema.Follow James Slaymaker on Twitter.James' book Time is Luck: The Cinema of Michael Mann, is now available in paperback and Kindle.Trailer #1 for Blackhat (Michael Mann, 2015)

UNSECURITY: Information Security Podcast
Unsecurity Episode 235: CMMC Updates w/ Scott Singer & Ryan Abraham

UNSECURITY: Information Security Podcast

Play Episode Listen Later Feb 19, 2025 38:05


With two guest features, Scott Singer from CyberNINES and FRSecure's own Security Information Consultant, Ryan Abraham, this week's episode focuses on CMMC's recent changes, enforcement, and compliance requirements.About FRSecure https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Cloud Security Podcast
Cloud Security Detection & Response Strategies That Actually Work

Cloud Security Podcast

Play Episode Listen Later Feb 4, 2025 57:58


We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives deep into: Why cloud security is NOT like on-prem – and how that affects incident response How attackers exploit APIs in seconds (yes, seconds—not hours!) The secret to building a cloud detection program that actually works The biggest detection blind spots in AWS, Azure, and multi-cloud environments What most SOC teams get WRONG about cloud security Guest Socials: ⁠⁠⁠⁠⁠⁠⁠Will's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠ If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠ AI Cybersecurity Podcast Questions asked: (00:00) Introduction (00:38) A bit about Will Bengtson (05:41) Is there more awareness of Incident Response in Cloud (07:05) Native Solutions for Incident Response in Cloud (08:40) Incident Response and Threat Detection in the Cloud (11:53) Getting started with Incident Response in Cloud (20:45) Maturity in Incident Response in Cloud (24:38) When to start doing Threat Hunting? (27:44) Threat hunting and detection in MultiCloud (31:09) Will talk about his BlackHat training with Rich Mogull (39:19) Secret Detection for Detection Capability (43:13) Building a career in Cloud Detection and Response (51:27) The Fun Section

ITSPmagazine | Technology. Cybersecurity. Society
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 4, 2025 11:39


ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.Key Industry EventsThe year's schedule includes cornerstone cybersecurity conferences such as RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.Expanding Coverage Beyond CybersecurityBeyond security-focused events, the team is covering NAMM 2025, a leading music and technology conference, and Legal Week in New York, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.Learn about Event Briefings: https://www.itspmagazine.com/event-coverage-briefingsLearn about the Event Coverage Sponsorship Bundle: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefingsHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliThis Episode's Sponsor: HITRUST: https://itspm.ag/itsphitwebResourcesThe Business Newsletter: https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-RSA Conference 2025: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageBlack Hat USA 2025: https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegasInfosecurity Europe 2025: https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverageAll of our planned On Location event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 4, 2025 11:39


ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.Key Industry EventsThe year's schedule includes cornerstone cybersecurity conferences such as RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.Expanding Coverage Beyond CybersecurityBeyond security-focused events, the team is covering NAMM 2025, a leading music and technology conference, and Legal Week in New York, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.Learn about Event Briefings: https://www.itspmagazine.com/event-coverage-briefingsLearn about the Event Coverage Sponsorship Bundle: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefingsHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliThis Episode's Sponsor: HITRUST: https://itspm.ag/itsphitwebResourcesThe Business Newsletter: https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-RSA Conference 2025: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageBlack Hat USA 2025: https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegasInfosecurity Europe 2025: https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverageAll of our planned On Location event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

UNSECURITY: Information Security Podcast
Unsecurity Episode 233: HERoic Hacks - Women in InfoSec w/ Tonya Barnes

UNSECURITY: Information Security Podcast

Play Episode Listen Later Jan 27, 2025 32:16


In this special Edition of Unsecurity, Key Account Manager Tonya Barnes speaks on the creation of HERoic Hacks, the infosec conference that empowers women in the field. About HERoic Hacks: Envisioned by Tonya, and supported by FRSecure, HERoic Hacks addresses the gap in representation by providing networking opportunities, expert speakers, and award recognition with notable infosec organizations and leaders! This year's HERoic Hacks will feature keynote speaker Connie Hiber, Director of Technology Governance at GreatClips! Interested in Sponsoring or Attending? 20% of sponsorship fees will support women-led organizations WiCys and MN Women in Tech! Visit the event page to register now and sign up to sponsor. Spots are limited!https://www.eventbrite.com/e/heroic-hacks-tickets-1083192711559?aff=oddtdtcreatorAbout FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Identity At The Center
#325 - Theorycrafting Modern Identity Architecture with Ian Glazer

Identity At The Center

Play Episode Listen Later Jan 13, 2025 69:17


Welcome to the Identity at the Center podcast! In this episode, hosts Jeff and Jim dive deep into modern identity architecture with guest Ian Glazer. They discuss topics such as the importance of policy, data orchestration, and the evolving landscape of identity and access management (IAM). Ian shares his thoughts on the future of IAM, the integration of various data sources, the role of events in IAM, and the potential for real-time identity solutions. They also touch on upcoming conferences, the European Identity and Cloud Conference 2025, and the significance of engaging with the identity community. Tune in for a thought-provoking discussion on the advancements and future directions of digital identity! Chapters 00:00 Introduction and Podcast Overview 00:11 Upcoming Plans and Challenges 01:03 Guest Invitation and Podcast Dynamics 03:31 Conference Announcements and Discounts 06:05 Welcoming the Guest: Ian Glazer 06:46 Fido Feud and Conference Experiences 16:29 Identity Market Trends and Innovations 19:19 Modern Identity Architectures 33:51 Identity First Security: A New Approach 34:50 Unified Data Tiers: Breaking Down Silos 36:14 Modern IAM: Opportunities and Challenges 37:02 Ephemeral Access and Zero Standing Privilege 39:18 Understanding Identity Data 41:30 Workforce Identity Data Platforms 47:14 Orchestration and Execution in IAM 51:09 Real-Time Event-Based Identity Systems 54:45 Future Directions and Community Engagement 59:03 Teaching and Sharing Knowledge 01:05:33 Closing Thoughts and Recommendations Connect with Ian: https://www.linkedin.com/in/iglazer/ Notional architecture for modern IAM: Part 3 of 4 (blog): https://weaveidentity.com/blog/notional-architecture-for-modern-iam/ 2025: The year we free our IAM data: https://weaveidentity.com/blog/2025-the-year-we-free-our-iam-data/ Learn more about Weave Identity: https://weaveidentity.com/ Digital Identity Advancement Foundation: https://digitalidadvancement.org/ Avoid the Noid! - https://en.wikipedia.org/wiki/The_Noid Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Ian Glazer, Weave Identity, Identity and Access Management, IAM, Modern Identity Architectures, Modern IAM, Data Tier, Events, Orchestration, Zero Trust, ZTNA, Shared Signals Framework, EIC, Gartner, Black Hat, RSA, Identibeer, Data Lake, OIDs, IANS

Fridays with Keenan's Cutting Edge
Civility and Professionalism with William Hagans

Fridays with Keenan's Cutting Edge

Play Episode Listen Later Jan 13, 2025 56:42


(This is a Replay)In our adversarial system, it can often be difficult to be civil and professional with the other side, especially if they are true Black Hats. Tune in to hear 2018 KTI Graduate and Texas attorney, William G. Hagans, share about how to keep the civility and professionalism in the courtroom. Contact William G. Hagans atPhone: (713) 222-2700Website: https://hagans.law/

@BEERISAC: CPS/ICS Security Podcast Playlist
Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 7, 2025 19:02


Podcast: PrOTect It All (LS 24 · TOP 10% what is this?)Episode: Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025Pub date: 2025-01-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHappy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems. He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/ With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together. Key Moments:  00:40 Resilience needs technology, people, and processes. 05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON. 09:01 Networking is crucial for career and growth. 11:42 Secure messaging suggests normal texting may be compromised. 16:04 Balance technical skills with essential soft skills. 17:11 Excellent professionals struggle in untrained management roles.   Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Affiliate Marketing Show
Episode 99 - Family Firsts, Lead Gen, Calls, Black Hat, Female Leadership (Featuring Karly Beachler - Founder of Bloom Calls)

The Affiliate Marketing Show

Play Episode Listen Later Dec 20, 2024 58:15


Josh Sebo (COO of OfferVault), Adam Young (CEO of Ringba), industry legend Harrison Gevirtz and special guest Karly Beachler (Founder of Bloom Calls) discuss: - Bloom Calls: The start of an empire - Family Firsts: 1st College Graduate & 1st Female Business Owner - 8+ Years in Lead Gen - Taking Campaigns Over Sea - How Black Hat Marketing better prepared Karly for White Hat - Being a female in a male dominated industry - Why Karly is pivoting into eCommerce, Lead forms & VSLs Follow Us: OfferVault: WEBSITE: https://www.offervault.com/ FACEBOOK: https://www.facebook.com/offervault INSTAGRAM: https://www.instagram.com/offervaultmarketing/ TWITTER: https://www.twitter.com/offervault LINKEDIN: https://www.linkedin.com/company/offer-vault/ Adam Young: RINGBA: https://www.ringba.com RINGBA's INNER CIRCLE: https://try.ringba.com/inner-circle/ FACEBOOK: https://www.facebook.com/ringba INSTAGRAM: https://www.instagram.com/adamyoung/ TWITTER: https://www.twitter.com/arbitrage LINKEDIN: https://www.linkedin.com/in/capitalist Harrison Gevirtz: INSTAGRAM: https://www.instagram.com/affiliate/ LINKEDIN: https://www.linkedin.com/in/harrisongevirtz/ Karly Beachler: BLOOM CALLS: https://www.bloomcalls.com/ INSTAGRAM: https://www.instagram.com/xbloomcalls/ LINKEDIN: https://www.linkedin.com/in/karly-beachler/

Cybercrime Magazine Podcast
Black Hat MEA 2024. Key Takeaways, Expert Insights & More. Jason Lau, CISO, Crypto.com.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 19, 2024 13:34


Black Hat MEA is one of the world's largest infosec events. This year's conference brought together global CISOs, elite ethical hackers & 14000+ visitors in Riyadh, Saudi Arabia. Jason Lau, CISO at Crypto.com, was in attendance. In this episode, he joins host David Braue to discuss his experience, sharing key takeaways and expert insights. Learn more about Black Hat MEA at https://blackhatmea.com. • For more on cybersecurity, visit us at https://cybersecurityventures.com

UNSECURITY: Information Security Podcast
Unsecurity Episode 230: What A CISO Wants for Christmas

UNSECURITY: Information Security Podcast

Play Episode Listen Later Dec 18, 2024 37:58


In this special holiday-themed episode, Gary Berger, Director of Information Security for Ogletree Deakins Law Firm, joins Megan to go over what a CISO wants for Christmas. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

OODAcast
Episode 124: The History and Future of Cyberwar with Matt Devost

OODAcast

Play Episode Listen Later Dec 17, 2024 61:34


In this episode of the OODAcast we turn the microphone over to Dr. Bilyana Lily, the world renowned cyber and geopolitical expert, who interviews OODA's CEO and co-founder Matt Devost. The session provides insights which can benefit any entrepreneur, board member, investor or cybersecurity practitioner. Bilyana reviews Matt's journey from a small-town in Vermont to becoming a global leader in cybersecurity, counterterrorism, and risk management and then dives into Matt's work founding groundbreaking companies like FusionX and the Terrorism Research Center, his insights into AI and cyber defense, and even his contributions to Hollywood films like Blackhat. Matt also explores the evolving hacker community, the future of augmented reality, and why exponential technological change will reshape our world. This is a must-watch for anyone interested in the nexus of technology, security, and innovation.

Risky Business
Risky Business #774 -- Cleo file transfer appliances under widespread attack

Risky Business

Play Episode Listen Later Dec 11, 2024 62:28


On this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Cleo file transfer products have a remote code exec, here we go again! Snowflake phases out password-based auth Chinese Sophos-exploit-dev company gets sanctioned Romania's election gets rolled back after Tiktok changed the outcome AMD's encrypted VM tech bamboozled by RAM with one extra address bit Some cool OpenWRT research And much, much more. This week's episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him! This episode is also available on Youtube. Show notes Cleo Software Actively Being Exploited in the Wild CVE-2024-50623 | Huntress Blue Yonder investigating data leak claim following ransomware attack | Cybersecurity Dive Snowflake to phase out single-factor authentication by late 2025 | Cybersecurity Dive Treasury Sanctions Cybersecurity Company Involved in Compromise of Firewall Products and Attempted Ransomware Attacks | U.S. Department of the Treasury Another teenage hacker charged as feds continue Scattered Spider crackdown | The Record from Recorded Future News Germany arrests suspected admin of country's largest criminal marketplace | The Record from Recorded Future News FCC, for first time, proposes cybersecurity rules tied to wiretapping law | CyberScoop Russian state hackers abuse Cloudflare services to spy on Ukrainian targets | The Record from Recorded Future News Cloudflare's pages.dev and workers.dev Domains Increasingly Abused for Romania annuls presidential election over alleged Russian interference | The Record from Recorded Future News EU demands TikTok 'freeze and preserve data' over alleged Russian interference in Romanian elections | The Record from Recorded Future News Research Note: Meta's Role in Romania's 2024 Presidential Election - CheckFirst Key electricity distributor in Romania warns of ‘cyber attack in progress' | The Record from Recorded Future News Backdoor slipped into popular code library, drains ~$155k from digital wallets - Ars Technica AMD's trusted execution environment blown wide open by new BadRAM attack - Ars Technica New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader – PT SWARM Telegram partners with child safety group to scan content for sexual abuse material Apple hit with $1.2B lawsuit after killing controversial CSAM-detecting tool - Ars Technica Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research How do I turn on the Do Not Track feature? | Firefox Help

UNSECURITY: Information Security Podcast
Unsecurity Episode 229: API Security w/ Baljeet Malhotra & Nicole Salazar

UNSECURITY: Information Security Podcast

Play Episode Listen Later Dec 9, 2024 43:52


This week, CEO, Nicole Salazar and Founder, Dr. Baljeet Malhotra of TeejLab join Megan and Brad to discuss all things Open Source and API Risk Management. Along with a brief review of Dr. Malhorta's background, the group discusses TeejLab's origins and discuss a new API workshop. About FRSecure https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 5, 2024 35:02


Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech [@InformaTechHQ] and General Manager at Black Hat [@BlackHatEvents]On LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesLondon as the Backdrop for Innovation and CultureThe conversation kicked off with reflections on London's vibrant mix of history, culture, and modernity. Marco captured it perfectly, noting the city's knack for staying on the cutting edge of fashion, music, and movement. Sean chimed in, describing the city as a destination where “cool kids” converge. It's this ever-evolving energy that makes London the ideal host for forward-thinking gatherings like Black Hat.Sean and Marco's admiration for the city wasn't just about its aesthetics but also its role in shaping global conversations. London is a place where the local meets the global, a theme that would resonate throughout their discussion.Black Hat's Expanding Global ReachSean and Marco highlighted the global nature of the cybersecurity community, emphasizing Black Hat's international presence. Marco pointed out how the event has grown beyond its Las Vegas origins, with thriving editions in Europe, Asia, the Middle East, and beyond. This expansion reflects not only a growing need for cybersecurity collaboration but also the importance of tailoring conversations to regional contexts.Sean observed how each edition of Black Hat carries a unique flavor, shaped by local cultures and challenges. He praised the effort to include regional experts on review boards, ensuring that the content resonates with specific audiences. From Riyadh to Toronto, this approach has made Black Hat a truly global force.Celebrating Local Voices in Global ConversationsOne of the key takeaways from the conversation was the importance of amplifying local voices in global discussions. Marco commended Black Hat's dedication to fostering a sense of ownership among local cybersecurity communities. Sean agreed, noting how local insights enrich the broader, boundaryless research presented at these events.The duo discussed the balance between global trends, like AI and supply chain security, and region-specific concerns, such as policy-driven discussions in Europe or industrial focus in Canada. This nuanced approach ensures that every Black Hat event feels relevant, impactful, and inclusive.Sean and Marco's Chemistry: Informal Yet InsightfulBeyond the topics, the conversation was marked by the easy rapport between Sean and Marco. They navigated seamlessly from cybersecurity strategy to the lighter moments, like teasing each other about wardrobe choices for London's chilly December weather. Marco's love for local cuisine even sparked a playful detour into Italian titles for hardware hacking sessions.It's this blend of professional insight and personal charm that makes their discussions so engaging. Whether they're debating the merits of AI sessions or reminiscing about hallway chats at past events, Sean and Marco bring an authenticity that keeps listeners coming back.Looking AheadAs the conversation wrapped up, Sean and Marco hinted at their plans to keep “Chats on the Road” moving forward. While they may not make it to every event, their commitment to bringing the community's stories to light remains steadfast. Whether you're attending Black Hat in person or following along from afar, Sean and Marco ensure that the spirit of innovation and collaboration is accessible to all.Stay tuned as they continue to explore the intersections of technology, culture, and community, one conversation at a time.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesLearn more about Black Hat Europe 2024: https://www.blackhat.com/eu-24/Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Hacker Valley Studio
Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss

Hacker Valley Studio

Play Episode Listen Later Nov 26, 2024 40:21


Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they're sharing firsthand how organizations can prepare for adversaries in the wild. Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity. Impactful Moments: 00:00 - Introduction 01:25 - You Deserve To Be Hacked 03:05 - Emulating criminal behavior: The hive structure 07:55 - Social engineering tactics that really work 20:16 - Physical breaches: Pentesting in action 24:09 - Past the firewall: Second- and third-layer testing 29:14 - Digital exploits and real-world vulnerabilities 35:24 - Why organizations hesitate to invest in red teams 37:33 - Building muscle memory for security   Links: Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/ Learn more about CovertSwarm here: https://covertswarm.com/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Why Your Podcast Isn't Growing: A Get More Listeners Podcast For Podcasters
#218 | A Black Hat Strategy For Getting More Reviews For Your Podcast (Plus 2 Podcast Growth Tips)

Why Your Podcast Isn't Growing: A Get More Listeners Podcast For Podcasters

Play Episode Listen Later Nov 25, 2024 12:16


How can you break through the noise when 44 pitches flood into every podcast daily?If you're frustrated by slow podcast growth, struggling to rank on Apple or Spotify, or yearning for more reviews, this episode delivers actionable strategies to transform your efforts into results.In this episode, you will:1) Stand Out with Smart Pitches: Learn how to craft guest pitches that get noticed and accepted.2) Boost Discoverability: Unlock the secret to ranking on page one for your niche.3) Gain More Reviews: Discover a clever "black hat" strategy to increase your reviews without annoying your audience.Ready to supercharge your podcast growth? Hit play now and start applying these game-changing strategies today!More From Get More Listeners:Grab your FREE personalized audit + a copy of our bestseller Podcast Marketing.Or Visit https://getmorelisteners.com/bookView Client Results & Case Studies Here.https://getmorelisteners.com/studentsuccessOr Visit getmorelisteners.com/studentsuccessGet More Listeners Recommendations:Looking for a new hosting platform with amazing analytics?Try Captivate: Get a FREE 7-day Trial Here.

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 19, 2024 1:53


Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

ITSPmagazine | Technology. Cybersecurity. Society
SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 18, 2024 2:02


SecTor, Canada's largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.Show highlights for 2024 included:● Keynotes: This year's event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.● Business Hall: This year's Business Hall showcased the latest products and technologies from more than 140 of the industry's leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-EventLearn more and catch more stories from SecTor Cybersecurity Conference Toronto 2024: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

The Common Sense Show
BLACK HAT MILITARY OPPOSING TRUMP'S WHITE MILITARY FOR CONTROL OF USA! SCOTTY SACHS

The Common Sense Show

Play Episode Listen Later Nov 14, 2024 54:50


BLACK HAT MILITARY OPPOSING TRUMP'S WHITE MILITARY FOR CONTROL OF USA! SCOTTY SACHS

ITSPmagazine | Technology. Cybersecurity. Society
A New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation withChristine Dewhurst and Dr. Thomas Lee | On Location Coverage

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 9, 2024 26:55


Guests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:

Becker Group C-Suite Reports Business of Private Equity
Black Hats, Scandals, Wars, and the Lost Art of Compromise 9-9-24

Becker Group C-Suite Reports Business of Private Equity

Play Episode Listen Later Sep 9, 2024 6:27


In this episode, Scott Becker delves into the complexities of global conflicts, scandals, and trade wars, emphasizing the need for a return to the lost art of compromise. From Russia-Ukraine tensions to U.S.-China trade relations, Scott explores how finding common ground is essential in navigating today’s challenges.