POPULARITY
Send us a textWhat does it take to write the books that build the backbone of the networking industry? In this energetic conversation with Jason Gooley, Technical Evangelist at Cisco and author of numerous certification guides, we dive into the fascinating world of technical education and the art of making complex networking concepts accessible to learners.Jason shares his remarkable journey from networking novice who once believed the myth that "CCIEs make more than the president" to becoming the author selected to take over the iconic CCNA certification guides from Wendell Odom after his 23-year, 10-edition legacy. The responsibility is enormous—with Cisco's Network Academy having certified 17 million professionals and aiming for another 25 million in the next decade, Jason's words will shape countless careers.We explore the delicate balance required when creating technical content: providing enough depth for certification success without overwhelming readers, adding engaging storytelling without sacrificing accuracy, and addressing varied audience backgrounds without assuming too much or too little prior knowledge. As Jason beautifully puts it, "When I write, it feels like I'm talking... like I'm explaining it to a specific person." This approach transforms what could be dry technical manuals—"paper cuts to the eyes"—into relatable learning experiences.For anyone working in technology, the episode offers valuable insights on continuous learning in a rapidly evolving field. Jason describes technology as "a train... the second you step on, you're moving with it." The key is simply starting somewhere: "Don't be afraid to get on the train. Just do 'hello world.' Get a Raspberry Pi. Use Alexa to turn off your lights." Whether you're pursuing certifications, teaching others, or creating educational content, this episode provides practical wisdom on making technical knowledge accessible, relevant, and engaging. Subscribe now for more conversations that bridge the gap between complex technology and human understanding.Connect with the Guest:@Jason_Gooley on Xhttps://www.linkedin.com/in/jgooley/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
On this week's episode, Dr. John Snyder hosts a former member of Christ Church New Albany, Josephine Rose. Josephine began coming to CCNA while she was in college. It was during her time in the fellowship there that God revealed Himself to her and rescued her. After graduation, she came down with a serious illness that forced her to move back in with her parents. Bedridden and anxious, she and her mother prayed for God to show her something useful she could do with her time. The next day, she opened her laptop and began blogging.From the simple act of sharing the realities of God that she was learning through her illness, Josephine was approached by numerous ministries to write for them. She accepted, and doors continued to be opened for her. Recently, LifeWay published a Bible study written for teenage girls focused on prayer. The title is Talking to God: A Bible Study on Prayer. The study is based upon the foundation of God's attributes and the Lord's Prayer. We pray the testimony of God's faithfulness to Josephine and the conversation between her and John encourage you to seek afresh a close communion with God as our Father. Show Notes: See Josephine's Blog: https://josephinedrose.com/ Talking to God: A Bible Study on Prayer - https://www.lifeway.com/en/product/talking-to-god-teen-girls-bible-study-book-P005847913 Want to listen to The Whole Counsel on the go? Subscribe to the podcast on your favorite podcast app: https://www.mediagratiae.org/podcasts You can get The Whole Counsel a day early on the Media Gratiae App: https://subsplash.com/mediagratiae/app
State lawmakers took it right down to the wire on some of the biggest issues of the 2025 legislative session, including immigration, artificial intelligence, labor unions, rights for transgender Coloradans and rideshare safety. While some are poised to become law, others crashed and burned in the final stretch. And a few made it over the finish line, but are likely headed to a veto at the hand of the governor. CPR's Bente Birkeland, KUNC's Lucas Brady Woods and The Colorado Sun's Jesse Paul come full circle on the various issues they discussed all session long, including policies that got settled earlier in the year, like the gun bills. We also check back in with the first-time lawmakers we met early in the session, and learn how things went for them, on the path from day one to day 120.Purplish is produced by CPR News and the Capitol News Alliance, a collaboration between KUNC News, Colorado Public Radio, Rocky Mountain PBS, and The Colorado Sun, and shared with Rocky Mountain Community Radio and other news organizations across the state. Funding for the Alliance is provided in part by the Corporation for Public Broadcasting.Purplish's producer is Stephanie Wolf. This episode was edited by Megan Verlee and sound designed and engineered by Shane Rumsey. Our theme music is by Brad Turner. Special thanks to CCNA editor Chas Sisk, who helped get the Alliance up and running and heads back home now that the regular legislative session has wrapped.
US Treasury Department sanctions Iranian national accused of running the Nemesis criminal marketplace. Hunters International threatens to leak data stolen from Tata Technologies. Apple challenges U.K.'s iCloud encryption backdoor order. UK competition regulator says no investigation into Microsoft's OpenAI partnership. Stealthy malware campaign targets the UAE's aviation and satellite industry. This week on our CertByte segment, N2K's Chris Hare is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam. And hackers hit the books. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. This week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam, 201-301, version 1.1 exam. Today's question comes from N2K's Cisco Certified Network Associate (CCNA 200-301) Practice Test. According to Cisco, the CCNA is the industry's most widely recognized and respected associate-level certification. To learn more about this and other related topics under this objective, please refer to the following resource: https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html Selected Reading Treasury sanctions Iranian national behind defunct Nemesis darknet marketplace (The Record) Ransomware Group Claims Attack on Tata Technologies (SecurityWeek) Apple is challenging U.K.'s iCloud encryption backdoor order (TechCrunch) UK's competition regulator says Microsoft's OpenAI partnership doesn't qualify for investigation (TechCrunch) Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware (Proofpoint) Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear (GuidePoint Security) Fake police call cryptocurrency investors to steal their funds (Bitdefender) Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (Bleeping Computer) Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement (CyberScoop) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This video is NOT sponsored by TCM Security and I DO NOT get any affiliate commission if you use the links in the video description to buy courses etc from TCM. Also, in the interest of transparency: Heath mentions in the video and in the linked article that references to TCM Security are marked as self-promotion. I love it that Heath is providing so much free training and low cost training to the community. Heath is very well known and respected in the cybersecurity community. I love that he is making so much content available for free via his YouTube channel and on his website. Watch his content on YouTube, take the free courses and also do you own research and make your own decisions about the training and references he mentions. There are so many options out there for free training - see my other videos for options like free training from Cisco and other providers. // Article / Blog REFERENCE // How to be an Ethical Hacker in 2025: https://tcm-sec.com/how-to-be-an-ethi... // YouTube Video REFERENCE // Real World Windows Pentest Tutorial (Demos of 5 Active Directory Hacks): • Real World Windows Pentest Tutorial (... Hacking Roadmap to Success: • Hacking Roadmap to Success: AMA with ... // TCM Security SOCIAL// YouTube (The Cyber Mentor): / thecybermentor LinkedIn : / tcm-security-inc Twitter : / tcmsecurity Discord: / discord Instagram: / tcmsecurity Facebook: / tcmsecure TikTok: / tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: / discord Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam's SOCIAL // LinkedIn: / heathadams // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. // MENU // 0:00 - Coming up 0:28 - Intro 01:44 - Foundational Skills 03:14 - Basic IT Skills & Courses 04:48 - TCM Security Courses 06:01 - Networking Skills & Courses 07:17 - CCNA or Network+ ? 08:20 - Linux Skills & Course 10:33 - Learning should be free 11:05 - Coding/Scripting Skills & Course 13:52 - Security Skills & Course 16:20 - Ethical Hacking Skills & Course 20:40 - Content on Youtube 21:40 - Building up your skill set as a junior hacker 23:07 - Active Directory 23:36 - Web and Mobile Application Hacking 29:23 - Wireless Hacking 30:23 - Certifications 35:04 - Privilege Escalation 36:46 - Will AI Take Our Jobs? 38:27 - What Hacking Path Should You Take? 40:03 - How to Connect with Heath 42:52 - Heath's Advice 44:32 - Outro
Discover how digital literacy paves the way for a successful IT support career. In this episode, captured during a recent CERTIFIED Academy training, we explore the importance of digital literacy skills with CERTIFIED Ambassador, Jessie Kalloo. Jessie Kalloo is a CTE Instructor and Program Approval Coordinator for the Information Technology programs at Thomas A. Edison Career and Technical Education High School located in Jamaica, Queens, New York. Jessie is also a Cisco Networking Academy Instructor Trainer for IT Essentials, CCNA, CCNA Security, and CCNA CyberOps covering areas throughout the United States. Being a product of CTE as a graduate of Thomas Edison High has provided him the opportunity to view teaching through a different lens. Through the various partnerships he has formed with the industry he is able to inspire, motivate and provide opportunities to his students that truly help them prepare for their future. The training he has done in and out of the classroom combined with his unique approach to teaching, has allowed for creative ways to spark the curiosity in students, helping them continuously challenge themselves to do better. Jessie shares how basic technical problem-solving, hardware and software knowledge, and strong communication skills are pivotal for IT support professionals. We discuss how digital literacy not only helps in adapting to new technologies but also in navigating diverse digital environments. A large percentage of IT professionals start their careers in IT support roles, and this episode offers valuable insights and practical advice to help you effectively support this career trajectory. Learn more about our IC3 Digital Literacy certification program here: https://certiport.pearsonvue.com/Certifications/IC3/Digital-Literacy-Certification/Overview. Connect with your fellow educators, like Jessie, in our CERTIFIED Educator Community here: https://www.linkedin.com/groups/8958289/. Don't miss your chance to register for our annual CERTIFIED Educator's Conference here: https://certified.certiport.com/.
Today's mashup episode recorded from the NMFTA Conference features two incredible guests, Piyush Panchal of IANA and Joe Ohr of NMFTA! Our guests focus on the critical data management practices necessary for securing sensitive information in the transport industry, the evolving cybersecurity threats facing critical infrastructure, the importance of comprehensive training, awareness programs for staff, and collaboration among industry players, and fostering greater cybersecurity awareness and testing protocols within the industry. This is another episode you shouldn't miss! About Piyush Panchal Piyush Panchal is the Assistant Vice President of Information Technology at the Intermodal Association of North America(IANA). He's been associated with IANA for about 15 years, and overall, he has 21+ years of IT experience in software development, system architecture, project management, and cloud infrastructure management. He led many IT projects, transformed legacy applications into modern architecture, consistently optimized IT operations, and elevated the technological landscape for IANA. He's recently tasked to oversee IANA's security landscape and elevate the overall security posture of IANA's IT infrastructure in the cloud. Visit IANA website at https://intermodal.org/. About Joe Ohr Joe Ohr has more than two decades of experience in technical operations, customer success management, customer support, and product support. Currently serving as the Chief Operating Officer for the National Motor Freight Traffic Association, Inc. (NMFTA)™, he plays a pivotal role in helping to advance the industry through digitization, classification, and cybersecurity. Prior to Ohr's role at NMFTA, he served as in numerous engineering and operations positions at Qualcomm and Eaton, and most recently held the position of Senior Vice President of Operations/Customer Experience at Omnitracs. Throughout his career, Ohr has provided strategic guidance, vision, and a roadmap for addressing long-term customer challenges. He has played a key role in accelerating revenue growth and has collaborated closely with IT, product, and engineering teams to foster stronger partnerships with strategic customers and peers. Additionally, Ohr has overseen post sales customer support and service teams, as well as operations, managing a workforce of over 400 individuals. He holds multiple certifications such as CCNA from Cisco and MCSE from Microsoft and earned his Bachelor of Science in Education from the Ohio State University. Due to his contributions to the industry, he earned a spot in the Inner Circle in 2015 and 2018 from Qualcomm and Omnitracs. To learn more about NMFTA's future events and what they do, visit https://nmfta.org/.
Joe Ohr and Joe Lynch discuss cyber threats and solutions in the supply chain. Joe Ohr is the Chief Operating Officer at The National Motor Freight Traffic Association (NMFTA), a nonprofit membership organization that represents the interests of less-than-truckload (LTL) carriers. Summary: Cyber Threats and Solutions in the Supply Chain Joe Ohr and Joe Lynch discuss cyber threats and solutions in the supply chain. Joe Ohr is the Chief Operating Officer at The National Motor Freight Traffic Association (NMFTA), a nonprofit membership organization that represents the interests of less-than-truckload (LTL) carriers. Joe and Joe discuss the critical role of cybersecurity in the supply chain, transportation, and logistics space. In our digital era, cyber threats like ransomware from organized, state-sponsored groups pose significant risks to global supply chains. With extensive connectivity across multi-tier supplier networks, stringent authentication, encryption, and zero-trust models are crucial for secure data sharing and mitigating vulnerabilities. The rise of cargo theft through cybersecurity loopholes demands robust countermeasures like two-factor authentication and restricted access controls. As cybersecurity becomes a necessity for critical industries, we explore strategies, predictions, API security, and securing legacy maintenance software. This information offers valuable insights for cybersecurity professionals. The NMFTA Cybersecurity Conference, happening October 27-29, 2024, is the premier event for trucking and supply chain cybersecurity professionals. Join industry leaders to discuss and learn about the latest threats, solutions, and best practices to protect North America's vital supply chain. #CybersecurityInLogistics #SupplyChainResilience #FightingRansomware About Joe Ohr Joe Ohr has more than two decades of experience in technical operations, customer success management, IT, customer support, and product support. Currently serving as the Chief Operating Officer for the National Motor Freight Traffic Association, Inc. (NMFTA)™, he plays a pivotal role in helping to advance the industry through digitization, classification, and cybersecurity. Prior to Ohr's role at NMFTA, he served as in numerous IT, engineering and operations positions at Qualcomm and Eaton, and most recently held the position of Senior Vice President of Operations/Customer Experience at Omnitracs. Throughout his career, Ohr has provided strategic guidance, vision, and a roadmap for addressing long-term customer challenges. He has played a key role in accelerating revenue growth and has collaborated closely with IT, product, and engineering teams to foster stronger partnerships with strategic customers and peers. Additionally, Ohr has overseen post sales customer support and service teams, as well as operations, managing a workforce of over 400 individuals. He holds multiple certifications such as CCNA from Cisco and MCSE from Microsoft and earned his Bachelor of Science in Education from the Ohio State University. Due to his contributions to the industry, he earned a spot in the Inner Circle in 2015 and 2018 from Qualcomm and Omnitracs. About NMFTA The National Motor Freight Traffic Association, Inc. (NMFTA™) is a non-profit membership organization headquartered in Alexandria, Virginia. It is the world's leading organization representing the interests of less-than-truckload (LTL) carriers. The association's membership is comprised of motor carriers operating in interstate, intrastate, and foreign commerce. NMFTA provides critical services to the industry in the form of classification standards, identification codes, digital operation standards, and support for cybersecurity within the industry. Key Takeaways: Cyber Threats and Solutions in the Supply Chain Insights into cyber threats and solutions in the supply chain industry NMFTA's role in promoting and advancing trucking through research, education, and lobbying Cybersecurity leader Joe Ohr's journey from teaching to IT and nonprofit cybersecurity Ransomware as a major cyber threat in transportation and logistics Increasing cybersecurity risks in global supply chains due to API connectivity Cargo theft risks through cybersecurity loopholes and mitigation strategies Cybersecurity becoming mandatory, with companies facing compliance challenges Timestamps (00:00:02) Cyber Threats and Solutions in Supply Chain (00:06:41) Continuing Business Operations After Cyber Attack (00:10:39) Joe Ohr's Background and Career Path (00:15:56) Ransomware Risks and Compliance Concerns (00:20:15) API Security and Deployment Challenges (00:24:51) Offshoring Considerations and Trimble Insight Conference (00:27:45) Cargo Theft and Cybersecurity Connections (00:33:40) NMFTA Cybersecurity Conference Overview (00:40:53) Data Sharing Concerns and Supply Chain Impacts (00:43:02) Compliance Mandates and Industry Expectations (00:46:38) Trimble Sponsorship and Conference Details (00:50:58) Closing Remarks on NMFTA Conference Learn More About Cyber Threats and Solutions in the Supply Chain Joe Ohr | Linkedin NMFTA | Linkedin NMFTA | Facebook NMFTA | Twitter/X NMFTA | Instagram NMFTA | YouTube Channel NMFTA NMFTA Cybersecurity Conference Simplifying the Complex: NMFC to Undergo Major Changes in 2025 with Keith Peterson | The Logistics of Logistics Episode Sponsor: Trimble Transportion 2024 Insight Tech Conference Revolutionizing the Road: Trimble's Tech Solutions with Kelly Williams | The Logistics of Logistics The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube
A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm // FREE Training // Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1): • Ethical Hacking in 15 Hours - 2023 Ed... Ethical Hacking in 12 Hours - Full Course - Learn to Hack: • Ethical Hacking in 12 Hours - Full Co... Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT: • Open-Source Intelligence (OSINT) in 5... // TCM Security SOCIAL// LinkedIn : / tcm-security-inc Twitter : / tcmsecurity YouTube (The Cyber Mentor): / thecybermentor Discord: / discord Instagram: / tcmsecurity Facebook: / tcmsecure TikTok: / tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: / discord Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam's SOCIAL // LinkedIn: / heathadams // YouTube Video REFERENCE // Real World Windows Pentest Tutorial (Demos of 5 Active Directory Hacks): • Real World Windows Pentest Tutorial (... My Entrepreneurial Journey – Episode 1: • My Entrepreneurial Journey - Episode ... // Books REFERENCE // They ask you Answer by Marcus Sheridan: US: https://amzn.to/4eVDFyv UK: https://amzn.to/45NKRIO 12 Months to $1 Million by Ryan Daniel Moran: US: https://amzn.to/3VLFwwY UK: https://amzn.to/4cEMOtb // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:32 - Introduction 01:08 - Certifications in TCM 06:06 - Exploring TCM Offerings 08:04 - Advanced Courses in TCM 09:29 - Red Team vs. Blue Team 10:14 - Video Learning vs. Reading 10:51 - Cloud Penetration Testing 12:06 - Hacking Certifications Roadmap 15:55 - Preparation Before PNPT 16:46 - Career Prospects with PNPT 17:31 - Degree vs. Certificate Requirements 19:37 - Job Opportunities without Certificates 21:21 - CCNA vs. Network+ 22:30 - Red Team Certificates for Blue Teaming 23:07 - Essential Skills for Penetration Testers 24:20 - Job Search Advice 27:09 - Relevance of Previous Job Skills 28:04 - Programming Skills Requirement 30:04 - AI in Cybersecurity 32:11 - Starting a Career in Cybersecurity 33:05 - Heath Adams' Journey 37:17 - Changing Your Life 38:25 - Achieving Work-Life Balance 41:01 - Job Opportunities in Cybersecurity 44:20 - Getting Started in Cybersecurity 45:24 - Entrepreneurial Journey 50:39 - Advice from Heath Adams 53:07 - Starting a Penetration Testing Company 54:36 - Importance of Social Media 55:25 - Courses on Starting a Cyber Business 56:24 - More Advice from Heath Adams 59:23 - Pricing Your Services 01:01:18 - Continuous Learning 01:03:07 - Realities of Cybersecurity 01:05:24 - Remote vs. In-Person Work 01:08:13 - Studying, Burnout, and Motivation 01:10:58 - Competing with Yourself 01:12:51 - Recommended Tools 01:15:38 - Debunking Cyber Myths 01:18:38 - How to Get in Touch 01:20:38 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #hack #hacker
In a compelling message titled "Forgive One Another" based on Ephesians 4:30-32, Pastor Rob Berk from CCNA explores the essence of forgiveness. He explains the WHO of forgiveness by examining who God is and who we are. He then addresses the WHY, emphasizing its importance and significance, and finally, he outlines the HOW, providing practical steps to embrace and practice forgiveness in our daily lives.
Discover the captivating journey of John Capobianco from the factory floor to the forefront of AI technology at Cisco on this episode of Cables2Clouds. John shares his inspiring path, detailing how his early fascination with technology and subsequent mastery of programming languages like Ansible and Python laid the groundwork for his current role in network automation and AI. Listen as he recounts his experience with early access to ChatGPT's API and discusses cutting-edge advancements in AI such as Retrieval-Augmented Generation (RAG) and the innovative Raptor approach.Join us as we navigate the intricate world of AI integration within network operations and the ongoing debate between cloud and on-premises solutions. Using Cisco's AI Security Assistant as a real-world example, we highlight how AI is transforming complex IT tasks into more manageable processes. From prompt engineering to the unpredictable nature of AI outputs, we tackle the challenges and opportunities that come with adopting new technologies, drawing enlightening parallels to the tech shifts of the past.Finally, we delve into the evolving role of security analysts in light of AI and automation, spotlighting Cisco's recent updates to the CCNA certification. Learn about the strategic importance of embedding AI knowledge early in an engineer's career and the safeguards necessary for handling sensitive data. We explore the implementation of Cisco's validated designs and the concept of a digital twin for networks, and share insights on fine-tuning AI models. Tune in to grasp how AI is poised to revolutionize network management, making operations more streamlined and elevating the role of IT professionals.Check out the Fortnightly Cloud Networking NewsVisit our website and subscribe: https://www.cables2clouds.com/Follow us on Twitter: https://twitter.com/cables2cloudsFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatjArt of Network Engineering (AONE): https://artofnetworkengineering.com
Beginning August 20, 2024, the CCNA exam topics will include Generative AI, Cloud Network Management, and Machine Learning. In this episode of “What's the Deal with?” Cisco Learning Network Community Manager Matt Saunders and Lead Technical Advocate Kareem Iskander discuss what the deal is with Cisco's decision to include AI in the CCNA, and the specific details of the exam topics that have changed. If you have a tech topic that you'd like Matt and Kareem to cover, please leave us a comment on this episode, or on the Cisco Learning Network: https://learningnetwork.cisco.com/s/podcasts
How can we protect ourselves from cybercrimes and online fraudulent activities as transportation professionals? Let's hear it from NMFTA's Joe Ohr and their mission in cybersecurity and freight digitalization! Today, we'll cover the need for cloud and API security, the unique risks faced by businesses in the industry, the importance of secure freight visibility, and more! About Joe Ohr Joe Ohr has more than two decades of experience in technical operations, customer success management, customer support, and product support. Currently serving as the Chief Operating Officer for the National Motor Freight Traffic Association, Inc. (NMFTA)™, he plays a pivotal role in helping to advance the industry through digitization, classification, and cybersecurity. Prior to Ohr's role at NMFTA, he served as in numerous engineering and operations positions at Qualcomm and Eaton, and most recently held the position of Senior Vice President of Operations/Customer Experience at Omnitracs. Throughout his career, Ohr has provided strategic guidance, vision, and a roadmap for addressing long-term customer challenges. He has played a key role in accelerating revenue growth and has collaborated closely with IT, product, and engineering teams to foster stronger partnerships with strategic customers and peers. Additionally, Ohr has overseen post sales customer support and service teams, as well as operations, managing a workforce of over 400 individuals. He holds multiple certifications such as CCNA from Cisco and MCSE from Microsoft and earned his Bachelor of Science in Education from the Ohio State University. Due to his contributions to the industry, he earned a spot in the Inner Circle in 2015 and 2018 from Qualcomm and Omnitracs. To learn more about NMFTA's future events and what they do, visit https://nmfta.org/.
The CCNA has a long history as an important certification for network engineers. While the CCST has been created by Cisco "below" the CCNA, or as a different starting point, many network engineers begin their career with the CCNA. Join Jason Gooley, Wendell Odom, Tom, and Russ as we discuss the most recent updates to the CCNA, the way updates to the program are changing, and Jason's and Wendell's updated book on the CCNA.
Infosec and Cyber Work hacks can help you pass Cisco's CCNA certification exam! But what if you think you're not ready to make that jump? What would it take for you to jump into the study of the CCNA with both feet? Infosec's CCNA boot camp instructor Wilfredo Lanz wants you to know that you can be ready to start the big learning a lot faster than you think, and tells us why some of his most entry-level students often do better on the test than their more established classmates. If the prospect of passing the CCNA on the first try got you fired up, well, that's the point! Keep the excitement coming, and check out today's Cyber Work Hack. 0:00 - Cisco's CCNA certification exam0:57 - Who enrolls in an Infosec CCNA boot camp2:50 - What should you know before studying for the CCNA?3:50 - What does a CCNA certified IT network professional do?6:42 - Ensuring you're ready to take on CCNA9:59 - How to gain networking experience11:39 - Become an IT and networking professional 12:50 - OutroLearn more about the CCNA: https://www.infosecinstitute.com/training/ccna/About InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Infosec and Cyber Work Hacks podcast want to help you pass the CCNA exam! So, for today's hack, let's talk boot camps. The CCNA is an intimidating exam, especially if you're trying to go it alone, just you and your self-study book. That's why I'd like to introduce you to Infosec's CCNA boot camp instructor, Wilfredo Lanz! He will explain what the Infosec 5-day CCNA boot camp is like, the learning and memorizing strategies you'll employ and how boot camp training can help you pass on the first try. Lanz helps his students with every networking question, and students who commit to those five intensive days will see significant results. 0:00 - What is a CCNA boot camp like? 1:40 - Boot camp training versus university6:37 - Do I need to bring anything to CCNA boot camp?7:23 - Take CCNA exam after boot camp8:25 - Advice for taking a CCNA boot camp9:46 - OutroAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Infosec and Cyber Work Hacks are here to help you pass the CCNA exam! For today's Hack, Wilfredo Lanz, Infosec bootcamp instructor in charge of Cisco's CCNA certification, walks us through four sample CCNA questions, walking through each answer and discounting the wrong ones with explanations, allowing you to reach the right answer in a logical and stress-free way. And the only way you're going to see it is by staying right here for this Cyber Work Hack! 0:00 - CCNA exam sample questions 1:31 - Different types of CCNA exam questions3:34 - First CCNA exam sample question 8:34 - Second CCNA exam sample question13:52 - Third CCNA exam sample question20:47 - Fourth CCNA exam sample question 25:22 - Infosec CCNA boot camp practice exam27:04 - Advice for CCNA exam day28:46 - OutroLearn more about the CCNA: https://www.infosecinstitute.com/training/ccna/About InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Naila brings you 21 articles from January 2024, on non-pharmacological approaches to the prevention and intervention of Alzheimer's disease. You'll be treated to research from computational modeling, to rodent models, to clinical trials, with a particular focus on optimizing and personalizing intervention strategies. This episode also covers some research on the role of caregivers, and several papers consider the socioeconomic and ethnographic context in which these studies take place. Let's get to it! Stimulation Techniques (7)Exercise (3)Cognitive Training (2) Art Therapy and Dyad Interventions (4)Lifestyle Interventions and Prevention (5)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1-NvZsr9qousOnp51vDbtMxX4RQe7Elrd/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Naila Kuhlmann, edited by Isabelle Vaux, and reviewed by Anusha Kamesh. The bibliography and wordcloud were created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2024, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann, Yonjoon Shin, Ali Mithani, and Ben Cornish. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Join Christy for 12 papers from January 2024 on structural neuroimaging in the diagnosis of Alzheimer's disease. This episode is a bit different from past ones because it's all about the use of machine learning and deep learning. Whether you're an AI researcher or simply curious about the topic, you won't want to miss this episode. Detecting AD (3:42) Predictions, associations or comparisons (16:48)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1A4HZVCtgh5AwZkd5V2ATZSFAxGJt48q3/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Christy Yu, edited by Michelle Grover, and reviewed by Anusha Kamesh. The bibliography and wordcloud were created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2024, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann, Yonjoon Shin, Ali Mithani, and Ben Cornish. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Infosec and Cyber Work Hacks want you to pass the Cisco CCNA exam! To help you do that, Infosec's CCNA Boot Camp instructor Wilfredo Lanz gives you his top tips and tricks for taking the CCNA exam! Lanz will give you some advice for narrowing down the right answer by eliminating the obviously wrong ones, common mistakes people make while taking the exam and what to do if, for some reason, you don't pass on the first try. And most importantly, why you must take the practice exams before the test. And then retake them. And again! 0:00 - CCNA exam tips 1:43 - What does the CCNA cover? 4:50 - Tricks for taking the CCNA exam 5:55 - Common CCNA exam mistakes 7:17 - What if you fail the CCNA exam? 8:40 - Best piece of advice for CCNA exam day 9:53 - Outro About Infosec Infosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Another series of AMiNDR kicks off with this episode. Anusha takes you through 7 papers published in January 2024 targeting neuroprotection in AD. If you'd like to hear about potential compounds that could reduce neurodegeneration in Alzheimer's disease, this is the episode for you.Testing for neuroprotection in cell lines (2:57)Testing for neuroprotection using in vivo AD models (11:47)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1A4HZVCtgh5AwZkd5V2ATZSFAxGJt48q3/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Anusha Kamesh, edited by Scott Prins, and reviewed by Naila Kuhlmann. The bibliography and wordcloud were created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2024, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann, Yonjoon Shin, Ali Mithani, and Ben Cornish. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
How might we create the conditions and spaces for learning to be wild? Or maybe we need to un-create them for wildness?I speak to Jennifer D. Klein and Jill Ackers-Clayton. Jennifer has a broad background in global education and global partnership development, student-centered curricular strategies, diversity and inclusivity work, authentic assessment, and experiential, inquiry-driven learning. She has facilitated workshops in English and Spanish on four continents, providing strategies for high-quality, globally connected project-based learning in all cultural and socioeconomic contexts, with an emphasis on amplifying student voice and shifting school culture to support such practices. Jennifer has worked with organizations such as the Buck Institute for Education, the Center for Global Education at the Asia Society, The Institute for International Education, Fulbright Japan, What School Could Be, the Centre for Global Education, TakingITGlobal, and the World Leadership School, to name a few. Jennifer's first book, The Global Education Guidebook: Humanizing K–12 Classrooms Worldwide Through Equitable Partnerships, was published in 2017, and her second book, The Landscape Model of Learning: Designing Student-Centered Experiences for Cognitive and Cultural Inclusion, was released in 2022.Jill is an influential educator with nearly three decades of experience across a broad spectrum of the educational sector. Her journey began as a mathematics teacher, evolving into a technology expert after achieving her CCNA & MCSE certifications in Denver, Colorado. Her skills in managing school networks and teaching K-8 technology led her to significant roles in educational leadership. Her publication, "Developing Natural Curiosity through Project-Based Learning: Five Strategies for the PreK-3 Classroom," highlights her dedication to innovative education. As the Director of Education at VS America, her current role focuses on transforming learning environments, a crucial aspect of impacting student lives daily. This role involves collaborating with architectural firms, interior designers, and furniture vendors globally to create adaptable, flexible, and dynamic learning spaces.We discuss:
Are you ready to become a Cisco-certified networking expert? Learn how to prepare for the CCNA exam and ace it with tips from CBT Nuggets. Get ready to take your networking career to the next level with this must-watch video! #Cisco #CCNA #CBTNuggets #Networking #CertificationsGain access to the new CCNA: https://cbt.gg/powered-by-adept Sign up for a free week of CBT Nuggets training:https://cbt.gg/free-week Resource: How to study for the CCNA by Mayhttps://cbt.gg/ccna-5-months List of all new courses (created in the Adept training platform)https://cbt.gg/new-coursesThe Code of Entry PodcastThe Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the...Listen on: Apple Podcasts SpotifySupport the show
http://convocourses.net https://www.youtube.com/live/Wu1DHW3VueA?si=DJqI_DDxphFRDOGK ### Introduction - Brief introduction of Bruce, his background in cybersecurity, and the purpose of Convo Courses. ### Personal Journey in Cybersecurity - Bruce's initial fascination with cybersecurity and IT. - Transition from passion to profession. - Reflections on career longevity and personal growth. ### Career Development and Financial Planning - The importance of planning beyond the day-to-day job. - Strategies for using income to build passive income streams. - Real estate and publishing as examples of passive income sources. ### Advice for Aspiring IT and Cybersecurity Professionals - Encouragement for newcomers to consider their long-term career goals. - Importance of financial planning and investment in passive income. ### Networking and Mentorship - The value of meeting people who have successfully exited the "rat race." - Insights from mentors on building financial independence through passive income. ### The Evolving Landscape of IT and Cybersecurity - Discussion on the impact of AI and technological advancements. - Personal experiences and perspectives on the changing nature of IT work. ### Corporate Experiences and Personal Growth - Anecdotes from Bruce's time in the corporate world. - Learning from challenges and using them to pivot towards entrepreneurship. ### Entrepreneurial Ventures and Lessons Learned - Experiences with blogging and creating online content. - The significance of perseverance, experimentation, and learning from failure. ### Engaging with the Audience - Q&A session with viewers. - Advice on career choices, technical skills, and job market insights. ### Cybersecurity Certifications and Career Tips - Discussion on CISSP certification and its value. - Tips for gaining experience and standing out in the cybersecurity field. ### Closing Thoughts - Summarization of key points discussed. - Encouragement for viewers to think big and plan for the future. - Invitation for topic suggestions for future discussions. This format aims to capture the essence of Bruce's dialogue, providing clear sections that can be easily expanded upon with more detailed bullet points or narrative descriptions as needed. Each section would be designed to offer actionable insights, drawing from Bruce's extensive experience and personal journey within the field of cybersecurity and beyond. Hey guys, this is Bruce and welcome to Convo Courses. Every week I do this and I'm talking about cyber security from a GRC perspective. I'm an insider. I've been doing cyber security for a very long time and normally I do this at one Mountain Standard time, but I had some business to do and as promised, I'm back. I'm a bit late because I had some stuff I had to take care of. What I wanted to talk about is what I do. When I first got into cybersecurity IT, I just did it because it was cool. It was fun. It was amazing. It's like magic to me. It's so amazing how it all works together and stuff. And as I've gotten older, it's just become a job. I'm not saying that that's bad or anything. It just is what it is. I've been doing it a very long time and now it's to the point where I got to think about, okay, where am I going with this? What's the end goal? What do I want to accomplish at the end of the road when this is all said and done? What do I want to leave to my family? When am I going to stop? So I've been thinking about that for quite some time, not just thinking about it, but doing something about it. And what I've been doing is using the income, my salary, my high salary to build passive income streams. And there's many, many things you can do for passive income. I just started doing something that worked for me and something that was more in my lane, which is like publishing and in real estate. So those are the things that I mainly focus on with my income. And it's just I guess I wanted to talk about it because it's important to think about where you want to go with this. Like if you're trying to get into cybersecurity, if you're trying to get if you just started IT or you want to get into it, you're a college student, you're in high school, whatever the case may be. And you're thinking, man, you know, IT is cool or I want to do it. It's a lot of jobs. They get paid a lot of money. It's job security, blah, blah, blah. At some point, maybe not today, maybe not tomorrow, but at some point in your career, you're going to have to think about where do I want this to go? What's the end goal? Am I just going to work a nine to five until I retire? What am I trying to do with this? And so that's what I've had to think about for the last 10 years. not just thinking about it but doing something about it so I just started trying different businesses I would use some of the income that I have to try different things and some of them worked and some of them didn't work sometimes it worked but it wasn't for me you know but the thing is you got to keep trying and failing just fail forward keep on trying different things um What's amazing is the people I've met. I've met some really amazing people who've done it all kinds of ways, all kinds of creative ways to get out of the rat race, meaning get out of the struggle. They don't struggle anymore with finances. They don't struggle with the treadmill of capitalism. They have mastered it. They have mastered it. And all the people who have mastered it all have passive income streams, I've noticed. They don't have to have a job. And I've met people who did it with real estate in different ways by either flipping houses or doing Airbnbs or doing tax liens, just doing rentals, regular rentals. I've met people doing property management. So there's many, many ways to do just real estate. And then I've met people who did, what do you call them? Homes for the elderly. I met people who just saved and put away a bunch of money in stocks and are going to be wealthy that way or are wealthy that way. I've met some people who did a combination of those things. I've met Just all kinds of people who did it their way. They were creative. One thing they all have in common is they have enough income to where they don't have to work a nine to five anymore if they don't want to. Some of them, they still work a nine to five because they're still like building a nest egg. And some of them, they have like a business and they like working that business. They like actually being there and working the business and all that kind of stuff. So seeing that these people kind of became like mentors to me. I would follow what they did. I would, I would ask them questions about what, how did they do it? What, what, what did they do? And all of them had to invest their own money or time to get to a point where to get to a point where they, their, their time was so valuable that they, that they didn't, It was more valuable for them to spend time on their business than their time at their job. So that's one thing I've noticed about a lot of them. And it's just something you should think about. And another thing is one of the reasons why you should consider doing IT and cybersecurity and progressing is that once you get to a certain income level, Obviously, your life changes. But one thing that happens is you have this surplus of income and you you've got to think about what you want to do with it. You have this little bit. It could be like an extra thousand. You like all your bills are paid. You know, you groceries are done like you. You're good. Right. You could probably even loan people money or whatever. Give people money, whatever. But you still have this extra cash. And so you got to think about, okay, what do I want to do with this money? And I would suggest that you invested in some kind of passive method of passive income. It doesn't have to be what I'm doing. It should be something that you find that works for you. And so that is a great reason to get into IT and cybersecurity because it's a high paying job. It's They're always going to need somebody doing IT. I know there's all these fears about LLMs and artificial intelligence and all that kind of stuff, but I would say that it's going to be more of a threat to not know it than to think it's going to just take all jobs. There's still... I don't think it's going to take all jobs. I think that's... hyperbole. I think it's just, we don't really know what's going to happen with it, right? One thing for sure that we know is it's going to change humanity. That's for sure. That's probably more scary. I'm surprised more people don't talk about that. What's more scary about AI is it's going to change us, just like this phone did, just like the internet did. It's changed us. We're no longer the same. We're not the same species that we were hundreds Before the internet, we're not the same. We're rapidly changing into something else. And I don't know what the hell that is, but we are not the same species that we were before. And AI is gonna speed up that process. We are gonna be different. And people keep talking about jobs. We have way more stuff to worry about than jobs. Way more stuff to worry about than jobs. It's gonna change us fundamentally as a species. And I don't know where that leads us to, but jobs is the least of our worries. That said, while we still have this thing going on, get into I.T., get into cybersecurity. You'll have all this extra income and it allows you to have a more freedom to build something that you for yourself and for your family. I'm somebody who comes from very humble beginnings, like I came from nothing and. I can tell you there's different stages and levels to this. When I first started out, like as a kid, we're struggling to survive. And so you're not thinking about necessarily, it's not real to you. $100,000 a year is not real. When you're struggling poor, it's just, it's delusional. I didn't know anybody who made 100,000 or maybe I did, but I didn't know that they made 100,000. I didn't have any friends that I knew made 100,000. It wasn't real. So it just didn't seem real at that level. It didn't seem real. And then once I started making my own income, I started meeting, my network changed. I started meeting other people who are also doing their own thing, other young people who are also doing their own thing, living their own life, doing their own thing. And I started running with that crowd. And then I started meeting older heads who are already doing, real estate and business and stuff they were talking a lot about it and I'd be like what is what what's this you're talking about this is while still in the military I got out of the military and I thought when I got out that I was going to get a corporate job make like 80 and and be cool and then just retire with that one corporation little that I know that corporations don't give don't care so much about humans. They care about the bottom line. They care about their money. So they're not really trying to take care of people. Maybe 50 years ago, they used to do that. But that's no longer the case. And I'm not trying to discourage you from going to a company. Yeah, by all means, do it. But just realize it's a stepping stone. And that's what I realize is that you're not going to stick with one company. Not anymore. Like I said, maybe 50 years ago. It's just very different now. And I got into the corporate world. I think the thing that turned me around with corporations, the thing that made me not lose hope, but think of them differently and see the reality of what was really going on is that one time my my wife at the time got really sick um she had like a pulmonary embolism or something like in her leg I mean she had like something in her leg like she had to go to uh the doctor she was out in the hospital for like three days and I asked I had just gotten hired and I asked the company I said You know, is it okay if I, I just bought a house, you know, we just moved in and we had a little baby and I said, hey, I know you guys just hired me, but can I get three days off because I need to take care of my kid. I don't have anybody here. I just moved to the state. And they were just like, well, we can't do it. It's against company policy. And it was some kind of politics that they were playing. My immediate supervisor basically wouldn't allow me to do it. It's just weird. And I'm just like, what? And it just dawned on me, these people do not give a damn about me. They really don't care. And I was like, well, why should I care about them? If they don't care about me or my family, then why am I sacrificing myself I'll do anything for these guys. I'm like, so I'm a fool. And after that, you know, it just, I just realized, man, I got to do something else. I'm not going to quit my job, but I got to figure something else out. Because if this is how it's going to be, I got to do something else, right? Because while I'm in the military, military take care of you. Military, like you have a brotherhood. If you stay with the military, you stay 20 years, they're going to give you retirement. It's not like that on the outside. And I, it just, it was a hard lesson to learn. And I said, okay, you know what, what I'm going to do is I'm going to start a business. That was the first time I was like, I'm going to start a business. And, um, the first business I did this now, this is crazy. First thing I did was blog. I made a blog and, um, it was back when blog could make a blog can make money. I mean, it could still could, but this was like, right. The early stages of blogs where blogs were brand new and people were making all this money off of blogs. And I started this blog and it got pretty popular, but now before it got popular, I remember I made 10 cents and I was super excited. I was like, I made 10 cents, you know, after writing a few articles or whatever. And the only reason I was happy is because I realized if I can make 10 cents, I can make a dollar. If I can make a dollar, I can make $10. If I can make $10, I can make a hundred dollars a day. If I can make a hundred dollars a day, you know what I mean? And that was true. what happened was the blog got really popular and it ended up landing me my first hundred thousand dollar job and allowed me to publish my first, uh, the first thing I published was like for a, it was like a pamphlet, uh, for this company. And, uh, they had me go around the world and teach, teach from this pamphlet that I wrote. And I made a little over a hundred thousand for the first time. So that blog, And one time I wrote an article, it went viral. It was making like $100 a day for a while, which at the time was crazy. And I don't know. It just opened my eyes. You never know what's going to work. So you should just try different things. And I've tried a lot of stuff, man. I've tried stuff that absolutely did not work. But I've tried things that really did work. And that's what you got to do. Just try different things. All right, I got some questions here. Thank you guys for watching. I appreciate it. Kind of a different flow right now. I just want to have you guys think a little bit bigger, especially if this is your goals. If you're trying to do IT, if this is what you're trying to do, start thinking about your future, what you want for your family far in the future, and what you can do. Somebody asked me or said, would you recommend starting at a big tech company or a small non-tech with higher pay long term. Think of it differently. What you want, the ideal job is one where you have a little bit of extra time. Like they're not, what do I mean by that? So what I'm trying to say is, I would take a little less pay to have a little bit more uh, a less stress personally. Um, but you could also go for high pay that will allow you to take some of that pay and re either reinvest it into a 401k, buy stocks, uh, buy bonds. If that's what you're into, um, play around with, with, uh, swing trading. If that's what you're into, try, try different things. You could use, if you make a, if you go to a big company and they pay you a whole bunch of money, um, or a small company and they pay you a whole bunch of money, use some of that money to invest it in. Try things, real estate, try stocks, try business, try different things. Use it as a stepping stone. As far as which one would I try, you said non-technical with higher pay or big tech. I'm just going to tell you from my experience. Smaller companies are more... There's more like a person to person feeling with smaller companies. I've worked from for literally like a two man company all the way up to multibillion dollar companies and international multibillion dollar companies and for the government. And I can tell you some of the best experiences I had was with smaller companies. And maybe this is just anecdotal, like maybe it's just my experience and maybe it's different for everybody. But in all the small companies I worked for, it was more one-on-one. I was a person. I wasn't just a number. At the large companies, I was just a number. I might have had a real good team and everything, but at the end of the day, they can replace you in a heartbeat. And because of that, they don't really value the person as much as they used to. But smaller companies, they really took their time to develop each person. And I really miss that feeling of being on this team. And with that said, when you're in a small company, it's kind of like you're in a big ocean being kind of rocked by all the market By the market that's happening, you know, whereas when you're in a big ass company, it's like you're on an ocean liner and the economy is rocking. But the boat is just going like this, you know, it's kind of wavering a bit. You're not being tossed on the sea by the economy or whatever's happening, market forces or whatever. So there's tradeoffs for different things. At the end of the day, it depends on what you want to do. Just think long term, like think big, think your entire lifespan and what you want. for yourself and for your kids and for your kids' kids. When it's all said and done, when you are nothing more than a memory, you want to have a look back and create some sort of legacy. This is one stepping stone in a long line of steps you're going to take. So just think of it. Think big is what I would say to make your decision. And that way, when you do make a decision, it'll mean something. It'll be one step in the right direction that you're going. So I hope that helps. I'm just telling you my experience with small companies and big companies and all that kind of stuff. If you went for the big money, non-tech big money, you can use that money to invest it and do what you want. And the big companies got a little bit more of... What feels like security and maybe have a little bit more time on your hands to mess around and you can use that time to tinker and mess with something else. Probably the money is what I would take, to be honest with you. Let me see. Forty Rock says a four rock says. Is IT cybersecurity still hiring? I have three years of technical support and two years of SQL development. I've been unemployed since November and I cannot get a help desk position. Open up what you're willing to take for Rock. What I would recommend is possibly going back into SQL development, be open to that, be open to technical support. um lean on your skills um a lot of times I'll give you an example of one time there was a time when I i was really wanting to get um into more technical stuff and I did I actually landed a job in a technical position as a field technician And I did know it at the time, but I took a huge pay cut because my specialty was in cybersecurity. I just didn't want to do it anymore. I just didn't want to do policies and all that kind of stuff anymore. I just didn't want to do it. So I was like, man, I want to do more hardcore stuff. And I found a job, but I took like a, I don't know, 45% pay cut. I mean, it was a lot, man. I had no idea. If I could go back, I realized my mistake was that I didn't lean on my strengths. Lean on your strengths. Your strengths are, you said, two years of SQL development. Not a lot of people know SQL, bro. That's a special skill and all the things that come with it. I guarantee you, you're not tapping into all of the skill sets that you have with SQL. SQL is very special. Very special, because that means you could work in, and correct me if I'm wrong, but with SQL, you can work in several different database environments, because many of the largest databases, relational databases and object-oriented databases, they use some sort of SQL. MySQL, Oracle, right? They use some sort of SQL. So lean heavily on your SQL experience. What you could do to see what types of keywords to put in your resume so you can quote unquote lean into your strengths is look at other people's resume. Go to LinkedIn. Go to LinkedIn right now. If you happen to be watching me, go to LinkedIn and type in SQL development. And then don't look at jobs just yet, right? That'll come next. What you want to do first is look at other people's resumes. Look who comes up on there and look at their resumes. Not all people put their entire resume out there or profile rather, but some people do. Look at their profile. Check out their profile and see what they're putting, what keywords. I guarantee you a lot of the stuff that they're doing, that they're the keywords, that the key phrases that they use are referring to skills and things that you have done in your two years with SQL development. Put that shit on your resume. Put it on your resume. Because don't just aim for a help desk job. Broaden your horizon. That's what I'm trying to tell you to do. And these guys on here who have IT experience, they'll tell you, man, listen, a lot of these guys are looking for your skill set. Mike chimed in. He says, some of these firms, non-tech, you are You're just a number, yeah, absolutely. Okay, so my man Mike is talking to you. Let me see who else is out here talking. Oh man, TikTok is crazy. Is it necessary to do help desk before jumping into cybersecurity analyst? Not necessarily help desk, but like a tier one type position. I mean, let me see if I can explain it better. The first point of contact for fixing technical problems, it's not always called help desk. Sometimes it's called customer support, technical support. field technician. There's different names for it, but they're normally the first person that you talk to. They're normally the first person you talk to when you have some kind of a problem with your internet, with the computer. It's not always just help desk. We kind of use that as a blanket term because that's probably the most known term for That first tier person that you talk to. But you get the idea. So I would say it's best. You don't absolutely have to. Like I've seen people who were cybersecurity analysts who did not have a solid help desk background. But the best people started from the bottom. worked their way up. They were field technicians and then they were help desk or field technician or customer support or something like that. And then they kind of graduated to this other level. I've seen people who skip rungs, like people who are just thrown right into systems system and administrators creating accounts and things like that. And then they were working with server problems or updating servers and stuff, and they never really touched help desk per se. I've seen people who went directly in the networking straight out of basic training, went to some technical school and then went straight to that or went straight from college to do that or They had some sort of background networking, did network, junior network administrator, and then went to something else, cybersecurity analyst or forensics or whatever. They did something else. So it's not absolutely necessary, but let me explain a little bit about cybersecurity analyst. That's one of the skill sets that I've had, something I've done in the past. A cybersecurity analyst... Um, when, when I was doing it was somebody who was, they were monitoring, they were doing a lot of, of monitoring of the network. We were monitoring the network using tools like scene, which is a security information event manager, uh, that looked at all the logs going on the network. We would look at, uh, we had. IPS, IDS, which is intrusion detection or intrusion prevention systems that we would have to know how to block certain ports or whatever, certain source IPs. We have to know different types of attacks. We were looking at the network, right? And determining if we were being attacked or if there was some kind of a threat that was on the network. That was our job as a cybersecurity and we were analyzing the network. And then sometimes we'd have to escalate it to the incident response team, or we'd have to do something like that. So that said, think about it. A cybersecurity analyst has to know quite a bit about how the network works, like how networking itself works. Because they're looking at logs over the network. And you have to know How TCP IP works and all that kind of stuff, because you're looking sometimes you're looking at packets going across the network. And sometimes we even break open packets to look at what was going on. Right. So you have to know a bit about network engineer, how networks work. You have to know the difference between a server and a workstation and how they work together. You have to know that you have to have the basics nailed down. You know, you have to know what ports are, like at least like common ports and how they work, how they can be exploited. So you kind of have to know like two or three different things and start linking them together for cybersecurity analyst work. It takes very talented people to be good at it. And I'm not saying I was good at it. I wasn't. I was just a newcomer. I was a new guy who was fascinated by it. You know, I could... I could get around, but I wasn't like one of the more skilled guys on the team. I was learning stuff. But what I'm getting at is you have to have the basics nailed down in order to do a job like cybersecurity analyst work, right? I'm not saying you have to be a master at it or some kind of brilliant person at it, but you – Even to do the basics, you have to have some basic skills, basic like help desk type skills down, first tier skills down. Somebody said, bro, where do I start? Start where you are. Consider your industry. If you happen to be from student, zero to hero. If you're a student, you can start right now. If you're in some sort of industry already, like you're in the healthcare industry, you're in the pharmaceutical industry, you're in the retail industry, you're in, you name it, restaurant, and all of them use IT, you can start where you are. if you're a student uh you're in a special position because um now if you're a high schooler shoot they they have clubs that you can start right now start doing computer start learning computer stuff right now um start fixing people's computers right now start coding right now um there's things you can do right now as a high schooler to to do the hell I know people who Um, who got a CompTIA started getting cybersecurity certifications in high school, um, just to get, get the knowledge now, um, and to build themselves up, to go to a vocational school or to go to a community college or college university or whatever, to build up their skills. Or hell, start your own business doing fixing people's computers. You know, you can get that good at it. And then that stuff you can put on a resume or just keep building, scaling your own business from high school. College is I mean, college is a huge pivot point because in college, like you don't have to wait to get your degree. You don't have to wait like you shouldn't wait. Start being a working student right away. If you're on campus, see if you can help them out, help. Help out the campus to figure out what vulnerabilities they have. See if there's a working student program. Hell, even if it's remote, like if you're doing college remotely, they might still have a working student program. look into it they have apprenticeships they have internships they have all kinds of uh sometimes I have like a b2b uh university to business pipeline um ask you got to get yourself in there and ask uh where you can start as a college student college students probably have the best they're probably in the best position to get themselves uh get the ball rolling for their career But they got to start now. Like a lot of times they just wait until they get their degree and they're like, oh, I can't get a job, you know, like get start now, right now. Now, if you happen to be, let's say you forget the student, you're not a student no more, you're in the world, you're a healthcare professional. You know more about HIPAA than I do. And HIPAA is one of the primary laws that is used to protect patient data. That can get your foot in the door right there. I mean, that right there is huge. That's a huge step in the right direction. Now, you still have to learn all the basics of information technology, but you have a good foothold in that industry. If you happen to be in retail, did you know that all the times that you're taking people's credit cards, the whole system in the background is taking all that information has to have to have to have something called PCI compliance. You can start learning a little bit about that. See if you see if you can get involved with their IT department. If everyone has one, Taco Bell has one. Walmart has one. Everybody has an IT department. Everyone start get see if they'll let you do a lateral move over there or start learning shadow marketing. shadowing somebody who already does it. And in whatever retail space you're in, you'd be surprised. Look at their career page. They might have something where they're looking for IT professionals at TJ Maxx or whatever. And I'm being serious. It's not a joke. Like whatever, start where you are. That's what I'm telling you to do. And then once you get that money, right, you get that pay bump. Don't look, listen, I know you want a better lifestyle and I'm not telling you to not have a better lifestyle, but use some of that income to start building some passive income streams. And if you don't know what that is, you might want to Google it. You might want to Google it because it's important and they don't teach it in school. But I'm telling you right now, it's important to do it. This is not me trying to get. I don't have a course on passive income streams. Right. I thought about it, but I don't have one. OK, I'm not trying to sell you anything. Right. I'm just trying to tell you, like, if you don't know what passive income is, look it up. That's what I'm trying to tell you. It's a life changer. It can change your life. So look into it. Let me see here. Getting some more comments and stuff. And I'm only going to do about an hour, guys. So I got about 30 minutes. I was on here earlier. I was doing one of my AirBVs. And now I'm here to do the real work here. Okay. Susie says, I hope I'm pronouncing that correctly. I'm sure I'm not. After getting your CISSP, did you find some of the content helpful on the job? or was it mainly a confidence booster currently studying for the exam? I'm curious. I'm going to say something that you're probably not going to like. I'm going to say something that's probably controversial, but I'm going to tell you the truth. The CISSP is so general that it really didn't, I can't say that it helped in any capacity. And I know that's not what you want to hear. You want to hear that there's a magic wand, that you take some certification and magical things happen. The magic was that everybody wanted to hire me after I got the goddamn thing. That was the magic. There are certifications that I could say that were extremely technically useful that I saw the things I was using on that certification in real life, like things like the CCNA. Cisco certification, like those Cisco certifications are the real, they're the real deal, right? What other certifications would I say were extremely useful? The Microsoft certification, the technical vendor level certifications doing their vendor level stuff is very, very useful. Qualys, like that was, that's not a big certification. It's not marketing. talked about but it's qualis is a scanner it's a network scanner and that stuff the stuff that I learned um that I had that that were on that was on the test that's the stuff that we're actually using uh at the organization I worked at so the vendor level certifications are very very much useful um I would say the security plus was very useful even though it's not vendor specific Security Plus was useful because it's talking about stuff that you're going to... Let me put it to you this way. Security Plus is usually introduced to people who are fairly new into cybersecurity. So it opens up... It's kind of touching on many different things that you might not have ever been introduced to for the first time. By the time you get to the CISSP, you kind of have some level of, you've touched a lot of different security by the time you actually take the cert. You take the cert, and the way they word it, how can I explain it without losing the CISSP? The way that they word it is like, it's a, what do they call it? Let me put it to you like this. They'll ask you a question, and the hardest part is the answers. Because you'll have two answers you can kind of throw away, and then they'll have two answers that are both right, but one's more right than the other. That's hard. That's the hard part about the CISSP. Would I say it helped me? I can't know. There's nothing on there that I could say, yeah, that right there, that's... That was on the, you know, I'm not quoting the CISSP. Like, it's not, I will say this, it's highly marketable. It's a great, it changed my life. As soon as I got it, people were like, oh, it was like I was a lawyer or some shit. It was like I had to pass the bar or something. It single-handedly changed my life. You could probably get the CISSP and not have a degree. With some years you got, of course, you have to have experience, but you could probably, that damn thing is so effective. It's so effective that as soon as you get it, like, so many people hire you just to say they, oh, we have a CISSP on the board in our IT department. He's a CISSP, you know, or whatever. That said, you know, just because you have a CISP doesn't mean I'm magically no shit because there's a lot of dumbass CISPs, you know. So I'm sorry I had to take the magic out of it. The magic is that you will get paid and people will hire you. So that just, you know, it is what it is. Let me see. I just got my Security+. six months ago, but I'm still struggling to get a job. How much experience concern, Jay? How much experience do you have? Because the certification alone is not, including the CISSP, is not enough to land you a job. They really, employers want a, they want to see that you can do the work. And that requires, and the best way to see that is via your experience. So wherever you can get experience, get experience. There's been a lot of questions about what search should I get or, you know, I get a lot of those kinds of questions, but the questions I get less of that should be asked is how do I get experience? That's a harder question for me to answer for you, but also it's, It's the best question because that's what they're really looking for. I'm not saying you shouldn't have a security plus. Security plus is fire. CISSP, I just told you, if single-handedly changed my life, it's great. A degree is, you know, people are talking shit about degrees, but if you're doing technical work, you're going to be an engineer, you're going to be doing this for a while, a degree is important. Because the longer you stay in this career path, the more competitive it gets. And the degree is very competitive. So those certs, those degrees, all the pieces of paper, those are important, right? There's an important half in your arsenal, right? But it's like you're sharpening the blades. But the best thing you can have is is experience. The best thing, that's the meat on the plate. Got to have experience. It's very, very, very important. So can't stress that enough, right? Wherever you can get it, you can get it in school, while you're still in school, wherever industry you're in, try to get it there. Wherever you can get experience that you can put something that you can put on your resume, on your profile to say, I did X, Y, and Z for this company. If you can do that, that's That's where the meat is at. Yes, get the Security Plus. Yes, get the CISP. Yes, get cloud certifications. Yes, all that, right? But those are just tools in your arsenal, right? You got to be able to wield the sword, and that's where the skill set comes in. Let me see. Got more questions, comments, complaints on here. How long should I stay in corporate? I just started my career in big tech. It depends on what your ultimate goal is. I would say stay, ride that gravy train as long as you need to. Ride that gravy train as far as it'll take you. Make them fire you. Keep collecting that check and then use that check To brick by brick build something bigger for yourself and for your family. As long as you need to, brother. Use it to build your own corporation. Use it to build your nest egg, your 401k. Use it to, especially if they're doing like that shit where they say, okay, if you put a dollar in, we'll put $3. Yes, do that shit. Ride that gravy train as far as it'll take you. Let me see here. Let me see. Let's see. I've got some more questions, comments, complaints here. Do you have a step by step how to be an ISO course? I do. If that's what you're looking for, you came to the right man. because that's exactly what I have. I have a course specifically for ISOs. I'm glad you asked that question, because that brings us to a commercial break. This is brought to you by Risk Management Framework, ISO. This is what the course is called. And this is a book, by the way, that I wrote. This is coming directly from my own personal experience. I tell you, in plain English, what this job entitles, and specifically from the perspective of an information system security officer, how to do this work for risk management framework, NIST 800. I've got two books. One focuses on the NIST 837, and one focuses on the NIST 853. I remember talking to one of my peers, and I was telling him, hey, man, I was trying to get him in with me to write books and stuff. I'm like, man, I've got this course, and I want you to help me build it. And he says, man, why would people pay for something that they can get for free? You can get this for free. All this shit here is for free on the internet. But when you read it, it sounds like just go read it. You'll see for yourself what it sounds like. When I first started learning this stuff, I was like, what the fuck? What am I reading here? It doesn't tell you what you're supposed to do. It does, but it takes 15 paths to Sunday to get to the point. What I'm doing is getting straight to the point and telling you from my experience in the Department of Defense and a couple other federal organizations exactly what you need to do, where you need to focus on, and where to not waste your time. That's what I'm doing. So it's from the perspective of somebody who's done it before. And I'm telling you how it is. So and then once you read this, all the other shit will make more sense. So, yes, I do have a course. It's out there right now. Go to convocourses.net. I've got a bunch of discounts that you can use. Huge, huge. You got to go through it. There's lots of stuff that's out there. Huge discounts been putting out over the years. And if you can't afford it, you can just get this book right here. I've got two of them and that's on Amazon. It's also on my site and it'll walk you through it. It's just stuff I wrote that I wish somebody would have told me when I first started doing this stuff. and explains it in a way that's just straight to the point like here's what you need to do then do this don't worry about this focus on this that's what the book is about that's what the course is about I hope that helps um what do you recommend to leverage your existing salary credit now I know dave ramsey is not going to agree with this but credit other people's money um leverage your set, your existing salary. A couple of things, a couple of things. It's a great fucking question. So listen, a couple of things I use credit, manage your credit. I'm not telling you if you can't manage your credit, if you don't have no discipline, do it. Don't do not do it. Go watch Dave Ramsey. Listen to everything he says, put money in an envelope and pay everything with that shit. Right. But if you can, if you have restraint, right, you're not going to, Go buy a Lamborghini with the money that the bank gives you. And you're trying to build a legacy. You're trying to build something for your kids and your family. Credit, loans, shit like that. Business credit. You don't even have to use your own personal credit if you have an LLC, if you have a business. If you have a bank account that has money going into it, After about two years, they'll give you a loan based off of that LLC. That's based off your bid. They'll give you money from your bid. They'll give your business money and it doesn't mess with your own personal credit. But yeah, that's one thing I use is credit, loans, stuff like that, other people's money. And then I use my high salary to pay that debt down or manage that debt effectively. So that's one thing you can use. And if you're doing real estate, you basically have to use other people's money. So um another thing I do I've done before not doing it currently but if I had the opportunity I probably would uh is uh over it's called over employment so what you do is you just get two jobs if you work from home you can work two jobs you can have one part-time job and one full-time job two part-time jobs or you can you could do uh what a lot of i.t guys do is they just hop from um They'll do what's called 10 99s. They won't be a full-time employee. Let's jump from contract to contract to contract and do like three months here, four months here, nine months here at these different companies. And sometimes doing it two at a time and doing that shit, you can make 200, $300,000 easy doing that, you know? So, um, that's another way you can leverage your, your existing salary. Another thing is, uh, uh, do, do, uh, have a side hustle, side incomes. Um, this is something I've been doing for many, many years and my favorite thing to do. And it's stuff like this. This is a side hustle. It does pretty good. It does pretty good. It does. All right. You know, I'm not rich or anything. I mean, look where I'm at, you know what I'm saying? But, uh, it does. Okay. You know, um, what else do I do? I mean, that's pretty much it. Um, loans credit uh making sure I maintain my credit and build using other people's money to do the bank's money to do what I need to do and managing that money with my salary right um that's one thing I do uh and then over employment I do from time to time where I'm not really a fan of it these days because I really need my time for me and my family my kids and everything um And then the other thing is side hustles. That's what I do to leverage. I use my salary to build. There's a lot of leverage you can use. These tools are very, very useful. Very, very, very useful. Let me see. Dewart says, can you work two jobs if you have a secret clearance? It's not so much about the secret clearance. It's about the agreement you have with the company. So it depends on the agreement you have with the company. Some companies are very strict and say, look, you agree to work with us eight hours a day. There's a couple of things. Okay. Let me, let me back out a little bit. Number one, you cannot have a conflict of interest. All right. You can't have a con meaning you can't work for Lockheed Martin and Northrop Grumman for this, for, for competing contracts or some shit. Like you can't, you can't work for this company and it's competing with this company and they're on the same contract or something. Like you can't, have conflicts of interest. What's a real good example of a conflict of interest? Look, you can't have a conflict of interest. That's all I'm going to say about it. You can't. Don't do it. Don't do it. It's not worth it. And then sometimes the organization that you're working for will flat out say, look, we want you to work eight hours a And that's what you're supposed to do. You're going to work eight hours for them. But they can't stop you from working some hours on the weekends. If Saturday and Sunday is yours, they don't own you. Am I right or wrong? They do not own you. Even if you have a secret, top secret, it doesn't matter. They don't own you. You're a human being. You have rights. So after hours, they don't own you. You can work after hours. Now, you can't work during their time during their, you know, so the secret clearance doesn't say that you cannot work for anyone else, right? It just says you cannot share the Volge information that they've, that's sensitive, you know? So that's what, don't do that, you know? So, yeah, it doesn't, a secret clearance doesn't matter in that regard. You can still be over, you know, uh, overemployed, but don't have a conflict of interest. Don't do not do it. Like you can't, we'll be a conflict of interest. Like if you work for the government as a GS, and then you also work as a contractor on the same contract, that's probably a conflict of interest, stuff like that. Are you two competing companies where one, they have one has this special sauce and this one has a special sauce. And then you, You don't want to do stuff like that, right? It's just, you might get yourself in some legal trouble if you do something like that. They're very clear with you. And some companies, what you can do, the company I'm currently working for, they said, look, If you work for another company, just let us know. They say, look, we can't stop you from working for this other company. Now, you can't work during the hours we want you to. Like, if you're working for us, we're not expecting you to be using our stuff to work on theirs. No way. This is our stuff. You know, you work on our time. If you clock eight hours. You're working for us. Right. That's understood. That's what this contract you're signed. So they just said the company I'm working for is like, look, just let us know. You know, that's that's it. Just let us know. And they you know, they can't stop you. Let me see. What other questions do we have here? Somebody said, what if you know how to. What if I know how to build computers? That's a really great first step. I've got a little course, a free course about this where I talk about the levels to help people understand where they have to go to get from point A to point B. And I say the first step is to become a geek. That means to get interested in computers, learn everything you can about it, learn a common body of knowledge. And so, yeah, become a geek. Learn, take computers apart, put them together. But that's only one aspect of it, right? You need to learn networking. You should probably learn a little bit about cloud technology. You should probably learn a little bit about networking technology. Maybe you mess around with a little bit of scripting or code. There's a lot of different aspects of IT to learn. Frameworks is a really good one to learn. Start learning the common body of knowledge beyond just building computers, like learn the whole landscape. That's cool that you know what mountains are, but what about valleys? What about rivers? Learn the whole map of how this landscape works from a distance, like how all this is laid out, how people are using information technology. You want to have a bird's eye view of how all this works, and that's the common body of knowledge, something that all of us have, regardless of whether you are a software engineer or a database guy or a help desk person. cybersecurity person. All of us have some idea of how IPs work. All of us have some idea of how it was a server versus a workstation. All of us have some idea of what cloud technology is. All of us know the layout, the lay of the land. So you still have to know that piece. Now, you might be a master of building computers. You could run circles around me with building computers. I've built a computer in many, many years. But that's not the only thing that you have to learn, right? So from geek, I talk about going to trying to land your first job. From there, from geek to getting your first job, now you're talking about possibly going to school, possibly getting yourself a certification. A plus certification would be something you would probably kill, you know, because it's all about how computers, the components work and how software works with the components, all that kind of stuff. So from geek, landing your first job. Now, let's say you actually get that technical support job and you talk about how to go from there to do a specialization. Cybersecurity is the one that I talk about. What kinds of things as an IT professional do you need to know to get in the door of a cybersecurity type job? So that's the kind of stuff I talk about. But Building computers is one aspect of it, and that's a great aspect to start with. I would recommend you look at the common body of knowledge in CompTIA A+, especially if you're very, very new to IT. I'm taking AWS solution architect exam on Monday. Oh, man, that's awesome. I've been thinking about doing AWS. I have not had time. I would really like to. I'm working on my CCNA next month. CCNA is no joke. I like it. Somebody says, I have a CISSP and master trying to find a job, but people want experience. Yeah. Experience is super important. What can you do to get experience? It depends on where you're at. If you're a student, maybe what you could do is go to your campus, go to your college campus and see if you can get on their IT team. Don't say that help desk is beneath you. Do it. That's experience. Get in there and fix some computers. Get in there and image some computers. do laptops, fix laptops, figure out how the laptop connects to the network. Put that experience on your resume. Try to be a working student if you still have a connection with your school. Even if it's a remote school, you'd be surprised. Sometimes they need help with their equipment that's out there in the field. You could do freelance work and start your own If you know a lot, you're CISSP, if you know a lot about a certain thing, a lot of CISPs are a mile deep in like one or two things. Take that skill set, whether it's scripting or running scans or building networks or whatever you do, whatever you are professional on, do freelance work for local companies or find some organizations. If you have a church, if you go to a church or some kind of other local community, whatever it is, interface with them and try to see if you can do work for them. Do it for free if you can. Do work for some organization so you can put that on your resume. Another thing you can do, one thing Ryan brought up that I just didn't think of it all this whole time, but join an organization called the ISSA. So this is a local – they have local chapters everywhere. In almost every major city, they have a local chapter. And this organization, they meet like monthly. And it's a bunch of information system security people and IT professionals, system admins, help desk people, captains of industry, CEOs are there, CIOs are there, chief information security officers are there. You name it, they're there. And they all meet about once a month in a city, in whatever city you happen to be in, and They're talking about career paths. If you have a CISSP, hell, sometimes they have jobs there and ways to get experience. You could talk to some of the old heads there and say, look, man, I'm trying to get in this field. I've got a CISSP. I got a master's degree. I specialize in writing scripts. How can I get experience? What do I have to do? to get experience for this field. The ISSA is the Information Systems Security Association. They have one in every single state. They have one in almost every city. Well, probably not in every city, every major city, but every state has one. And I think there's even some in other countries. So look that up and try to network with those people. Because with With all of your pedigree of prestigious papers, you should be able to land yourself a job, if nothing else, an internship or something. Somebody said create projects and post them on GitHub. That's another way to do it, especially if you know Python or something or if you know any kind of software projects. Put that on GitHub and you can put that on your resume. So there's a lot of different ways to do it. It depends on where you're at. Somebody says, I have a portfolio with five complex cloud projects. How can I get into the field? Any tips? Hmm. How could you get into? A lot of times when people say this to me, it's usually experience and their resume. It's one of the two things. It's usually one of those things that are stopping them from getting their foot in the door. Pretty clear. It's usually one of those things. They send me their resume and I look through it and it's usually one of those things. I don't know. I don't know what to say. But how could you do it? I think you've got to continue to build out your as much experience as you can. And it's hard. I mean, it's difficult because that's where the real rubber meets the road. That's where the real meat is at, is your experience. It's the hardest part. You've got to talk to people. It's hard. You've got to get out there. You've got to network. So like I said, you could try the local ISSA chapter. I mean, they've got a whole bunch of people you can network with and figure something out. I mean, you have cloud experience. Do you have any certifications that might help you out? If you don't have one, maybe try to get some certifications under your belt. That's one thing you could try. Let me see. Oh, Ryan, how you doing, man? He says, I'm presenting on election security on February 28th at Pikes Peak ISC2 chapter meeting. That's awesome. So these are the kinds of people you want to network with, cybersecurity professionals, IT professionals who are out there. They have this in your area. LinkedIn, one of the hidden gems of LinkedIn is is that if you go there, there's a bunch of forums. In your local area, there'll be a bunch of meetings, a bunch of forums, a bunch of people presenting. Sometimes they'll have job fairs that are local to you. Join those groups. Join some of those groups. And a lot of times people are trading jobs back and forth. Another pretty good resource is Reddit. Reddit might have some pretty good resources for you as well. um reddit has a lot of professionals who are talking back and forth and it's a good way to network with like-minded people who are in the same position um and uh finding finding out new stuff that's kind of bubbling up in the industry uh let me see here I got some other stuff going on here and I'm going to end this real soon guys I appreciate all the people jumping on here um Or can I find your book? Go to Amazon, type Bruce Brown Convo Courses. You'll find a bunch of my books. Risk Management Framework is just one of them. Another place you can look at is convocourses.net. You'll also see free stuff. Ryan's got a free book. I linked his on there. He's got a free book that is walking you through how to study for the ISE2 CGRC, formerly the CAP, Governance, Risk, and Compliance Certification. So we've got free stuff, discounted stuff on there. At the end of the day, what we're trying to do is help people to make your life easier to get into this field, stay in this field, and level up if you already are in this field. Let me see. Emmanuel says, let me see this one. Emmanuel says, which MOS will you advise a 25 Bravo or a 25 Hotel for a start in cybersecurity? 25 Bravo. I thought that was an IT guy. 25 Bravo is in the Army MOS. Ryan's Army. He might be able to answer this. Ryan, what do you think about this question here? Emmanuel is asking, which MOS you would advise a 25 Bravo for a start in cybersecurity? Ryan says, 25 Bravo is a great start. Yeah, that is a great start because that's an IT, yes, and that's an IT specialist, as a matter of fact. So that is a great start. Don't do that. What are you doing? OK, I'm wrapping it up. I'm wrapping it up. Let me see. I'm going to stop this thing. I'm going to answer one more question. Ryan's taking care of the manual. He says, get a network plus or security plus ASAP. That's a great security plus. I would highly recommend a security plus. Oh, boy. OK, I think it's time. OK, one more question. OK, one more question. Okay, I got a bunch of Army guys jumping on here, giving great advice on TikTok. Do I have experience with overlays? A bit, a bit. 25 Delta, 17 Charlie, 25 Bravo. You locked in for six years. Man, I've got a lot of Army guys on here. and highly transferable to civilian sector. Okay, that's where we're going to end this. So 25 Bravo, let me tell you something. If you're a 25 Bravo, and they have an equivalent for this in every branch of the military. I believe the Air Force, they changed it. It used to be a three char... Oh, my Lord. Oh, my Lord. They changed it. It used to be called a three... 3Charlie. 3Charlie. Man, my brain. 3Charlie. 3COX1. That's what it was. 3COX1. That's what it used to be called. But it's no longer called that. So I don't know what they call it these days. 3Delta or something? 17Delta? I don't remember. But every branch has a 25 Bravo equivalent. And it's an IT professional. And somebody on TikTok nailed it. So he said that It is highly transferable to the civilian world. And he is absolutely right. So I was a, I'm an old head. So when I was in the air force, it was called a three Charlie, a three CLX one is what we called it. And a computer operator, same thing as a 25 Bravo. And I was, the thing is, and I don't know how they do it in the army. An army has really sharp IT guys. especially the warrant officers. Very impressive. But the thing is, the Air Force will specialize you in certain things. A computer operator, you could narrow down into firewalls. You could go into network engineering. You could go into not software engineering. That was a completely different field. But you get databases. You could focus on one kind of one area. And once you got out, I mean, you have certifications. If you put the effort in, you had a degree. Listen, if you have a year or more left, I would highly, highly recommend you get a degree. Because look, All of the training, all the way back to boot camp, all the way back to boot camp is going to go towards your degree. You have some credits there that are transferable to your degree. So you're probably only a few points away, maybe six credits, maybe 10 credits away from an associate's degree. Once you get the associate's degree, you have maybe, what is it, 60 more credits? I want to say 60 more credits, and then you have a bachelor's degree. That may sound crazy, like a lot of work, but it's actually not that much work. It's a few classes. Maybe not a few, maybe 10. Look, it's going to be some work, but You can get out with a bachelor's degree within a year. You can be within arm's reach of a bachelor's degree. At the very least, get an associate's degree because literally that's like two classes away. If you have one year left in the military and you are a 25 Bravo, hell, whatever MOS you're in, listen, get your damn degree. Just get the damn degree. All you got to do is go to – they've got a unit on base. I don't know what the Army calls it, but there's a unit on base that you can go to. They'll tell you exactly. They'll have a counselor. They'll break down. They'll take all the credits you already have. They'll say, listen, you went to boot camp. That's six credits. You went to 25 Bravo school. That's – You've got 30 credits for that, right? And of these 40 credits you have, you can apply 25 of them to this associate's degree. You only need two classes. This is what they're going to tell you. You only need two classes. You need one in math and you need one in history and you need one. And basically you can clep your way out of it. Clep is a test. You can just take a test and then they'll give you credits and then bam, you have a degree. Just do it, man. And then it's more, put it to you this way, it's more money. If you want more money, then just do it. Just go through this little bit of process that you have to do. Let them take your transcripts from the military, consolidate them, and you're going to boost up your income by like 15% to 25% when you get out of the military. And then also what Ryan said, Security+. Get a certification. And now you have experience, you have a degree, and you have a certification. And you're very, very deadly. You're very competitive. Very competitive. It's hard out here. It's hard out here on the outside, man. They don't just magically give you stuff here. Like, you got to work for this shit. But the good news is you're in a place where you can really sharpen some swords and come out swinging. All right. That's it, guys. I got to get off of this thing. I appreciate everybody. Remember what I said, like use this as a stepping a stepping stone, like use this as this is one step. You got to go to the next step, whether that's to level up your career, to make. big money as a director and retire with a bunch of 401k money or use this money to go start a business, use this money to invest in real estate. Use it to build up passive income streams because you can't do this forever, guys. You cannot do this forever. I know if you're 30 or you're 20, you think, oh, I'm going to... You just don't even think about it. You think you're going to live forever, man. Then you start seeing your friends die. I'm not trying to bring you down or anything, but I'm just telling you, like, life has an expiration date. And you got to start thinking about, okay, what's my plan? What am I trying to do? You can use this field as a way to go to another level and level up your family, too, and the people you love. So... Just some words of advice from an old guy. I hope some of you guys, I hope at least one of you guys listen to what I'm saying because it can change your life. All right, guys, I'll talk to you guys on the next week. Give me some suggestions of what we should talk about next. Sometimes I just get on here and ramble. So, all right, guys, talk to you later.
In today's episode, Naila provides an overview of 14 articles published in November 2023 on non-pharmacological interventions for AD. You'll hear about cognitive training, music therapy, chair yoga, providing support to caregivers, and a range of neural stimulation techniques. Enjoy! Cognitive and Social Factors (2:26)Lifestyle interventions (13:40)Stimulation Techniques (19:20)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1A4HZVCtgh5AwZkd5V2ATZSFAxGJt48q3/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Naila Kuhlmann and Christy Yu, edited by Scott Prins, and reviewed by Anusha Kamesh. The bibliography was made by Rob Cloke and wordcloud was created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For November 2023, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann and Anusha Kamesh. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Join us as we cover a set of papers published in November 2023 on treatments targeting cholinergic transmission in Alzheimer's disease. In this episode hosted by Christy, we will go over various topics, from drug discovery using synthesized compounds to drug testing of plant extracts, as well as improving drug delivery through the blood-brain barrier. Enjoy! Papers evaluating synthesized compounds (2:00) Papers targeting AchE (10:45)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1wh1EFtB3KrW0J6CHd_i-NxOaSZxZdXyT/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Christy Yu, edited by Isabelle Vaux, and reviewed by Anusha Kamesh. The bibliography was made by Rob Cloke and wordcloud was created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For November 2023, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann and Anusha Kamesh. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Hello listeners, it's been a while since we last released an episode but we are back with another series here at AMiNDR bringing you a synopsis of publications on Alzheimer's disease (AD) research on various topics that were released in November of 2023. In this episode, Anusha takes you through 11 papers testing potential neuroprotective agents for AD treatment. You'll hear about naturally and pharmaceutically-derived compounds as well as strategies that exploit cell-endogenous processes for neuroprotection in AD. Testing Naturally-Derived Compounds for Neuroprotective effects (3:53)Testing Cell-Endogenous Mechanisms for Neuroprotection (16:57)Testing Pharmaceutically-Derived Compounds for Neuroprotective effects (20:17)-------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1cILUsT6aQY9go4n3e_veF4yawB-aTbwx/view?usp=drive_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Anusha Kamesh, edited by Chihiro Abe, and reviewed by Naila Kuhlmann. The bibliography was made by Rob Cloke and wordcloud was created by Salodin Al-Achkar (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For November 2023, the sorters were Elyn Rowe, Christy Yu, Salodin Al-Achkar, Naila Kuhlmann and Anusha Kamesh. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: https://davidbombal.wiki/protonvpn5 // Phillip's SOCIAL // X / Twitter: https://twitter.com/PhillipWylie Website: https://www.thehackermaker.com/ Linktree: https://linktr.ee/phillipwylie LinkedIn: https://www.linkedin.com/in/phillipwylie YouTube: https://www.youtube.com/c/phillipwylie // Books MENTIONED // The Pentester Blueprint by Phillip Wiley and Kim Crawley https://amzn.to/41N5CBl The Hacker Playbook by Peter Kim https://amzn.to/40LvInc The Hacker Playbook 2 by Peter Kim https://amzn.to/3oVemqr The Hacker Playbook 3 by Peter Kim https://amzn.to/40SjokN The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard https://amzn.to/3oLN5Xv Hacking API's by Cori Ball https://amzn.to/3Hi5amj Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman https://amzn.to/3Hi5zF RTFM (Read Team Field Manual) by Ben Clark and Nick Downer https://amzn.to/3Vf0XWs Operator Handbook Red Team + OSINT + Blue Team by Joshua Picolet https://amzn.to/41JTQYH Black Hat GraphQL by Nick Aleks and Dolev Farhi: https://amzn.to/47I8zpT // Videos MENTIONED // Pentester Blueprint: Your road to success: https://youtu.be/-FjL8y3B08k Free Hacking API course!: https://youtu.be/CkVvB5woQRM // YouTubers mentioned // Rana Khalil: https://www.youtube.com/@RanaKhalil101 Profesor Messer: https://www.youtube.com/@professormesser She Networks: https://www.youtube.com/@shenetworks Tib3rius: https://www.youtube.com/tib3rius // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X / Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal // Menu // 00:00 - Coming Up 01:51 - Sponsored segment 03:35 - Intro 04:11 - Blackhat 06:43 - Try Hack Me / Hack The Box 08:35 - Roadmap in 2024 14:30 - Do You Need Certifications? 18:07 - Problems Getting a Job 20:16 - CCNA or Network+? 23:34 - Certifications & Degrees 27:43 - Roadmap for Developers 30:33 - Using BugBounty for Experience 32:40 - What Should you Focus on in 2024? 36:12 - A.I in 2024 41:12 - Modern Day Opportunities 42:02 - Books For 2024 44:58 - Last Advice 50:03 - You're Never Too Old 52:14 - Different Roles 54:00 - Phillip's regrets 57:33 - Outro // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #hack
Welcome to 2024! A new year means a new opportunity to focus on your students. In this episode, we sat down with CERTIFIED Ambassador, Jessie Kalloo, to talk about how to engage students in your classroom and beyond. Jessie Kalloo is a CTE Instructor and Program Approval Coordinator for the Information Technology programs at Thomas A. Edison Career and Technical Education High School located in Jamaica, Queens, New York. Jessie is also a Cisco Networking Academy Instructor Trainer for IT Essentials, CCNA, CCNA Security, and CCNA CyberOps covering areas throughout the United States. Being a product of CTE as a graduate of Thomas Edison High has provided him the opportunity to view teaching through a different lens. Through the various partnerships he has formed with the industry he is able to inspire, motivate and provide opportunities to his students that truly help them prepare for their future. The training he has done in and out of the classroom combined with his unique approach to teaching, has allowed for creative ways to spark the curiosity in students, helping them continuously challenge themselves to do better. Together with Jessie, we talked about creating an engaged culture in your classroom, and practical approaches for how to keep your students engaged. Jessie even shares how he flips the classroom and allows his students to become the teachers. Get other ideas for your classroom on our blog: https://certiport.pearsonvue.com/blog. Connect with your fellow educators, like Jessie, in our CERTIFIED Educator Community here: https://www.linkedin.com/groups/8958289/. Don't miss your chance to register for our annual CERTIFIED Educator's Conference here: https://certified.certiport.com/.
In this video, I talk with David Ruess, a CCIE candidate, about what it's like to go through the certification process. From studying for the exams to networking with fellow professionals, we discuss everything you need to know to prepare for the CCIE certification.If you're looking to get your CCIE certification, then this video is for you! David shares his experiences and tips on how to best prepare for the certification, from study tactics to networking opportunities. Tune in to learn everything you need to know to reach your certification goals!David Ruess Twitter: https://twitter.com/KangaruessSupport the show
Check out Everything Alpha Prep has to offer: https://www.alphaprep.net/If you're looking for a better way to learn, then look no further than AlphaPrep! With their unique course structure and online courses, AlphaPrep offers a better learning experience than any other provider on the market.In this video, we'll take a closer look at what AlphaPrep is and how it can transform your learning experience. We'll also discuss the different IT certifications that AlphaPrep offers and how they can help you in your tech career.AlphaPrep is the perfect solution for anyone looking for a better way to learn!The Code of Entry PodcastThe Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the...Listen on: Apple Podcasts SpotifySupport the show
Welcome back to another enlightening episode with Avetis Antaplyan! This week, Avetis is joined by the dynamic Craig Sixta, the experienced entrepreneur and technological strategist behind the success of Element Technologies. From his diverse roles in technology outsourcing to his latest adventures in the world of cryptocurrency and AI, we uncover the secrets of his journey, the future of AI in business, and much more. Episode Highlights: Introducing Craig Sixta: Dive into Craig's entrepreneurial journey and learn about the drive that led him to become the CTO of Element Technologies. Element Technologies - Over Three Decades of Excellence: Discover the history, mission, and vision of a company that has been proudly serving clients for over 35 years in the tech industry. Cybersecurity in Today's Digital Age: Craig shares valuable insights into the evolving landscape of cybersecurity and the importance of preparedness in incident response. The Crypto Universe with Earnity: Unravel the wonders of the crypto world with Earnity, a unique social-first crypto platform that aims to redefine the crypto experience. Incorporating AI in Business: Learn how businesses can harness the potential of artificial intelligence and its significant role in cybersecurity, compliance, and overall strategy. The Ethics of AI: A look into the ethical considerations of using AI, including data privacy and decision-making transparency. Partnerships and Affiliations: Find out about Element Technologies' strategic partnerships that have propelled them to the forefront of technological solutions. Certifications and their Impact: How certifications like CISSP and Cisco's CCNA play a pivotal role in assuring quality and expertise in the tech world. Future Horizons: What's next for Craig? Get a sneak peek into his plans, aspirations, and upcoming ventures. Connect with Avetis: LinkedIn: Avetis Antaplyan Connect with Craig Sixta: LinkedIn: Craig Sixta - CISSP Company Website: Element Technologies Episode Resources: ISC2 Certification Earnity - The Social Crypto Platform Keywords for SEO: Craig Sixta, Element Technologies, AI in Business, Cybersecurity, Earnity, Social Crypto Platform, Technology Outsourcing, Avetis Antaplyan, CISSP Certification, Tech Entrepreneurship.
Bogdan Avasiloae is a Purchasing Manager at the City of Deerfield-beach Florida. He is working with and under the direction of the Chief Financial Officer, this position is responsible for highly specialized, professional administrative and supervisory work to oversee and unify the City's purchasing and contract administration functions; serves as the City's central point of contact regarding the purchase of contracts for commodities, goods, and services for the City departments and outside agencies; responsible to monitor and ensure the City's consistency and legal compliance with procurement policies, procedures and methods, and requirements of federal, state, and local laws. Bogdan manages and supervises the procurement of commodities and services used by the City using direct purchase, formal and informal quotes, and various methods of formal competitive solicitations, sole source, or other acceptable methods of acquisition. He ensures compliance with applicable guidelines, regulations, laws, and ordinances established by the City or other outside agencies. He also prepares and submits Commission agenda items to department directors and/or the City Manager related contract awards and other procurement-related items. Bogdan negotiates and confers with vendors on terms, conditions, and pricing; analyzes bid and proposal responses for responsiveness. He serves as a consultant to departments for the sourcing of the acquisition of commodities, services, construction, and professional services including CCNA. He maintains accurate records related to the procurement of goods and services in compliance with Florida's Public Records law. Mr Avasiloae acts, or delegates, as the City's representative for various procurement organizations including the Southeast Florida Governmental Purchasing Cooperative Group, and the National and Southeast Florida Chapter of NIGP. And abides by the NIGP Code of Ethics. Learn more about the City of Deerfield-beach and the work they do: https://www.deerfield-beach.com/ --- Send in a voice message: https://podcasters.spotify.com/pod/show/governmentcoins/message Support this podcast: https://podcasters.spotify.com/pod/show/governmentcoins/support
Bogdan Avasiloae is a Purchasing Manager at the City of Deerfield-beach Florida. He is working with and under the direction of the Chief Financial Officer, this position is responsible for highly specialized, professional administrative and supervisory work to oversee and unify the City's purchasing and contract administration functions; serves as the City's central point of contact regarding the purchase of contracts for commodities, goods, and services for the City departments and outside agencies; responsible to monitor and ensure the City's consistency and legal compliance with procurement policies, procedures and methods, and requirements of federal, state, and local laws. Bogdan manages and supervises the procurement of commodities and services used by the City using direct purchase, formal and informal quotes, and various methods of formal competitive solicitations, sole source, or other acceptable methods of acquisition. He ensures compliance with applicable guidelines, regulations, laws, and ordinances established by the City or other outside agencies. He also prepares and submits Commission agenda items to department directors and/or the City Manager related contract awards and other procurement-related items. Bogdan negotiates and confers with vendors on terms, conditions, and pricing; analyzes bid and proposal responses for responsiveness. He serves as a consultant to departments for the sourcing of the acquisition of commodities, services, construction, and professional services including CCNA. He maintains accurate records related to the procurement of goods and services in compliance with Florida's Public Records law. Mr Avasiloae acts, or delegates, as the City's representative for various procurement organizations including the Southeast Florida Governmental Purchasing Cooperative Group, and the National and Southeast Florida Chapter of NIGP. And abides by the NIGP Code of Ethics. Learn more about the City of Deerfield-beach and the work they do: https://www.deerfield-beach.com/ --- Send in a voice message: https://podcasters.spotify.com/pod/show/governmentcoins/message Support this podcast: https://podcasters.spotify.com/pod/show/governmentcoins/support
El videojuego "Space Invaders" cumple 45 años y, para celebrarlo, Taito y Google se unen para crear un nuevo juego AR inmersivo, en el que puedes defender la Tierra desde tu vecindario, ademas; Twitter está trabajando en nuevas herramientas de publicación para artículos de formato largo y mucho más... Los temas del día: Meta y Microsoft lanzan Llama 2, un modelo de lenguaje de IA para uso comercial https://www.engadget.com/meta-and-microsoft-release-llama-2-an-ai-language-model-for-commercial-use-163615807.html? Twitter está trabajando en nuevas herramientas de publicación para artículos de formato largo https://www.engadget.com/twitter-is-working-on-new-publishing-tools-for-long-form-articles-185302573.html? Defiende la Tierra en un nuevo juego inmersivo de SPACE INVADERS https://blog.google/products/google-ar-vr/space-invaders/? Fernando Ruiz, Técnico de Redes en CCNA, fue a Infosecurity 2023, y nos realiza un completo resumen del evento APOYANOS DESDE PAYPAL https://www.paypal.me/arielmcorg APOYANOS DESDE PATREON https://www.patreon.com/radiogeek APOYANOS DESDE CAFECITO https://cafecito.app/radiogeek Podes seguirme desde Twitter @arielmcorg (www.twitter.com/arielmcorg) También desde Instagram @arielmcorg (www.instagram.com/arielmcorg) Sumate al canal de Telegram #Radiogeekpodcast (http://telegram.me/Radiogeekpodcast)
#XRP #Ripple #securitytoken Tune in to this episode of the Security Token Show where this week Kyle Sonlin and Jason Barraza talk about XRP's Impact on the Blockchain Ecosystem! Jason's Company of the Week: Cetif Advisory: https://www.cetif.it/advisory Kyle's Company of the Week: Ondo Finance: https://decrypt.co/148370/ondo-finance-tokenized-treasuries-stablecoin-alternative-ethereum-polygon?amp=1 = Stay in touch via our Social Media = Kyle: https://www.linkedin.com/in/kylesonlin/ Herwig: https://www.linkedin.com/in/herwigkonings/ Opinion articles, interviews, and more: https://medium.com/security-token-group Find the video edition of this episode on our Youtube Channel: https://www.youtube.com/channel/UCTKdeN3ElyPeqtROWUp0CmQ All articles that were discussed were sourced from https://STOmarket.com/news Check out our medium blog for more news! #STSTOP5 Articles of the Week UK Expands Tokenization Adoption Plans: https://www.coindesk.com/policy/2023/07/11/uk-treasury-starts-consultations-on-five-year-digital-securities-trial/?utm_campaign=coindesk_main&utm_source=twitter&utm_medium=social&utm_content=editorial&utm_term=organic INX New Offering - CCNA: https://thetokenizer.io/2023/07/11/inx-to-facilitate-ccnas-security-token-offering/ IX Swap Launches Tokenization Launchpad: https://twitter.com/julian2kwan/status/1679405359285383169?s=20 Mediobanca Tokenizes Mutual Fund: https://www.ledgerinsights.com/mediobanca-tokenizes-mutual-fund-units/ WisdomTree Digital Assets App: https://www.ledgerinsights.com/wisdomtree-goes-live-with-its-prime-digital-assets-app/ Institutional Update: Broadridge Report: https://www.broadridge.com/_assets/pdf/broadridge-return-on-innovation-intraday-repo-has-arrived-on-scale.pdf Market Update: INX CCNA: https://thetokenizer.io/2023/07/11/inx-to-facilitate-ccnas-security-token-offering/ Boston & Alexander LLP: https://www.linkedin.com/pulse/boston-alexander-llp-launch-new-digital-security%3FtrackingId=ZRsGPQe4s5S3E%252BSJi1ZYvw%253D%253D/?trackingId=ZRsGPQe4s5S3E%2BSJi1ZYvw%3D%3D FraXion: https://www.prnewswire.com/news-releases/fraxion-launches-first-security-token-offering-in-the-us-301871577.html Ondo: https://decrypt.co/148370/ondo-finance-tokenized-treasuries-stablecoin-alternative-ethereum-polygon?amp=1 = Check out our Companies = Security Token Group: http://securitytokengroup.com/ Security Token Advisors: http://www.securitytokenadvisors.com/ Security Token Market: https://stm.co InvestReady: https://www.investready.com ⏰ TABLE OF CONTENTS ⏰ 0:49 Introduction: XRP's Impact on the Blockchain Ecosystem 1:51 UK Tokenization Adoption Plans, CCNA, IX Swap Launchpad, Mediobanca, WisdomTree | STSTOP5 7:52 Broadridge Report | Institutional Updates 10:38 INX CCNA, Boston & Alexander LLP, FraXion, Ondo Finance | Market Updates 13:04 Main Topic: XRP's Impact on the Blockchain Ecosystem 25:49 Companies of The Week: Cetif Advisory, Ondo Finance
IT Job Coach; Tips on Tech Resumes, Interviews, Cover Letters, and Job Hunting
Welcome to "Information Technology Certifications for Job Seekers", a podcast that delves into the significance of certifications for information technology professionals. In this episode, we explore how certifications can shape your career trajectory and provide a competitive advantage in the ever-evolving IT industry. From validating your expertise to standing out in a crowded job market, we uncover the various ways certifications can enhance your prospects. Join us as we discuss the value of certifications, the steps to select the right one, and the impact they can have on your professional growth. Whether you're an aspiring IT professional or a seasoned expert, this episode will shed light on the transformative role that certifications can play in your IT career. Get ready to unlock new opportunities and gain insights into the world of IT certifications. Tune in now to take the next step towards a brighter future in the IT job market! Get my FREE IT Job Interview Master Class: http://www.itjobcoach.com/interview Get a 40% advantage over other job applicants: https://itjobcoach.com/advantage/ Get the first chapter of my How to Find a Job book for FREE: https://losstoboss.com/freechapter Website: https://www.itjobcoach.com Full Show Notes: https://itjobcoach/episode8/
The great Marc Quibell visits The Brett Johnson Show for a chat. Marc Quibell is a cybersecurity blue team expert with over 30 years of professional IT experience. In addition to being an Infosec Skills author, he's a consultant and security architect with a Bachelors of Science in Technology Information Management from Upper Iowa University and an Associate of Applied Science in Computer Systems Networking from Texas State Technical College in Waco. Marc has been CISSP certified since 2009 and was previously CCNA, MCSE and CRISC certified. Marc is a fantastic individual.
If you're interested in hearing about the impact of hearing aids on quality of life in AD patients, or how having a stable life partner can slow down the progression of dementia, tune in to this episode on the latest in cognitive and behavioural research in Alzheimer's disease! Judy will cover 9 papers on sleep, depressive symptoms and sensory processing, all published in February 2023. This is one you don't want to miss! Sections in this episode: Sleep (2:42) Depressive Symptoms (8:05) Sensory Processing (12:59) -------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/14xA3SaK5dhw7mTZtseglFIAFW62Zfgm_/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Judy Cheng, edited by Michelle Grover, and reviewed by Naila Kuhlmann and Anusha Kamesh. The bibliography was made by Salodin Al-Achkar and wordcloud was created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For February 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
In today's episode, Naila provides you with an overview of 10 paper published in February 2023, on non-pharmacological therapies for Alzheimer's disease. You'll learn about a virtual reality intervention targeting anxiety, the signaling pathways underlying the potential benefits of acupuncture, the challenges of implementing new interventions, and what spectral light flicker means. Happy listening! Sections in this episode: Psychological Interventions (1:37) Physical Activity (7:26) Neuromodulatory Techniques (14:05) -------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1ZG-uORwCnfP383EN7-a2nlHQ0mczsKm-/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Naila Kuhlmann, edited by Scott Prins, and reviewed by Anusha Kamesh. The bibliography was made by Salodin Al-Achkar and wordcloud was created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For February 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
This short and sweet episode kicks off the February 2023 series, highlighting studies all the way from worms to humans. Anusha will take you through 9 papers that converge on targeting neuroprotection in Alzheimer's disease. If you're interested in learning about implicated pathways or potential therapeutics, this episode is sure to whet your appetite. Sections in this episode: Targeting Specific Neuroprotective Pathways (3:39) Targeting Neuroprotection Broadly (13.21) -------------------------------------------------------------- You can find the bibliography for this episode here, or by clicking the link below:https://drive.google.com/file/d/1n7wQss1hiT-FPjVYdYz8SRO89LYGi7O4/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted, hosted, and edited by Anusha Kamesh, and reviewed by Judy Cheng and Ellen Koch. The bibliography and wordcloud were created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For February 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, Judy Cheng, and Christy Yu, for keeping everything running smoothly. AMiNDR was founded in 2020 by Sarah Louadi, Ellen Koch, Elyn Rowe, and Naila Kuhlmann. Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Elyn's back with more insight from the field on how blood vessel health impacts brain health. Tune in for a journey through mechanisms underlying increased risk from "vascular risk factors" like hypertension, diabetes, and atrial fibrillation, lots of neuroimaging studies providing clinical insights, and several interesting novel therapeutic avenues. If you weren't already convinced that the vasculature is relevant in the context of AD, you sure will be after this episode! Sections in this episode: Cerebral blood flow and hypoperfusion (4:08) More clinical insights (10:53) Blood-brain barrier and amyloid-endothelial cell interactions (19:52) Therapeutic avenues targeting the vasculature (27:12) -------------------------------------------------------------- To find the numbered bibliography with all the papers covered in this episode, click here, or use the link below:https://drive.google.com/file/d/1jxLnkb02ovKVtHq_MNwg738QyyYWmA4y/viewTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- We at AMiNDR are eager to hear from you! We opened up a survey available until the end of April for you to tell us what we are doing well, and where we can improve. Access the survey at tinyurl.com/amindrsurvey. All survey responses will be anonymous. By doing the survey, you can choose to enter a draw for a $15USD gift card for any location you choose! -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Elyn Rowe, edited by Isabelle Vaux, and reviewed by Cassi Friday and Anusha Kamesh. The bibliography was made by Anjana Rajendran and wordcloud was created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, and Judy Cheng, for keeping everything running smoothly.Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
This episode covers some papers from January 2023 on treatments focused on repairing the neurotransmitter imbalance in Alzheimer's disease. We hope you enjoy listening as Christy summarizes this exciting research—from the discovery of new therapeutics to the synthesis of drugs. Sections in this episode:Drug Screening (3:37)New Drugs (7:00)Synthesized Drugs (13:35)-------------------------------------------------------------- To find the numbered bibliography with all the papers covered in this episode, click here, or use the link below:https://drive.google.com/file/d/1BkF6ofShRYL_ggRRFKvNsHvBz4PrLfXr/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- We at AMiNDR are eager to hear from you! We opened up a survey available until the end of April for you to tell us what we are doing well, and where we can improve. Access the survey at tinyurl.com/amindrsurvey. All survey responses will be anonymous. By doing the survey, you can choose to enter a draw for a $15USD gift card for any location you choose! -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Ellen Koch, edited by Michelle Grover, and reviewed by Christy Yu and Anusha Kamesh. The bibliography and wordcloud were created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, and Judy Cheng, for keeping everything running smoothly.Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
In today's episode of AMiNDR, Ellen will tell you all about the functional connectivity of different networks in the brain, and changes to brain structure and volume in Alzheimer's disease. This includes how these changes in the brain relate to cognitive changes, behavioural symptoms, and other neuropathological markers. There are many fascinating studies to hear about today! Sections in this episode: Functional Connectivity (4:26) Excitation/Inhibition Balance & Neuronal Hyperactivity (17:48) Structural Changes (23:07) -------------------------------------------------------------- To find the numbered bibliography with all the papers covered in this episode, click here, or use the link below:https://drive.google.com/file/d/1BkF6ofShRYL_ggRRFKvNsHvBz4PrLfXr/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- We at AMiNDR are eager to hear from you! We opened up a survey available until the end of April for you to tell us what we are doing well, and where we can improve. Access the survey at tinyurl.com/amindrsurvey. All survey responses will be anonymous. By doing the survey, you can choose to enter a draw for a $15USD gift card for any location you choose! -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Ellen Koch, edited by Michelle Grover, and reviewed by Christy Yu and Anusha Kamesh. The bibliography and wordcloud were created by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, and Judy Cheng, for keeping everything running smoothly.Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Naila covers 11 papers from January 2023, with a focus on a variety of stimulation techniques. You'll get a smattering of new research from humans to mice to flies, and from brain imaging to computer simulations to molecular mechanisms. Enjoy! Sections in this episode: Complementary therapies (2:55) Current and magnetic stimulation (7:25) Electroacupuncture (14:30) Other stimulation techniques (22:15) Other (25:52) -------------------------------------------------------------- To find the numbered bibliography with all the papers covered in this episode, click here, or use the link below:https://drive.google.com/file/d/15pdrQWDkOTA0XxP3flwu4xt5zNITNMRe/view?usp=share_linkTo access the folder with ALL our bibliographies, follow this link (it will be updated as we publish episodes and process bibliographies), or use the link below:https://drive.google.com/drive/folders/1bzSzkY9ZHzzY8Xhzt0HZfZhRG1Gq_Si-?usp=sharingYou can also find all of our bibliographies on our website: amindr.com. -------------------------------------------------------------- We at AMiNDR are eager to hear from you! We opened up a survey available until the end of April for you to tell us what we are doing well, and where we can improve. Access the survey at tinyurl.com/amindrsurvey. All survey responses will be anonymous. By doing the survey, you can choose to enter a draw for a $15USD gift card for any location you choose! -------------------------------------------------------------- Follow-up on social media for more updates!Twitter: @AMiNDR_podcastInstagram: @AMiNDR.podcastFacebook: AMiNDR Youtube: AMiNDR PodcastLinkedIn: AMiNDR PodcastEmail: amindrpodcast@gmail.com -------------------------------------------------------------- Please help us spread the word about AMiNDR to your friends, colleagues, and networks! And if you could leave us a rating and/or review on your streaming app of choice (Apple Podcasts, Spotify, or wherever you listen to the podcast), that would be greatly appreciated! It helps us a lot and we thank you in advance for leaving a review! Don't forget to subscribe to hear about new episodes as they come out too. Thank you to our sponsor, the Canadian Consortium of Neurodegeneration in Aging, or CCNA, for their financial support of this podcast. This helps us to stay on the air and bring you high quality episodes. You can find out more about the CCNA on their website: https://ccna-ccnv.ca/. Our team of volunteers works tirelessly each month to bring you every episode of AMiNDR. This episode was scripted and hosted by Naila Kuhlmann, edited by Isabelle Vaux, and reviewed by Anusha Kamesh. The bibliography was created by Salodin Al-Achkar and wordcloud was made by Lara Onbasi (www.wordart.com). Big thanks to the sorting team for taking on the enormous task of sorting all of the Alzheimer's Disease papers into episodes each month. For January 2023, the sorters were Elyn Rowe, Christy Yu, Eden Dubchak, Ben Cornish, Kevin Nishimura, Anelya Gandy, Salodin Al-Achkar, and Rob Cloke. Also, props to our management team, which includes Sarah Louadi, Ellen Koch, Naila Kuhlmann, Elyn Rowe, Anusha Kamesh, Lara Onbasi, Joseph Liang, and Judy Cheng, for keeping everything running smoothly.Our music is from "Journey of a Neurotransmitter" by musician and fellow neuroscientist Anusha Kamesh; you can find the original piece and her other music on soundcloud under Anusha Kamesh or on her YouTube channel, AKMusic. https://www.youtube.com/channel/UCMH7chrAdtCUZuGia16FR4w -------------------------------------------------------------- If you are interested in joining the team, send us your CV by email. We are specifically looking for help with sorting abstracts by topic, abstract summaries and hosting, audio editing, creating bibliographies, and outreach/marketing. However, if you are interested in helping in other ways, don't hesitate to apply anyways. --------------------------------------------------------------*About AMiNDR: * Learn more about this project and the team behind it by listening to our first episode: "Welcome to AMiNDR!"
Last month, the TikTok user TracketPacer posted a video online called “Network Engineering Facts to Impress No One at Zero Parties.” TracketPacer regularly posts fun, educational content about how the Internet operates. The account is run by a network engineer named Lexie Cooper, who has worked in a network operations center, or NOC, and who's earned her Cisco Certified Network Associate certificate, or CCNA. In the video, Cooper told listeners about the first spam email being sent over Arpanet, about how an IP address doesn't reveal that much about you, and about how Ethernet isn't really a cable—it's a protocol. But amidst Cooper's bite-sized factoids, a pair of comments she made about something else—the gender gap in the technology industry—set off a torrent of anger. As Cooper said in her video: “There are very few women in tech because there's a pervasive cultural idea that men are more logical than women and therefor better at technical, 'computery' things.” This, the Internet decided, would not stand. The IT industry is “not dominated by men, well actually, the women it self just few of them WANT to be engineer. So it's not man fault," said one commenter. “No one thinks it's because women can't be logical. They're finally figuring out those liberal arts degrees are worthless," said another. “The women not in computers fact is BS cuz the field was considered nerdy and uncool until shows like Big Bang Theory made it cool!” said yet another. The unfortunate reality facing many women in tech today is that, when they publicly address the gender gap in their field, they receive dozens of comments online that not only deny the reasons for the gender gap, but also, together, likely contribute to the gender gap. Nobody wants to work in a field where they aren't taken seriously, but that's what is happening. Today, on the Lock and Code podcast with host David Ruiz, we speak with Cooper about the gender gap in technology, what she did with the negative comments she received, and what, if anything, could help make technology a more welcoming space for women. One easy lesson, she said: "Guys... just don't hit on people at work. Just don't." Tune in today. You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use. Show notes and credits: Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 4.0 License http://creativecommons.org/licenses/by/4.0/ Outro Music: “Good God” by Wowa (unminus.com)
Today's guest is Steve Walbroehl, Chief Technology Officer / Chief Security Officer and cofounder of Halborn. Halborn is a blockchain cybersecurity firm that aims to secure the blockchain and protect users against data and monetary. Operating across the software development lifecycle, Halborn provides a suite of products and services designed to identify and close vulnerabilities in Web3 applications, helping to create the security standards that the market lacks. The company serves a diverse global client base spanning Layer 1 blockchains, infrastructure providers, financial institutions, and application and game developers. Halborn was founded in 2019 and is based in Miami, Florida. Steve has over 15 years of experience in cybersecurity, he is an expert, trainer, and technical leader in penetration testing, ethical hacking, web application, and cloud security, infrastructure security, vulnerability scanning and detection, IT compliance, and risk mitigation. He's worked with Fortune 500 companies spanning the Financial, Insurance, Mortgage, Technology, Utilities, Hospitality, and Blockchain industries. He holds several information technology and security certifications, including CISSP, CEH, CRISC, OSCP, OSWP, CISM, GWAPT, GAWN, AWS Solutions Architect Associate, CCNA, and Six Sigma. We begin our conversation by discussing the differences between traditional and crypto cybersecurity. Steve explains why security is the most important sector of industry, the crypto. We discuss why being a security specialist in crypto is very stressful. We discuss the connection between regulation and cybersecurity. We stress that regulation can foster decentralization and provide better user protection guidelines. Steve shares how the internet regulation during the early days of the internet could provide a blueprint for how to foster proper regulation and compliance in crypto. Our next conversation topic centered around the systemic risks that developed in DeFi due to greed. We discuss how greed fueled flawed protocol design spurring the wrong incentives resulted in the collapse of various centralized institutions. Steve expresses his concern about proof-of-stake as a centralizing force. Steve shares a story where he explains the systemic risks that can come from cross-chain liquidity, similar to the 2008 financial crisis. We transition our conversation to focus on the security risks in crypto. Steve explains the full spectrum of vulnerabilities that are present in crypto. We discuss how these vulnerabilities can be exploited and why a particular type of protocol is targeted more routinely than others. Steve explains that security in crypto requires taking into account technical vulnerabilities and socio-economic incentives to properly assess a project's vulnerabilities. Our next conversation topic centered around Halborn. Steve shares that one of the requirements to work as a security engineer at Halborn is to hack their way in. We discuss how coding and security testing is both an art and a science. We discuss the security of SHA-256 and why Bitcoin was a cryptography marvel. Our conversation transitions to focus on Seraph, the world's first blockchain security notary platform powered by Halborn. Steve explains how Seraph can help provide a security framework and guardrails for projects looking to standardized security practices. Our final discussion topic centered around the connection between adoption and security. Steve explains how increased security will lead to increased adoption of DeFi. Please enjoy my conversation with Steve Walbroehl.
About AshishAshish has over 13+yrs experience in the Cybersecurity industry with the last 7 focusing primarily helping Enterprise with managing security risk at scale in cloud first world and was the CISO of a global Cloud First Tech company in his last role. Ashish is also a keynote speaker and host of the widely poplar Cloud Security Podcast, a SANS trainer for Cloud Security & DevSecOps. Ashish currently works at Snyk as a Principal Cloud Security Advocate. He is a frequent contributor on topics related to public cloud transformation, Cloud Security, DevSecOps, Security Leadership, future Tech and the associated security challenges for practitioners and CISOs.Links Referenced: Cloud Security Podcast: https://cloudsecuritypodcast.tv/ Personal website: https://www.ashishrajan.com/ LinkedIn: https://www.linkedin.com/in/ashishrajan/ Twitter: https://twitter.com/hashishrajan Cloud Security Podcast YouTube: https://www.youtube.com/c/CloudSecurityPodcast Cloud Security Podcast LinkedIn: https://www.linkedin.com/company/cloud-security-podcast/ TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: This episode is sponsored in part by our friends at Thinkst Canary. Most folks find out way too late that they've been breached. Thinkst Canary changes this. Deploy canaries and canary tokens in minutes, and then forget about them. Attackers tip their hand by touching them, giving you one alert, when it matters. With zero administrative overhead to this and almost no false positives, Canaries are deployed and loved on all seven continents. Check out what people are saying at canary.love today. Corey: This episode is bought to you in part by our friends at Veeam. Do you care about backups? Of course you don't. Nobody cares about backups. Stop lying to yourselves! You care about restores, usually right after you didn't care enough about backups. If you're tired of the vulnerabilities, costs and slow recoveries when using snapshots to restore your data, assuming you even have them at all living in AWS-land, there is an alternative for you. Check out Veeam, thats V-E-E-A-M for secure, zero-fuss AWS backup that won't leave you high and dry when it's time to restore. Stop taking chances with your data. Talk to Veeam. My thanks to them for sponsoring this ridiculous podcast.Corey: Welcome to Screaming in the Cloud. I'm Corey Quinn. This promoted episode is brought to us once again by our friends at Snyk. Snyk does amazing things in the world of cloud security and terrible things with the English language because, despite raising a whole boatload of money, they still stubbornly refuse to buy a vowel in their name. I'm joined today by Principal Cloud Security Advocate from Snyk, Ashish Rajan. Ashish, thank you for joining me.Corey: Your history is fascinating to me because you've been around for a while on a podcast of your own, the Cloud Security Podcast. But until relatively recently, you were a CISO. As has become relatively accepted in the industry, the primary job of the CISO is to get themselves fired, and then, “Well, great. What's next?” Well, failing upward is really the way to go wherever possible, so now you are at Snyk, helping the rest of us fix our security. That's my headcanon on all of that anyway, which I'm sure bears scant, if any, resemblance to reality, what's your version?Ashish: [laugh]. Oh, well, fortunately, I wasn't fired. And I think I definitely find that it's a great way to look at the CISO job to walk towards the path where you're no longer required because then I think you've definitely done your job. I moved into the media space because we got an opportunity to go full-time. I spoke about this offline, but an incident inspired us to go full-time into the space, so that's what made me leave my CISO job and go full-time into democratizing cloud security as much as possible for anyone and everyone. So far, every day, almost now, so it's almost like I dream about cloud security as well now.Corey: Yeah, I dream of cloud security too, but my dreams are of a better world in which people didn't tell me how much they really care about security in emails that demonstrate how much they failed to care about security until it was too little too late. I was in security myself for a while and got out of it because I was tired of being miserable all the time. But I feel that there's a deep spiritual alignment between people who care about cost and people who care about security when it comes to cloud—or business in general—because you can spend infinite money on those things, but it doesn't really get your business further. It's like paying for fire insurance. It isn't going to get you to your next milestone, whereas shipping faster, being more effective at launching a feature into markets, that can multiply revenue. That's what companies are optimized around. It's, “Oh, right. We have to do the security stuff,” or, “We have to fix the AWS billing piece.” It feels, on some level, like it's a backburner project most of the time and it's certainly invested in that way. What's your take on that?Ashish: I tend to disagree with that, for a couple reasons.Corey: Excellent. I love arguments.Ashish: I feel this in a healthy way as well. A, I love the analogy of spiritual animals where they are cost optimization as well as the risk aversion as well. I think where I normally stand—and this is what I had to unlearn after doing years of cybersecurity—was that initially, we always used to be—when I say ‘we,' I mean cybersecurity folks—we always used to be like police officers. Is that every time there's an incident, it turns into a crime scene, and suddenly we're all like, “Pew, pew, pew,” with trying to get all the evidence together, let's make this isolated as much—as isolated as possible from the rest of the environment, and let's try and resolve this.I feel like in Cloud has asked people to become more collaborative, which is a good problem to have. It also encourages that, I don't know how many people know this, but the reason we have brakes in our cars is not because we can slow down the car; it's so that we can go faster. And I feel security is the same thing. The guardrails we talk about, the risks that you're trying to avert, the reason you're trying to have security is not to slow down but to go faster. Say for example in an ideal world, to quote what you were saying earlier if we were to do the right kind of encryption—I'm just going to use the most basic example—if we just do encryption, right, and just ensure that as a guardrail, the entire company needs to have encryption at rest, encryption in transit, period, nothing else, no one cares about anything else.But if you just lay that out as a framework and this is our guardrail, no one brakes this, and whoever does, hey we—you know, slap on the wrist and come back on to the actual track, but keep going forward. That just means any project that comes in that meets [unintelligible 00:04:58] criteria. Keeps going forward, as many times we want to go into production. Doesn't matter. So, that is the new world of security that we are being asked to move towards where Amazon re:Invent is coming in, there will be another, I don't know, three, four hundred services that will be released. How many people, irrespective of security, would actually know all of those services? They would not. So, [crosstalk 00:05:20]—Corey: Oh, we've long since passed the point where I can convincingly talk about AWS services that don't really exist and not get called out on it by Amazon employees. No one keeps them on their head. Except me because I'm sad.Ashish: Oh, no, but I think you're right, though. I can't remember who was it—maybe Andrew Vogel or someone—they didn't release a service which didn't exist, and became, like, a thing on Twitter. Everyone—Corey: Ah, AWS's Infinidash. I want to say that was Joe Nash out of Twilio at the time. I don't recall offhand if I'm right on that, but that's how it feels. Yeah, it was certainly not me. People said that was my idea. Nope, nope, I just basically amplified it to a huge audience.But yeah, it was a brilliant idea, just because it's a fake service so everyone could tell stories about it. And amazing product feedback, if you look at it through the right lens of how people view your company and your releases when they get this perfect, platonic ideal of what it is you might put out there, what do people say about it?Ashish: Yeah. I think that's to your point, I will use that as an example as well to talk about things that there will always be a service which we will be told about for the first time, which we will not know. So, going back to the unlearning part, as a security team, we just have to understand that we can't use the old ways of, hey, I want to have all the controls possible, cover all there is possible. I need to have a better understanding of all the cloud services because I've done, I don't know, 15 years of cloud, there is no one that has 10, 15 years of cloud unless you're I don't know someone from Amazon employee yourself. Most people these days still have five to six years experience and they're still learning.Even the cloud engineering folks or the DevOps folks, they're all still learning and the tooling is continuing to evolve. So yeah, I think I definitely find that the security in this cloud world a lot more collaborative and it's being looked at as the same function as a brake would have in car: to help you go faster, not to just slam the brake every time it's like, oh, my God, is the situation isolated and to police people.Corey: One of the points I find that is so aligned between security and cost—and you alluded to it a minute ago—is the idea of helping companies go faster safely. To that end, guardrails have to be at least as easy as just going off and doing it cow-person style. Because if it's not, it's more work in any way, shape, or form, people won't do it. People will not tag their resources by hand, people will not go through and use the dedicated account structure you've got that gets in their way and screams at them every time they try to use one of the native features built into the platform. It has to get out of their way and make things easier, not worse, or people fight it, they go around it, and you're never going to get buy-in.Ashish: Do you feel like cost is something that a lot more people pay a lot more attention to because, you know, that creeps into your budget? Like, as people who've been leaders before, and this was the conversation, they would just go, “Well, I only have, I don't know, 100,000 to spend this quarter,” or, “This year,” and they are the ones who—are some of them, I remember—I used to have this manager, once, a CTO would always be conscious about the spend. It's almost like if you overspend, where do you get the money from? There's no money to bring in extra. Like, no. There's a set money that people plan for any year for a budget. And to your point about if you're not keeping an eye on how are we spending this in the AWS context because very easy to spend the entire money in one day, or in the cloud context. So, I wonder if that is also a big driver for people to feel costs above security? Where do you stand on that?Corey: When it comes to cost, one of the nice things about it—and this is going to sound sarcastic, but I swear to you it's not—it's only money.Ashish: Mmm.Corey: Think about that for a second because it's true. Okay, we wound up screwing up and misconfiguring something and overspending. Well, there are ways around that. You can call AWS, you can get credits, you can get concessions made for mistakes, you can sign larger contracts and get a big pile of proof of concept credit et cetera, et cetera. There are ways to make that up, whereas with security, it's there are no do-overs on security breaches.Ashish: No, that's a good point. I mean, you can always get more money, use a credit card, worst case scenario, but you can't do the same for—there's a security breach and suddenly now—hopefully, you don't have to call New York Times and say, “Can you undo that article that you just have posted that told you it was a mistake. We rewinded what we did.”Corey: I'm curious to know what your take is these days on the state of the cloud security community. And the reason I bring that up is, well, I started about a year-and-a-half ago now doing a podcast every Thursday. Which is Last Week in AWS: Security Edition because everything else I found in the industry that when I went looking was aimed explicitly at either—driven by the InfoSec community, which is toxic and a whole bunch of assumed knowledge already built in that looks an awful lot like gatekeeping, which is the reason I got out of InfoSec in the first place, or alternately was completely vendor-captured, where, okay, great, we're going to go ahead and do a whole bunch of interesting content and it's all brought to you by this company and strangely, all of the content is directly align with doing some pretty weird things that you wouldn't do unless you're trying to build a business case for that company's product. And it just feels hopelessly compromised. I wanted to find something that was aimed at people who had to care about security but didn't have security as part of their job title. Think DevOps types and you're getting warmer.That's what I wound up setting out to build. And when all was said and done, I wasn't super thrilled with, honestly, how alone it still felt. You've been doing this for a while, and you're doing a great job at it, don't get me wrong, but there is the question that—and I understand they're sponsoring this episode, but the nice thing about promoted guest episodes is that they can buy my attention, not my opinion. How do you retain creative control of your podcast while working for a security vendor?Ashish: So, that's a good question. So, Snyk by themselves have not ever asked us to change any piece of content; we have been working with them for the past few months now. The reason we kind of came along with Snyk was the alignment. And we were talking about this earlier for I totally believe that DevSecOps and cloud security are ultimately going to come together one day. That may not be today, that may not be tomorrow, that may not be in 2022, or maybe 2023, but there will be a future where these two will sit together.And the developer-first security mentality that they had, in this context from cloud prospective—developers being the cloud engineers, the DevOps people as you called out, the reason you went in that direction, I definitely want to work with them. And ultimately, there would never be enough people in security to solve the problem. That is the harsh reality. There would never be enough people. So, whether it's cloud security or not, like, for people who were at AWS re:Inforce, the first 15 minutes by Steve Schmidt, CSO of Amazon, was get a security guardian program.So, I've been talking about it, everyone else is talking about right now, Amazon has become the first CSP to even talk about this publicly as well that we should have security guardians. Which by the way, I don't know why, but you can still call it—it is technically DevSecOps what you're trying to do—they spoke about a security champion program as part of the keynote that they were running. Nothing to do with cloud security, but the idea being how much of this workload can we share? We can raise, as a security team—for people who may be from a security background listening to this—how much elevation can we provide the risk in front of the right people who are a decision-maker? That is our role.We help them with the governance, we help with managing it, but we don't know how to solve the risk or close off a risk, or close off a vulnerability because you might be the best person because you work in that application every day, every—you know the bandages that are put in, you know all the holes that are there, so the best threat model can be performed by the person who works on a day-to-day, not a security person who spent, like, an hour with you once a week because that's the only time they could manage. So, going back to the Snyk part, that's the mission that we've had with the podcast; we want to democratize cloud security and build a community around neutral information. There is no biased information. And I agree with what you said as well, where a lot of the podcasts outside of what we were finding was more focused on, “Hey, this is how you use AWS. This is how you use Azure. This is how you use GCP.”But none of them were unbiased in the opinion. Because real life, let's just say even if I use the AWS example—because we are coming close to the AWS re:Invent—they don't have all the answers from a security perspective. They don't have all the answers from an infrastructure perspective or cloud-native perspective. So, there are some times—or even most times—people are making a call where they're going outside of it. So, unbiased information is definitely required and it is not there enough.So, I'm glad that at least people like yourself are joining, and you know, creating the world where more people are trying to be relatable to DevOps people as well as the security folks. Because it's hard for a security person to be a developer, but it's easy for a developer or an engineer to understand security. And the simplest example I use is when people walk out of their house, they lock the door. They're already doing security. This is the same thing we're asking when we talk about security in the cloud or in the [unintelligible 00:14:49] as well. Everyone is, it just it hasn't been pointed out in the right way.Corey: I'm curious as to what it is that gets you up in the morning. Now, I know you work in security, but you're also not a CISO anymore, so I'm not asking what gets you up at 2 a.m. because we know what happens in the security space, then. There's a reason that my area of business focus is strictly a business hours problem. But I'd love to know what it is about cloud security as a whole that gets you excited.Ashish: I think it's an opportunity for people to get into the space without the—you know, you said gatekeeper earlier, those gatekeepers who used to have that 25 years experience in cybersecurity, 15 years experience in cybersecurity, Cloud has challenged that norm. Now, none of that experience helps you do AWS services better. It definitely helps you with the foundational pieces, definitely helps you do identity, networking, all of that, but you still have to learn something completely new, a new way of working, which allows for a lot of people who earlier was struggling to get into cybersecurity, now they have an opening. That's what excites me about cloud security, that it has opened up a door which is beyond your CCNA, CISSP, and whatever else certification that people want to get. By the way, I don't have a CISSP, so I can totally throw CISSP under the bus.But I definitely find that cloud security excites me every morning because it has shown me light where, to what you said, it was always a gated community. Although that's a very huge generalization. There's a lot of nice people in cybersecurity who want to mentor and help people get in. But Cloud security has pushed through that door, made it even wider than it was before.Corey: I think there's a lot to be said for the concept of sending the elevator back down. I really have remarkably little patience for people who take the perspective of, “Well, I got mine so screw everyone else.” The next generation should have it easier than we did, figuring out where we land in the ecosystem, where we live in the space. And there are folks who do a tremendous job of this, but there are also areas where I think there is significant need for improvement. I'm curious to know what you see as lacking in the community ecosystem for folks who are just dipping their toes into the water of cloud security.Ashish: I think that one, there's misinformation as well. The first one being, if you have never done IT before you can get into cloud security, and you know, you will do a great job. I think that is definitely a mistake to just accept the fact if Amazon re:Invent tells you do all these certifications, or Azure does the same, or GCP does the same. If I'll be really honest—and I feel like I can be honest, this is a safe space—that for people who are listening in, if you're coming to the space for the first time, whether it's cloud or cloud security, if you haven't had much exposure to the foundational pieces of it, it would be a really hard call. You would know all the AWS services, you will know all the Azure services because you have your certification, but if I was to ask you, “Hey, help me build an application. What would be the architecture look like so it can scale?”“So, right now we are a small pizza-size ten-people team”—I'm going to use the Amazon term there—“But we want to grow into a Facebook tomorrow, so please build me an architecture that can scale.” And if you regurgitate what Amazon has told you, or Azure has told you, or GCP has told you, I can definitely see that you would struggle in the industry because that's not how, say every application is built. Because the cloud service provider would ask you to drink the Kool-Aid and say they can solve all your problems, even though they don't have all the servers in the world. So, that's the first misinformation.The other one too, for people who are transitioning, who used to be in IT or in cybersecurity and trying to get into the cloud security space, the challenge over there is that outside of Amazon, Google, and Microsoft, there is not a lot of formal education which is unbiased. It is a great way to learn AWS security on how amazing AWS is from AWS people, the same way Microsoft will be [unintelligible 00:19:10], however, when it comes down to actual formal education, like the kind that you and I are trying to provide through a podcast, me with the Cloud Security Podcast, you with Last Week in AWS in the Security Edition, that kind of unbiased formal education, like free education, like what you and I are doing does definitely exist and I guess I'm glad we have company, that you and I both exist in this space, but formal education is very limited. It's always behind, say an expensive paid wall sometimes, and rightly so because it's information that would be helpful. So yeah, those two things. Corey: This episode is sponsored in part by our friends at Uptycs. Attackers don't think in silos, so why would you have siloed solutions protecting cloud, containers, and laptops distinctly? Meet Uptycs - the first unified solution prioritizes risk across your modern attack surface—all from a single platform, UI, and data model. Stop by booth 3352 at AWS re:Invent in Las Vegas to see for yourself and visit uptycs.com. That's U-P-T-Y-C-S.com. Corey: One of the problems that I have with the way a lot of cloud security stuff is situated is that you need to have something running to care about the security of. Yeah, I can spin up a VM in the free tier of most of these environments, and okay, “How do I secure a single Linux box?” Okay, yes, there are a lot of things you can learn there, but it's very far from a holistic point of view. You need to have the infrastructure running at reasonable scale first, in order to really get an effective lab that isn't contrived.Now, Snyk is a security company. I absolutely understand and have no problem with the fact that you charge your customers money in order to get security outcomes that are better than they would have otherwise. I do not get why AWS and GCP charge extra for security. And I really don't get why Azure charges extra for security and then doesn't deliver security by dropping the ball on it, which is neither here nor there.Ashish: [laugh].Corey: It feels like there's an economic form of gatekeeping, where you must spend at least this much money—or work for someone who does—in order to get exposure to security the way that grownups think about it. Because otherwise, all right, I hit my own web server, I have ten lines in the logs. Now, how do I wind up doing an analysis run to figure out what happened? I pull it up on my screen and I look at it. You need a point of scale before anything that the modern world revolves around doesn't seem ludicrous.Ashish: That's a good point. Also because we don't talk about the responsibility that the cloud service provider has themselves for security, like the encryption example that I used earlier, as a guardrail, it doesn't take much for them to enable by default. But how many do that by default? I feel foolish sometimes to tell people that, “Hey, you should have encryption enabled on your storage which is addressed, or in transit.”It should be—like, we have services like Let's Encrypt and other services, which are trying to make this easily available to everyone so everyone can do SSL or HTTPS. And also, same goes for encryption. It's free and given the choice that you can go customer-based keys or your own key or whatever, but it should be something that should be default. We don't have to remind people, especially if you're the providers of the service. I agree with you on the, you know, very basic principle of why do I pay extra for security, when you should have already covered this for me as part of the service.Because hey, technically, aren't you also responsible in this conversation? But the way I see shared responsibility is that—someone on the podcast mentioned it and I think it's true—shared responsibility means no one's responsible. And this is the kind of world we're living in because of that.Corey: Shared responsibility has always been an odd concept to me because AWS is where I first encountered it and they, from my perspective, turn what fits into a tweet into a 45-minute dog-and-pony show around, “Ah, this is how it works. This is the part we're responsible for. This is the part where the customer responsibility is. Now, let's have a mind-numbingly boring conversation around it.” Whereas, yeah, there's a compression algorithm here. Basically, if the cloud gets breached, it is overwhelmingly likely that you misconfigured something on your end, not the provider doing it, unless it's Azure, which is neither here nor there, once again.The problem with that modeling, once you get a little bit more business sophistication than I had the first time I made the observation, is that you can't sit down with a CISO at a company that just suffered a data breach and have your conversation be, “Doesn't it suck to be you—[singing] duh, duh—because you messed up. That's it.” You need that dog-and-pony show of being able to go in-depth and nuance because otherwise, you're basically calling out your customer, which you can't really do. Which I feel occludes a lot of clarity for folks who are not in that position who want to understand these things a bit better.Ashish: You're right, Corey. I think definitely I don't want to be in a place where we're definitely just educating people on this, but I also want to call out that we are in a world where it is true that Amazon, Azure, Google Cloud, they all have vulnerabilities as well. Thanks to research by all these amazing people on the internet from different companies out there, they've identified that, hey, these are not pristine environments that you can go into. Azure, AWS, Google Cloud, they themselves have vulnerabilities, and sometimes some of those vulnerabilities cannot be fixed until the customer intervenes and upgrades their services. We do live in a world where there is not enough education about this as well, so I'm glad you brought this up because for people who are listening in, I mean, I was one of those people who would always say, “When was the last time you heard Amazon had a breach?” Or, “Microsoft had a breach?” Or, “Google Cloud had a breach?”That was the idea when people were just buying into the concept of cloud and did not trust cloud. Every cybersecurity person that I would talk to they're like, “Why would you trust cloud? Doesn't make sense.” But this is, like, seven, eight years ago. Fast-forward to today, it's almost default, “Why would you not go into cloud?”So, for people who tend to forget that part, I guess, there is definitely a journey that people came through. With the same example of multi-factor authentication, it was never a, “Hey, let's enable password and multi-factor authentication.” It took a few stages to get there. Same with this as well. We're at that stage where now cloud service providers are showing the kinks in the armor, and now people are questioning, “I should update my risk matrix for what if there's actually a breach in AWS?”Now, Capital One is a great example where the Amazon employee who was sentenced, she did something which has—never even [unintelligible 00:25:32] on before, opened up the door for that [unintelligible 00:25:36] CISO being potentially sentenced. There was another one. Because it became more primetime news, now people are starting to understand, oh, wait. This is not the same as it used to be. Cloud security breaches have evolved as well.And just sticking to the Uber point, when Uber has that recent breach where they were talking about, “Hey, so many data records were gone,” what a lot of people did not talk about in that same message, it also mentioned the fact that, hey, they also got access to the AWS console of Uber. Now, that to me, is my risk metrics has already gone higher than where it was before because it just not your data, but potentially your production, your pre-prod, any development work that you were doing for, I don't know, self-driving cars or whatever that Uber [unintelligible 00:26:18] is doing, all that is out on the internet. But who was talking about all of that? That's a much worse a breach than what was portrayed on the internet. I don't know, what do you think?Corey: When it comes to trusting providers, where I sit is that I think, given their scale, they need to be a lot more transparent than they have been historically. However, I also believe that if you do not trust that these companies are telling you the truth about what they're doing, how they're doing it, what their controls are, then you should not be using them as a customer, full stop. This idea of confidential computing drives me nuts because so much of it is, “Well, what if we assume our cloud provider is lying to us about all of these things?” Like, hypothetically there's nothing stopping them from building an exact clone of their entire control plane that they redirect your request to that do something completely different under the hood. “Oh, yeah, of course, we're encrypting it with that special KMS key.” No, they're not. For, “Yeah, sure we're going to put that into this region.” Nope, it goes right back to Virginia. If you believe that's what's going on and that they're willing to do that, you can't be in cloud.Ashish: Yeah, a hundred percent. I think foundational trust need to exist and I don't think the cloud service providers themselves do a great job of building that trust. And maybe that's where the drift comes in because the business has decided they're going to cloud. The cyber security people are trying to be more aware and asking the question, “Hey, why do we trust it so blindly? I don't have a pen test report from Amazon saying they have tested service.”Yes, I do have a certificate saying it's PCI compliant, but how do I know—to what you said—they haven't cloned our services? Fortunately, businesses are getting smarter. Like, Walmart would never have their resources in AWS because they don't trust them. It's a business risk if suddenly they decide to go into that space. But the other way around, Microsoft may decides tomorrow that they want to start their own Walmart. Then what do you do?So, I don't know how many people actually consider that as a real business risk, especially because there's a word that was floating around the internet called supercloud. And the idea behind this was—oh, I can already see your reaction [laugh].Corey: Yeah, don't get me started on that whole mess.Ashish: [laugh]. Oh no, I'm the same. I'm like, “What? What now?” Like, “What are you—” So, one thing I took away which I thought was still valuable was the fact that if you look at the cloud service providers, they're all like octopus, they all have tentacles everywhere.Like, if you look at the Amazon of the world, they not only a bookstore, they have a grocery store, they have delivery service. So, they are into a lot of industries, the same way Google Cloud, Microsoft, they're all in multiple industries. And they can still have enough money to choose to go into an industry that they had never been into before because of the access that they would get with all this information that they have, potentially—assuming that they [unintelligible 00:29:14] information. Now, “Shared responsibility,” quote-unquote, they should not do it, but there is nothing stopping them from actually starting a Walmart tomorrow if they wanted to.Corey: So, because a podcast and a day job aren't enough, what are you going to be doing in the near future given that, as we record this, re:Invent is nigh?Ashish: Yeah. So, podcasting and being in the YouTube space has definitely opened up the creative mindset for me. And I think for my producer as well. We're doing all these exciting projects. We have something called Cloud Security Villains that is coming up for AWS re:Invent, and it's going to be released on our YouTube channel as well as my social media.And we'll have merchandise for it across the re:Invent as well. And I'm just super excited about the possibility that media as a space provides for everyone. So, for people who are listening in and thinking that, I don't know, I don't want to write for a blog or email newsletter or whatever the thing may be, I just want to put it out there that I used to be excited about AWS re:Invent just to understand, hey, hopefully, they will release a new security service. Now, I get excited about these events because I get to meet community, help them, share what they have learned on the internet, and sound smarter [laugh] as a result of that as well, and get interviewed where people like yourself. But I definitely find that at the moment with AWS re:Invent coming in, a couple of things that are exciting for me is the release of the Cloud Security Villains, which I think would be an exciting project, especially—hint, hint—for people who are into comic books, you will definitely enjoy it, and I think your kids will as well. So, just in time for Christmas.Corey: We will definitely keep an eye out for that and put a link to that in the show notes. I really want to thank you for being so generous with your time. If people want to learn more about what you're up to, where's the best place for them to find you?Ashish: I think I'm fortunate enough to be at that stage where normally if people Google me—and it's simply Ashish Rajan—they will definitely find me [laugh]. I'll be really hard for them not find me on the internet. But if you are looking for a source of unbiased cloud security knowledge, you can definitely hit up cloudsecuritypodcast.tv or our YouTube and LinkedIn channel.We go live stream every week with a new guest talking about cloud security, which could be companies like LinkedIn, Twilio, to name a few that have come on the show already, and a lot more than have come in and been generous with their time and shared how they do what they do. And we're fortunate that we get ranked top 100 in America, US, UK, as well as Australia. I'm really fortunate for that. So, we're doing something right, so hopefully, you get some value out of it as well when you come and find me.Corey: And we will, of course, put links to all of that in the show notes. Thank you so much for being so generous with your time. I really appreciate it.Ashish: Thank you, Corey, for having me. I really appreciate this a lot. I enjoyed the conversation.Corey: As did I. Ashish Rajan, Principal Cloud Security Advocate at Snyk who is sponsoring this promoted guest episode. I'm Cloud Economist Corey Quinn, and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast platform of choice, whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice, along with an insulting comment pointing out that not every CISO gets fired; some of them successfully manage to blame the intern.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.Announcer: This has been a HumblePod production. Stay humble.
Hannah Walker, RCDD, CCNA, Chief Operating Officer at Sinclair Digital, joins the show to discuss innovative building energy systems - energy storage, digital electricity, and power over ethernet - and share insights into transition from architecture to networking and energy systems. You'll hear about transitioning electrical components from high voltage to low voltage DC, power over ethernet (PoE), digital energy, DC micro grid systems, energy flow process, and so much more! Hannah Walker, RCDD, CCNA | Email Sinclair Digital | https://sinclair-digital.com/ (Website) | https://www.linkedin.com/company/sinclair-digital-services/ (LinkedIn) As heard on the show: Podcast: https://player.captivate.fm/episode/7e334f2d-432a-4f69-9543-389f386f741a (Detailed: An original podcast by ARCAT, Episode 22: Passive House & PoE | Hotel Marcel) Thank you to our sponsors! https://bqe.com/masterclass (BQE CORE) Start implementing powerful systems for the profitability you need and the freedom you want. Join Douglas Tieger, FAIA for the next Designing Your Business Masterclass, brought to you by BQE CORE. Every live masterclass session is free and includes AIA continuing education credit. Register now at https://bqe.com/masterclass (bqe.com/masterclass). Show Music: Intro - "Keep Calm and Chill" by Soundroll Outro - "Backyard" by Gregory David If you enjoy our content, you can check out similar content from our fellow creators at https://gablmedia.com/ (Gābl Media). Spaces Podcast https://spaces-podcast.captivate.fm (Spaces Podcast website) Spaces Podcast // Gābl Media All rights reserved