Podcasts about cti

  • 547PODCASTS
  • 1,108EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Nov 7, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cti

Show all podcasts related to cti

Latest podcast episodes about cti

Scaling UP! H2O
449 Michael Bourgeois on AWT Partnerships and Professional Growth

Scaling UP! H2O

Play Episode Listen Later Nov 7, 2025 76:49


Get stuck in – Michael Bourgeois, CWT How do standards get written in ways that working water treaters can actually meet? In this conversation, AWT Past President, current Related Trade Organization (RTO) Committee Chair, and Chemco Products Company Operations Manager, Michael Bourgeois CWT, explains how AWT's liaisons collaborate with peer organizations, so guidance reflects field reality—operations, risk, and achievable compliance.  From Field Bags to Board Rooms: Why RTOs Matter  Bourgeois outlines the purpose of AWT's RTO structure: volunteer liaisons track and influence work at groups whose missions overlap with industrial water—CTI, ABMA, ASHRAE, AWWA, ASHE, and others. The aim is simple and practical: make sure member voices are heard so guidance advances health outcomes (e.g., Legionella control) and day-to-day feasibility for service providers and suppliers.  Turning Reaction into Proaction  Historically, the industry learned about new rules after they landed. Bourgeois details how AWT is shifting to co-authoring cooling-water guidelines with CTI and re-engaging ABMA, so boiler-water limits and methods reflect current technologies and operations. The model: clarify shared goals, contribute content expertise, and formalize collaboration so members get usable documents at member pricing.  Concrete Moves: Boiler Water, Healthcare, and More  Examples include AWT's role on ABMA's Boiler Expo steering committee (with a focused water-treatment training block) and early conversations with ASHE on pathogen control in building and healthcare water systems. He describes how liaisons feed updates into a formal committee cadence, so the AWT Board and members see progress—not just headlines.  When working professionals help write the playbook, outcomes improve clients, operators, and public health—and members stop "reacting" to standards they had no hand in shaping.  Listen to the full conversation above. Explore related episodes below.   Stay engaged, keep learning, and continue scaling up your knowledge!     Timestamps   00:02:28 - Trace Blackmore shares his AWT excitement & community shout-outs  00:05:16 - Water You Know with James McDonald  00:06:44 - The magic of the Scaling Up buttons (why & how to use them)  00:20:25 - North Metal Quarterly Magazine (Grab physical copy by visiting Booth 212)  00:27:00 - Interview starts: Mike Bourgeois (Chemco; AWT Past President; RTO Chair)  00:33:58 - What is the RTO Committee and why it exists  00:36:31 - The 10 formal collaborators + 4–6 informal  00:36:43 - AWWA/ASDWA (Joe Hannigan); Premise plumbing link  00:38:19 - ASHE (healthcare engineering) early wins (Reid Hutchinson)  00:38:47 - ABMA (boilers) momentum (Steve Jobin) + Women of Boilers  00:40:28 - CTI (Mike); CDC (Patsy Root); WEF (Brian Liotta)  00:40:46 - AMPP (formerly NACE) (Jay Farmerie); WQA (Chuck Hamrick)  00:41:19 - ASHRAE (Bill Pearson) & the impact on Std 188  00:45:26 - Principle: Be proactive so standards are achievable for members  00:47:34 - Boiler Expo: half-day on water treatment (economics, pretreatment, failures, regs)  00:50:56 - Where to learn about RTO work  00:54:19 - Volunteers needed: attributes of great liaisons  00:58:48 - Breakthrough: ABMA boiler water guideline refresh (toward ASME alignment)  01:01:02 - Potential collaboration with ASHE on pathogen control guidance  01:01:39 - What Mike's most excited to see at the Broadmoor  01:02:22 - Mike's session: new OSHA walk-around rules  01:02:51 - Theme of the conversation: "Get stuck in" (join committees)    Quotes  "The button is magic—it breaks the ice for you and starts real conversations."  "Talk to every single booth. A year from now, you'll remember exactly who can help."   "RTO stands for Related Trade Organization—our way to shape the standards that shape us."   "Why write a standard no one can achieve? AWT's role is to make it achievable."   "If you want to help AWT, get stuck in. Volunteer. It pays back 10 to 100-fold."   "AWT's RTO liaisons keep members' interests represented before rules and guidelines are finalized—so they're practical and achievable."  "Look for committees aligned with your strengths."    Connect with Michael Bourgeois Email: mbourgeois@chemcoprod.com   Website: Home | Chemco Products Company  LinkedIn: Michael Bourgeois, CWT | LinkedIn  https://www.linkedin.com/company/chemco-products-company/     Guest Resources Mentioned   ABMA's Boiler Water Quality Requirements and Associated Steam Quality for Industrial/Commercial and Institutional Boilers  Atlas Shrugged (Centennial Ed.) Hardcover – April 21, 2005 by Ayn Rand  AWT Committee  AWT Get Involved  Cancer Ward: A Novel (FSG Classics) Paperback – April 14, 2015 by Aleksandr Solzhenitsyn (Author)  Cooling Technology Institute (CTI)  Fossil Future: Why Global Human Flourishing Requires More Oil, Coal, and Natural Gas--Not Less Hardcover – by Alex Epstein   Signature in the Cell: DNA and the Evidence for Intelligent Design Paperback – Illustrated, June 22, 2010 by Stephen C. Meyer  WTG-126: The Use of Non-Oxidizing Biocides in Cooling Water Systems    Scaling UP! H2O Resources Mentioned  380 The WOW Effect: Women Leading Transformation in the Water Industry  447 Unlocking Team Potential with Culture Index with Randi Fargen  ASHE's "Water Management in Health Care Facilities: Complying with ASHRAE Standard 188"  ASPE's Engineering Methodologies to Reduce the Risk of Legionella in Premise Plumbing Systems  ASSE 12080 Training & Certification, Get certified to the ASSE/IAPMO/ANSI 12080 Standard: Professional Qualifications Standard for Legionella Water Safety and Management Personnel  AWT (Association of Water Technologies)   AWT's Legionella 2019: A Position Statement and Guidance Document  North Metal & Chemical Co Quarterly Magazine Issue 3 -page 8 for Trace Blackmore Story  Scaling UP! H2O Academy video courses  Start with Why Simon Sinek - TedTalk  Submit a Show Idea  The 6 Types of Working Genius  The Rising Tide Mastermind    Water You Know with James Questions: What do you call the physical property of matter that is defined as the amount of heat energy required to raise the temperature of a unit mass of a substance by one degree?    2025 Events for Water Professionals  Check out our Scaling UP! H2O Events Calendar where we've listed every event Water Treaters should be aware of by clicking HERE.   

AZIMUT
ESTACA : témoignage de Pierre - ancien étudiant en filière navale

AZIMUT

Play Episode Listen Later Nov 7, 2025 17:45


AZIMUT a recueilli le retour d'expérience de Pierre, diplômé en 2022 de l'ESTACA dans la filière navale.Il raconte son parcours scolaire, étudiant et professionnel. Il partage ses ressentis, ses stages et donne des conseils aux parents d'ados intéressés par l'ESTACA.L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

AZIMUT
ESTACA : témoignage de Capucine - ancienne étudiante en filière spaciale

AZIMUT

Play Episode Listen Later Nov 7, 2025 16:42


AZIMUT a recueilli le retour d'expérience de Capucine, diplômée en 2024 de l'ESTACA dans la filière spacial.Elle raconte son parcours scolaire, étudiant et professionnel. Elle partage ses ressentis, ses stages et donne des conseils aux parents d'ados intéressés par l'ESTACA.L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

Moving Medicine Forward
The Science of Compassion: Advancing Oncology Trials

Moving Medicine Forward

Play Episode Listen Later Nov 6, 2025 16:48


In this inspiring episode of Moving Medicine Forward,Amanda King, Senior Clinical Scientist at CTI, discusses her remarkable journey from pediatric ICU nurse practitioner to leading-edge oncology researcher. Amanda shares how personal loss fueled her passion for patient-centered careand clinical research, and how her work at the NIH and CTI is shaping the future of medicine. From the complexities of oncology trials to the emotional weight of working with vulnerable patients, Amanda offers a candid look at thechallenges and triumphs of advancing therapeutic options. Whether you're in healthcare or simply curious about the human stories behind medical innovation, this episode is a must-listen.00:30 Meet Amanda King: her background and passionfor patient-centered care. 01:07 Amanda's clinical roots in pediatric ICU andtransition to research. 02:00 Pursuing a PhD and discovering a love forclinical trials at the NIH. 02:34 The motivation behind Amanda's shift toclinical research. 03:34 Why Amanda joined CTI and what drew her toindustry research. 05:10 Amanda's role as a Senior Clinical Scientistand her impact on trial safety. 06:35 Deep dive into Amanda's work at the NIH and theimportance of patient outcomes data. 09:21 Challenges in oncology trials: balancingsafety, complexity, and emotional toll. 11:39 The rewards of working in oncology and Amanda'spersonal connection to cancer research. 13:08 Advice for young people interested in clinicalresearch and the importance of mentorship. 15:14 Amanda's vision for the future of medicine:innovation meets compassion. 16:10 Closing thoughts and how to stay connected withCTI.

Along The Lines
Episode 63: CT Transportation Institute

Along The Lines

Play Episode Listen Later Nov 4, 2025 21:16


Dr. Eric Jackson, Executive Director of the Connecticut Transportation Institute at UConn and Director of the Connecticut Transportation Safety Research Center, joins us to explore how research, innovation, and data are advancing safety and shaping the future of transportation in Connecticut. From crash analytics to workforce training and autonomous vehicle testing, this episode highlights how CTI and CTDOT are building a safer, more intelligent, and more connected transportation system for all.

PolySécure Podcast
Teknik - Double-Tap Campaign - Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations - Parce que... c'est l'épisode 0x656!

PolySécure Podcast

Play Episode Listen Later Nov 4, 2025 47:16


Parce que… c'est l'épisode 0x656! Shameless plug 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Description Ce podcast technique réunit Nicolas, l'animateur, avec Maxime Arquillière et Amaury-Jacques Garçon, deux analystes en cybermenace de sekoia., une société française spécialisée dans le renseignement sur les menaces informatiques (CTI - Cyber Threat Intelligence). Leur discussion porte sur une investigation approfondie d'une campagne de cyberespionnage sophistiquée baptisée “Double Tap”, probablement liée au groupe APT28 du renseignement militaire russe. Le contexte et la méthodologie Maxime et Amaury expliquent d'abord leur approche du travail de CTI, qui repose largement sur une veille continue des publications d'organismes spécialisés (CERT français, américains, canadiens) et de chercheurs en cybersécurité. Cette collecte systématique d'informations en source ouverte leur permet de modéliser les menaces et de créer des règles de détection, notamment des règles Yara pour identifier les fichiers malveillants. Leur équipe dispose de quatre spécialités : le tracking d'infrastructure, les règles de détection, le reverse engineering de malware, et l'analyse stratégique qui vise à comprendre les objectifs géopolitiques derrière les attaques étatiques. Cette approche multidimensionnelle permet une compréhension globale des cybermenaces. La découverte initiale L'investigation démarre à partir d'un article publié fin juillet 2024 par le CERT-UA (l'autorité ukrainienne de réponse aux incidents), qui documente des attaques ciblant régulièrement l'Ukraine. À partir de ces informations, l'équipe a créé des règles de détection, dont certaines volontairement plus souples pour capturer d'éventuelles variantes. Mi-octobre, une de ces règles Yara a détecté un document Word malveillant sur VirusTotal, une plateforme où sont analysés des millions de fichiers suspects. Ce document contenait une macro et semblait être issu du ministère des Affaires étrangères du Kazakhstan. Cette alerte a déclenché une investigation approfondie qui a permis de découvrir au total 18 documents similaires, dont une dizaine n'avaient jamais été publiés auparavant. L'analyse technique : la chaîne d'infection “Double Tap” Amaury détaille la sophistication technique de cette attaque. Les documents malveillants utilisent une technique de social engineering : ils apparaissent floutés ou déformés à l'ouverture, incitant la victime à cliquer sur “Activer les macros” pour les rendre lisibles. Cette action déclenche une chaîne d'infection particulièrement élaborée. La particularité qui a donné son nom à la campagne est l'utilisation d'un double mécanisme : le premier document Word crée un second document contenant des macros malveillantes dans un répertoire temporaire du système. Cette approche en plusieurs étapes vise à contourner les systèmes de détection. Une fois activé, le malware modifie les paramètres de sécurité du système pour permettre l'exécution automatique de macros futures, établit une persistance qui se réactive toutes les quatre minutes, et contacte un serveur de commande et contrôle (C2). Le code, largement obfusqué, construit progressivement une troisième macro qui communique avec un serveur externe pour transmettre des informations sur la machine compromise (nom d'utilisateur, nom du PC) et potentiellement déployer un backdoor Python appelé “Cherry Spy” pour l'exfiltration de données. La dimension géopolitique L'analyse de Maxime révèle que les dix documents découverts étaient tous rédigés en kazakh et concernaient des sujets diplomatiques : câbles d'ambassades kazakhes en Belgique et Afghanistan, comptes-rendus de visites présidentielles, et notamment une déclaration diplomatique conjointe entre l'Allemagne et le Kazakhstan datant de septembre 2024, lors d'une visite du chancelier Olaf Scholz visant à diversifier les approvisionnements énergétiques allemands. Ces documents, datés entre 2021 et 2024, semblent être des documents légitimes récupérés lors d'opérations antérieures et réutilisés comme appâts pour cibler des diplomates et officiels kazakhs. Le Kazakhstan, bien qu'allié traditionnel de la Russie, adopte une politique de plus en plus indépendante, ce qui expliquerait l'intérêt du renseignement russe. Le lien avec APT28 et Zebrocy L'équipe établit des connexions avec APT28 (également connu sous le nom de Fancy Bear), un groupe de cyberespionnage du renseignement militaire russe (GRU). Ils identifient également des similitudes avec Zebrocy, un mode opératoire actif entre 2015 et 2020 qui ciblait spécifiquement l'Asie centrale et utilisait des techniques similaires de “double tap”. L'importance du partage Les chercheurs soulignent l'importance de publier leurs découvertes en source ouverte. Bien que cela puisse alerter les attaquants et les pousser à modifier leur infrastructure, cette transparence contribue à l'amélioration de la cybersécurité globale, permettant à d'autres chercheurs de construire sur leurs travaux. De manière remarquable, quelques jours après la publication de leur rapport, un média kazakh a annoncé qu'une inspection imprévue du ministère des Affaires étrangères serait menée suite aux révélations sur cette cyberattaque. L'équipe avait d'ailleurs tenté de contacter le gouvernement kazakh avant publication, sans recevoir de réponse. Cette investigation illustre parfaitement la complexité du travail en CTI : combiner expertise technique, compréhension géopolitique et éthique du partage pour protéger efficacement contre les menaces étatiques sophistiquées qui peuvent s'étendre sur plusieurs années. Notes Double-Tap Campaign - Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations Collaborateurs Nicolas-Loïc Fortin Maxime Arquillière Amaury-Jacques Garçon Crédits Montage par Intrasecure inc Locaux virtuels par Riverside.fm

Unspoken Security
Bringing Humanity to Security (Rerun of Episode 22)

Unspoken Security

Play Episode Listen Later Oct 30, 2025 43:41 Transcription Available


In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show

mnemonic security podcast
The Quiet Conflict

mnemonic security podcast

Play Episode Listen Later Oct 27, 2025 40:06


In this episode of the mnemonic security podcast, we take a closer look at a tension that remains invisible to most of us, yet is very real: the quiet conflict unfolding within our critical infrastructure.This topic gave us the perfect excuse to once again invite one of our favorite guests, for the fourth time, Joe Slowik. Joe brings over 15 years of experience in cyber threat intelligence (CTI), detection engineering, and incident response, with expertise in industrial control systems (ICS), operational technology (OT), and critical infrastructure environments. He currently serves as Director of Cybersecurity Alerting Strategy at Dataminr.In his conversation with Robby, Joe explores the threats posed by Volt Typhoon, a state-sponsored Chinese cyber operation known for targeting critical infrastructure, primarily in the United States. They discuss the origins and activities of the group, recent operations, and Joe also shares his research into what this group has the potential to achieve based on their current operations and proven capabilities.The discussion also covers Joe's broader research into China's cyber eco-system and how it has evolved, including the country's extensive network of research institutions, companies, and lesser known contractors. Joe also shares his observations about current trends in the OT industry, insights into his upcoming areas of research within OT, and his perspective on where the field is heading.Send us a text

@BEERISAC: CPS/ICS Security Podcast Playlist
S2 E6: Keeping Up With ICS Threat Intelligence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 26, 2025 22:33


Podcast: Simply ICS CyberEpisode: S2 E6: Keeping Up With ICS Threat IntelligencePub date: 2025-10-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe industrial threat landscape never stands still — and neither can defenders. In this episode of Simply ICS Cyber, Don and Tom sit down with Joe Slowik, a globally recognized expert in cyber threat intelligence (CTI), detection engineering, and incident response for ICS, OT, and critical infrastructure environments.With over 15 years of experience spanning offensive operations, threat research, and leadership roles in both government and private sectors, Joe brings an unparalleled perspective on how adversaries target industrial systems — and how defenders can stay ahead.Listeners will hear how Joe's work connects cutting-edge artificial intelligence and detection development with the real-world challenges of protecting operational environments. His insights reveal where the next evolution of ICS threat intelligence is headed — and what teams should focus on now to stay resilient.⚙️ Tune in to learn how threat intelligence is evolving across industrial control systems and what it takes to keep pace in a rapidly changing landscape.Connect with Joe on LinkedIn: Joe Slowikhttps://www.linkedin.com/in/joe-slowik

AZIMUT
Les formations en Énergie et Numérique à UniLaSalle, Institut Polytechnique ➿

AZIMUT

Play Episode Listen Later Oct 20, 2025 24:49


Face aux défis de la transition énergétique et de la transformation numérique, UniLaSalle Amiens forme des ingénieurs capables d'innover et d'apporter des solutions concrètes.Le campus propose deux formations complémentaires :- Le Bachelor Ingénierie du Numérique, qui prépare en trois ans aux métiers de la cybersécurité, du développement informatique et de l'intelligence artificielle.- Le Diplôme d'Ingénieur en Énergie et Développement Durable, accrédité par la CTI, qui forme des experts en gestion des ressources énergétiques, en énergies renouvelables et en optimisation des systèmes énergétiques. ✅ DANS CET ÉPISODE NOUS ABORDONS :Ce qui distingue UniLaSalle Amiens des autres écoles d'ingénieursLes formations en énergie et numérique, et leurs débouchésL'approche pédagogique basée sur la pratique, les stages et l'innovationLa vie sur le campus

Unspoken Security
Redefining National Security

Unspoken Security

Play Episode Listen Later Oct 16, 2025 56:14


In this episode of Unspoken Security, host A.J. Nash sits down with LaurenZabierek, Senior Vice President for the Future of Digital Security at theInstitute for Security and Technology. Together, they examine how thetraditional view of national security often overlooks the people it seeks toprotect. Lauren shares why national security must move beyond militaryand government, and instead focus on the everyday risks that affecteveryone—whether that's cybersecurity, healthcare, or even climate safety.Lauren makes a strong case for widening the lens on security. She explainswhy protecting people requires new thinking and fresh policies, not justmore funding for defense. She also describes the need for face-to-faceconnections and open dialogue to rebuild trust and unity in a fracturedworld.The conversation turns to software and the Secure by Design movement.Lauren outlines how changing incentives for software companies can leadto safer products. She draws on lessons from automotive and aviationsafety to show paths forward, and encourages listeners to help drivedemand for secure technology across all industries.Send us a textSupport the show

Moving Medicine Forward
From Diagnosis to Drug Development

Moving Medicine Forward

Play Episode Listen Later Oct 16, 2025 17:01


Chuck Scheper, Board Chair at Bexion Pharmaceuticals, shares how a stage IV non-Hodgkin lymphoma diagnosis at age 39 and a life-saving clinical trial led to his lifelong commitment to cancer research. He joins Tim Schroeder, CEO and Chairman of CTI, to discuss the founding of VaxCella, the evolution of cancer therapies, the importance of patient-centered research, and the role of collaboration in advancing drug development, highlighting resilience, innovation, and the impact of clinical trials. 

Matt Fanslow - Diagnosing the Aftermarket A to Z
Training That Actually Trains with Brandon Steckler & Bob Leonard [E206]

Matt Fanslow - Diagnosing the Aftermarket A to Z

Play Episode Listen Later Oct 15, 2025 61:01


Thanks to our Partner, NAPA Autotech Training and Pico TechnologyWatch Full Video EpisodeLive from “pre-ASTA,” Matt sits down with two “industry nobodies” (his words) who… are anything but. The trio gets honest about what makes training worth the time and money—and what ruins it. They dig into presenter prep (yes, 40 hours for a 4-hour class), class vetting, sponsor pressure, why a sexy scope trick isn't always the right first move, and how to bring new voices onto the stage without burning attendees. They also share practical advice for first-timers at training expos so you learn more and regret less.What we coverWhy one weak class can poison a whole event—and how to prevent itThe difference between a presenter and an educatorBrandon's CTI “boot camp” lessons: pacing, body language, audience interactionTeaching your experience vs. reading someone else's slidesThe “pico math channel” vs. relative compression—start simple, earn the complexityReal-world prep: building a class, flow, case study sourcing, time costs no one seesSponsor dynamics: class quality vs. class quantityVetting ideas: short audition decks, Zoom mini-presentations, real Q&APathways for new trainers: Techs Informing Techs, vision-style tech talks, co-teaching/mentorshipFeedback that helps: beyond Scantron; what to write so organizers can actAttendee playbook: note-taking, pacing yourself, lobby networking, post-event reviewQuick takeawaysFor trainersIf you didn't write the class, make it your own—prep until you could answer questions without the deck.Lead with the right test, not the flashiest one. Wow factor is not a learning objective.Ask a veteran to review your flow. Co-teach if you can.For event organizersDon't let sponsorship replace standards. Vet instructors with a 10–15 slide audition + live Q&A.Reward quality: fewer tracks > more mediocre tracks.Follow up for feedback after the event; invite longer-form comments.For attendeesBring a notebook/app, a highlighter, and capture 3 “do-this-Monday” items per session.Don't try to copy every slide—listen for the why and the decision tree.Network on purpose. Introduce yourself. Follow up a week later as you review notes.Notable moments/quotes“Teaching is the fun part—I'd do that for free. You're really paying for the prep.” — Brandon“You can't preach ‘training matters' and then short-change the delivery.” — Matt“We need an on-ramp for new presenters—safe reps before three-hour sets.” — Matt“Start with the test that answers the question fastest.” — BobShout-outs & mentionsMobilityWorks — Bob's focus on vehicles modified for physically disabled drivers/passengersCTI/Worldpac instructor boot camp (presenter craft)Techs Informing Techs / vision-style tech talks — great first stage repsPico Technology concepts referenced (math channels, relative compression)Who this episode helpsTechs deciding whether to spend the time/money to travel for trainingNew and aspiring trainers looking for the right entry pathOrganizers who want higher attendee retention and better word-of-mouthCall to actionBeen to a class that changed your workflow—or wasted your time? Send Matt what made the difference and why.If you're an aspiring presenter with a killer case study, draft a 10-slide mini and reach out—let's get you reps at a tech-talk format.Thanks to our Partner, NAPA Autotech...

ResiWeek
Verify, But Also Verify | ResiWeek 504

ResiWeek

Play Episode Listen Later Oct 15, 2025 40:59


Amazon is going in on the AI race, adding 'smarter' features to their Blink and Ring camera series. What could possibly go wrong? In a series about troubleshooting HDMI systems, CE Pro looks at dynamic range and potential problems for clients. What integrators need to know about these issues and help projects succeed... Outside of looking forward to GPMI. What happened to that, anyway? We look at alternatives to cold calls and other outreach techniques for your business. We'll do our best to avoid any Glengarry Glen Ross comparisons, unless they slide into 30 Rock.The video version of this podcast can be found here.Thanks to the still-dubious invention of Canadian Thanksgiving, Matt Scott is out enjoying time with his family. But the news doesn't take a holiday, especially the fast-moving residential AV market. We've still gathered the latest topics and stories to discuss with a panel of experts in the space. Joining pinch-hitter-host Uncle Richie this week is Patrick Norton from CTI and Brad Hintze of Crestron.Host: Rich FregosaGuests:Brad Hintze – CrestronPatrick Norton – CTILinks to sources:Residential Tech Today – New Features for Amazon CamerasCE Pro – High Dynamic Range and HDMIResidential Systems – The Alternative to Cold CallsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

AZIMUT
ESTACA : témoignage de Julien - ancien étudiant en filière automobile ➿

AZIMUT

Play Episode Listen Later Oct 12, 2025 20:48


AZIMUT a recueilli le retour d'expérience de Julien, diplômé en 2021 de l'ESTACA dans la filière automobile.Il raconte son parcours scolaire, étudiant et professionnel. Il partage ses ressentis, ses stages et donne des conseils aux parents d'ados intéressés par l'ESTACA.L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

AZIMUT
ESTACA : témoignage de Astrid - ancienne étudiante en filière aéronautique ➿

AZIMUT

Play Episode Listen Later Oct 12, 2025 14:02


AZIMUT a recueilli le retour d'expérience de Astrid, diplômé en 2021 de l'ESTACA dans la filière aéronautique.Elle raconte son parcours scolaire, étudiant et professionnel. Elle partage ses ressentis, ses stages et donne des conseils aux parents d'ados intéressés par l'ESTACA.L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

AZIMUT
ESTACA : témoignage de Jérémy - ancien étudiant en filière ferrovaire ➿

AZIMUT

Play Episode Listen Later Oct 12, 2025 19:32


AZIMUT a recueilli le retour d'expérience de Jérémy, diplômé en 2022 de l'ESTACA dans la filière ferroviaire.Il raconte son parcours scolaire, étudiant et professionnel. Il partage ses ressentis, ses stages et donne des conseils aux parents d'ados intéressés par l'ESTACA.L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

AZIMUT
ESTACA : école d'ingénieurs spécialisée transports à prépa intégrée ➿

AZIMUT

Play Episode Listen Later Oct 12, 2025 26:16


L'ESTACA est une école d'ingénieurs habilitée CTI, spécialisée dans la formation d'ingénieurs automobile, aéronautique, spatial, ferroviaire, mobilités urbaines, ...Dans cette table ronde enregistrée nous avons abordé :- La présentation de l'ESTACA - Les notions de prépa classique et prépa intégrée - La différence entre une école généraliste et une école spécialisée - La vie étudiante et la vie associative, les journée type…- Quand et comment intégrer l'ESTACA (Les Concours Avenir, Parcoursup, le choix des spécialités )- Rencontrer l'ESTACA tout au long de l'année (journées portes ouvertes, journées d'immersion et lives)https://www.estaca.fr/Épisode sponsorisé ℹ️ SUIVEZ L'ACTUALITÉ DE L'ORIENTATIONInscrivez-vous à l'Hebdo de l'orientation : https://azimut-orientation.com/abonnez-vous-a-la-newsletter/ (vous recevrez en cadeau un guide téléchargeable)

Mañanas BLU con Néstor Morales
Gustavo Sastoque, el inocente que pagó 10 años por crimen de Hernando Pizarro: "Dañaron mi vida"

Mañanas BLU con Néstor Morales

Play Episode Listen Later Oct 7, 2025 13:56


Sastoque fue vinculado al proceso penal por el homicidio de Pizarro Leongómez, pese a no ejercer funciones operativas. Él tenía a su cargo el archivo de la sección de criminalística y la correspondencia del CTI, recordó la Andje.See omnystudio.com/listener for privacy information.

Unspoken Security
Security Awareness for the Connected Generation

Unspoken Security

Play Episode Listen Later Oct 2, 2025 62:07


In this episode of Unspoken Security, host A.J. Nash sits down with Marley Salveter, Director of Marketing at Unspoken Security. They explore how digital privacy and security awareness look different for younger generations who have grown up in a world where sharing personal data is routine, not a choice. Marley shares her perspective on adapting to life online, where building a personal brand and protecting personal information often overlap for today's professionals.Marley explains how her generation views data privacy as an accepted tradeoff, not a conscious decision, and why traditional corporate security training rarely feels relevant. She discusses the real risks of living in public—how threats feel less urgent until they get personal and why the rapid response of tech platforms can mask the lasting impact of breaches. She and A.J. dig into the challenge of communicating security risks to a connected generation that rarely sees tangible consequences.Together, they reflect on how open conversations bridge generational gaps and why storytelling and relatable dialogue help people internalize security lessons. Marley argues that making security personal is key to lasting change—especially for those building their careers and brands in the public eye.Send us a textSupport the show

Moving Medicine Forward
Cautious Optimism: The State of Clinical Research in 2025

Moving Medicine Forward

Play Episode Listen Later Oct 1, 2025 32:44


In this episode, host Jeremy Schrand is joined by Tim Schroeder, Chairman, CEO, and Founder of CTI, and Joel White, Owner of Marketcap Consulting, for a broad discussion on the clinical research industry. Topics include recent industry developments, biotech funding challenges, leadership in clinical trials, corporate citizenship, and predictions for future innovation.01:20 Tim shares insights on the current state ofthe clinical research industry, highlighting recent developments and a view toward stability and cautious optimism.02:36 Joe discusses macro trends shaping the clinical research landscape, focusing on biotech funding challenges and the impact on the industry.04:05 The conversation shifts to the pharma services sector, with Joe reflecting on the changing number of public companies and the influence of major investment firms.06:53 The conversation explores industry cancellation rates and repeat business, leading to a discussion on measurement differences and the challenges of consistent reporting.08:08 The role of leadership in navigating today's complex clinical trial environment is explored, emphasizing vision, talent retention, and cultural impact.13:08 Tim and Joel discuss corporate citizenship, leading to reflections on CTI's evolution, community involvement, and the importance of sustainability.21:01 Exploring the potential influence of major retail companies on the clinical trial ecosphere, the conversation considers their resources and the challenges they face within the industry.22:34 Tim addresses therapeutic areas with recent surges in activity or innovation, prompting a discussion on oncology,neurodegeneration, and GLP therapies.29:00 Bold predictions shape the future of the clinical research industry, with forecasts pointing to a recovery in biotech funding and shifts in FDA approval processes.

The Revitalizing Doctor
Part 1: The Multifaceted Career

The Revitalizing Doctor

Play Episode Listen Later Sep 30, 2025 21:06


What happens when the “perfect” medical specialty no longer fits, and you dare to forge a new path?In this Echo Episode, Dr. Andrea Austin sits down with Dr. Kim Chan Ko, a former academic ophthalmologist and co-founder of Ketamine Startup, to explore her transition from repairing eyes to building a ketamine infusion clinic and teaching other physicians to do the same. Kim opens up about the challenges of practicing at a high-pressure Level 1 trauma center, the emotional weight of patient care, and the struggle to reconcile her identity as an ophthalmologist with her need for creativity and connection.Through personal development coaching and a circuitous journey, Kim discovered her passion for patient education, mentorship, and innovative healthcare models. She shares how embracing her multifaceted identity and saying “yes” to new opportunities—like video editing and coaching—paved the way for her current work. This episode dives into the power of redefining “physician,” the value of coaching for personal growth, and the courage to step away from traditional medicine to serve patients on your own terms.You'll hear how they:Navigate the emotional and professional challenges of leaving a specialty that no longer alignsUse coaching to uncover personal strengths and reframe physician identityEmbrace creative outlets like video editing to build new ventures in healthcareHighlight the growing trend of physicians starting independent practices, from ketamine clinics to telemedicineIf you're a physician feeling stuck or seeking a more fulfilling career, this episode offers honest insights and practical inspiration for your own journey.About the Guest“I am a multifaceted individual. I am just practicing medicine.” – Dr. Kim Chan KoDr. Kim Chan Ko is a board-certified ophthalmologist, diplomat of the American College of Lifestyle Medicine, and co-founder of Ketamine Startup, an online course teaching physicians to open ketamine infusion clinics. After years as creative director of Reset Ketamine in Palm Springs, CA, alongside her emergency physician husband, Kim stepped away from academic ophthalmology to pursue a path aligned with her passions for patient education, mentorship, and innovative healthcare. Her journey through burnout and coaching has shaped her mission to help physicians find clarity and build fulfilling careers.

Cybercrime Magazine Podcast
The Power of Threat Intelligence. Fraud Prevention & Integrating CTI. Shawn Loveland, Resecurity.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 29, 2025 9:33


Shawn Loveland is the Chief Operating Officer of Resecurity. In this episode, he joins host Paul John Spaulding to discuss cyber threat intelligence (CTI) and how it differs from traditional fraud monitoring, as well as why organizations should integrate it across their businesses, the technology's future as AI evolves, and more. The Power of Threat Intelligence, a Cybercrime Magazine podcast series brought to you by Resecurity, which offers real-time threat monitoring, dark web surveillance, and predictive analytics to identify risks before digital threat actors victimize your company and customers, ensuring your business remains secure. To learn more about our sponsor, visit https://resecurity.com

Scaling UP! H2O
438 Innovative Water Treatment Chemistry with Matheus Paschoalino

Scaling UP! H2O

Play Episode Listen Later Sep 19, 2025 57:17


Can a carbon-negative, bio-based molecule replace legacy phosphonates and help you use less azole—without sacrificing corrosion performance? In this episode, host Trace Blackmore, CWT, welcomes Matheus Paschoalino, PhD Senior Business Development Manager and Microbial Control SME of Solugen, to unpack polyhydroxycarboxylic acids (PHCs) and how they're changing cooling-water programs from the field up. We cover HEDP replacement in light-duty systems, azole enhancement in copper-challenged waters, a second-generation cut for heavy-duty heat flux, and PHC behavior with oxidizers and non-oxidizer biocides.  From Bioforge to Basin: How PHCs Are Made and Why It Matters  Paschoalino explains Solugen's chemo-enzymatic “Bioforge” approach that oxidizes sugars (corn-syrup feedstock) into PHCs with very high yield and no practical byproducts—a pathway validated as carbon-negative. He outlines how different “cuts” (monoacid-rich vs. diacid-rich) map to different use cases, and notes current manufacturing capacity and adoption across hundreds of towers.  Replacing HEDP in Light-Duty Programs  For hospitals, HVAC, and other light-duty systems, PHCs have fully replaced HEDP as the anodic corrosion inhibitor while keeping PBTC for scale, enabling lower total phosphorus formulations with equal or better performance compared to status-quo organics.  Azole Enhancement, Free Copper, and Real-World Cost  Field work showed PHCs chelate metals quickly, protecting azole demand when free copper is present (e.g., after oxidizer flushing) and reducing expensive azole overdosing. One university case dropped an adjunct 8-ppm azole feed by pairing the base 3–4 ppm azole with PHC, yielding both corrosion control and lower discharge costs.  Second-Generation PHCs for Heavy-Duty Heat Flux (Toward “Neutral Phosphorus”)  At higher heat flux and stabilized-phosphate conditions, a diacid-rich second-generation PHC proved more stable, enabling orthophosphate reduction and opening a path toward “neutral phosphorus” programs that leverage background phosphate in municipal make-up. Bench data also show synergy with trace metals (e.g., zinc).  Biocide Potentiation and Where It Works Best PHCs remain stable with oxidizers like chlorine dioxide and bleach. Their most compelling synergy shows up with non-oxidizers and peracetic acid (PAA): as a biocide potentiator, PHCs can reduce the need to overdose actives such as THPS, glutaraldehyde, quats, and DBNPA by first complexing interfering metals (e.g., Fe/FeS), letting the biocide perform as intended.  Not “Bug Food”: Pilot Cooling Towers and Oxidizer Demand  To address the industry's biggest concern with bio-based chemistries, Solugen ran side-by-side outdoor pilot cooling towers under identical bleach control. Result: comparable oxidizer usage and consistently low counts versus HEDP—evidence that PHCs don't fuel biofilm.  Chelation Mechanics, Polymer Savings, and White Rust  PHCs chelate beyond acid-group stoichiometry thanks to multiple hydroxyls and conformational effects—critical for controlling dissolved metals and protecting films. In stressed heat-flux/chlorine conditions, PHCs reduced calcium-phosphate fouling versus HEDP, often allowing polymer dosage cuts. Early data also show promise for white-rust mitigation on galvanized systems, with the diacid-rich cut delivering the strongest reductions.  For practitioners, the message is pragmatic: PHCs aren't “lab curiosities.” They're fielded at scale, enabling lower-phosphorus programs, protecting costly azole inventories, widening the operational window under oxidizer stress, and potentiating select biocides—while staying compatible with common metals. If you manage cooling assets under cost, compliance, and performance pressure, this episode gives you a clear technical playbook to evaluate.  Listen now, review the papers in the show notes, and test a pilot where it counts—on your heat exchangers.  Stay engaged, keep learning, and continue scaling up your knowledge!    Timestamps  02:15 - Trace Blackmore shares a quick personal open: spotting the Goodyear Blimp (100th anniversary), using memories as fuel rather than limits, and a mindset reset around the word “can't.”  06:42 - Upcoming Events for Water Treatment Professionals   09:23 - Water You Know with James McDonald  11:41 - Interview with Matheus Paschoalino, Senior Business Development Manager and Microbial Control SME of Solugen  12:02 - HEDP replacement in light-duty programs; lower total phosphorus without losing performance  19:13 - Heavy-duty heat flux: second-generation (diacid-rich) PHCs and reducing orthophosphate  20:39 - “Neutral phosphorus” approach  27:42 - Biocide potentiation: synergy with PAA; strongest effects with non-oxidizers (e.g., THPS)  33:03 - “Bug food?” Pilot side-by-side cooling towers (Houston)  37:39 - HEDP systems fouled with calcium phosphate while PHC system showed only minor patching (CTI paper)  41:44 - Early evidence: white-rust mitigation on galvanized systems (seeking field partners)    Quotes  “Use your past as history, not as a limiter.” - Trace Blackmore  “Plan where you'll be; you never know what you'll learn or who you'll meet.” - Trace Blackmore   “First-gen PHCs let us replace HEDP in light-duty programs and keep performance with lower total phosphorus.” - Matheus Paschoalino  “Non-oxidizing biocides work best with PHCs—we target the metals first so you stop over-dosing the biocide.” - Matheus Paschoalino  “We like to be very conservative… we start with the laboratory; we start with light duty. Now we are going to heavy duty.”    Connect with Matheus Paschoalino, PhD   Phone: 14847193979  Email: matheus.paschoalino@solugen.com  Website: Home - New - Solugen | Solugen  LinkedIn: Matheus P. Paschoalino, PhD | LinkedIn  Solugen: Overview | LinkedIn     Guest Resources Mentioned   I Must Betray You by Ruta Sepetys   Blog entitled “Achieving Phosphorus-Neutral Cooling Treatment Using Carbon-Negative Additives” by Solugen Verza360® Enables Cost Savings with Effective Biocide Potentiation in Produced Water - Oil & Gas Solutions Case Study by Solugen  2025 Winter Issue of CTI Journal paper TP24-16, “Toward Phosphorus-Neutral Cooling Tower Treatment Using Carbon-Negative Environmentally Friendly Additive”  Presentation at AMPP entitled "Novel Biobased Carbon-Negative Corrosion Inhibitors Enabling Environmentally Friendliness"    Scaling UP! H2O Resources Mentioned  AWT (Association of Water Technologies)  Scaling UP! H2O Academy video courses  Submit a Show Idea  The Rising Tide Mastermind   Water You Know with James McDonald  Question: Back in the day, what was the treatment used for corrosion inhibition in cooling water systems that was banned around 1985 in the United States from widespread use due to its toxicological impact?    2025 Events for Water Professionals  Check out our Scaling UP! H2O Events Calendar where we've listed every event Water Treaters should be aware of by clicking HERE.   

Unspoken Security
They're Hacking the People!

Unspoken Security

Play Episode Listen Later Sep 18, 2025 43:01


In this episode of Unspoken Security, host AJ Nash welcomes Ivan Novikov, CEO of Wallarm, to discuss the fundamental shifts in API security. They explore how APIs have evolved from internal tools to the public-facing backbone of mobile apps, IoT, and AI. This change has dramatically expanded the threat surface, making traditional security methods obsolete.Ivan explains why older approaches, like signature-based detection and RegEx, fail against modern attacks. He details Wallarm's unique solution: a real-time decompiler that analyzes the actual payload of API requests. This technique allows for deep inspection of complex and nested data formats, identifying malicious code that standard tools miss.The conversation also looks to the future, examining the security risks posed by the rapid adoption of AI agents. Ivan concludes with a stark comparison between physical and cyber threats. In the digital world, attacks are constant and aggressive. Success depends less on the tools you have and more on who you are and how you use them.Send us a textSupport the show

The Cybersecurity Defenders Podcast
#247 - Intel Chat: JavaScript high-profile phishing, Red Sea cable cutting, Contagious Interview campaign & Salty2FA

The Cybersecurity Defenders Podcast

Play Episode Listen Later Sep 15, 2025 34:08


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A high-profile phishing incident has resulted in the compromise of several widely-used JavaScript packages on npm, after a developer known as "Qix" inadvertently clicked a malicious link from a fake support email.Multiple undersea cable cuts in the Red Sea have led to degraded internet connectivity across the Middle East and South Asia, affecting key infrastructure and cloud services.North Korean-aligned threat actors operating under the Contagious Interview campaign have been systematically abusing cyber threat intelligence (CTI) platforms to monitor exposure of their own infrastructure and scout for new assets.Researchers from Ontinue have detailed a sophisticated phishing campaign leveraging the Salty2FA phishing kit - a framework that reflects how cybercriminal tooling is increasingly mimicking enterprise-grade software in terms of design, capability, and operational maturity.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Paul's Security Weekly
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW #423

Paul's Security Weekly

Play Episode Listen Later Sep 8, 2025 126:06


Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue's global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the real-world risks of software acquisition in the API economy, the explosive growth of AI-generated code, and the rise of “vibe coding”—and how these trends are silently expanding the attack surface for organizations everywhere. Visit https://securityweekly.com/levelbluebh to download the Data Accelerator: Software Supply Chain and Cybersecurity as well as all of LevelBlue's research. In this interview, Yuval Wollman, President of CyberProof, unpacks how AI agents are not only expanding the attack surface—but reshaping the entire cyber threat landscape. Discover how ransomware-as-a-service platforms like Funksec and Dragonforce are operating with enterprise-level precision. Learn about the role of agentic AI, geopolitical cyber warfare, and why today's hackers offer better customer support than airlines. This segment is sponsored by CyberProof. Visit https://securityweekly.com/cyberproofbh to learn more about them! Doug White and Mickey Bresman, CEO of Semperis, dive deep into a conversation on the evolution of ransomware and the alarming rise of cyber extortion tactics. From the early days of encryption-only attacks to today's ransomware-as-a-service operations and hybrid threats blending digital and physical intimidation, this interview unpacks the growing sophistication of organized cybercrime. Mickey shares firsthand insights from Semperis' recent ransomware report, including a chilling real-world example where a photo of a child was used to threaten an IT professional — illustrating how far threat actors are willing to go. This segment is sponsored by Semperis. Visit https://securityweekly.com/semperisbh to download the 2025 Global Ransomware Report! Matt Alderman sits down with J.J. Guy, CEO & Co-Founder of Sevco Security, to unpack a 20-year industry failure finally being addressed: the disconnect between asset inventory, vulnerability visibility, and true cyber risk understanding. From the roots of CASM (Cyber Asset Attack Surface Management) to the convergence with CTE (Continuous Threat Exposure), JJ shares how Sevco is tackling today's fragmented environments — spanning cloud, on-prem, mobile, and containers — with a data-first approach. Would you like to see the Sevco platform in action? You can take a self-guided tour at https://securityweekly.com/sevcobh Doug White sits down with Intel 471 CEO Jason Passwaters for an eye-opening conversation on how cybercrime has evolved into a professional, profit-driven ecosystem. From ransomware-as-a-service to agentic AI, this interview pulls back the curtain on the real-world intel enterprises need to defend against today's most dangerous digital threats. Jason shares how threat actors are using business models that rival legitimate startups — complete with support teams and customer service — while enterprise security teams face shrinking budgets and expanding attack surfaces. This segment is sponsored by Intel471. Visit https://securityweekly.com/intel471bh to learn more about them! CyberRisk TV sits down with HD Moore, CEO & Co-Founder of runZero, for a conversation on why vulnerability management is still failing enterprises — and what needs to change now. This interview dives deep into the real-world challenges facing security teams today: tool overload, missing assets, unauthenticated exposures, and the illusion of visibility. HD reveals how attackers are exploiting blind spots faster than defenders can react — and why unauthenticated discovery is the secret weapon defenders need. Try runZero free! Get started at https://securityweekly.com/runzerobh Jackie McGuire sits down with Jawahar Sivasankaran, President at Cyware, for an unmissable deep dive into the future of Cyber Threat Intelligence (CTI), agentic AI, and open-source security innovation. With nearly three decades of experience spanning hands-on engineering, go-to-market leadership, and cutting-edge product strategy, Jawahar shares insider insights on how CTI is evolving from fragmented alerts to unified, automated threat intelligence platforms. To explore Cyware's new Intelligence Suite, CTI automation capabilities, and open-source AI integration protocol, visit https://securityweekly.com/cywarebh. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-423

Enterprise Security Weekly (Audio)
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW #423

Enterprise Security Weekly (Audio)

Play Episode Listen Later Sep 8, 2025 126:06


Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue's global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the real-world risks of software acquisition in the API economy, the explosive growth of AI-generated code, and the rise of “vibe coding”—and how these trends are silently expanding the attack surface for organizations everywhere. Visit https://securityweekly.com/levelbluebh to download the Data Accelerator: Software Supply Chain and Cybersecurity as well as all of LevelBlue's research. In this interview, Yuval Wollman, President of CyberProof, unpacks how AI agents are not only expanding the attack surface—but reshaping the entire cyber threat landscape. Discover how ransomware-as-a-service platforms like Funksec and Dragonforce are operating with enterprise-level precision. Learn about the role of agentic AI, geopolitical cyber warfare, and why today's hackers offer better customer support than airlines. This segment is sponsored by CyberProof. Visit https://securityweekly.com/cyberproofbh to learn more about them! Doug White and Mickey Bresman, CEO of Semperis, dive deep into a conversation on the evolution of ransomware and the alarming rise of cyber extortion tactics. From the early days of encryption-only attacks to today's ransomware-as-a-service operations and hybrid threats blending digital and physical intimidation, this interview unpacks the growing sophistication of organized cybercrime. Mickey shares firsthand insights from Semperis' recent ransomware report, including a chilling real-world example where a photo of a child was used to threaten an IT professional — illustrating how far threat actors are willing to go. This segment is sponsored by Semperis. Visit https://securityweekly.com/semperisbh to download the 2025 Global Ransomware Report! Matt Alderman sits down with J.J. Guy, CEO & Co-Founder of Sevco Security, to unpack a 20-year industry failure finally being addressed: the disconnect between asset inventory, vulnerability visibility, and true cyber risk understanding. From the roots of CASM (Cyber Asset Attack Surface Management) to the convergence with CTE (Continuous Threat Exposure), JJ shares how Sevco is tackling today's fragmented environments — spanning cloud, on-prem, mobile, and containers — with a data-first approach. Would you like to see the Sevco platform in action? You can take a self-guided tour at https://securityweekly.com/sevcobh Doug White sits down with Intel 471 CEO Jason Passwaters for an eye-opening conversation on how cybercrime has evolved into a professional, profit-driven ecosystem. From ransomware-as-a-service to agentic AI, this interview pulls back the curtain on the real-world intel enterprises need to defend against today's most dangerous digital threats. Jason shares how threat actors are using business models that rival legitimate startups — complete with support teams and customer service — while enterprise security teams face shrinking budgets and expanding attack surfaces. This segment is sponsored by Intel471. Visit https://securityweekly.com/intel471bh to learn more about them! CyberRisk TV sits down with HD Moore, CEO & Co-Founder of runZero, for a conversation on why vulnerability management is still failing enterprises — and what needs to change now. This interview dives deep into the real-world challenges facing security teams today: tool overload, missing assets, unauthenticated exposures, and the illusion of visibility. HD reveals how attackers are exploiting blind spots faster than defenders can react — and why unauthenticated discovery is the secret weapon defenders need. Try runZero free! Get started at https://securityweekly.com/runzerobh Jackie McGuire sits down with Jawahar Sivasankaran, President at Cyware, for an unmissable deep dive into the future of Cyber Threat Intelligence (CTI), agentic AI, and open-source security innovation. With nearly three decades of experience spanning hands-on engineering, go-to-market leadership, and cutting-edge product strategy, Jawahar shares insider insights on how CTI is evolving from fragmented alerts to unified, automated threat intelligence platforms. To explore Cyware's new Intelligence Suite, CTI automation capabilities, and open-source AI integration protocol, visit https://securityweekly.com/cywarebh. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-423

Paul's Security Weekly TV
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - Theresa Lanowitz, Yuval Wollman, Mickey Bresman, J.J. Guy, Jason Passwaters, HD Moore, Jawahar “Jawa” Sivasankaran - ESW #423

Paul's Security Weekly TV

Play Episode Listen Later Sep 8, 2025 126:06


Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue's global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the real-world risks of software acquisition in the API economy, the explosive growth of AI-generated code, and the rise of “vibe coding”—and how these trends are silently expanding the attack surface for organizations everywhere. Visit https://securityweekly.com/levelbluebh to download the Data Accelerator: Software Supply Chain and Cybersecurity as well as all of LevelBlue's research. In this interview, Yuval Wollman, President of CyberProof, unpacks how AI agents are not only expanding the attack surface—but reshaping the entire cyber threat landscape. Discover how ransomware-as-a-service platforms like Funksec and Dragonforce are operating with enterprise-level precision. Learn about the role of agentic AI, geopolitical cyber warfare, and why today's hackers offer better customer support than airlines. This segment is sponsored by CyberProof. Visit https://securityweekly.com/cyberproofbh to learn more about them! Doug White and Mickey Bresman, CEO of Semperis, dive deep into a conversation on the evolution of ransomware and the alarming rise of cyber extortion tactics. From the early days of encryption-only attacks to today's ransomware-as-a-service operations and hybrid threats blending digital and physical intimidation, this interview unpacks the growing sophistication of organized cybercrime. Mickey shares firsthand insights from Semperis' recent ransomware report, including a chilling real-world example where a photo of a child was used to threaten an IT professional — illustrating how far threat actors are willing to go. This segment is sponsored by Semperis. Visit https://securityweekly.com/semperisbh to download the 2025 Global Ransomware Report! Matt Alderman sits down with J.J. Guy, CEO & Co-Founder of Sevco Security, to unpack a 20-year industry failure finally being addressed: the disconnect between asset inventory, vulnerability visibility, and true cyber risk understanding. From the roots of CASM (Cyber Asset Attack Surface Management) to the convergence with CTE (Continuous Threat Exposure), JJ shares how Sevco is tackling today's fragmented environments — spanning cloud, on-prem, mobile, and containers — with a data-first approach. Would you like to see the Sevco platform in action? You can take a self-guided tour at https://securityweekly.com/sevcobh Doug White sits down with Intel 471 CEO Jason Passwaters for an eye-opening conversation on how cybercrime has evolved into a professional, profit-driven ecosystem. From ransomware-as-a-service to agentic AI, this interview pulls back the curtain on the real-world intel enterprises need to defend against today's most dangerous digital threats. Jason shares how threat actors are using business models that rival legitimate startups — complete with support teams and customer service — while enterprise security teams face shrinking budgets and expanding attack surfaces. This segment is sponsored by Intel471. Visit https://securityweekly.com/intel471bh to learn more about them! CyberRisk TV sits down with HD Moore, CEO & Co-Founder of runZero, for a conversation on why vulnerability management is still failing enterprises — and what needs to change now. This interview dives deep into the real-world challenges facing security teams today: tool overload, missing assets, unauthenticated exposures, and the illusion of visibility. HD reveals how attackers are exploiting blind spots faster than defenders can react — and why unauthenticated discovery is the secret weapon defenders need. Try runZero free! Get started at https://securityweekly.com/runzerobh Jackie McGuire sits down with Jawahar Sivasankaran, President at Cyware, for an unmissable deep dive into the future of Cyber Threat Intelligence (CTI), agentic AI, and open-source security innovation. With nearly three decades of experience spanning hands-on engineering, go-to-market leadership, and cutting-edge product strategy, Jawahar shares insider insights on how CTI is evolving from fragmented alerts to unified, automated threat intelligence platforms. To explore Cyware's new Intelligence Suite, CTI automation capabilities, and open-source AI integration protocol, visit https://securityweekly.com/cywarebh. Show Notes: https://securityweekly.com/esw-423

Enterprise Security Weekly (Video)
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - Theresa Lanowitz, Yuval Wollman, Mickey Bresman, J.J. Guy, Jason Passwaters, HD Moore, Jawahar “Jawa” Sivasankaran - ESW #423

Enterprise Security Weekly (Video)

Play Episode Listen Later Sep 8, 2025 126:06


Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue's global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the real-world risks of software acquisition in the API economy, the explosive growth of AI-generated code, and the rise of “vibe coding”—and how these trends are silently expanding the attack surface for organizations everywhere. Visit https://securityweekly.com/levelbluebh to download the Data Accelerator: Software Supply Chain and Cybersecurity as well as all of LevelBlue's research. In this interview, Yuval Wollman, President of CyberProof, unpacks how AI agents are not only expanding the attack surface—but reshaping the entire cyber threat landscape. Discover how ransomware-as-a-service platforms like Funksec and Dragonforce are operating with enterprise-level precision. Learn about the role of agentic AI, geopolitical cyber warfare, and why today's hackers offer better customer support than airlines. This segment is sponsored by CyberProof. Visit https://securityweekly.com/cyberproofbh to learn more about them! Doug White and Mickey Bresman, CEO of Semperis, dive deep into a conversation on the evolution of ransomware and the alarming rise of cyber extortion tactics. From the early days of encryption-only attacks to today's ransomware-as-a-service operations and hybrid threats blending digital and physical intimidation, this interview unpacks the growing sophistication of organized cybercrime. Mickey shares firsthand insights from Semperis' recent ransomware report, including a chilling real-world example where a photo of a child was used to threaten an IT professional — illustrating how far threat actors are willing to go. This segment is sponsored by Semperis. Visit https://securityweekly.com/semperisbh to download the 2025 Global Ransomware Report! Matt Alderman sits down with J.J. Guy, CEO & Co-Founder of Sevco Security, to unpack a 20-year industry failure finally being addressed: the disconnect between asset inventory, vulnerability visibility, and true cyber risk understanding. From the roots of CASM (Cyber Asset Attack Surface Management) to the convergence with CTE (Continuous Threat Exposure), JJ shares how Sevco is tackling today's fragmented environments — spanning cloud, on-prem, mobile, and containers — with a data-first approach. Would you like to see the Sevco platform in action? You can take a self-guided tour at https://securityweekly.com/sevcobh Doug White sits down with Intel 471 CEO Jason Passwaters for an eye-opening conversation on how cybercrime has evolved into a professional, profit-driven ecosystem. From ransomware-as-a-service to agentic AI, this interview pulls back the curtain on the real-world intel enterprises need to defend against today's most dangerous digital threats. Jason shares how threat actors are using business models that rival legitimate startups — complete with support teams and customer service — while enterprise security teams face shrinking budgets and expanding attack surfaces. This segment is sponsored by Intel471. Visit https://securityweekly.com/intel471bh to learn more about them! CyberRisk TV sits down with HD Moore, CEO & Co-Founder of runZero, for a conversation on why vulnerability management is still failing enterprises — and what needs to change now. This interview dives deep into the real-world challenges facing security teams today: tool overload, missing assets, unauthenticated exposures, and the illusion of visibility. HD reveals how attackers are exploiting blind spots faster than defenders can react — and why unauthenticated discovery is the secret weapon defenders need. Try runZero free! Get started at https://securityweekly.com/runzerobh Jackie McGuire sits down with Jawahar Sivasankaran, President at Cyware, for an unmissable deep dive into the future of Cyber Threat Intelligence (CTI), agentic AI, and open-source security innovation. With nearly three decades of experience spanning hands-on engineering, go-to-market leadership, and cutting-edge product strategy, Jawahar shares insider insights on how CTI is evolving from fragmented alerts to unified, automated threat intelligence platforms. To explore Cyware's new Intelligence Suite, CTI automation capabilities, and open-source AI integration protocol, visit https://securityweekly.com/cywarebh. Show Notes: https://securityweekly.com/esw-423

In the Groove, Jazz and Beyond

This playlist is a retrospective of recordings on CTI albums released in the 1970. They have that quality production and slick arrangement that make these albums so recognizable. These are some of my favorite examples. Playlist Artist ~ Name ~ Album Airto ~ Return to Forever ~ Free Deodato ~ Also Sprach Zarathustra ~ Prelude Milt Jackson ~ Sunflower ~ Sunflower Stanley Turrentine ~ Sugar ~ Sugar Joe Farrell ~ Follow Your Heart ~ Joe Farrell Quartet George Benson ~ So What? ~ Beyond the Blue Horizon

Moving Medicine Forward
Redefining Possibility: CTI's Role in Cell and Gene Therapy Trials

Moving Medicine Forward

Play Episode Listen Later Aug 26, 2025 19:33


In this episode of Moving Medicine Forward, host Jeremy Schrand welcomes Dr. Rich Curry to discuss how CTI is helping redefine what's possible in clinical research. From the complexities of cell and gene therapy to the human stories behind the science, Dr. Curry shares how CTI's expertise in rare diseases and regenerative medicine is accelerating innovation and improving patient outcomes. Discover how CTI's patient-first approach and global regulatory insight are shaping the future of advanced therapies.01:03 Dr. Curry explains how his background in neuropsychology and oncology research led him to clinical trials and CTI. 03:08 Dr. Curry highlights why cell and gene therapy excites him, emphasizing its potential to transform treatment approaches. 04:20 He explains how CTI's full-service research model supports complex, high-risk cell and gene therapy trials. 05:39 Dr. Curry describes the critical safety considerations in cell and gene therapy trials, particularly around immune system risks. 09:31 He explains how CTI approaches long-term follow-up and risk mitigation, sometimes monitoring patients for up to 15 years. 10:51 Dr. Curry shares how CTI stays ahead of global regulatory expectations through its dedicated regulatory and scientific affairs team. 12:03 He gives an example of how CTI helped a sponsor overcome regulatory challenges by identifying risk factors to ensure trial continuation. 13:16 Dr. Curry explains how CTI's focus on regenerative medicine and rare disease expertise sets it apart in gene therapy support. 14:01 He discusses how CTI's patient-first philosophy shapes trial design to improve patient experience and trial success. 14:54 Dr. Curry shares excitement for future innovations, especially in treating solid tumors, autoimmune diseases, and neurodegenerative disorders. 17:00 He explains how CTI prepares for the next wave of therapies by building strong sponsor partnerships and providing excellent service.  

Unspoken Security
Communication Strategies for Data Driven Leaders

Unspoken Security

Play Episode Listen Later Aug 21, 2025 60:59


Data alone does not persuade. For data-driven leaders, learning totranslate numbers into a compelling narrative is a critical skill. In thisepisode of Unspoken Security, host AJ Nash speaks with Salvatore Manzi, aleadership communications coach, about the strategies technical leaderscan use to create influence. Salvatore explains why leaders must learn tomake meaning over metrics to connect with teams, stakeholders, andcustomers.Salvatore shares practical frameworks to improve communication. Heintroduces the "You then me" principle, which prioritizes acknowledging the other person's view to build rapport. He also shows how using simplemetaphors and a little appreciation can make complex dataunderstandable. These techniques disarm a room before you need tocorrect someone or present a counter-argument, ensuring your message lands effectively.The conversation also covers imposter syndrome and the uniquecommunication hurdles women face in the tech industry. AJ and Salvatorediscuss the power of authenticity and the need for allies who activelyamplify other voices. They explore how simple shifts in body language andmindset can build the confidence needed to overcome these challenges and ensure your voice is heard.Send us a textSupport the show

Data Security Decoded
Breaking the Intelligence-Defense Divide with Scott Scher

Data Security Decoded

Play Episode Listen Later Aug 13, 2025 24:19


In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn't just technical work, it's about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most. • Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions • Hear how Scott's off-grid lifestyle influenced his approach to resilience and technology reliance • Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like • Get practical ways to transform raw threat data into clear, actionable defense strategies

Moving Medicine Forward
Spotlight: Savannah Doliboa, Chief Commercial Officer at CTI

Moving Medicine Forward

Play Episode Listen Later Aug 12, 2025 11:02


In this episode of “Moving Medicine Forward,” SavannahDoliboa, Chief Commercial Officer at CTI, shares her career journey and what led her to CTI, a company that combines the strengths of both large and mid-sized CROs. She reflects on the rewards of working with rare disease sponsors, CTI's diverse client base, and its reputation for flexibility, expertise, and lasting partnerships. Savannah also highlights CTI's global growth and commitment to advancing clinical research through innovation and collaboration, while navigating regulatory challenges and embracing trends such as AI and patient-centricity.00:52 Savannah shares her career journey and what led her to join CTI, highlighting her experience at both large and mid-sized CROs and how CTI offered the best of both worlds.02:39 She discusses what makes working with rare disease sponsors so personally and professionally rewarding, particularly the close connection to patient communities.03:57 Savannah outlines who CTI's clients are, explaining that they range from biotech startups to large pharmaceutical companies, with a common thread of complexity and innovation.04:46 She explains why clients choose CTI, citing the company's niche expertise, flexibility, and ability to retain skilled team members throughout long and complex trials.05:48 Savannah talks about how CTI's agility helps meet client needs, especially when navigating regulatory challenges or changing trial strategies mid-study.06:33 She identifies current trends in the clinical research industry, such as AI and reducing patient burden, that are creating new opportunities for both CTI and its clients.07:51 Savannah shares how CTI's global growth strategy aligns with its mission to go where clients need them most, supported by a strong track record of repeat businessand comprehensive services.08:56 From a commercial lens, she explains where CTI is headed in the next 3–5 years, emphasizing innovation, quality partnerships, and staying at the forefront of clinical research.09:33 She sums up why clients choose to work with CTI: a trusted mid-sized partner that delivers global reach, personalized service, and an extensive commitment tobringing treatments to market.

PEBMED - Notícias médicas
Check-up Semanal #186: Hipertireoidismo subclínico e demência, fototerapia e mais!

PEBMED - Notícias médicas

Play Episode Listen Later Aug 8, 2025 9:23


Confira os temas do Check-up Semanal de hoje: Diretriz Chest para hemotransfusão no CTI; Critério Heaven de intubação difícil; Hipertireoidismo subclínico e demência; Fototerapia na prevenção das complicações de icterícia neonatal; Diretriz de risco cirúrgico ACC/AHA. Ouça agora!Confira esse e outros posts no ⁠Portal Afya⁠ e siga nossas redes sociais!⁠Facebook⁠⁠Instagram⁠⁠Linkedin⁠⁠Twitter

Unspoken Security
Today's Geopolitical Threat Environment Requires a New Security Model

Unspoken Security

Play Episode Listen Later Aug 7, 2025 59:26


In this episode of Unspoken Security, host AJ Nash welcomes Mark Freedman, Principal and CEO of Rebel Global Security, to discuss a major shift in the global threat landscape. The primary national security concern has moved from counter-terrorism to interstate strategic competition. This change requires a new security model, especially for the private sector.Mark explains that companies are now players on a geopolitical battlefield, facing sophisticated threats from nation-states. Yet, many organizations operate in silos. Legal teams track sanctions while cybersecurity teams react to technical threats. They often miss the strategic connection between the two, which creates significant vulnerabilities.To close these gaps, AJ and Mark explore the need for an integrated intelligence function within businesses. They discuss how even a single empowered person, tasked with understanding the geopolitical environment, can connect various teams. This strategic view helps companies build a more resilient and proactive defense in a complex world.Send us a textSupport the show

Life Science Success
How a Color-Changing Ink Pioneer Is Battling Cancer

Life Science Success

Play Episode Listen Later Aug 4, 2025 49:18


Send us a textIn this episode of the Life Science Success Podcast my guest is Lyle Small, a seasoned innovator with 35 years of experience in interactive inks and coatings who is now the Founder and CEO of Lahjavida, Inc., a promising cancer research company developing targeted chemotherapy technologies. Lyle has an impressive track record of technological innovation, having previously founded Chromatic Technologies and developed groundbreaking color-changing technologies for brands like Coors Light, and is now focused on creating potentially transformative cancer treatments.00:00 Introduction to Life Science Success Podcast00:40 Celebrating Podcast Achievements01:27 Interview with Lyle Small: Background and Journey02:43 Lyle's Early Career and Innovations07:13 Founding Chromatic Technologies Inc. (CTI)09:00 CTI's Impact and Innovations15:13 Transition to Lahjavida: New Ventures in Cancer Research20:16 Challenges and Insights in Cancer Research25:03 Understanding Success Rates in Business27:40 The Importance of Failure Mode and Effects Analysis (FMEA)28:58 Building Effective Teams: Lessons Learned38:27 Leadership Qualities and Challenges40:39 Current Endeavors and Fundraising Efforts43:45 Inspiration, Concerns, and Excitement48:05 Conclusion and Final Thoughts

NewsByte
Too Much Winning, NFL Delusion, and Trump Channels Sean Connery

NewsByte

Play Episode Listen Later Aug 3, 2025 34:24 Transcription Available


Even Democrats admit Trump cant stop winning, the NFL is blamed for a mass shooting in New York City, and President Trump does his best Sean Connery impersonation! Its been a surreal week which you will hear in our "did they really just say that" cuts.

Unspoken Security
Can My AI Be Hacked?

Unspoken Security

Play Episode Listen Later Jul 24, 2025 65:43


In this episode of Unspoken Security, host AJ Nash speaks with Dr. Peter Garraghan, CEO and CTO of Mindgard. They discuss the real-world security risks of artificial intelligence. Peter starts with a simple point: AI is just software, and software is easy to break. He urges businesses using AI to step back and truly understand its vulnerabilities.Peter draws parallels between the current AI boom and past technology cycles like cloud computing. While AI feels revolutionary, the security risks are not new. Threats like data poisoning and prompt injection are modern versions of classic cybersecurity problems. The danger is that AI's human-like interface makes it easy to anthropomorphize, causing users to overlook fundamental security flaws.To manage these risks, Peter advises companies to treat AI like any other software. This means applying the same rigorous security controls, testing protocols, and incident response playbooks. Instead of creating a separate process for AI, organizations should find the gaps in their current security posture and update them. This practical approach helps businesses secure AI systems effectively.Send us a textSupport the show

ADHD Support Talk Radio
ADHD Solutions

ADHD Support Talk Radio

Play Episode Listen Later Jul 22, 2025 28:33


In this episode of ADHD Support Talk Radio, co-host Lynne Edris is joined by cognitive engineer and ADHD coach Jeff Copper for a fascinating conversation that may completely change the way you think about ADHD and executive function. Jeff introduces a groundbreaking model he calls Cognitive Ergonomics From the Inside Out™, which reframes ADHD as a problem-solving impairment rather than a motivational or behavioral failure.   Together, they discuss: Why so many ADHD productivity strategies fall short How executive function challenges stem from ambiguity, not laziness The role of collaboration and communication as natural, effective accommodations How to externalize thinking and reduce overwhelm in ways that actually work What it means to "think like an engineer" when managing ADHD Whether you're struggling with procrastination, motivation, or follow-through, this conversation offers refreshing clarity—and practical solutions that may surprise you.

university video owner mba adhd tampa adults inside out icf add adhd adult adhd cti aco chadd edward hallowell stephanie sarkis paac terry matlen jeff copper professional excellence award laurie dupar attention talk radio lynne edris tara mcgillicuddy
The MFCEO Project
910. Andy & DJ CTI+: Trump Orders Bondi To Seek Release Of Epstein-Related Grand Jury Testimony

The MFCEO Project

Play Episode Listen Later Jul 18, 2025 32:16


On today's CTI+, Andy & DJ discuss President Donald Trump's Truth requesting Attorney General Pam Bondi to seek the release of the grand jury testimony related to the criminal prosecution of Jeffrey Epstein.

To The Point - Cybersecurity
Anticipation and Preparation The Science Behind Cyber Threat Intelligence with Dmitry Bestuzhev Part 2 rerun

To The Point - Cybersecurity

Play Episode Listen Later Jul 15, 2025 26:01


Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns our attention to the risks posed by public charging stations - a ploy dubbed “Juice Jacking.”   Dmitry Bestuzhev, Senior Director CTI at BlackBerry Dmitry Bestuzhev is Senior Director, CTI (Cyber Threat Intelligence) at BlackBerry. Prior to BlackBerry, Dmitry was Head of Kaspersky's Global Research and Analysis Team for Latin America, where he oversaw the company's experts' anti-malware development work in the region. Dmitry has more than 20 years of experience in IT security across a wide variety of roles. His field of expertise covers everything from traditional online fraud to targeted high-profile attacks on financial and governmental institutions. His main focus in research is on producing Threat Intelligence reports on financially motivated targeted attacks. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e341

Moving Medicine Forward
Clinical Research in the Middle East & Africa: A Conversation with Alaa Assem from CTI

Moving Medicine Forward

Play Episode Listen Later Jul 14, 2025 18:07


Alaa Assem, Managing Director for CTI in the Europe & MEA regions, joins us to discuss the evolution of clinical trials in the Middle East and Africa. With over a decade of experience in pharma and CROs, Alaa shares how CTI has built a strong regional presence, the impact of COVID-19, and why sponsors should consider the region for future trials.Topics Covered:CTI's history and expansion in the Middle East & AfricaLocal expertise and regulatory evolutionVaccine research and biotech investmentGene therapy, AI, and the future of clinical trialsClick Here for more Info about CTI in the MEA RegionTimestamps:00:00 – Meet Alaa and his background00:56 – CTI's regional roots and growth02:19 – Why local presence matters03:20 – Clinical research evolution in the region05:02 – COVID-19's transformative impact06:44 – Vaccine research and biotech hubs08:33 – Advice for sponsors entering the region10:33 – Changing perceptions and realities12:52 – CTI's readiness and expansion strategy14:06 – Future growth and innovation15:42 – Alaa's excitement for the future of research

Unspoken Security
The Human Side of Cyber

Unspoken Security

Play Episode Listen Later Jul 10, 2025 61:26


Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actual human risk.Ashley presents a better way forward through human risk management. This modern strategy moves beyond simple phishing tests and integrates data from your existing security tools. It provides a full view of employee behavior to identify and address risks proactively. The goal is to make security training engaging and effective, not just another task to ignore.The conversation also covers the nuanced relationship between human risk management and insider threat programs. AJ and Ashley discuss how to empower employees and transform them from a potential liability into an organization's greatest security asset, creating a stronger, more resilient workforce.Send us a textSupport the show

En Perspectiva
La Mesa 09.07.2025 - Oposición convocó ministro del Interior por operativo policial en el clásico

En Perspectiva

Play Episode Listen Later Jul 9, 2025 31:52


La Tertulia de los Miércoles con Valentina Arlegui, Leonardo Costa, Juan Erosa y Daoiz Uriarte. *** El clásico del domingo pasado entre Nacional y Peñarol volvió a encender las alarmas sobre la seguridad en el fútbol uruguayo. Los hechos son conocidos… y graves: una bengala náutica lanzada desde la tribuna Colombes impactó en un policía ubicado en la bancada de prensa de la tribuna América. El funcionario debió ser operado de urgencia y permanece internado en CTI, con lesiones severas en la zona genital. Fiscalía investiga el hecho como un “atentado” y hasta el momento no hay responsables identificados. Otro agente fue alcanzado por una pedrada. En este caso, la lesión fue menor y no requirió hospitalización. Además, un relevamiento del Ministerio del Interior basado en cámaras seguridad -consignado por El Observador- indica que, a lo largo de los 120 minutos del partido, más la tanda de penales, las hinchadas de Nacional y Peñarol arrojaron más de 15 bengalas náuticas. El lunes, en conferencia de prensa, el ministro Carlos Negro aseguró que el operativo policial “fue cumplido a la perfección” y que “prácticamente” no se registraron episodios de violencia. “Tuvimos un excelente operativo desplegado en las inmediaciones del Estadio Centenario, y dentro también. Pero un individuo ingresó con un arma —porque un lanzador de bengalas marítimas es un arma de fuego— y brutalmente la disparó contra una tribuna, donde podía haber niños. Le tocó, desgraciadamente, a un integrante de nuestro ministerio, y vamos a agotar todas las medidas de investigación para dar con el responsable y con todos aquellos que participaron en disturbios o sostuvieron banderas que fueron robadas en momentos anteriores”. Las declaraciones del secretario de Estado generaron rechazo en varios sectores. El diputado nacionalista Pedro Jisdonian anunció que citarán a Negro a la Comisión de Deportes: “No vamos a tolerar que diga que fue un procedimiento exitoso cuando hay un policía en CTI”, afirmó. El objetivo del llamado, dijo, es conocer cuál es el plan que tiene la cartera en relación con la violencia en el fútbol. También se convocará a los sindicatos policiales, que expresaron su indignación por los dichos del ministro, que consideran una minimización del episodio. Desde el Ministerio del Interior se sostiene que la seguridad del espectáculo deportivo es responsabilidad de los organizadores, y que la Policía actúa como apoyo. En paralelo, Negro se reunió el martes con jerarcas policiales y hoy hará lo propio con representantes de la AUF y con los presidentes de Peñarol y Nacional, Ignacio Ruglio y Ricardo Vairo, respectivamente. ¿Qué evaluación hacen los tertulianos sobre lo ocurrido el domingo? ¿Puede calificarse de exitoso un operativo que terminó con un agente gravemente herido? ¿Quién debe asumir la responsabilidad por lo sucedido? ¿Qué medidas concretas se pueden tomar para que los violentos no sigan adueñándose del espectáculo? ¿Qué margen de acción tienen los clubes y la AUF frente a estos hechos?

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 8, 2025 5:29


What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent access to compromised systems. https://moonlock.com/amos-backdoor-persistent-access HOUKEN SEEKING A PATH BY LIVING ON THE EDGE WITH ZERO-DAYS At the beginning of September 2024, an attacker repeatedly exploited vulnerabilities CVE-2024- 8190, CVE-2024-8963, and CVE-2024-9380 vulnerabilities to remotely execute arbitrary code on vulnerable Ivanti Cloud Service Appliance devices. https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf SEO Scams Targeting Putty, WinSCP, and AI Tools Paid Google ads are advertising trojaned versions of popuplar tools like ssh and winscp https://arcticwolf.com/resources/blog-uk/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-and-trojanized-tools/

To The Point - Cybersecurity
Anticipation and Preparation The Science Behind Cyber Threat Intelligence with Dmitry Bestuzhev (Rerun)

To The Point - Cybersecurity

Play Episode Listen Later Jul 8, 2025 23:28


Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns our attention to the risks posed by public charging stations - a ploy dubbed “Juice Jacking.”   Dmitry Bestuzhev, Senior Director CTI at BlackBerry Dmitry Bestuzhev is Senior Director, CTI (Cyber Threat Intelligence) at BlackBerry. Prior to BlackBerry, Dmitry was Head of Kaspersky's Global Research and Analysis Team for Latin America, where he oversaw the company's experts' anti-malware development work in the region. Dmitry has more than 20 years of experience in IT security across a wide variety of roles. His field of expertise covers everything from traditional online fraud to targeted high-profile attacks on financial and governmental institutions. His main focus in research is on producing Threat Intelligence reports on financially motivated targeted attacks. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e340

ITSPmagazine | Technology. Cybersecurity. Society
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 2, 2025 6:39


Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chief Technology Officer at RedSeal; Chip Witt, Principal Security Analyst at Radware; and Jason Kaplan, Chief Executive Officer at SixMap, each bring their perspective on why threat intelligence must become a leadership signal that shapes decisions far beyond the security team.From Risk Reduction to OpportunityRyan Patrick explains how organizations are shifting from compliance checkboxes to meaningful, risk-informed decisions that influence structure, operations, and investments. This point is reinforced by John Salomon, who describes CTI as a clear, relatable area of security that motivates chief information security officers to exchange threat information with peers — cooperation that multiplies each organization's resources and builds a stronger industry front against emerging threats.Real Business ContextTod Beardsley outlines how CTI can directly support business and investment moves, especially when organizations evaluate mergers and acquisitions. Wayne Lloyd highlights the importance of network context, showing how enriched intelligence helps teams move from reactive cleanups to proactive management that ties directly to operational resilience and insurance negotiations.Chip Witt pushes the conversation further by describing CTI as a business signal that aligns threat trends with organizational priorities. Jason Kaplan brings home the reality that for Fortune 500 security teams, threat intelligence is a race — whoever finds the gap first, the defender or the attacker, determines who stays ahead.More Than DefenseThe discussion makes clear that the real value of CTI is not the data alone but the way it helps organizations make decisions that protect, adapt, and grow. This episode challenges listeners to see CTI as more than a defensive feed — it is a strategic advantage when used to strengthen deals, influence product direction, and build trust where it matters most.Tune in to hear how these leaders see the role of threat intelligence changing and why treating it as a leadership signal can shape competitive edge.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.

Unspoken Security
Why is Fighting Cybercrime Worth the Effort?

Unspoken Security

Play Episode Listen Later Jun 26, 2025 45:52


Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle.Robert challenges the common view that "whack-a-mole" tactics are pointless. He believes the key is changing the game from single-player to multiplayer whack-a-mole. By working with domain registrars, hosting providers, and government agencies, defenders can hit criminals at multiple points in their attack chain. This coordinated response makes cyber crime more expensive and less profitable for attackers.The conversation covers everything from traditional phishing to sophisticated pig butchering scams. Robert shares how Netcraft uses AI to engage with scammers and gather intelligence at scale. He also discusses the national security implications of cyber crime and why whole-of-government responses in countries like Australia and the UK show promise for reducing fraud rates.Send us a textSupport the show