POPULARITY
Kevin Szczepanski is joined by insurance and technology veteran analyst and author Barry Rabkin as they take a deep dive into all things cyber, cyber risk, and insurability. Barry sets the stage by addressing the evolution of cyber risk and noting that the CrowdStrike outage was both a wake-up call and a harbinger of what's to come. Kevin and Barry then discuss cyber and operational technology (OT) vs information technology (IT). Their deeper dive into what cyber risks are (“corruption, disruption, destruction, nuisance, and theft”) leads them to note that our world, instead of terraforming, is cyberforming. Listen in as Barry shares more, including about his forthcoming book, “Ramifications of Insurance Commerce in the Cyber Age.”
Vedran Bajer je country manager Microsofta Hrvatska, no njegova karijera uključuje više voditeljskih pozicija u MojPosao i VIDI, te vođenje više business development odjela u Googleu. Posao ga je vodio diljem svijeta, a dovoljno je dugo vremena proveo u Singapuru i Švicarskoj da se tamo osjeća kao doma. Osoba je vrlo širokih interesa, kao najveće kvalitete ističe radoznalost, spremnost na učenje, čitanje knjiga, te sportu. S Vedranom smo pričali o dojmovima koje je skupio o svijetu i karijeri, razlikama Singapura i Hrvatske, te kakva nam budućnost predstoji s AI alatima, osobito Microsoftovom Copilotu. Pričali smo i o možda najvažnijoj temi - tko sve može imati koristi od Copilota i integracijama AI-a u svakodnevno poslovanje, te što je sve trenutno moguće. Vedran preporučuje knjige: Material World: A Substantial Story of Our Past and Future, Ed Conway (pijesak, sol, bakar, željezo, nafta, litij) The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, David Sanger (cyber) This Is How They Tell Me The World Ends, Nicole Perlorth (cyber) The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma, Mustafa Suleyman (o revoluciji u kojoj smo sada) Off Menu: The Secret Science of Food and Dining, Nell McShane Wulfhart (samo Audible, jako zanimljivo za ekipu koja voli klopati) Dosta Adam Granta - Originals, Think Again (broadly, leadership) How the World Really Works: How Science Can Set Us Straight on Our Past, Present and Future, Vaclav Smil (facts, facts, facts :)) Chip War: The Quest to Dominate the World's Most Critical Technology, Chris Miller (a must za svakoga u tehnologiji) Never Finished: Unshackle Your Mind and Win the War Within, David Goggins (možda malo granična, ali jako dobra priča o pomicanju ljudskih granica, iako David Goggins ima jaaaaako puno problema kao osoba) Flying Blind: The 737 MAX Tragedy and the Fall of Boeing, Peter Robison (za napraviti Boeing 737 treba manje od 9 dana, a random fact, izvrsna knjiga o promjeni kulture i utjecaju toga; imam puno tih povezanih s avijacijom, tehnologijom etc, ali ova je nekako poslovno zanimljiva također) Outlive: The Science and Art of Longevity, Peter Attia MD, Bill Gifford (najdraža mi knjiga 2023.) The Culture Map, Erin Meyer (za increasingly global way of working, the business book koju mislim da svatko treba imati, poklonio sam ih barem 30 ljudima) A General Theory of Love, Thomas Lewis, Fari Amini (divna, jedina ovdje koja ima veze sa neuroznanoscu, da ne gnjavim previse) Podcasti: Another Podcast, Ben Evans (geek, ultra mega pametan) Prof G pod, Scott Galloway (tu i tamo, uglavnom jer pratim tržista kapitala) Acquired (duboke, duboke price o raznim biznisima, fascinantno - epizode o npr. Nvidia, Nike, Microsoft) Huberman Lab (sve su top) Epizodu je sponzorirao Microsoft Hrvatska. Citat dana: Freedom means the opportunity to be what we never thought we would be.Daniel J. Boorstin Tri načina kako slušati podcast Kako slušati podcast u autu koji nema Mp3 player Top lista najslušanijih epizoda
Cyber threats are increasingly becoming a critical element in global conflicts, with the Ukraine and Gaza being prime examples, indicating a growing need for specialized cyber forces. To … Read More » The post
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.
In today's digitized world, our lives inexorably intertwine with cyberspace. We are exposed to damaging cyberattacks by foreign actors, local criminal gangs, and other nefarious entities. U.S. Naval War College's Derek Reveron and Brown University's John E. Savage join "Doorstep" co-hosts Nick Gvosdev and Tatiana Serafin to discuss their new book "Security in the Cyber Age" and how we can protect ourselves online. How can we mitigate the harmful effects of AI? What are governments around the globe doing to secure individual user rights? For more, please go to: https://carnegiecouncil.co/doorstep-reveron-savage
In conversation with Robert E. Hamilton, Head of Eurasia Research - Eurasia Program, Foreign Policy Research Institute Horace W. Goldsmith Foundation Endowed Lecture The White House and national security correspondent for The New York Times, David E. Sanger has been a member of three Pulitzer Prize-winning journalist teams, including in 2017 for international reporting. His bestselling books include The Inheritance: The World Obama Confronts and the Challenges to American Power; Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power; and The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, which was adapted into an award-winning HBO documentary. Sanger is also a regular contributor to CNN and teaches national security policy at Harvard's Kennedy School of Government. In New Cold Wars, he offers an in-depth account of the United States' high-stakes struggles against two very dissimilar adversaries-Xi Jinping's China and Vladimir Putin's Russia. Colonel (Retired) Robert E. Hamilton, Ph.D., is the Head of Research at the Foreign Policy Research Institute's Eurasia Program and an Associate Professor of Eurasian Studies at the U.S. Army War College. In a 30-year career in the U.S. Army, spent primarily as an Eurasian Foreign Area Officer, he served overseas in Saudi Arabia, Iraq, Germany, Belarus, Qatar, Afghanistan, the Republic of Georgia, Pakistan and Kuwait. He is the author of numerous articles and monographs on conflict and security issues, focusing principally on the former Soviet Union and the Balkans. He is a graduate of the German Armed Forces Staff College and the U.S. Army War College and holds a Bachelor of Science degree from the United States Military Academy, a Master's Degree in Contemporary Russian Studies and a Ph.D. in Political Science, both from the University of Virginia. Because you love Author Events, please make a donation to keep our podcasts free for everyone. THANK YOU! (recorded 4/18/2024)
Derek Reveron is Chair and Professor of National Security Affairs at the U.S. Naval War College in Newport, Rhode Island. He specializes in strategy development, non-state security challenges, intelligence, and U.S. defense policy. He has authored or edited fourteen books. Dr. Reveron is a faculty affiliate at the Belfer Center for Science and International Affairs at Harvard University where he co-teaches a course on contemporary national security challenges at the Kennedy School of Government. The views expressed by Dr. Reveron are his alone and do not necessarily represent the positions of the Naval War College, the U.S. Navy, or the Department of Defense. John E. Savage is the An Wang Professor Emeritus of Computer Science at Brown University. He is a Fellow of the American Association for the Advancement of Science, Association for Computing Machinery, Institute of Electrical and Electronics Engineers, and a Guggenheim Fellow. He served as a Jefferson Science Fellow in the U.S. State Department, a Fellow at the EastWest Institute, and a member of the Rhode Island Cybersecurity Commission. Dr. Savage has published over one hundred research articles, two books on theoretical computer science, co-authored a book on computer literacy, and co-edited a book on Very Large Scale Integration and parallel systems. He has given more than one hundred and eighty-five invited presentations worldwide. Together Dr. Reveron and Dr. Savage are the co-authors of Security in the Cyber Age: An Introduction to Policy and Technology which was recently released from Cambridge University Press, and is the subject of our conversation today.
Join Tom Wheelwright in this episode as he discusses "Security in the Cyber Age" with authors Derek Reveron and John E. Savage, both professors and experts in cybersecurity. Derek Reveron is a Chair and Professor of National Security Affairs at the U.S. Naval War College in Newport, R.I., who specializes in strategy development, non-state security challenges, intelligence, and U.S. defense policy. An Wang Professor Emeritus of Computer Science at Brown University, John E. Savage, also joins the conversation, and has served as a Jefferson Science Fellow in the U.S. State Department, a Fellow at the EastWest Institute, and as a member of the Rhode Island Cybersecurity Commission. Discover ways to protect your clients, yourself, and your tax business from cyber threats, gain insight on proactive safety measures, as well as invaluable tools and organizations to protect you like cyber insurance. Learn more about your ad choices. Visit megaphone.fm/adchoices
Guests: Derek Reveron, Professor and Chair of National Security at the US Naval War College John Savage, An Wang Professor Emeritus of Computer Science of Brown University Topics: You wrote a book on cyber and war, how did this come about and what did you most enjoy learning from the other during the writing process? Is generative AI going to be a game changer in international relations and war, or is it just another tool? You also touch briefly on lethal autonomous weapons systems and ethics–that feels like the genie is right in the very neck of the bottle right now, is it too late? Aside from this book, and the awesome course you offered at Brown that sparked Tim's interest in this field, how can we democratize this space better? How does the emergence and shift to Cloud impact security in the cyber age? What are your thoughts on the intersection of Cloud as a set of technologies and operating model and state security (like sovereignty)? Does Cloud make espionage harder or easier? Resources: “Security in the Cyber Age” book (and their other books') “Thinking, Fast and Slow” book “No Shortcuts: Why States Struggle to Develop a Military Cyber-Force” book “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age“ book “Active Cyber Defense: Applying Air Defense to the Cyber Domain” EP141 Cloud Security Coast to Coast: From 2015 to 2023, What's Changed and What's the Same? EP145 Cloud Security: Shared Responsibility, Shared Fate, Shared Faith?
Host Llewellyn King and Co-host Adam Clayton Powell III discuss a new "primer" on cybersecurity policy and technology with its authors, Derek Reveron , chair of the National Security Affairs Department at the U.S. Naval War College and John Savage, professor emeritus of computer science at Brown University.
David Sanger's "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age" tells the story of the rise of cyberweapons: a transformational twist for geopolitics comparable to the atomic bomb. Original air date 18 July 2018.
So while there is much debate around people like Tim Berners-Lee and Vint Cerf, we should also include “The Editor of the Internet”: Jon Postel. Jon was born on 6 August 1943 and died in October 1998. Even up to his death, he was the editor of the Request for Comment (RFC) documents and administered the Internet Assigned Numbers Authority (IANA). In 2012, he was inducted into the Internet Hall of Fame by the Internet Society, and the foundation he has left is as strong as any foundation ever created, in fact, it's the foundation for our Cyber Age. Building and standardizing the Internet Before the Internet, companies such as IBM held a stranglehold on the industry, and typically defined the standards for others to follow. Along with this, we had standards agencies, such as ISO and the IEEE, which were comborsome entities which took years, if not decades, to standardize anything. With these standardization agencies, a standard could take years to develop, and often involved the tinkering from countries, in order to protect their industries, and thus often stifled innovation. Overall the Internet was built around many of the systems and protocols that grew up in the early 1980s. It then grew without the constraints of governments and standards agencies. The core part of this growth was the quick method of publishing a new standard: the RFC. RFCs RFC (Request For Comment) documents are a way to quickly define standards. With this HTTP and email quickly become standardized. Developers could then go ahead and implement the system against the standards, without the massive overhead of taking them to international standards agencies like the ISO (International Standard Organisation) or the IEEE. While first published in 1969 (with RFC1), the classics first started to appear in 1981, and which now provide the core of the Internet: RFC 791 which defines the format of IP packets (IPv4) RFC 793 which defines TCP (Transport Control Protocol), and the foundation of virtually all of the traffic that exists on the Internet. Many protocols, although now limited, became de-facto standards, and have moved on little since, including HTTP (HyperText Transmission Protocol) 1.1, which was initially created as RFC 1945. The foundation: TCP and IP So, it was in September 1981, that the true foundation of the standardisation of Internet communications was born: For RFC 783 we have: September 1981 Transmission Control Protocol PREFACE This document describes the DoD Standard Transmission Control Protocol (TCP). There have been nine earlier editions of the ARPA TCP specification on which this standard is based, and the present text draws heavily from them. There have been many contributors to this work both in terms of concepts and in terms of text. This edition clarifies several details and removes the end-of-letter buffer-size adjustments, and redescribes the letter mechanism as a push function. Jon Postel Editor Sandwiched in-between the two classics, was another one, which did not have the same impact, but has helped to debug a billion systems: Internet Control Message Protocol (ICMP) — RFC 782. So RFC791, RFC792 and RFC793 have since changed the course of our societies. The impact of the IP and TCP standards cannot be underestimated in terms of their impact on our society, and certainly rate alongside “The Wheel” and “The Transistor” as some of the most disruptive technologies ever created. Its standardization supported a whole range of activities and basically allow the Internet to boot up quickly. If nation-states had controlled the Internet, it would have ended up being licensed, and locked down in its growth. Without the massive growth of the spread of the protocols, the Internet would have died as quickly as it had been created. With standards and government agencies controlling its every move. For Jon, he just gathered the required methods for the standards and posted them for everyone to review. If you missed it, you really couldn't contribute until the next version came along. Building a Web: HTTP For something like HTTP, which provides the core of most of what we do on the Web, it started with 1.0 (with the input from Tim Berners-Lee) with RFC1945 (in 1996) and then developed on HTTP 1.1 as RFC2068 (in 1997). Basically in the 18 years since, very little has changed with the core HTTP protocol, as it quickly becomes as standard. New methods of using in — such as with REST Web services — actually made use of all the things that were not really used when accessing static Web pages. The lack of thought to security is highlighted by the fact that it took to RFC 1508 before the word “Security” was included in the title (Sept 1993), which was more than 12 years since the IP packet definition (Sept 1981). So it was 1981 when TCP and IP were created, and two major other things happened around the time that supported the growth of the Internet. The first was the release of the PC by IBM, and the other was when Leonard Bosack networked the Stanford University computer science department's computers, along with Sandy Lerner. Their knowledge was then used to create the router, and the formation of Cisco in 1984. At its core was the implementation of the IP and TCP standards. Email, remote access and lots more… It's not just TCP, IP and HTTP that we have to thank Jon for, it's all the other protocols he helped standardize. The way that we use Web addresses, such as http://asecuritysite.com/challenges, was standardized in RFC 1738 — Uniform Resource Locators (URL), and which is something that we just take for granted, but without it, we really couldn't create our integrated infrastructure. And without Jon, we would have to remember the IP address of every Web site we wanted to visit — for that, he standardised domain names and their mapping to IP addresses with RFC1035. And how can I connect a computer to the Internet, and every computer in the whole knows it's there — well that one is a shy little protocol — ARP — Address Resolution Protocol — the most horrible and beautiful of all the protocols. It was published as RFC826 (standardized in 1982), and allows the discovery of computers on a local network by a network gateway. Without ARP, we would have to create a massive database that kept a copy of all the computers which connect to the Internet. With it, computers are discovered and connectable. The Killer App: Email In the early phases of the Internet, it was not the Web that was the “killer app”, it was electronic mail. The large-scale adoption of email was indebted to Jon with standards around sending emails (SMTP — Simple Mail Transport Protocol — RFC821 — defined in 1982) and reading it (POP — Post Office Protocol — RFC960) — defined in 1985). Often, though, the first, and even the second version, was not enough, and some protocols, such as POP-3 (RFC1939) and IMAP-4 (RFC1730), went through a few major iterations to become the worldwide de-facto standard. The Internet and the internet The greatest challenge for the Internet, when it was first created, was how it would scale, so that new computers and networks could be added, and discovered by the rest of “The Internet”. I must here define “The Internet”, as it is different from “the internet”. Basically, “The Internet” uses publicly defined IP addresses, whereas “the internet” is not publicly routable. The key to this, along with IP Version 4, was routing protocols, which were used to find the best way to a destination, and involved routers intercommunicating to discover new networks. The first of these “routing protocols” were fairly simple, just measuring the number of hops that it took to get from one network to another. And so Jon posted RFC1058 for RIP (Routing Information Protocol) Version 1. Before RFCs, large companies often defined the standards, especially IBM, and who could force the market to abide by their interface and who could thus control the market. This monopoly was completely broken by Jon, and few companies could release new standards unless they had been standardized by RFCs.
Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
In this high-energy episode of Cyber Security Matters, Christian and Dominic talk with Paige Strand, Director of Marketing and Communications for irlabs. In this episode we will cover: Why it is so important for board members and executive leadership to be part of cyber incident response planning. What good communication of the cyber incident response plan looks like for small and midsize businesses. What the current climate is for executives and board members regarding the reputational risk of a cyber attack. How much better is it to proactively plan a cyber attack response versus trying to mitigate the damage after an attack event. What augmented reality (AR) is and how it is impacting communication in business. For being a loyal listener, we have a special offer from this week's sponsor, Senteon: a free trial of their cross compliance database. Please click on the link provided and follow the instructions below: https://app.senteon.co/ In order to access the mapping database, make a user account to access the home page. On the left side of the bar, click on the title: ‘Catalog' and within this screen, select ‘4 columns showing'. From here, you can add in whichever regulated framework you would like to see cross mapping for. Once signed up, the trial allows you to deploy up to 10 agents and run a gap assessment to see your current configurations versus the CIS benchmark.
Humanity has plunged into the Cyber Age at terminal velocity. Everything must move at the speed of light. High-speed internet, […] The post The Price of Gas appeared first on Mat Labotka.
In Episode 37, Julie shares her tangent thoughts on paid dating apps. Then she shares a few memorable online dating stories, including the time she got stood up, got called a psycho, and had an interesting DM on Offer Up. Reference Episode 14 - Our Online Dating Scam Stories Connect with The Brown Girl Podcast on Instagram Connect with Julie on Instagram and Youtube Sign up for our b-weekly Newsletter #southasianpodcasts #desipodcasts #datingpodcasts
Agency Nation Radio - Insurance Marketing, Sales and Technology
On the final edition of the three-part series from the Big “I” InsurTech Summit, Chris Cline, executive director of Agents Council for Technology, and Bill Haber, co-founder TEKRiSQ talk about the cyber age. Cyber is the new cost of doing business and agency owners need to be more proactive in their approach to data security—creating policies and having staff and services in place to prevent breaches. With the ramp-up of email, EFT fraud, and phishing, it's also important for owners to become more resilient as well. Tune in for a future-focused talk on cyber. Rember to check out Parts 1 and 2 from the InsurTech Summit.
The porn industry is behind many of the innovations that drive e-commerce and the consumer internet today. If you want to know what new trend is going to be the hottest thing in tech, the makers of smut probably have the answer. Learning notes from this episode: The adult industry pioneered streaming video, tracking devices and online credit card transactions. Even before the advent of the internet, porn drove consumer tech. Author Patchen Barss says that without porn, the VCR might have never taken off as a consumer product. Pornographers are not necessarily the inventors of new technologies, but they are the first to use them and thus drive consumer adoption. Once a technology works for porn users, they often flow down to the mainstream. If you are a tech investor or a tech innovator, seeing what new products or use cases are happening in the adult industry, can help you spot the next big trend. The more you can pick up ideas from wherever they come from, regardless of whether they are from culturally approved places, the more creative you will be in your work. Resources mentioned in this episode: Business Insider: How porn drives innovation in tech Web root: internet Pornography by the Numbers Obscene Profits: The Entrepreneurs of Pornography in the Cyber Age, by Frederick Lane The Erotic Engine, by Patchen Barss Join the The Non-Technical Founders Introduction to Tech workshop You will learn: The framework for how to go from idea to live product Product management fundamentals How to work with developers effectively How and when to hire a product team ----- If you like learning about how tech products and profits get made, you'll like our newsletter. It's funny too. Sign up here. ----- There are 2 ways to apply this work to your goals: For individuals, APPLY FOR A CONSULTATION CALL for Tech For Non-Techies membership. For companies: If you want to increase productivity, innovation and diversity, then your non-technical teams need to learn how to collaborate with the techies. BOOK A CALL to discuss bespoke training & consulting. We love hearing from our readers and listeners. So if you have questions about the content or working with us, just get in touch on info@techfornontechies.co Say hi to Sophia on Twitter and follow her on LinkedIn. Following us on Facebook, Instagram and TikTok will make you smarter.
I was surprised to learn that phone sex was not only still around, but thriving. niteflirt.com/SummerXXX# Twitter.com/SummerXXXFun Our Links: Our Sponsor: Gumroad.com/HouseOfAlgos. Link to the Facebook Page: https://www.facebook.com/groups/800973537000402/?ref=share Want awesome merch? Check out our selection: https://www.teepublic.com/user/lewdiverse-podcast Have questions or comments? Contact us on Twitter https://twitter.com/LewdiverseP Want to help support the show? Consider joining https://www.patreon.com/Lewdiverse mood. by sakura Hz | https://soundcloud.com/sakurahertz Music promoted by https://www.free-stock-music.com Attribution-NoDerivs 3.0 Unported (CC BY-ND 3.0) https://creativecommons.org/licenses/by-nd/3.0/ Happy Commercial by MaxKoMusic | https://maxkomusic.com/ Music promoted by https://www.free-stock-music.com Creative Commons Attribution-ShareAlike 3.0 Unported https://creativecommons.org/licenses/by-sa/3.0/deed.en_US --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/lewdiverse/message Support this podcast: https://anchor.fm/lewdiverse/support
Countries around the world are debating how to respond to the unfolding humanitarian and political crisis in Ukraine. Few people have more intimate knowledge into the thinking of the Washington national security establishment than David Sanger. Sanger is a senior writer for the New York Times covering the White House and national security. He is a three-time winner of the Pulitzer Prize, a CNN expert analyst and the author of three bestselling books, the most recent of which is The Perfect Weapon: War, Sabotage and Fear in the Cyber Age, which was also an HBO documentary by the same title.Sanger recently wrote about possible end game scenarios in Ukraine. “I think you can make a persuasive case that Vladimir Putin is going to end this conflict in a lot worse strategic position than he began it,” he told The Vermont Conversation. “Three weeks ago, we were thinking that Russia's military was 10 feet tall. We now think they're kind of the gang that couldn't shoot straight. We thought that Putin was a master strategist. We now think he bit off more than he could chew … and underestimated the Ukrainians and overestimated his own power. We thought that he was trying to split up NATO, and he ended up reaffirming NATO's power. These are all pretty big mistakes he made.”What is the mood among American national security leaders? “Worried that this war is going to spread to involve us,” Sanger said. “Even if the chances are 15 or 20 or 25 percent, that's pretty significant. Worried that the humanitarian disaster is going to continue for some time. Worried the American attention to this could flag.”Sanger also discussed his 40-year career at the Times and how he has periodically covered Washington from his home in Vermont.
On 'current history', or what might be going on out there. Subscribe at: paid.retraice.com Details: what's GOOT; current history; hypotheses [and some predictions]; What's next? Complete notes and video at: https://www.retraice.com/segments/re17 Air date: Monday, 7th Mar. 2022, 4 : 20 PM Eastern/US. 0:00:00 what's GOOT; 0:01:35 current history; 0:04:30 hypotheses [and some predictions]; 0:13:38 What's next? References: Allison, G. (2018). Destined for War: Can America and China Escape Thucydides's Trap? Mariner Books. ISBN: 978-1328915382. Searches: https://www.amazon.com/s?k=9781328915382 https://www.google.com/search?q=isbn+9781328915382 https://lccn.loc.gov/2017005351 Andrew, C. (2018). The Secret World: A History of Intelligence. Yale University Press. ISBN in paperback edition printed as "978-0-300-23844-0 (hardcover : alk. paper)". Searches: https://www.amazon.com/s?k=978-0300238440 https://www.google.com/search?q=isbn+978-0300238440 https://lccn.loc.gov/2018947154 Baumeister, R. F. (1999). Evil: Inside Human Violence and Cruelty. Holt Paperbacks, revised ed. ISBN: 978-0805071658. Searches: https://www.amazon.com/s?k=9780805071658 https://www.google.com/search?q=isbn+9780805071658 https://lccn.loc.gov/96041940 Bostrom, N. (2011). Information Hazards: A Typology of Potential Harms from Knowledge. Review of Contemporary Philosophy, 10, 44-79. Citations are from Bostrom's website copy: https://www.nickbostrom.com/information-hazards.pdf Retrieved 9th Sep. 2020. Bostrom, N. (2019). The vulnerable world hypothesis. Global Policy, 10(4), 455-476. Nov. 2019. https://nickbostrom.com/papers/vulnerable.pdf Retrieved 24th Mar. 2020. Bostrom, N., & Cirkovic, M. M. (Eds.) (2008). Global Catastrophic Risks. Oxford University Press. ISBN: 978-0199606504. Searches: https://www.amazon.com/s?k=978-0199606504 https://www.google.com/search?q=isbn+978-0199606504 https://lccn.loc.gov/2008006539 Brockman, J. (Ed.) (2015). What to Think About Machines That Think: Today's Leading Thinkers on the Age of Machine Intelligence. Harper Perennial. ISBN: 978-0062425652. Searches: https://www.amazon.com/s?k=978-0062425652 https://www.google.com/search?q=isbn+978-0062425652 https://lccn.loc.gov/2016303054 Chomsky, N. (1970). For Reasons of State. The New Press, revised ed. ISBN: 1565847946. Originally published 1970; this revised ed. 2003. Searches: https://www.amazon.com/s?k=1565847946 https://www.google.com/search?q=isbn+1565847946 https://catalog.loc.gov/vwebv/search?searchArg=1565847946 Chomsky, N. (2017). Requiem for the American Dream: The 10 Principles of Concentration of Wealth & Power. Seven Stories Press. ISBN: 978-1609807368. Searches: https://www.amazon.com/s?k=978-1609807368 https://www.google.com/search?q=isbn+978-1609807368 https://lccn.loc.gov/2016054121 Cirkovic, M. M. (2008). Observation selection effects and global catastrophic risks. (pp. 120-145). In Bostrom & Cirkovic (2008). de Grey, A. (2007). Ending Aging: The Rejuvenation Breakthroughs That Could Reverse Human Aging in Our Lifetime. St. Martin's Press. ISBN: 978-0312367060. Searches: https://www.amazon.com/s?k=978-0312367060 https://www.google.com/search?q=isbn+978-0312367060 https://lccn.loc.gov/2007020217 Deary, I. J. (2001). Intelligence: A Very Short Introduction. Oxford. ISBN: 978-0192893215. Searches: https://www.amazon.com/s?k=978-0192893215 https://www.google.com/search?q=isbn+978-0192893215 https://lccn.loc.gov/2001269139 Diamond, J. (1997). Guns, Germs, and Steel: The Fates of Human Societies. Norton. ISBN: 0393317552. Searches: https://www.amazon.com/s?k=0393317552 https://www.google.com/search?q=isbn+0393317552 https://catalog.loc.gov/vwebv/search?searchArg=0393317552 Dolan, R. M. (2000). UFOs and the National Security State Vol. 1: An Unclassified History. Keyhole, 1st ed. ISBN: 0967799503. Searches: https://www.amazon.com/s?k=0967799503 https://www.google.com/search?q=isbn+0967799503 https://catalog.loc.gov/vwebv/search?searchArg=0967799503 Dolan, R. M. (2009). UFOs and the National Security State Vol. 2: The Cover-Up Exposed, 1973-1991. Keyhole. ISBN: 978-0967799513. Searches: https://www.amazon.com/s?k=978-0967799513 https://www.google.com/search?q=isbn+978-0967799513 Durant, W., & Durant, A. (1968). The Lessons of History. Simon and Schuster. No ISBN. Searches: https://www.amazon.com/s?k=lessons+of+history+durant https://www.google.com/search?q=lessons+of+history+durant https://lccn.loc.gov/68019949 Dyson, G. (2015). Analog, the revolution that dares not speak its name. (pp. 255-256). In Brockman (2015). Dyson, G. (2020). Analogia: The Emergence of Technology Beyond Programmable Control. Farrar, Straus and Giroux. ISBN: 978-0374104863. Searches: https://www.amazon.com/s?k=9780374104863 https://www.google.com/search?q=isbn+9780374104863 https://catalog.loc.gov/vwebv/search?searchArg=9780374104863 Dyson, G. B. (1997). Darwin Among The Machines: The Evolution Of Global Intelligence. Basic Books. ISBN: 978-0465031627. Searches: https://www.amazon.com/s?k=978-0465031627 https://www.google.com/search?q=isbn+978-0465031627 https://lccn.loc.gov/2012943208 Frank, R., & Bernanke, B. (2001). Principles of Economics. Mcgraw-Hill. ISBN: 0072289627. Searches: https://www.amazon.com/s?k=0072289627 https://www.google.com/search?q=isbn+0072289627 https://catalog.loc.gov/vwebv/search?searchArg=0072289627 Frankfurt, H. G. (1988). The Importance of What We Care About. Cambridge. ISBN: 978-0521336116. Searches: https://www.amazon.com/s?k=978-0521336116 https://www.google.com/search?q=isbn+978-0521336116 https://lccn.loc.gov/87026941 Gawande, A. (2014). Being Mortal: Medicine and What Matters in the End. Metropolitan Books. ISBN: 978-0805095159. Searches: https://www.amazon.com/s?k=9780805095159 https://www.google.com/search?q=isbn+9780805095159 https://catalog.loc.gov/vwebv/search?searchArg=9780805095159 Grabo, C. M. (2002). Anticipating Surprise: Analysis for Strategic Warning. Center for Strategic Intelligence Research. ISBN: 0965619567 https://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf Retrieved 7th Sep. 2020. Griffiths, P. J. (1971). Vietnam, Inc.. Phaidon, 2nd ed. ISBN: 978-0714846033. Originally published 1971. This edition 2006. Link and searches: http://philipjonesgriffiths.org/photography/selected-work/vietnam-inc/ Retrieved 10 Mar. 2022. https://www.amazon.com/s?k=978-0714846033 https://www.google.com/search?q=isbn+978-0714846033 https://lccn.loc.gov/2006283959 Hamming, R. W. (2020). The Art of Doing Science and Engineering: Learning to Learn. Stripe Press. ISBN: 978-1732265172. Searches: https://www.amazon.com/s?k=9781732265172 https://www.google.com/search?q=isbn+9781732265172 Hawking, S. (2018). Brief Answers to the Big Questions. Bantam. ISBN: 978-1984819192. Searches: https://www.amazon.com/s?k=9781984819192 https://www.google.com/search?q=isbn+9781984819192 https://catalog.loc.gov/vwebv/search?searchArg=9781984819192 Herrnstein, R. J., & Murray, C. (1996). The Bell Curve: Intelligence and Class Structure in American Life. Free Press. ISBN: 978-0684824291. Searches: https://www.amazon.com/s?k=9780684824291 https://www.google.com/search?q=isbn+9780684824291 https://catalog.loc.gov/vwebv/search?searchArg=9780684824291 Johnson, S. (2014). How We Got to Now: Six Innovations That Made the Modern World. Riverhead Books. ISBN: 978-1594633935. Searches: https://www.amazon.com/s?k=9781594633935 https://www.google.com/search?q=isbn+9781594633935 https://lccn.loc.gov/2014018412 Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux. ISBN: 978-0374533557. Searches: https://www.amazon.com/s?k=978-0374533557 https://www.google.com/search?q=isbn+978-0374533557 https://lccn.loc.gov/2012533187 Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Simon & Schuster. ISBN: 978-1476763255. Searches: https://www.amazon.com/s?k=9781476763255 https://www.google.com/search?q=isbn+9781476763255 https://catalog.loc.gov/vwebv/search?searchArg=9781476763255 Kelleher, C. A., & Knapp, G. (2005). Hunt for the Skinwalker: Science Confronts the Unexplained at a Remote Ranch in Utah. Paraview Pocket Books. ISBN: 978-1416505211. Searches: https://www.amazon.com/s?k=978-1416505211 https://www.google.com/search?q=isbn+978-1416505211 https://lccn.loc.gov/2005053457 Keyhoe, D. (1950). The Flying Saucers Are Real. Forgotten Books. ISBN: 978-1605065472. Originally published 1950; this edition 2008. Searches: https://www.amazon.com/s?k=9781605065472 https://www.google.com/search?q=isbn+9781605065472 https://lccn.loc.gov/50004886 Kilcullen, D. (2020). The Dragons And The Snakes: How The Rest Learned To Fight The West. Oxford University Press. ISBN: 978-0190265687. Searches: https://www.amazon.com/s?k=9780190265687 https://www.google.com/search?q=isbn+9780190265687 https://catalog.loc.gov/vwebv/search?searchArg=9780190265687 Lazar, B. (2019). Dreamland: An Autobiography. Interstellar. ISBN: 978-0578437057. Searches: https://www.amazon.com/s?k=9780578437057 https://www.google.com/search?q=isbn+9780578437057 Lee, K.-F. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt. ISBN: 978-1328546395. Searches: https://www.amazon.com/s?k=9781328546395 https://www.google.com/search?q=isbn+9781328546395 https://catalog.loc.gov/vwebv/search?searchArg=9781328546395 Mitter, R. (2008). Modern China: A Very Short Introduction. Oxford University Press, kindle ed. ISBN: 978-0199228027. Searches: https://www.amazon.com/s?k=9780199228027 https://www.google.com/search?q=isbn+9780199228027 https://catalog.loc.gov/vwebv/search?searchArg=9780199228027 Nouri, A., & Chyba, C. F. (2008). Biotechnology and biosecurity. (pp. 450-480). In Bostrom & Cirkovic (2008). O'Donnell, P. K. (2004). Operatives, Spies, and Saboteurs: The Unknown Story of the Men and Women of World War II's OSS. Free Press / Simon & Schuster. ISBN: 074323572X. Edition and searches: https://archive.org/details/operativesspiess00odon https://www.amazon.com/s?k=074323572X https://www.google.com/search?q=isbn+074323572X https://catalog.loc.gov/vwebv/search?searchArg=074323572X Ord, T. (2020). The Precipice: Existential Risk and the Future of Humanity. Hachette. ISBN: 978-0316484916. Searches: https://www.amazon.com/s?k=978-0316484916 https://www.google.com/search?q=isbn+978-0316484916 https://lccn.loc.gov/2019956459 Orlov, D. (2008). Reinventing Collapse: The Soviet Example and American Prospects. New Society. ISBN: 978-0865716063. Searches: https://www.amazon.com/s?k=9780865716063 https://www.google.com/search?q=isbn+9780865716063 https://catalog.loc.gov/vwebv/search?searchArg=9780865716063 Osnos, E. (2020/01/06). The Future of America's Contest with China. The New Yorker. https://www.newyorker.com/magazine/2020/01/13/the-future-of-americas-contest-with-china Retrieved 22 April, 2020. Perlroth, N. (2020). This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury. ISBN: 978-1635576054. Searches: https://www.amazon.com/s?k=978-1635576054 https://www.google.com/search?q=isbn+978-1635576054 https://lccn.loc.gov/2020950713 Phoenix, C., & Treder, M. (2008). Nanotechnology as global catastrophic risk. (pp. 481-503). In Bostrom & Cirkovic (2008). Pillsbury, M. (2015). The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower. St. Martin's Griffin. ISBN: 978-1250081346. Searches: https://www.amazon.com/s?k=9781250081346 https://www.google.com/search?q=isbn+9781250081346 https://lccn.loc.gov/2014012015 Pinker, S. (2011). The Better Angels of Our Nature: Why Violence Has Declined. Penguin Publishing Group. ISBN: 978-0143122012. Searches: https://www.amazon.com/s?k=978-0143122012 https://www.google.com/search?q=isbn+978-0143122012 https://lccn.loc.gov/2011015201 Pogue, D. (2021). How to Prepare for Climate Change: A Practical Guide to Surviving the Chaos. Simon & Schuster. ISBN: 978-1982134518. Searches: https://www.amazon.com/s?k=9781982134518 https://www.google.com/search?q=isbn+9781982134518 https://catalog.loc.gov/vwebv/search?searchArg=9781982134518 Putnam, R. D. (2015). Our Kids: The American Dream in Crisis. Simon & Schuster. ISBN: 978-1476769905. Searches: https://www.amazon.com/s?k=9781476769905 https://www.google.com/search?q=isbn+9781476769905 https://lccn.loc.gov/2015001534 Rees, M. (2003). Our Final Hour: A Scientist's Warning. Basic Books. ISBN: 0465068634. Searches: https://www.amazon.com/s?k=0465068634 https://www.google.com/search?q=isbn+0465068634 https://lccn.loc.gov/2004556001 Rees, M. (2008). Foreword to Bostrom & Cirkovic (2008). (pp. iii-vii). Reid, T. R. (2017). A Fine Mess: A Global Quest for a Simpler, Fairer, and More Efficient Tax System. Penguin Press. ISBN: 978-1594205514. Searches: https://www.amazon.com/s?k=9781594205514 https://www.google.com/search?q=isbn+9781594205514 https://catalog.loc.gov/vwebv/search?searchArg=9781594205514 Retraice (2020/09/07). Re1: Three Kinds of Intelligence. retraice.com. https://www.retraice.com/segments/re1 Retrieved 22nd Sep. 2020. Retraice (2020/11/10). Re13: The Care Factor. retraice.com. https://www.retraice.com/segments/re13 Retrieved 10th Nov. 2020. Romm, J. (2016). Climate Change: What Everyone Needs to Know. Oxford University Press. ISBN: 978-0190250171. Searches: https://www.amazon.com/s?k=9780190250171 https://www.google.com/search?q=isbn+9780190250171 https://catalog.loc.gov/vwebv/search?searchArg=9780190250171 Russell, S., & Norvig, P. (2020). Artificial Intelligence: A Modern Approach. Pearson, 4th ed. ISBN: 978-0134610993. Searches: https://www.amazon.com/s?k=978-0134610993 https://www.google.com/search?q=isbn+978-0134610993 https://lccn.loc.gov/2019047498 Salter, A. (2003). Predators. Basic Books. ISBN: 978-0465071732. Searches: https://www.amazon.com/s?k=978-0465071739 https://www.google.com/search?q=isbn+978-0465071739 https://lccn.loc.gov/2002015846 Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Broadway Books. ISBN: 978-0451497901. Searches: https://www.amazon.com/s?k=9780451497901 https://www.google.com/search?q=isbn+9780451497901 https://catalog.loc.gov/vwebv/search?searchArg=9780451497901 Sapolsky, R. M. (2018). Behave: The Biology of Humans at Our Best and Worst. Penguin Books. ISBN: 978-0143110910. Searches: https://www.amazon.com/s?k=9780143110910 https://www.google.com/search?q=isbn+9780143110910 https://lccn.loc.gov/2016056755 Shirer, W. L. (1959). The Rise and Fall of the Third Reich: A History of Nazi Germany. Simon & Schuster, 50th anniv. ed. ISBN: 978-1451651683. Originally published 1959; this ed. 2011. Searches: https://www.amazon.com/s?k=9781451651683 https://www.google.com/search?q=isbn+9781451651683 https://lccn.loc.gov/60006729 Shorrocks, A., Davies, J., Lluberas, R., & Rohner, U. (2019). Global wealth report 2019. Credit Suisse Research Institute. Oct. 2019. https://www.credit-suisse.com/about-us/en/reports-research/global-wealth-report.html Retrieved 4 July, 2020. Simler, K., & Hanson, R. (2018). The Elephant in the Brain: Hidden Motives in Everyday Life. Oxford University Press. ISBN: 9780190495992. Searches: https://www.amazon.com/s?k=9780190495992 https://www.google.com/search?q=isbn+9780190495992 https://lccn.loc.gov/2017004296 Spalding, R. (2019). Stealth War: How China Took Over While America's Elite Slept. Portfolio. ISBN: 978-0593084342. Searches: https://www.amazon.com/s?k=9780593084342 https://www.google.com/search?q=isbn+9780593084342 https://catalog.loc.gov/vwebv/search?searchArg=9780593084342 Stephens-Davidowitz, S. (2018). Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey Street Books. ISBN: 978-0062390868. Searches: https://www.amazon.com/s?k=9780062390868 https://www.google.com/search?q=isbn+9780062390868 https://lccn.loc.gov/2017297094 Sternberg, R. J. (Ed.) (2020). The Cambridge Handbook of Intelligence (Cambridge Handbooks in Psychology) (2 vols.). Cambridge University Press, 2nd ed. ISBN: 978-1108719193. Searches: https://www.amazon.com/s?k=9781108719193 https://www.google.com/search?q=isbn+9781108719193 https://lccn.loc.gov/2019019464 Vallee, J. (1979). Messengers of Deception: UFO Contacts and Cults. And/Or Press. ISBN: 0915904381. Different edition and searches: https://archive.org/details/MessengersOfDeceptionUFOContactsAndCultsJacquesValle1979/mode/2up https://www.amazon.com/s?k=0915904381 https://www.google.com/search?q=isbn+0915904381 https://catalog.loc.gov/vwebv/search?searchArg=0915904381 Walter, B. F. (2022). How Civil Wars Start. Crown. ISBN: 978-0593137789. Searches: https://www.amazon.com/s?k=978-0593137789 https://www.google.com/search?q=isbn+978-0593137789 https://lccn.loc.gov/2021040090 Walter, C. (2020). Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever. National Geographic. ISBN: 978-1426219801. Searches: https://www.amazon.com/s?k=9781426219801 https://www.google.com/search?q=isbn+9781426219801 https://catalog.loc.gov/vwebv/search?searchArg=9781426219801 Zubrin, R. (1996). The Case for Mars: The Plan to Settle the Red Planet and Why We Must. Free Press. First published in 1996. This 25th anniv. edition 2021. ISBN: 978-0684827575. Searches: https://www.amazon.com/s?k=978-0684827575 https://www.google.com/search?q=isbn+978-0684827575 https://lccn.loc.gov/2011005417 Zubrin, R. (2019). The Case for Space: How the Revolution in Spaceflight Opens Up a Future of Limitless Possibility. Prometheus Books. ISBN: 978-1633885349. Searches: https://www.amazon.com/s?k=978-1633885349 https://www.google.com/search?q=isbn+978-1633885349 https://lccn.loc.gov/2018061068 Copyright: 2022 Retraice, Inc. https://retraice.com
This week, the AEI Podcast Channel presents the latest Kitchen Sync Conversation. https://www.nytimes.com/by/david-e-sanger (David E. Sanger) is a White House and national security correspondent, and a senior writer. In a 38-year reporting career for The New York Times, he has been on three teams that have won Pulitzer Prizes, most recently in 2017 for international reporting. His newest book, “https://www.amazon.com/The-Perfect-Weapon-David-E-Sanger-audiobook/dp/B07B7QPYGZ/ref=sr_1_1?crid=2Z45907G0A71P&keywords=sanger+perfect+weapon&qid=1641924534&sprefix=plate+pin%2Caps%2C105&sr=8-1 (The Perfect Weapon: War, Sabotage and Fear in the Cyber Age),'' and an HBO documentary by the same title, examine the emergence of cyberconflict and its role in changing the nature of global power. In our conversation, we discuss his return to covering the White House, his latest reporting on U.S. negotiations with Russia over Ukraine and NATO, what China is thinking, and how cyber operations are now a core feature of every major military strategy. It is a great conversation and I hope you enjoy it! Klon
Since its birth, the United States has benefited from the protection of two vast oceans to the east and west. The events of 9/11, of course, brought new attention to the defense of the homeland and recent cyber attacks redefined thoughts of secure borders. A BETTER PEACE welcomes Matt Cavanaugh, Franky Matisek and Bert Tussing to the virtual studio to discuss their part in the Homeland Defense Institute. They join podcast editor Ron Granieri to examine how information is being used to divide and attack the civilian population. They look at examples of cyber attacks and the use of misinformation in Eastern Europe and discuss how Information as a part of DIME has come to the forefront in the cyber age.
During this episode, MAJGEN Susan Coyle, Head of Information Warfare for the Australian Defence Force, discusses a variety of projects and whole-of-government challenges that she is confronting relative to information operations. After she recaps her primary role and the branches within her division, our discussion touches on the threat from China, broader gray zone competition in the Pacific region, labor considerations, and partnerships. Books and Other Web Links: LikeWar: The Weaponization of Social Media by Peter Singer The Return of Marco Polo's World: War, Strategy, and American Interests in the Twenty-first Century by Robert D. Kaplan The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger Let down by the golden promise of digital age by Paul Kelly Link to full show notes and resources https://information-professionals.org/episode/cognitive-crucible-episode-61 Guest Bio: Major General Coyle currently holds the appointment of Head of Information Warfare for the Australian Defence Force. Susan Coyle was born in Kyogle, NSW on 21 May 1970. After completing a Bachelor of Science degree at the Australian Defence Force Academy she graduated from the Royal Military College in 1992 into the Royal Australian Corps of Signals. She has worked at the tactical, operational and strategic level in a variety of command and staff appointments including Commander Joint Task Force 633, Commander 6th Brigade, inaugural Commander Task Group Afghanistan, and Commanding Officer 17th Signal Regiment. Major General Coyle has received a Distinguished Service Medal as the Deputy Commander JTF 636 / Commander Task Group Afghanistan on Operation SLIPPER / HIGHROAD, and a Conspicuous Service Cross as the Commanding Officer 17th Signal Regiment. She holds post-graduate qualifications in a Master of Strategic Studies from the United States Army War College, a Master in Organisational Development and Strategic Human Resource Management from the University of New England, and a Master of Management in Defence Studies from the University of Canberra. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Apple Podcasts Rate and Review for SpotOn Dennis Logan Jr. is Cyber Safety Architects' Chief Architect. Cyber Safety Architects (CSA) is an independent cyber insurance agency. Just as their name implies, Dennis and his team specialize in cybersecurity and cyber coverage. They don't just offer cyber insurance, but also analyze business exposures and educate organizations on how to prevent an attack and what they should do if they fall victim to one. Before starting CSA, Dennis worked as an underwriter and broker at various insurance companies. Dennis joins us to discuss what business owners should know regarding their cyber policies' fine print. He describes what made him decide to work in insurance and why he decided to start CSA. He discusses some of the common ways hackers get inside business systems and why your team members will always be the most vulnerable entry points. He explains the difference between getting private data before smartphones and how it is easier today. Dennis also shares tips and tools he recommends to vastly improve private or professional cyber security. "Once something becomes a mainstream way of security, that's when things start to get hacked." - Dennis Logan Jr. Today on Spot On Insurance: Where Dennis he grew up, and how he joined the insurance industry When Dennis' entrepreneurial spirit made him realize what he really wanted to do Why Dennis prefers to learn something that's not in a book How the pandemic changed the way marketing was conducted The most essential cybersecurity coverage What can be classified as a tech interruption event How can a company prevent cybersecurity attacks and their options during one How many companies have their own cybersecurity team Why Dennis chose to leave his previous companies How hackers often work to get company information and data The difference between cyber vulnerability before smartphones and today What Dennis recommends when it comes to creating passwords Examples of phishing emails that may look legitimate to the untrained eye The fine print and policies business owners should be aware of The tools Dennis recommends that can significantly improve cybersecurity What Dennis looks forward to in the future How ILSA helped Dennis get a jump start in the industry Key Takeaways: The last thing you want to do is to have to rely on your LinkedIn network to find an IT provider who will help you immediately for a cost that's going to be reasonable. Even if you're not the C-Suite or the IT person, you're still logged into a system in some way. Resources Mentioned: Google Authenticator Book: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger LastPass 1Password Connect with Dennis Logan Jr.: Cyber Safety Architects LinkedIn Phone: (443) 212-8047 Email: dennis@csa.insure This episode was brought to you by….. Insurance Licensing Services of America (ILSA), America's Premier Insurance Compliance and Licensing experts. To learn more about ILSA and their services, visit ILSAinc.com. Connect, Learn, Share Thank you for joining us on this week's episode of Spot On Insurance. For more resources and episodes, visit SpotOnInsurance.com. Subscribe so you never miss an episode. Love what you're learning, Spot Light your review on Apple Podcasts Rate and Review For SpotOn and share your favorite episodes with friends and colleagues!
Guests: Jane Chung, VP of Cloud @ Palo Alto Joe Crawford, Director of Strategic Technology Partnerships for Google Cloud @ Palo Alto Topics: What are the top security mistakes you've seen during cloud migrations? What is your best advice to security leaders who want to go to the cloud using the on-premise playbook? What security technologies may no longer be needed in the cloud? Which are transformed by the cloud? Cloud often implies agility, but sometimes security slows things down, how to fix that? How do security needs change based on adoption architecture (cloud, hybrid with on-premise, multi-cloud, multi cloud with on-premise)? From a security perspective, is there really any such thing as “lift and shift”? How do we teach cloud to security leaders who “grew up” on-premise? Resources: Use “Move and Improve” Instead of “Lift an Shift” “Data Security in the Cloud” (Episode 2) “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age” book CSA CCM v4
Town Square with Ernie Manouse airs at 3 p.m. CT. Tune in on 88.7FM, listen online or subscribe to the podcast. Join the discussion at 888-486-9677, questions@townsquaretalk.org or @townsquaretalk. Bitcoin. Non-Fungible Tokens. Security breaches. Hacking. How do we keep safe in the digital world? And how does the digital world increasingly intersect with -- and impact -- our analog world? Today, it's Cyberworld 101. Experts will join us to answer your questions about new technologies and to discuss cyberconflict, cyberwarfare and cybersecurity. And what about the rise of cyberweapons? How do these technologies impact society, culture? Even world order and peace? And what does the future hold? https://www.youtube.com/watch?v=eeLHlOUNOmY Guests: David E. Sanger: Author of "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age," which has also been made into an HBO documentary National security correspondent for the "New York Times" Chris Bronk: Associate Professor of Computer and Information Systems Director of the UH Cybersecurity Graduate Program Town Square with Ernie Manouse is a gathering space for the community to come together and discuss the day's most important and pressing issues. Audio from today's show will be available after 5 p.m. CT. We also offer a free podcast here, on iTunes, and other apps.
Russia’s hack of software management system SolarWinds has caused many in Washington to sound the alarm. How were Russian operatives able to evade detection, and what does their intrusion mean for the future of American national security? The New York Times’ David Sanger joined Dany and Marc to discuss the SolarWinds hack, the state of American cybersecurity, and what the future may hold. They also talk about how technological developments in cyber continue to change the nature of warfare. David Sanger is a national security correspondent and a senior writer at the New York Times. He has been on three teams that have won Pulitzer Prizes, most recently in 2017 for international reporting. His newest book, “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age,’’ examines the emergence of cyberconflict. https://www.aei.org/wp-content/uploads/2021/01/1.27.20-Sanger-transcript.pdf (Download the transcript here.)
David Sanger, chief Washington correspondent for The New York Times, joins Press the Button for an exclusive interview on the emergence of cyber conflict between countries, and how the rise of cyberweapons like the Stuxnet virus transformed geopolitics. His book The Perfect Weapon: War, Sabotage and Fear in the Cyber Age, is the basis of a new HBO Original Documentary. Early Warning features Alexandra Bell of the Center for Arms Control and Non-Proliferation and Melissa Hanham of the Open Nuclear Network on the status of New START negotiations and North Korean missiles.
New York Times reporter, Pulitzer prize winner and best selling author, David Sanger discusses his latest book, soon to be an HBO special "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age", which focuses on cyberwarfare. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e88
New York Times reporter, Pulitzer prize winner and best selling author, David Sanger discusses his latest book, soon to be an HBO special "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age", which focuses on cyberwarfare. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e87
Akamai’s report on the record-setting DDoS attack it stopped this week. Glupteba GLOOP-tib-yeh and Lucifer malware strains described. Apple and Google move their defaults in the direction of greater privacy. The US designates Huawei and Hikvision as controlled by China’s military. A superseding indictment in Julian Assange’s case. The EU looks at GDPR and likes what it sees. REvil gets ready to sell stolen data. David Dufour from Webroot with tips on navigating new workplace realities. Our guest is David Sanger, author of The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age. And the Navy recruiting campaign that wasn’t. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/9/123
Liebe Leute, wenn ihr Euch schon einmal gefragt habt, wie man das perfekte Verbrechen begeht und aber die Frage der perfekten Waffe bisher ungelöst war, habe ich was für Euch. Ich spreche über „The Perfect Weapon. War, Sabotage, and Fear in the Cyber Age“ von David Sanger. Sanger ist der sicherheitspolitische Korrespondent der New York […] Der Beitrag 12 Rezension – The perfect weapon, von David Sanger erschien zuerst auf percepticon.
Catch-up and update interview with Shamane Tan, author of Cyber Risk Leaders & founder Cyber Risk Meetups Cyber Risk Leaders: Global C-Suite Insights – Leadership and Influence in the Cyber Age’, was launched in July 2019 at RSA APJ Conference, Singapore and then at Atalassian Head Office, Sydney, Australia. Cyber Risk Leaders is a laborious product of careful selection and compilation of the best stories and wisdom from over thirty C-Suite executives and based on interviews with 70 CISOs. Shamane spent several years speaking to CxOs from different industries, and all over the world, from Australia, to Singapore, Israel, the US and the UK, to bring different aspects of successful leadership to life in this unique book. Shamane is the APAC Executive Advisor at Privasec, a leading independent Security Consulting Firm in Australia and Singapore and Founder of the Cyber Risk Meetups, meeting across Australia and Singapore. Shamane explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season. REVIEWS “This large and diverse group paints an interesting narrative of the state of play in enterprise cyber risk.” Foreword by M.K. Palmore, Retired FBI Assistant Special Agent in Charge, FBI San Francisco Cyber Branch “With experience and insight, Shamane has written a really useful book for existing and aspiring CISOs. I loved her unique voice, highly readable style, and wholeheartedly recommend this book.” CEO, Cyber Security Capital (UK) “She has explored many topics long considered on the fringe of traditional security with great storytelling and insights from industry leaders.” CISO, Telstra APAC The Cyber Risk Meetup has event opportunities in Singapore, Tokyo, Sydney, Melbourne, Perth & Brisbane and will provide attendees a special experience and additional takeaways, including the Australian Security Magazine. The Meetup has an exclusive media partnership with My Security Media, a dedicated industry channel across Asia Pacific for security, cybersecurity and related technologies. Events attract a loyal audience of between 80 – 150+ people and topic ranges include cybersecurity, legal & insurance, blockchain and IoT events, along with promotion of specialised workshops and round-tables. For more information visit www.cyberriskmeetup.com and for sponsorship opportunities visit MySecurity Marketplace Recorded 16 January, 2020 at Tank Stream Labs, Sydney Previous Interviews with Shamane Tan Episode 136 - CISO Town Hall takeaways and the Cyber Risk Meetup events outlook for Australia and Singapore Episode 58 - Passionate about Cyber Risk? Cyber Risk Meetup Group organiser Shamane Tan - Sydney, Melbourne & Singapore
Executives, tech, data & cyber security, and privacy professionals face situations testing their ethics every day. Just a few issues include: • Profit maximization at any cost, including privacy and data security • Creating and selling products and services that monetize personal data at the cost of privacy, security and safety of the associated individuals • Intentionally refusing to acknowledge known security and privacy problems to not damage sales and profits • Deliberately releasing technologies that executives know do not work as expected or as advertised Tune in to hear Rebecca discuss these topics and more with Dr. Katina Michael, who has done significant research in these, and related, areas.
In this episode of The Freelancers Show the panel share advice and experiences for publishing technical books. Each of the panelists has experience publishing books. Reuven Lerner published a book, Core Perl back in 2000, using a publisher and has self-published two more books in recent years. He is currently republishing one of his self-published books using a publisher. Erik Dietrich has written three books, two of which were published through a friend and the third was self-published. Jeremy Green contributed to The Independent Consulting Manual and runs a SAS called Remarq, a tool for those who want to self-publish. Why write a book? The panel warns listeners that if your goal is to make money that most likely will not happen. They explain that authors who make real money from their books are rare and authors who make money off of technical books are even more rare. One reason to write a book is so that people will know your name and want to hire yours. Another reason is that writing a book will give you more credibility with clients. Having published a book can really impress clients, Erik shares how his book has brought him leads. Reuven explains how it shows prospective clients how knowledgeable and reliable he is, this is one reason he is republishing his book through an actual publisher. By having a publishing company publish his book it verifies his expertise for prospective clients, or as Erik puts it a book is social proof of your expertise. By having a published book, Erik receives a lot fewer requests for references or other proof of knowledge. The panel addresses the profits made by publishing a book. Reuven shares a little of his experience both with a publisher and without one when it came to making money. His first book Core Perl he went through a publisher and didn’t make more than the advance they gave him. Frustrated he decided to self-publish his next two books. Reuven admits he was a fool for turning down the publisher when they approached him about one of his books. Since working with that publisher, they have sold more than 4x as many copies as he had in four years. He may not make more money but his name will reach more people. Jeremy explains one of the downsides of going through a publisher. When a publisher sells your book you don’t get any information on who buys your book. You can’t reach out to them. You can’t share other products with them. When self-publishing you get all that information and are able to do those things to drum up more business. The panel explains that there are three parts to self-publishing a book. First is the production of the book, writing it. Next, how and where to sell your book. The last thing to consider is marketing, how do you reach the people who will buy your book. The panel addresses each step and shares advice. Jeremy explains how Remarq uses markdown in the production step of publishing the book. Reuven shares what he is currently using for his publishers and admits he would rather be using Remarq. In the past, Reuven has used so many different toolsets and each one was frustrating. The once piece of advice the panel has for production besides the tooling is to focus on the informational content first and design second. Selling the book, Reuven explains how he used nearly everything to try and sell his book the first time around. Selling your book on your own is a major time suck and headache. Reuven suggests doing as he did and going through a third party, they have it all figured out. Lastly marketing, Erik advises building a funnel to your site using youtube or other media, if you are unwilling to use amazon to market your book as he does. Reuven explains how he advertises his books like courses and mentions his book everywhere he can. It is hard to compete with publishers when it comes to marketing, they have the numbers and the followers. Writing for a specific audience will make marketing easier. If you know who you are writing for then you will know how to market to them before your book is even done. Jeremy suggests using people from your target audience to read and review your book as you right, not only will this help you focus your book but will also have people who will spread the word about your book. Now that they cover self-publishing, Reuven shares what it is like working with a publisher. It starts with a development editor, someone who finds authors and books to publish. Then you sign a contract with or without the help of an agent. Only after you sign the contract do you get assigned to an actual editor and a technical reviewer. These will read everything you write and give you feedback. His work is also read by a group of reviewers who give back feedback, some of which is a little harsh but all of which helps the book be better. Reuven explains how all of this has been a positive experience and that his book is better for it. The last topic address in this episode is when you should you write a book. First, you must like to write, the panel advises those who hate writing not to write a book. Second, you must have something to write about. Publish something in a niche. You won’t make any headway writing a book about a well-known language and a well-known topic. Next, you need to have a plan for your book. Ask yourself what you want to get from writing this book. Lastly, find your audience, write a book that will appeal to your client base, not your peers. Panelists Jeremy Green Erik Dietrich Reuven Lerner Sponsors Sentry– use the code “devchat” for two months free on Sentry’s small plan Adventures in Blockchain React Native Radio CacheFly Links Core Perl Python Workout Blurb AsciiDoc Gumroad https://twitter.com/jagthedrummer https://twitter.com/daedtech https://twitter.com/reuvenmlerner https://www.facebook.com/freelancersshow/ Picks Jeremy Green: Remarq.io The Independent Consulting Manual. Erik Dietrich: Starting to Unit Test Developer Hegemony: The Future of Labor Reuven Lerner: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
In this episode of The Freelancers Show the panel share advice and experiences for publishing technical books. Each of the panelists has experience publishing books. Reuven Lerner published a book, Core Perl back in 2000, using a publisher and has self-published two more books in recent years. He is currently republishing one of his self-published books using a publisher. Erik Dietrich has written three books, two of which were published through a friend and the third was self-published. Jeremy Green contributed to The Independent Consulting Manual and runs a SAS called Remarq, a tool for those who want to self-publish. Why write a book? The panel warns listeners that if your goal is to make money that most likely will not happen. They explain that authors who make real money from their books are rare and authors who make money off of technical books are even more rare. One reason to write a book is so that people will know your name and want to hire yours. Another reason is that writing a book will give you more credibility with clients. Having published a book can really impress clients, Erik shares how his book has brought him leads. Reuven explains how it shows prospective clients how knowledgeable and reliable he is, this is one reason he is republishing his book through an actual publisher. By having a publishing company publish his book it verifies his expertise for prospective clients, or as Erik puts it a book is social proof of your expertise. By having a published book, Erik receives a lot fewer requests for references or other proof of knowledge. The panel addresses the profits made by publishing a book. Reuven shares a little of his experience both with a publisher and without one when it came to making money. His first book Core Perl he went through a publisher and didn’t make more than the advance they gave him. Frustrated he decided to self-publish his next two books. Reuven admits he was a fool for turning down the publisher when they approached him about one of his books. Since working with that publisher, they have sold more than 4x as many copies as he had in four years. He may not make more money but his name will reach more people. Jeremy explains one of the downsides of going through a publisher. When a publisher sells your book you don’t get any information on who buys your book. You can’t reach out to them. You can’t share other products with them. When self-publishing you get all that information and are able to do those things to drum up more business. The panel explains that there are three parts to self-publishing a book. First is the production of the book, writing it. Next, how and where to sell your book. The last thing to consider is marketing, how do you reach the people who will buy your book. The panel addresses each step and shares advice. Jeremy explains how Remarq uses markdown in the production step of publishing the book. Reuven shares what he is currently using for his publishers and admits he would rather be using Remarq. In the past, Reuven has used so many different toolsets and each one was frustrating. The once piece of advice the panel has for production besides the tooling is to focus on the informational content first and design second. Selling the book, Reuven explains how he used nearly everything to try and sell his book the first time around. Selling your book on your own is a major time suck and headache. Reuven suggests doing as he did and going through a third party, they have it all figured out. Lastly marketing, Erik advises building a funnel to your site using youtube or other media, if you are unwilling to use amazon to market your book as he does. Reuven explains how he advertises his books like courses and mentions his book everywhere he can. It is hard to compete with publishers when it comes to marketing, they have the numbers and the followers. Writing for a specific audience will make marketing easier. If you know who you are writing for then you will know how to market to them before your book is even done. Jeremy suggests using people from your target audience to read and review your book as you right, not only will this help you focus your book but will also have people who will spread the word about your book. Now that they cover self-publishing, Reuven shares what it is like working with a publisher. It starts with a development editor, someone who finds authors and books to publish. Then you sign a contract with or without the help of an agent. Only after you sign the contract do you get assigned to an actual editor and a technical reviewer. These will read everything you write and give you feedback. His work is also read by a group of reviewers who give back feedback, some of which is a little harsh but all of which helps the book be better. Reuven explains how all of this has been a positive experience and that his book is better for it. The last topic address in this episode is when you should you write a book. First, you must like to write, the panel advises those who hate writing not to write a book. Second, you must have something to write about. Publish something in a niche. You won’t make any headway writing a book about a well-known language and a well-known topic. Next, you need to have a plan for your book. Ask yourself what you want to get from writing this book. Lastly, find your audience, write a book that will appeal to your client base, not your peers. Panelists Jeremy Green Erik Dietrich Reuven Lerner Sponsors Sentry– use the code “devchat” for two months free on Sentry’s small plan Adventures in Blockchain React Native Radio CacheFly Links Core Perl Python Workout Blurb AsciiDoc Gumroad https://twitter.com/jagthedrummer https://twitter.com/daedtech https://twitter.com/reuvenmlerner https://www.facebook.com/freelancersshow/ Picks Jeremy Green: Remarq.io The Independent Consulting Manual. Erik Dietrich: Starting to Unit Test Developer Hegemony: The Future of Labor Reuven Lerner: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
President Trump made history over the weekend when he became the first sitting American president to step into North Korea. But the biggest impact of that gesture may have been on Iran. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily. Background reading: Trump administration officials are at odds over what demands to make in new talks with North Korea, with some now considering a nuclear freeze as a first step.Iran on Monday violated a key element of the 2015 nuclear deal, from which Mr. Trump withdrew the United States last year.
This week, a conversation with David Sanger of The New York Times. His thoughts on what's next with Iran, cyberwarfare, Russia, and more on his latest book The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Learn more about your ad choices. Visit megaphone.fm/adchoices
A New York Times investigation found that the United States is actively infiltrating Russia’s electric power grid. We look at what that means for the future of cyberwarfare. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily. Background reading: The cyberattacks on Russia’s power grid are intended partly as a warning, and partly to be poised to act if a major conflict broke out between Washington and Moscow.In response to The Times’s report, the Kremlin warned that American attacks could escalate into cyberwar.
„Sicherheitshalber“ ist der Podcast zur sicherheitspolitischen Lage in Deutschland, Europa und der Welt. Für diese Spezialfolge waren Thomas Wiegold, Ulrike Franke, Carlo Masala und Frank Sauer in Berlin beim Aspen Cyber Security Forum, um dort zwei interessante Gespräche aufzuzeichnen. Mit Alexander Klimburg schlagen die vier Podcaster zunächst eine Schneise durch den Begriffsdschungel, etwa mit Blick auf den Unterschied zwischen Informationssicherheit und Cybersicherheit. Außerdem erklärt Alexander, welche Rolle das Kriegsvölkerrecht im Rahmen der Cybersicherheit spielt, ob es so etwas wie einen “Cyberwar” schon mal gegeben hat, welche Rolle Propaganda in der ganzen Diskussion spielt und wie sich staatliche und nicht-staatliche Akteure zueinander verhalten. Bei seiner Schilderung der “Operation Cupcake” bekamen alle Hunger. Gemeinsam mit Isabel Skierka wirft der Podcast dann im zweiten Teil ein Schlaglicht auf Deutschland und die deutsche Institutionen- und Gesetzeslandschaft, wo sich derzeit einiges tut. Isabel erklärt dabei unter anderem die zunehmend wichtigere Rolle des Bundesamt für Sicherheit in der Informationstechnik (BSI) und erläutert einige Inhalte des Entwurfs für ein neues IT-Sicherheitsgesetz, etwa mit Blick auf die neuen Meldepflichten für von Cyberangriffen betroffene Unternehmen. Natürlich schneidet sie auch den aktuellen Fall Huawei und das Problem der Lieferkettensicherheit an. Carlo erfindet zwischendurch die Cyber-Schlumpf-Polizei. Alexander Klimburg: 00:01:00 Isabel Skierka: 00:34:14 Erwähnte und weiterführende Interviews, Literatur und Dokumente: Gast #1 Alexander Klimburg https://hcss.nl/expert/alexander-klimburg Alexander Klimburg 2017: The Darkening Web: The War for Cyberspace, Penguin Press. David Sanger 2018: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, Crown. Gast #2 Isabel Skierka https://www.gppi.net/team/isabel-skierka Martin Schallbruch & Isabel Skierka 2018: Cybersecurity in Germany, SpringerBriefs in Cybersecurity, 1st ed., Springer. https://faculty-research.esmt.berlin/node/8416 Internet of Things Statistik aus dem Report der Muenchner Sicherheitskonferenz 2018: https://www.securityconference.de/fileadmin/images/MSR/MSC_MunichSecurityReport_2018.pdf (Seite 50)
In this episode of Intelligence Matters, host Michael Morell speaks with David Sanger, national security correspondent for the New York Times and author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” Morell and Sanger discuss the technological and geopolitical challenges of the cyber domain, including forthcoming developments like 5G networks, artificial intelligence and machine learning, and expanding opportunities for offensive operations. Sanger also offers his perspective on covering the intelligence community and the Trump administration.
President Trump was so confident thahe would reach a nuclear pact with North Korea that he scheduled a signing ceremony before an agreement had even been struck. Here’s how it all unraveled. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily.
David Sanger, national security correspondent and senior writer for The New York Times, joins Sam Wang in this episode to discuss the growing cybersecurity threats facing the United States. Sanger outlines how cyber warfare levels the playing field, allowing rich and poor countries alike to attack other nations, especially the United States. He also details several cyber attacks, including those undertaken by North Korea. In Sanger’s 36-year reporting career for The Times, he has been on three teams that have won Pulitzer prizes, including one in 2017 for international reporting. He is also the author of several books, including his most recent one “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.”
The United States believes that whoever controls fifth-generation cellular networks, known as 5G, will have a global advantage for decades to come. The fear is that China is almost there. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily.
David Sanger sits down with Bruce McConnell to discuss his latest book "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age", which explores the destructive potential of cyber weapons. Sanger share his insights on what policymakers are doing to address this issue, which has radically transformed geopolitics.
From the U.S. operation against Iran's nuclear enrichment plant, to Chinese theft of personal data, North Korea's financially motivated attacks on American companies, or Russia's interference in the 2016 election, cyberweapons have become the weapon of choice for democracies, dictators, and terrorists. "New York Times" national security correspondent David Sanger explains how and why cyberattacks are now the number one security threat.
From the U.S. operation against Iran's nuclear enrichment plant, to Chinese theft of personal data, North Korea's financially motivated attacks on American companies, or Russia's interference in the 2016 election, cyberweapons have become the weapon of choice for democracies, dictators, and terrorists. "New York Times" national security correspondent David Sanger explains how and why cyberattacks are now the number one security threat.
From the U.S. operation against Iran's nuclear enrichment plant, to Chinese theft of personal data, North Korea's financially motivated attacks on American companies, or Russia's interference in the 2016 election, cyberweapons have become the weapon of choice for democracies, dictators, and terrorists. "New York Times" national security correspondent David Sanger explains how and why cyberattacks are now the number one security threat.
Host Carol Castiel and VOA's Rick Pantaleo talk with veteran New York Times national security correspondent David Sanger, about his most recent book: "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age." The book recounts how great and small powers alike have slipped into a new era of constant sabotage, misinformation and fear.
President Trump says the nuclear threat from North Korea is over. But new satellite images of hidden missile bases suggest that the situation has only worsened since his meeting with Kim Jong-un, the North Korean leader. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily.
Cipher Brief CEO & Publisher Suzanne Kelly talks with David Sanger, The New York Times national security correspondent and author of The Perfect Weapon: War, Sabotage and Fear in the Cyber Age, about the current threat environment and what needs to be done to help people better understand how cyber threats impact them.
Podcast de notre BCM du 7 novembre en partenariat avec l’Institut d’études de sécurité de l’Union européenne (EUISS): « Russian foreign policy in the cyber age » en présence d’Alina Polyakova, policy fellow à la Brookings Institution, Stanislav Secrieru, analyste senior à l’EUISS, et Nicu Popescu, directeur du programme Europe Elargie de l'ECFR.
Connected Futures: A Cisco podcast exploring business innovation insights
Author David Sanger believes cyberweapons demand a wide range of new solutions - spanning businesses, governments, and innovators. Cyberweapons are cheap, stealthy, and powerful. They can launch a devastating Pearl Harbor level attack, knocking out power grids, government agencies, and financial institutions. Or they can cause more subtle disruptions, stealing information, influencing voters, or throwing off missile trajectories or nuclear bomb efforts. It's this flexibility that led David E. Sanger to call his new book, The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Sanger, who is also a New York Times national security correspondent whose teams have won two Pulitzer Prizes, believes that it's the more subtle "short of war" level attacks that will continue to confound political, business, and technology leaders. In this podcast, Connected Futures executive editor Kevin Delaney chats with David about the often misunderstood potential of cyberweapons. And how we can better prepare for what he sees as a future of 'low-level, perpetual cyberconflict.'
New York Times national security correspondent David Sanger discusses digital weapons, cyberwar, and his urgent new book, The Perfect Weapon: War, Sabotage and Fear in the Cyber Age, with Nicholas Kristof. The conversation was recorded on June 19, 2018 in front of a live audience at New York's 92nd Street Y.
John Thornhill talks to the New York Times journalist about his latest book: The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. See acast.com/privacy for privacy and opt-out information.
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target. See acast.com/privacy for privacy and opt-out information.
As natural gas has grown in importance as a fuel for electricity generation, have gas pipelines become the electric grid’s Achilles heel? A cybersecurity expert discusses the risk posed by the grid’s growing dependence on gas. --- Natural Gas fuels a third of the nation’s electricity generation, and the strong economics of natural gas are likely to cause its use to widen its use in years to come. Yet the growing reliance on natural gas may increase the risk of electricity supply disruption should pipelines fail due to severe weather, or physical and cyber attacks. States, federal government and electricity market operators are well aware of this vulnerability, but differ in how immediate they view threats to gas networks to be, and whether they believe regulators should dictate preventive action. Kleinman Center Senior Fellow and grid cybersecurity expert Bill Hederman talks about the growing dependence of the electric grid on natural gas, and the implications of gas pipeline vulnerability to the reliability and resilience of the electric grid. Listen to the companion podcast episode on state and federal action to address cyber risk, Grid Resilience in the Cyber Age. Bill Hederman is a Senior Fellow with the Kleinman Center and founder of the Office of Market Oversight and Investigations at the Federal Energy Regulatory Commission (FERC). Related Content Grid Resilience in the Cyber Age: https://kleinmanenergy.upenn.edu/energy-policy-now/grid-resilience-cyber-age New FERC Rule Grows Clean Energy’s Role in Grid Resilience https://kleinmanenergy.upenn.edu/blog/2018/02/21/new-ferc-rule-grows-clean-energys-role-grid-resilience Distributed Energy’s Cyber Risk https://kleinmanenergy.upenn.edu/energy-policy-now/distributed-energy’s-cyber-risk
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.Featuring:David E. Sanger, national security correspondent for the New York Times and bestselling author of The Inheritance and Confront and Conceal Teleforum calls are open to all dues paying members of the Federalist Society. To become a member, sign up here. As a member, you should receive email announcements of upcoming Teleforum calls which contain the conference call phone number. If you are not receiving those email announcements, please contact us at 202-822-8138.
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.Featuring:David E. Sanger, national security correspondent for the New York Times and bestselling author of The Inheritance and Confront and Conceal Teleforum calls are open to all dues paying members of the Federalist Society. To become a member, sign up here. As a member, you should receive email announcements of upcoming Teleforum calls which contain the conference call phone number. If you are not receiving those email announcements, please contact us at 202-822-8138.
Can the U.S. electric grid remain resilient as the threat of cyber and physical attack rises? Pennsylvania PUC Chair Gladys Brown talks about state and federal efforts to safeguard the electric power system. --- The electricity industry has taken advantage of network communications technologies to deliver power more efficiently and reliably. But as information technology becomes interwoven into the electricity system, the industry has also become more vulnerable to cyber attack. In recent years, hackers have gained access to utility customer information and to energy control systems, and may ultimately threaten to disrupt power delivery itself. Gladys Brown, Chairman of the Pennsylvania Public Utility Commission and head of the Critical Infrastructure Committee at the National Association of Regulatory Utility Commissioners (NARUC), talks about cyber risk and electric grid resilience. She also looks at current efforts involving state and federal regulators, and agencies such as the Department of Homeland security, to ensure electricity supply as cyber risks proliferate. Gladys Brown is Chairman of the Pennsylvania Public Utility Commission. She also leads the National Association of Regulatory Utility Commissioner’s Critical Infrastructure Committee, a forum where state utility commissioners examine grid security risks and best practices. Related Content New FERC Rule Grows Clean Energy’s Role in Grid Resilience https://kleinmanenergy.upenn.edu/blog/2018/02/21/new-ferc-rule-grows-clean-energys-role-grid-resilience Distributed Energy’s Cyber Risk https://kleinmanenergy.upenn.edu/energy-policy-now/distributed-energy’s-cyber-risk
Journalist David Sanger is a three-time Pulitzer Prize winner and author of the new book, The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Sanger argues that because cyberwar is inherently secretive by nature the way America will conduct cyberwarfare is more complicated than waging conventional or even nuclear war – and possibly even more dangerous. Sanger is a featured speaker at AFP 2018 this November in Chicago. Save $100 off registration when you use promo code PODCAST18. Visit www.AFP2018.org/pricing.
The three-time Pulitzer Prize-winning journalist and New York Times bestselling author of two books, David Sanger, offers insider analysis on foreign policy, national security, and cyber warfare .
We've spoken a lot about hacking on this podcast, but Russia and America have the cyber capabilities to do much more than hack elections. In fact, around 30 to 40 countries are thought to have cyber weapons that are sophisticated enough to bring advanced, and highly wired, countries to their knees. What's worse, is that our ability to attack other countries with digital weapons is far better than our ability to defend against attacks. Matt spoke to David Sanger, the national security correspondent for the New York Times and host of Deep State Radio podcast. His new book is called The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Want to get in touch? Email: russia@abc.net.au.
We've spoken a lot about hacking on this podcast, but Russia and America have the cyber capabilities to do much more than hack elections. In fact, around 30 to 40 countries are thought to have cyber weapons that are sophisticated enough to bring advanced, and highly wired, countries to their knees. What's worse, is that our ability to attack other countries with digital weapons is far better than our ability to defend against attacks. Matt spoke to David Sanger, the national security correspondent for the New York Times and host of Deep State Radio podcast. His new book is called The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Want to get in touch? Email: russia@abc.net.au.
We've spoken a lot about hacking on this podcast, but Russia and America have the cyber capabilities to do much more than hack elections. In fact, around 30 to 40 countries are thought to have cyber weapons that are sophisticated enough to bring advanced, and highly wired, countries to their knees. What's worse, is that our ability to attack other countries with digital weapons is far better than our ability to defend against attacks. Matt spoke to David Sanger, the national security correspondent for the New York Times and host of Deep State Radio podcast. His new book is called The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Want to get in touch? Email: russia@abc.net.au.
Retired US Air Force Colonel GARY BROWN, first senior legal counsel at US Cyber Command, on legal challenges arising from the use of modern air power, including drones, why the development of an international protocol governing the use of offensive cyber activity is a priority, and whether giant robots are the future. RECORDED at the conference on THE PRESENT AND FUTURE OF AIR POWER, held on 8-9 May 2018 at the UNIVERSITY OF ST ANDREWS. PRODUCTION | ChromeRadio in partnership with the INSTITUTE FOR THE STUDY OF WAR AND STRATEGY, SCHOOL OF INTERNATIONAL RELATIONS, UNIVERSITY OF ST ANDREWS | Producer - Catriona Oliphant | Post-production - Chris Sharp.
David E Sanger, national security correspondent for the New York Times , speaks about his new book: The Perfect Weapon: War, Sabotage and Fear in the Cyber Age
On a combative opening day of the NATO summit in Brussels, President Trump called other member countries “delinquent” on military spending and attacked Germany as a “captive” of Russia. We examine where his frustration is coming from. Guest: David E. Sanger, a national security correspondent for The New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” For more information on today’s episode, visit nytimes.com/thedaily.
В этом эпизоде Алиса, Логин и Алексей поговорили про скандальный 6688, браузеры, уязвимости с лого и сайтами, и некоторые другие новости прошедших двух недель. 6688 http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?pf3511=62236 Github Gentoo organization hacked - resolved https://gentoo.org/news/2018/06/28/Github-gentoo-org-hacked.html Apple corrects the record on reported iPhone vulnerability https://www.cyberscoop.com/iphone-brute-force-passcode-matthew-hickey/ Cops May Unlock iPhones Without a Warrant to Beat Apple's New Security Feature https://motherboard.vice.com/en_us/article/bj34wa/cops-unlock-iphones-without-a-warrant-apple-usb-restricted-mode Facebook shells out $8k bug bounty after quiz web app used by 120m people spews profiles https://www.theregister.co.uk/2018/06/28/facebook_data_abuse_bug_bounty/ Former NSA contractor Reality Winner accepts guilty plea for leaking classified report https://www.cyberscoop.com/former-nsa-contractor-reality-winner-accepts-guilty-plea-leaking-classified-report/ Firefox is adding 'Have I Been Pwned' alerts https://www.cyberscoop.com/firefox-is-adding-haveibeenpwned-alerts/ «Грязный секрет» Gmail: письма пользователей читают не только сотрудники Google https://thebell.io/gryaznyj-sekret-gmail-pisma-polzovatelej-chitayut-ne-tolko-sotrudniki-google/ "Stylish" browser extension steals all your internet history https://robertheaton.com/2018/07/02/stylish-browser-extension-steals-your-internet-history/ Brave browser adds private tabs with Tor for 'enhanced privacy protection' https://www.cyberscoop.com/brave-browser-adds-tor-tabs/ Fusion https://wiki.mozilla.org/Security/Fusion Alter attack https://alter-attack.net/ ProtonMail DDoS Attacks Are a Case Study of What Happens When You Mock Attackers https://www.bleepingcomputer.com/news/security/protonmail-ddos-attacks-are-a-case-study-of-what-happens-when-you-mock-attackers/ A year after devastating NotPetya outbreak, what have we learnt? Er, not a lot, says BlackBerry bod https://www.theregister.co.uk/2018/06/27/notpetya_anniversary/ New RAMpage attack affects all Android phones released since 2012 [Update] https://www.androidcentral.com/rampage-attack-discovered Thanatos Ransomware Decryptor Released by the Cisco Talos Group https://www.bleepingcomputer.com/news/security/thanatos-ransomware-decryptor-released-by-the-cisco-talos-group/ First Nationwide Undercover Operation Targeting Darknet Vendors Results in Arrests of More Than 35 Individuals Selling Illicit Goods and the Seizure of Weapons, Drugs and More Than $23.6 Million https://www.justice.gov/opa/pr/first-nationwide-undercover-operation-targeting-darknet-vendors-results-arrests-more-35 The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber/dp/0451497899/ UISGCON14 https://14.uisgcon.org/ Securit13 Patreon https://www.patreon.com/securit13 Keygen Music [2+ hour Mix] https://www.youtube.com/watch?v=cYkaG5CT53I
RealClear Cyber Today host Andrew Walworth discusses the future of cyber conflict and the quickly evolving world of cyber strategy with New York Times National Security Correspondent David Sanger, author of the new book The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. In an era marked by increasingly aggressive use of cyber weapons by a range of adversaries, US policymakers have been slow to develop a coherent strategy for their use, even as America deploys its own cyber arsenal against foreign targets. In an in-depth interview, Sanger discusses how the US is already both an aggressor and defender in a multitude of cyber conflicts, and why it is vital that American policymakers develop strategies and norms regarding cyber weapons and their use.
If Then | News on technology, Silicon Valley, politics, and tech policy
On this week’s If Then, Will Oremus and April Glaser talk about the Facebook privacy scandal that won’t go away. They’ll also touch on some new data from our employer, Slate, that illustrates how Facebook is pulling back from the news business. Then, the hosts will be joined by our colleague Mark Joseph Stern, who covers courts and the law. They’ll discuss some recent tech-related Supreme Court cases, and how the court’s stance toward technology and privacy could change with the retirement of Justice Anthony Kennedy. Don’t Close My Tabs Real Life Mag: Big and Slow: How can we represent the threats that are too vast to see? What if civilization itself is one of them? Vanity Fair: Sorry to Bother You Director Boots Riley Takes a Ride Through Oakland’s Changing Landscape Podcast production by Max Jacobs. If Then plugs: You can get updates about what’s coming up next by following us on Twitter @ifthenpod. You can follow Will @WillOremus and April @Aprilaser. If you have a question or comment, you can email us at ifthen@slate.com. If Then is presented by Slate and Future Tense, a collaboration among Arizona State University, New America, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, follow us on Twitter and sign up for our weekly newsletter. Listen to If Then via Apple Podcasts, Overcast, Spotify, Stitcher, or Google Play. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week’s If Then, Will Oremus and April Glaser talk about the Facebook privacy scandal that won’t go away. They’ll also touch on some new data from our employer, Slate, that illustrates how Facebook is pulling back from the news business. Then, the hosts will be joined by our colleague Mark Joseph Stern, who covers courts and the law. They’ll discuss some recent tech-related Supreme Court cases, and how the court’s stance toward technology and privacy could change with the retirement of Justice Anthony Kennedy. Don’t Close My Tabs Real Life Mag: Big and Slow: How can we represent the threats that are too vast to see? What if civilization itself is one of them? Vanity Fair: Sorry to Bother You Director Boots Riley Takes a Ride Through Oakland’s Changing Landscape Podcast production by Max Jacobs. If Then plugs: You can get updates about what’s coming up next by following us on Twitter @ifthenpod. You can follow Will @WillOremus and April @Aprilaser. If you have a question or comment, you can email us at ifthen@slate.com. If Then is presented by Slate and Future Tense, a collaboration among Arizona State University, New America, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, follow us on Twitter and sign up for our weekly newsletter. Listen to If Then via Apple Podcasts, Overcast, Spotify, Stitcher, or Google Play. Learn more about your ad choices. Visit megaphone.fm/adchoices
At the end of the Cold War, the West triumphantly crowed that it was our open societies and the information revolution that ultimately defeated the USSR. They lost because people deprived of information simply couldn't compete. Now however, as we enter another stage of the information revolution, it may be that we celebrated yet another premature "mission accomplished" moment. It is now possible that in the information-addicted world of today in which everyone is tethered to the Internet, the big winner may be Big Brother. State dominated information systems may be entering their prime and freedom and privacy may be the victims. David Sanger, author of the new book "The Perfect Weapon: War, Sabotage and Fear in the Cyber Age", Rosa Brooks of Georgetown University, Kori Schake of IISS and host, David Rothkopf join the discussion...which also explore recent spasms of ugly authoritarianism in the U.S. Tune in.Support this show http://supporter.acast.com/deepstateradio. See acast.com/privacy for privacy and opt-out information.
At the end of the Cold War, the West triumphantly crowed that it was our open societies and the information revolution that ultimately defeated the USSR. They lost because people deprived of information simply couldn't compete. Now however, as we enter another stage of the information revolution, it may be that we celebrated yet another premature "mission accomplished" moment. It is now possible that in the information-addicted world of today in which everyone is tethered to the Internet, the big winner may be Big Brother. State dominated information systems may be entering their prime and freedom and privacy may be the victims. David Sanger, author of the new book "The Perfect Weapon: War, Sabotage and Fear in the Cyber Age", Rosa Brooks of Georgetown University, Kori Schake of IISS and host, David Rothkopf join the discussion...which also explore recent spasms of ugly authoritarianism in the U.S. Tune in. See acast.com/privacy for privacy and opt-out information.
In our 223rd episode of The Cyberlaw Podcast, Stewart Baker interviews David Sanger (@SangerNYT) regarding his new book, The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Stewart and David are joined by Pat Derdenger, Michael Vatis, Matthew Heiman, and Jim Lewis to discuss: Carpenter: What the future holds. Private sector Carpenter-ish steps. Wayfair: What the future holds. North Korea is hacking banks in Latin America. Cyber attacks during Trump-Kim summit. Joshua Schulte leaks his startlingly pedestrian jail diaries. Chinese hackers getting stealthier? Project Solarium proposal in NDAA. Are the Chinese releasing OPM hack data? More karma for Southern Poverty Law Center? Algeria shuts down Internet completely to stop student cheating. Administration struggling with privacy principles to compete with GDPR. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
In a wide-ranging interview with Carl M. Cannon and Andrew Walworth, the former head of the CIA and NSA discusses the increasing assault on credible information, and government and private efforts to defend against and deter that barrage. Full video interview: https://www.realclearpolitics.com/topic/in_the_news/cybersecure/
In our 171th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Maury Shenk, Jon Sallet, and Jennifer Quinn-Barabanov discuss: new developments in breach law; Justice Kennedy’s gassy ode to the “Cyber Age"; DOJ’s merger authority growing firmer?; Germany authorizes law enforcement hacking; Germany also admits spying on the US; European Council prepares sanctions in response to cyberattacks; Russia beats Western companies into sharing cyber data; oral argument in LabMD goes badly for the FTC; solicitor General seeks review of Microsoft case; CIA contractors show cyberskills by hacking snacks. Our guest interview is with Ellen Nakashima, National Security Reporter at The Washington Post. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
We reflect back on the games of 2016: the ones we loved, the ones we were only mildly enthused about, and the ones that made is stare blankly at our phones while we wandered into traffic. Episode Timeline 0:00 - Intro 4:00 - Uncharted 4 8:55 - The Witcher 3: Blood and Wine 10:56 - Groove Coaster 13:38 - Dragon Quest Builders 20:22 - Final Fantasy XV 27:07 - Stardew Valley 29:40 - The Division 36:46 - Pokemon Go 41:04 - Paper Mario: Color Splash 44:05 - Gears of War 4 45:30 - Deus Ex New Game 49:15 - Doom 55:55 - Overwatch 1:00:06 - Inside 1:05:43 - The Last Guardian 1:11:17 - Oxenfree 1:20:00 - Outro
The BCS/RSI Annual Lecture for 2012 was entitled ‘Intelligence and Security in the Cyber Age’ and was given by Sir David Pepper KCMG, former Director of GCHQ. Brian Runciman MBCS attended.