POPULARITY
Mariano Mattei is the Vice President of Cybersecurity and AI at Azzur Solutions, bringing over 30 years of expertise in cybersecurity, AI innovation, and software engineering. A Certified Chief Information Security Officer (CCISO), Mariano has led AI-driven transformations across Biotechnology, Pharmaceuticals, and Medical Device sectors, integrating AI into clinical trials, manufacturing automation, quality systems, and regulatory compliance frameworks (FDA 21 CFR Part 11, GAMP 5, GDPR, HIPAA). His work spans predictive analytics for risk management, AI-powered process optimization, anomaly detection in manufacturing, and regulatory AI governance. He recently graduated from Temple University's Master's Program in Cyber Defense and Information Assurance, and he's the author of "Data-Driven Cybersecurity – Proven Metrics for Reducing Cyber Risk"Listen NOW to discover, "The Secret to Taking A Secure Risk"
Ahead of the 2025 NATO Summit, hosts Lokke Moerel and Alex van der Wolk speak with top experts and policymakers about hybrid threats, strategic defense, and the shifting digital battlefield.
When cybersecurity companies are racing to outpace evolving threats, innovation often starts in an unexpected place: revenue operations. In this episode of Tech Talks Daily, I sit down with John Queally, Senior Director of Revenue Operations at Clari, to explore why RevOps has become a vital engine behind the performance and resilience of cybersecurity leaders. John brings a unique perspective from his journey through banking, analytics, and enterprise tech. What stands out is how rapidly the RevOps function has matured from a back-office support role to a central, strategic force. Especially in the cybersecurity space, where innovation requires ongoing investment and risk is measured in seconds, the pressure to run efficient, scalable revenue processes has never been greater. We delve into why clean, trusted data is the backbone of any AI strategy and how 67% of revenue leaders still don't trust the data they're using. It's a staggering insight, and one that underscores the urgent need for cross-functional alignment. John explains how RevOps can serve as the connective tissue across sales, marketing, customer success, and finance, moving companies from a place where they're debating the accuracy of dashboards to making real decisions in real time. He also shares a behind-the-scenes look at Clari's work with cybersecurity firms like Okta, where implementing balanced pipeline strategies and streamlining task prioritization has unlocked measurable improvements. We discuss the rise of AI, but John doesn't just repeat industry headlines. He calls out the "unsexy" truth that real AI advantage requires the hard work of data cleanup first and those who do it will pull ahead. From operational transparency to building trust within revenue teams, this episode challenges assumptions about how data, AI, and RevOps intersect. And for anyone in cybersecurity or enterprise tech wondering how to scale effectively while preparing for what's next, this conversation offers a grounded and insightful starting point. Is your company still debating data? Or are you ready to turn trusted insights into action?
Brandon Van Grack, former senior official at the U.S. Department of Justice and chair of MoFo's Global National Security practice, joins our hosts to explore the seismic impact of the Trump administration on U.S. foreign policy and security. Bringing over a decade of experience monitoring national security threats in China and Russia, Brandon takes us through top-of-mind issues: from cyber offensive actions and NATO military command to tariffs, export controls, and sanctions. How aligned are U.S. and EU interests today? How should international businesses navigate?
(00:00:00) coming up (00:01:26) disclaimer (00:02:18) Intro to cyber-security Investorideas.com, a global news source and expert investing resource covering cybersecurity stocks issues a podcast interview with host Dawn Van Zant talking to Chris Temple , editor and publisher of The National Investor, With cybersecurity stocks seeing gains from 18%, to up to 40% in the past six months, Chris and Dawn do a deep dive into what is driving the growth in the sector. Chris has been a regular guest on the Exploring Mining Podcast at Investorideas.com talking about gold stocks. Today he joins Investorideas to talk about cybersecurity. Starting as an investor at 18, Chris says about his newsletter, “You can get information everywhere but here you get knowledge.” Chris shares insight into the future of cybersecurity and how to navigate the sector as it sees a 50 % increase in cyber-attacks in the first quarter of 2025. Looking at the stocks in the sector he says, “There are the go-to legacy companies like CrowdStrike Holdings, Inc. (NASDAQ: CRWD) and Palo Alto Networks, Inc. (NASDAQ: PANW but he has an interesting investment theme, adding two smaller companies for his subscribers that have their own little niche. When you look at these events where you have this quantum increase in cyber-attacks, you need to have an increase in the protocol, software solutions. . The best of the companies that come up with the better solutions end up being gobbled up bigger companies. “This happened with Y2K. A few of the software companies I recommended were bought out within months.” He also says Cyber ETF's are a great way for investors to bet on the sector. About Chris Temple Chris Temple is editor and publisher of The National Investor. He has had an over 40-year career now in the financial/investment industry. Temple is a sought-after guest on radio stations, podcasts, blogs and the like all across North America, as well as a sought-after speaker for organizations. His ability to help average investors unravel, understand and navigate today's markets is unparalleled; and his ability to uncover "off-the-radar" companies is likewise. His commentaries and some of his recommendations have appeared in Barron's, Forbes, CBS Marketwatch, Wall Street's Best Investments/The Cabot Group, Kitco.com, the Korelin Economics Report, Benzinga.com, Palisade Radio, Mining Stocks Education, Mining Stock Daily and other media. Connect with Chris on X: https://x.com/NatInvestor Research more cyber stocks with Investorideas.com free defense stock directory https://www.investorideas.com/Companies/HomelandDefense/Stock_List.aspAbout Investorideas.com - Big Investing Ideas Investorideas.com is the go-to platform for big investing ideas. From breaking stock news to top-rated investing podcasts, we cover it all. Our original branded content includes podcasts such as Exploring Mining, Cleantech, Crypto Corner, Cannabis News, and the AI Eye. We also create free investor stock directories for sectors including mining, crypto, renewable energy, gaming, biotech, tech, sports and more. Public companies within the sectors we cover can use our news publishing and content creation services to help tell their story to interested investors. Paid content is always disclosed.Disclaimer/Disclosure: Investorideas.com is a digital publisher of third party sourced news, articles and equity research as well as creates original content, including video, interviews and articles. Original content created by investorideas is protected by copyright laws other than syndication rights. Our site does not make recommendations for purchases or sale of stocks, services or products. Nothing on our sites should be construed as an offer or solicitation to buy or sell products or securities. All investing involves risk and possible losses. This site is currently compensated for news publication and distribution, social media and marketing, content creation and more. Disclosure is posted for each compensated news release, content published /created if required but otherwise the news was not compensated for and was published for the sole interest of our readers and followers. Contact management and IR of each company directly regarding specific questions. More disclaimer info: https://www.investorideas.com/About/Disclaimer.asp Learn more about publishing your news release and our other news services on the Investorideas.com newswire https://www.investorideas.com/News-Upload/ and tickertagstocknews.com Global investors must adhere to regulations of each country. Please read Investorideas.com privacy policy: https://www.investorideas.com/About/Private_Policy.asp Learn more about our news, PR and social media, podcast and ticker tag services at Investorideas.com https://www.investorideas.com/Investors/Services.asp Learn more about digital advertising and guest posts https://www.investorideas.com/Advertise/ Follow us on X @investorideas Follow us on Facebook https://www.facebook.com/Investorideas Follow us on YouTube https://www.youtube.com/c/Investorideas Contact Investorideas.com 800 665 0411
NEWS: Balikatan focuses on cyber defense drills | April 26, 2025Visit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimesVisit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes Hosted on Acast. See acast.com/privacy for more information.
summaryIn this episode of No Password Required, host Jack Clabby and guest Trevor Hillegas discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.takeawaysTrevor emphasizes the importance of metaphors in understanding cybersecurity.The public often fears sophisticated threats while ignoring more common dangers.Leadership in cybersecurity should focus on empowering teams rather than micromanaging.A proactive approach in cybersecurity can prevent victimization before it occurs.Technical leaders should understand core concepts to effectively guide their teams.Misconceptions about cyber criminals often stem from Hollywood portrayals.The military experience can significantly shape leadership styles in tech.Daily life in cybersecurity involves constant learning and adaptation.Sophistication in cyber threats does not always correlate with success.Cybersecurity is about both fighting threats and fortifying defenses. Memorable interactions can lead to impactful collaborations in cybersecurity.Sharing knowledge can help mitigate cyber threats effectively.Personal preferences can reveal a lot about an individual's character.Walk-up songs can reflect one's personality and professional identity.Breakfast choices can be a blend of cultural influences and personal tastes.Building a team for an escape room requires diverse skills and personalities.Nerd culture can foster connections and shared interests among individuals.Prank calls can be a humorous way to engage with public figures.Culinary competitions highlight the absurdity of turning survival into entertainment.Networking in cybersecurity can lead to unexpected opportunities.titlesCybersecurity Connections: Memorable MomentsThe Lifestyle Polygraph: Fun and InsightsWalk-Up Songs: A Reflection of IdentityBreakfast Favorites: A Culinary JourneySound Bites"Tell them what needs to get done.""Empower your people to fail.""We can stop that identity theft.""I was in Europe giving a talk.""I sent him everything that we had.""I would get Jack Sparrow.""I love Star Wars.""I would call Gordon Ramsey."Chapters00:00 Introduction to Cybersecurity Insights02:54 Career Path and Unexpected Experiences05:55 Transitioning from Military to Cybersecurity09:07 Daily Life at Spy Cloud12:12 Leadership Philosophy and Management Style14:53 The Nature of Cyber Threats17:50 Technical Skills in Leadership20:52 Misconceptions About Cyber Criminals25:32 Memorable Cybersecurity Interactions28:12 Lifestyle Polygraph Introduction28:35 Walk-Up Songs and Personal Preferences32:07 Breakfast Favorites and Culinary Influences34:40 Building the Ultimate Escape Room Team37:36 Nerd Culture and Personal Interests39:02 Prank Calls and Culinary Competitions41:20 Closing Thoughts and Contact Information
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
Japan's House of Representatives Cabinet Committee on Friday approved by a majority vote a bill to introduce active cyber defense, or preemptive measures against possible cyberattacks on government institutions and critical infrastructure.
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary
On today's episode, we're going even deeper into my stalker situation. I'll be sharing more details about his delusional tendencies—including how he's gone as far as pretending to be a police officer to manipulate and control people (which is a crime, by the way). I'll also be answering the questions I've received from you all about this ongoing situation.Law enforcement is now more involved (actual police, not to be confused with blue light bandits), we know everything, and we'll be handling it all legally. Tune in for the full update.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmJnibJBpoe9p7ReNXovwJMQN&gclid=Cj0KCQjwqIm_BhDnARIsAKBYcmsZOengz4NFStC14G_b2eziJgYpA8kGt2sokaR9i3PcTxs0QmcaPosaAtbGEALw_wcB
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
The Diet began deliberations Tuesday on a bill to introduce active cyber defense, or taking pre-emptive measures to prevent cyberattacks on government institutions and critical infrastructure.
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025] 00:00 - Intro 00:17 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors - Ed Skoudis - Brigadier General Brian D. Vile - Shawn Turskey 29:55 - Lollipop Moments - TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations - Cybersecurity Canon - Rick Howard - Kingpin - Kevin Poulsen - Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
This episode originally aired on June 13, 2024. Join Jason Kikta as he interviews Dmitri Alperovitch, co-founder of CrowdStrike and author of World on the Brink. Alperovitch shares insights on the importance of speed in cybersecurity, the role of automation in IT management, and the rising threat of opportunistic cyberattacks. They explore how cloud-based solutions like Automox are transforming endpoint security, allowing organizations to rapidly detect and respond to threats, and discuss key strategies from Alperovitch's book on geopolitical challenges and cybersecurity's role in national security.
Empower Your Family's Cybersecurity with Expert Insights In this episode of The Secure Family Podcast, Andy talks with cyber defense expert Reanna Schultz to discuss how families can ensure a safe and fun online experience. Reanna shares her journey into cybersecurity, offers practical tips on creating secure passwords, and advises on how to protect personal data. She emphasizes the importance of multi-factor authentication and the risks posed by seemingly innocuous social media and online interactions. Parents are given valuable guidelines on how to safeguard their children's online activities. For more on Reanna: https://www.cyberspeaklabs.com/ Watch the Interview: https://youtu.be/xlXC5gFe3Lg Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Protect your credit cards, smartphones, and devices with signal-blocking solutions from SLNT. Get 10% off at SLNT with the discount code: THESECUREDAD. Connect
Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it's the end of an era. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea segment. On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann's show, check out the episode here. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWire network and on your favorite podcast app. Selected Reading Exclusive: Hegseth orders Cyber Command to stand down on Russia planning (The Record) As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow (The Washington Post) Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia (The New York Times) Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (Bleeping Computer) VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks (Carnegie Mellon University Software Engineering Institute CERT Coordination Center) Cellebrite zero-day exploit used to target phone of Serbian student activist (Amnesty International Security Lab) California shuts down data broker for failing to register (The Record) Research finds 12,000 ‘Live' API Keys and Passwords in DeepSeek's Training Data (Truffle Security) Cyberattack detected at Polish space agency, minister says (Reuters) Polish space agency confirms cyberattack (The Register) As Skype shuts down, its legacy is end-to-end encryption for the masses (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The future of cybersecurity isn't about better technology alone—it's about reimagining how humans and machines work together. In this episode, we're discussing with William MacMillan the potential of the human-AI partnership to transform defense against increasingly sophisticated modern cyber threats. William is a Chief Product Officer at Andesite, a cybersecurity company dedicated to delivering cutting-edge technology to overburdened cybersecurity teams. https://www.linkedin.com/company/andesiteai/ thisishowtheytellmetheworldends.com/
At ThreatLocker Zero Trust World 2025 in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled The Grand Delusion. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.Challenging the Status QuoCunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn't be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.Zero Trust as a Strategy, Not Just a TermThe session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.Actionable Steps for Small BusinessesCunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.The Future of Zero TrustLooking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today's digital world.Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.Guest
Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, joins Ann on this week's episode of Afternoon Cyber Tea for an engaging conversation on the challenges and optimism driving the fight against cyber threats. Igor shares insights from his diverse career and breaks down why cybersecurity is best understood as a battle of graphs versus lists, the importance of raising the cost for attackers, and how AI is shaping the future of defense strategies. Igor also highlights the critical role of collaboration across industries, emphasizing that security is a collective effort. Resources: View Igor Tsyganskiy on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast No Slides Attached Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.
In Episode S7E5, host Steven Bowcut speaks with Ian Amit, CEO and Founder of Gomboc AI. The conversation covers various aspects of Gomboc AI and its approach to computer science and cybersecurity. Ian shares his practical problem-solving philosophy and insights into the evolving landscape of cybersecurity, highlighting the impact of generative AI and the inefficiencies in traditional cloud security and DevOps processes. They discuss the complexities of cloud security, including risks from misconfigurations and shadow IT, and outline Gomboc AI's deterministic approach to AI, which relies on provider documentation to deliver precise solutions while maintaining human oversight. Finally, Ian emphasizes the future direction of Gomboc AI, advocating for improved DevSecOps practices and the integration of infrastructure as code and GitOps methodologies.
Welcome to another engaging episode of the "To the Point Cybersecurity" podcast, brought to you by Forcepoint. This week, hosts Rachael Lyon and Jonathan Knepher delve into the intersection of sports and cybersecurity with a fascinating guest, Steve Kain, an adversary emulation manager with the Maryland Department of IT. With a background spanning both offensive and defensive security roles across the media industry, government entities like the DOD, and even sports organizations including the Baltimore Ravens, Steve brings a unique perspective to the table. This episode explores the cybersecurity challenges faced by high-profile sports teams, the rise of online impersonation, and the value of adversary emulation in proactively defending against threats. Listen in as Steve shares insights from his diverse career path, offering valuable advice for those looking to enter the cybersecurity industry and highlighting the importance of mentorship and continuous learning in today's dynamic cyber landscape. Don't miss out on the expertise and compelling stories that Steve brings to the podcast in this must-hear episode. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e320
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Peter Warmka. Peter is a Former Senior Intelligence Officer with the CIA with over 20 years' experience in breaching the security of organizations overseas. Peter is the founder of the Orlando-based firm Counterintelligence Institute, LLC and an Adjunct Professor at Webster University's Masters Cybersecurity Program. Peter is passionate about using his expertise in helping city, state, and federal government entities, non-profits, academic institutes, private companies, and individuals safeguard their sensitive proprietary and/or personal data. He is also the author of two books. [Feb 17, 2025] 00:00 - Intro 00:21 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:25 - Peter Warmka Intro 03:14 - Getting Recruited 12:11 - Working Above Cybersecurity 21:33 - Identifying Potential Candidates 23:20 - Tip to CISO's: Learn About AI 25:17 - The Importance of Guardrails 28:37 - Peter's Books - Confessions of a CIA Spy - Peter Warmka - Why Are You Messing With Me? - Peter Warmka 31:10 - Find Peter Warmka online - LinkedIn: in/peterwarmka - Website: counterintelligence-institute.com 32:18 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
In this podcast conversation, Steven and Edward explore the potential of AI in cyber defense, emphasizing its role in augmenting human security teams. Edward highlights a case study where AI enables a tech startup to function as if it has more engineers on staff. They delve into the concept of 'agentic AI' and its application in coaching AI systems, with Edward noting Dropzone AI's recognition as a 'cool vendor' by Gartner in October of the previous year—an important milestone for the company. Edward explains that agentic AI refers to systems capable of autonomously performing complex tasks without incremental instructions from users. He underscores the importance of coachability in AI, comparing these systems to digital workers who must adapt to an organization's specific needs. Steven adds that the value of a team member grows exponentially as they learn the operational nuances of the organization. Edward points out the trend of utilizing agentic AI to enhance productivity by offloading tedious tasks, such as tier-one analytical work. The duo also discusses the ethical training of large language models, addressing the challenges related to using unlicensed and private customer data. Edward raises concerns about the risks involved and advocates for responsible data handling, urging vendors to keep a clear distinction between private information and data used for system improvement. Steven expresses worry about the potential for agentic AI systems to learn from humans who may not fully grasp ethical standards. In response, Edward emphasizes the significance of case studies from fields like medicine. Finally, they discuss the growing adoption of AI in cybersecurity, with Edward noting that the technology has matured significantly in the past year. He highlights the potential for attackers to exploit large language models as well. Sharing his vision for the future, Edward aspires to create the most capable and trustworthy AI security analyst, which would empower organizations of all sizes to investigate security alerts promptly, making it harder for attackers to succeed. Steven conveys enthusiasm about the prospect of using digital workers as a force multiplier for startups and small businesses.
How can we safeguard our digital infrastructure in the age of quantum computing? In this episode of Tech Talks Daily, I speak with Rahul Tyagi, CEO of SECQAI, a NATO-backed leader in quantum-resilient and memory-safe semiconductor solutions. As quantum computing accelerates, the risks to current encryption systems grow, making it critical to rethink how we protect our most sensitive data and systems. Rahul shares insights into the looming quantum computing threat, where "steal now, decrypt later" strategies are already compromising long-term data security. He explains how SECQAI's groundbreaking secure semiconductor architecture, built on memory-safe principles, can block up to 70% of global cyberattacks while ensuring readiness for post-quantum cryptography. We discuss the pivotal role of collaboration between governments, industry, and academia in creating innovative solutions, from Cambridge University's Cherry architecture to partnerships with Oxford Quantum Circuits for quantum machine learning research. Rahul also highlights key timelines for quantum resilience, including global policy initiatives such as NIST's roadmap and aggressive adoption goals from agencies like CISA and the Australian Signals Directorate. As we stand at the crossroads of quantum advancement and cybersecurity, how can organizations and policymakers align to future-proof critical infrastructure? Join us as we explore these pressing challenges and solutions, and let us know your thoughts on what the quantum-resilient future holds.
In this episode, Defense Unicorns welcomes Col. Sean Kern, the Director of Cyberspace Operations Strategy at SAIC, who brings experience in military and cybersecurity strategy. Kern shares his journey from military service to civilian leadership, sharing the unique challenges and adjustments required in the transition. He discusses how his military background shaped his understanding of systems and software engineering and how essential it is to cultivate a resilient and adaptable culture in any DevSecOps team. Kern emphasizes that trust, humility, and continuous learning are cornerstones for building high-performing cybersecurity operations, both in the military and private sectors.The conversation dives deep into automation and the role of human judgment in high-stakes cybersecurity decisions. Kern puts a focus on a balanced approach, where automation speeds up processes without sacrificing the critical oversight humans provide. His thoughts on combating biases within AI and ensuring ethical applications of automation highlight the importance of strategic human involvement. His perspective illustrates how both tech innovation and human expertise are essential to adapting cybersecurity practices for dynamic challenges.Kern also addresses the structural complexities of coordinating cybersecurity operations across military branches. He explores the need for a more unified organizational framework that could enhance operational readiness and efficiency in cyber operations. Drawing from his experience, Kern advocates for a strategic, flexible, and consistent approach to cybersecurity management, emphasizing that speed and adaptability are key to staying ahead of potential threats in today's world.Key Quote:“Culture is going to happen whether you do it or not. Like that's the scary part. It's going to exist. You know, if it's left to its own devices, then if you get anything good out of it, that's pure chance. That's pure luck and we don't need to fight China on pure chance or pure luck. So we need to be deliberate about the culture we put in place.”Col. Sean KernTime Stamps:(00:32) Sean Kern's Military Background(06:42) Transitioning from the Military to the Private Sector(11:47) Building Effective Teams and Organizations(19:59) The Importance of Culture(28:24) Automation vs. Human Accuracy(34:50) Organizational Design for Cyber Operations(49:14) Lightning RoundLinks:Connect with Col. Sean KernLearn More About SAICConnect with Rebecca LivelyLearn More About Defense Unicorns
Podcast: ICS Cyber Talks PodcastEpisode: Ilan Gendelman co-founder & CTO @SIGA Multi-Layer OT Cybersecurity on OT cyber defense next genPub date: 2025-01-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationפתרון האבטחת הסייבר של סיגה למערכות תפעוליות ייחודי בזיהוי התקפות סייבר בסביבות טכנולוגיות תפעוליות. בעוד שספקי מערכות זיהוי מתקפות סייבר בסביבות תפעוליות (IDS) מסורתית התמקדו בניטור הרשת, סיגה מבדילה את עצמה על ידי ניטור אותות ישירות מהתקני קלט/פלט (I/O) רמה 0 בהיררכיית מערכות הבקרה התעשייתיות נחשון פינקו מארח את אילן גנדלמן מייסד-שותף והמנהל הטכנולוגי של סיגה, בשיחה מעמיקה על התפתחויות מכריעות בתחום אבטחת הסייבר בסביבות תפעוליות הערך האסטרטגי של שילוב התראות תפעוליות ואבטחת סייבר במערכת אחודה לקחים קריטיים שנלמדו על אבטחת סביבות תפעוליות מאז פרוץ המלחמה באוקטובר 2023 החידושים הטכנולוגיים האחרונים של סיגה וגישת האבטחה המתפתחת שלהם העתיד של הגנת סייבר למערכות תפעוליות בעידן שבו תוקפים ומגינים ממשתמשים ביכולות של בינה מלאכותית ועוד SIGA OT Security is distinctive in detecting cyber attacks in operational technology environments. While traditional Industrial Detection Systems (IDS) vendors focus on network-level monitoring, SIGA differentiates itself by monitoring signals directly from Input/Output (I/O) devices at Level 0 of the industrial control system hierarchy. In an in-depth conversation with Nachshon Pincu and SIGA's Co-Founder and CTO Ilan Gendelman discusses several crucial developments in OT cybersecurity: • The strategic value of integrating operational and cybersecurity alerts into a unified system • Critical lessons learned about OT security since the outbreak of the October 2023 conflict • SIGA's latest technological innovations and their evolving security approach • The future trajectory of OT cyber defense in an era where both attackers and defenders leverage artificial intelligence (AI) • Additional insights into emerging OT security challenges and solutionsThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Dustin Rozario Steinhagen, PhD is a privacy expert who recently graduated with his doctorate degree in Cyber Defense from Dakota State University. His dissertation is titled “Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota.” This quantitative analysis measured “what everyday people know about thought reform and psychologically manipulative groups.” One of the most powerful defenses a person can have against mind hacking is admitting they are vulnerable to it. After that, skills can be acquired and built upon to teach people how to protect themselves further. However, we mustn't let our guard down when it comes to our brains and minds coming under attack. Like anti-virus software needing updates to protect against the latest cyber threats, our minds also require ongoing learning to maintain psychological security in addition to adequate rest, play, and sleep. Influences are also more challenging to detect, more frequent in occurrence, from multiple directions, and require vigilance when interacting with different levels of trusted or untrusted sources. Having trusted groups who respect personal privacy and have our best intentions in mind becomes extremely important in such an environment. Learn more about your ad choices. Visit megaphone.fm/adchoices
Dustin Rozario Steinhagen, PhD is a privacy expert who recently graduated with his doctorate degree in Cyber Defense from Dakota State University. His dissertation is titled “Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota.” This quantitative analysis measured “what everyday people know about thought reform and psychologically manipulative groups.” One of the most powerful defenses a person can have against mind hacking is admitting they are vulnerable to it. After that, skills can be acquired and built upon to teach people how to protect themselves further. However, we mustn't let our guard down when it comes to our brains and minds coming under attack. Like anti-virus software needing updates to protect against the latest cyber threats, our minds also require ongoing learning to maintain psychological security in addition to adequate rest, play, and sleep. Influences are also more challenging to detect, more frequent in occurrence, from multiple directions, and require vigilance when interacting with different levels of trusted or untrusted sources. Having trusted groups who respect personal privacy and have our best intentions in mind becomes extremely important in such an environment. Learn more about your ad choices. Visit megaphone.fm/adchoices
Discover how cybersecurity is being reshaped to be more inclusive and accessible for everyone, especially those with disabilities. Join us as we host an enlightening conversation with Lauren Iglehart, CISA's Chief of the Office of Equity, Diversity, Inclusion, and Accessibility, and Bob Nadeau, the Partnerships Branch Chief within Strategic Relations at the Cybersecurity and Infrastructure Security Agency. While Neil Milliken enjoys a break in Thailand, our guests share the United States government's groundbreaking initiatives aimed at making cybersecurity resources available to all. Learn about the Secure Our World campaign, designed to mitigate cyber risks while fostering digital equality, and hear how these efforts are making a global impact on infrastructure protection.We also explore the importance of diversity within CISA's workforce, including the Neurodiverse Federal Workforce Initiative, which focuses on recruiting individuals with autism and other targeted disabilities. Gain insights into how diverse perspectives enhance innovation and problem-solving in the face of evolving cybersecurity threats. Our discussion highlights the challenges and opportunities presented by AI and underscores the need for comprehensive cybersecurity education. Additionally, we touch on the complexities of managing a multigenerational workforce and the importance of leadership in adapting to a rapidly changing security landscape. Listen in for a deeper understanding of how CISA is leading the charge toward a more secure and inclusive digital future.Support the showFollow axschat on social mediaTwitter:https://twitter.com/axschathttps://twitter.com/AkwyZhttps://twitter.com/neilmillikenhttps://twitter.com/debraruhLinkedInhttps://www.linkedin.com/in/antoniovieirasantos/ https://www.linkedin.com/company/axschat/Vimeohttps://vimeo.com/akwyz
Podcast: ICS Cyber Talks PodcastEpisode: Osher Assor CEO of Cyber & Tech Division @Auren IL on the "Beepers attach" & cyber defense techPub date: 2024-12-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationהאם ניתן להגדיר את מתקפת הביפרים על החיזבאללה כמתקפת סייבר? הנושא פותח דיון שעוסק בהיבטי סייבר רבים ומשמעותיים. נחשון פינקו מארח את אושר עשור שותף מנהל חטיבת הסייבר בפירמת הייעוץ הבינלאומית אוריין בשיחה מרתקת שמתחילה במתקפת הביפרים וזורמת לטכנולוגיות הגנה, גיוס מומחים בסייבר ועוד Can the pager attack on Hezbollah be defined as a cyber attack? The topic opens a discussion that deals with many significant cyber aspects. Nachshon Pincu hosts Osher Asor, co-director of the cyber division at the international consulting firm Auren, in a fascinating conversation that begins with the pager attack and flows into defense technologies, recruiting cyber experts, and more.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Jane Lo, MySecurity Media Singapore Correspondent sat down with Syed Ubaid Ali Jafri, Head of Cyber Defense and Offensive Security at Habib Bank Limited (HBL), at Tech Week Singapore, to get his insights on the sophistication of these threats. We delved into:Motivations for Attacks on Financial Institutions:Financial gain and data exploitation are prime motivations behind phishing and cyber attacks targeting banks. Attackers seek customer data, card details, and account balances, which they can use to extort or sell for profit.Financial institutions are particularly vulnerable due to their reputational concerns, leading some to pay ransoms to protect customer privacy.Increasing Accessibility of Cybercrime Tools:Advanced phishing tools, previously available only on the dark web, are now accessible on the surface web, enabling even less-skilled cybercriminals to launch attacks.With the rise of AI, non-experts can craft convincing phishing emails, bypassing traditional spam filters and reaching unsuspecting targets.Role of AI in Sophisticated Cyber Attacks:Gen AI and voice cloning technology make phishing more personalized and convincing, allowing attackers to craft emails and messages that mimic the target's language and communication style.The evolution from simple phishing to sophisticated voice and deepfake attacks was also highlighted, showing how AI can now be used to clone voices and create realistic fake videos with as few as 15 images.Challenges in Detecting AI-Driven Phishing and Deepfake Attacks:Deepfake technology makes it challenging for the average user to distinguish between real and fake communications. Convincing voice and video deepfakes are increasingly used in spear-phishing, targeting specific individuals with tailored scams.AI-powered tools generate flawless text, removing traditional phishing indicators like spelling errors or urgency cues, which previously helped users identify phishing emails.Recommendations for Protection:Users are advised to be cautious about what they share online, as personal information posted publicly can help cybercriminals tailor their attacks.Security tools like deepfake detection software can help individuals identify fake voices or videos, though awareness and cautious online behavior remain critical.Cybersecurity education is essential, with both vendors and users needing awareness of AI-driven threats to implement better protective measuresRecorded 10th Oct 2024, Tech Week Singapore 2024, 12.40pm.#mysecuritytv
Guest: Daisy Wong, Head of Security Awareness, MedibankOn LinkedIn | https://www.linkedin.com/in/daisywong127/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesKicking off the conversation, Marco noted the absence of his co-host Sean, whose focus often leans technical. This opened the door for a deeper exploration into the human and operational side of cybersecurity, an area Daisy Wong is uniquely equipped to discuss.Daisy's career journey, from earning a marketing degree to becoming Medibank's Head of Security Awareness, is rooted in understanding human behavior. Her hands-on experience with phishing emails and time spent in a pen-testing team revealed how critical culture and communication are to effective cybersecurity.The Power of Communication and Culture in CybersecurityDaisy highlighted how her ability to simplify complex technical language became the cornerstone of her work in cybersecurity awareness. She emphasized that soft skills, like communication, are just as essential as technical know-how in navigating today's cyber challenges.Drawing cultural parallels, Daisy shared analogies from her cultural heritage, like the tradition of removing shoes before entering a home, and compared them to cybersecurity practices. Marco added an Italian twist, pointing to customs like cheek-kissing as a metaphor for ingrained behaviors. Together, they underscored how fostering a security-first mindset mirrors cultural conditioning—it requires intentionality, consistency, and collective effort.Breaking Barriers and Building BridgesOne of the key takeaways from the discussion was the need to break down the misconception that cybersecurity is solely a technical field. Daisy argued for creating environments where employees feel safe reporting security concerns, regardless of their technical background.She shared strategies for fostering collaboration, like simple yet impactful initiatives during Cyber Awareness Month. These efforts, such as wearing branded T-shirts, can make security a shared responsibility and encourage open communication across teams.Staying Ahead in an Evolving Threat LandscapeDaisy also spoke about how cyber threats are evolving, particularly with the rise of generative AI. Traditional warning signs, like spelling mistakes in phishing emails, are being replaced with far more sophisticated tactics. She emphasized the need for organizations to stay adaptable and for individuals to remain vigilant.While AI offers tools to identify risks, Daisy and Marco agreed that personal accountability and fundamental awareness remain irreplaceable in ensuring robust security practices.In this lively episode of On Location with Marco Ciappelli, Daisy Wong spotlighted the indispensable role of human behavior, culture, and communication in cybersecurity. Her insights remind us that while technology evolves, the human element remains at the heart of effective cyber defense.Cybersecurity isn't just about systems and software—it's about people. And as threats become more sophisticated, so must our strategies, blending technical tools with cultural awareness to create a resilient and adaptable defense____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Send us a textIn this compelling episode, Joey Pinz connects with Michael Crean to discuss his transition from Managed Service Provider (MSP) to cybersecurity vendor, sharing insights from his military background and personal journey in the tech industry. Michael opens up about his early challenges as an MSP and the pivotal shift that led him to focus on cybersecurity, driven by a desire to protect those who cannot protect themselves.
Guest: Jacqueline Jayne, The Independent Cybersecurity ExpertOn LinkedIn | https://www.linkedin.com/in/jacquelinejayne/At AU Cyber Con | https://melbourne2024.cyberconference.com.au/speakers/jacqueline-jayne-smictHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the On Location series at AISA Cyber Con 2024 in Melbourne, the conversation about cybersecurity turns engaging as Jacqueline Jayne, Security Awareness Advocate, shares her experience on human risk management and cybersecurity education. Her insights bring forward crucial points on bridging the gap between human behavior and technological security measures.One pivotal topic discussed is the persistent challenge of human error in cybersecurity. Jacqueline highlights that human error now accounts for over 90% of security breaches. The approach to mitigating these risks isn't merely technological but educational. She emphasizes the need for comprehensive security awareness training and shifting organizational culture towards proactive risk management.Jacqueline shares, “Organizations should redefine IT departments from the ‘Department of No' to the ‘Department of K-N-O-W.'” She believes that instead of restricting users, organizations should focus on empowering them with knowledge, emphasizing the importance of comprehensive training that connects with employees on a personal level.Throughout the conversation, the importance of contextual and relatable education stands out. Jacqueline advocates for simulated phishing campaigns to provide real-world scenarios for employees. By understanding and experiencing what a phishing attempt looks like in a controlled environment, employees can better recognize and react to actual threats.Another compelling point is teaching digital citizenship from a young age. Jacqueline compares cybersecurity education to road safety education. Just as children learn road safety progressively, digital safety should be ingrained from an early age. Appropriate and guided exposure to technology can ensure they grow up as responsible digital citizens.The discussion also touches on parental and organizational roles. Jacqueline discusses the proposal of banning social media for children under 16, acknowledging its complexity. She suggests that though banning might seem straightforward, it's more about educating and guiding children and teenagers on safe digital practices. Organizations and parents alike should collaborate to create a safer and more informed digital environment for the younger generation.Towards the end, the dialogue shifts to the potential role of AI in enhancing cybersecurity awareness. There's a consensus on using AI not as a replacement but as an augmentative tool to alert and educate users about potential threats in real-time, potentially mitigating the risk of human error. In conclusion, the conversation highlights the indispensable role of education in cybersecurity. JJ's perspective fosters a comprehensive approach that includes organizational culture change, continuous engagement, and early digital citizenship education. It's not just about implementing technology but evolving our collective behavior and mindset to ensure a secure digital future.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesThe top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight (Session): https://melbourne2024.cyberconference.com.au/sessions/session-OZ4j4mTr1OKeeping our kids safe online: The essential information for parents and caregivers (Session): https://melbourne2024.cyberconference.com.au/sessions/session-oBf7Gjn2xGSecurity awareness 2.0: The paradigm shift from training and simulations to engagement and culture: https://melbourne2024.cyberconference.com.au/sessions/session-drDWsOKBsLLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
In this episode of Detection at Scale, Jack speaks to Brandon Kovitz, Senior Manager of Detection & Response at Outreach, shares his insights on the evolving landscape of cybersecurity. He discusses the critical role of generative AI in enhancing detection and response capabilities, emphasizing the importance of understanding data to maximize security tools' effectiveness. Brandon also highlights the balance between human intuition and AI, noting that while AI can analyze vast amounts of data, it lacks the nuanced understanding of intent that only humans can provide. Tune in to learn how organizations can leverage AI while maintaining essential human oversight in their security strategies! Topics discussed: The importance of operationalizing detection and response capabilities to enhance security posture in a cloud-native, SaaS-first environment. Leveraging generative AI to improve data analysis and streamline detection processes, ultimately enabling faster responses to emerging cyber threats. The critical balance between AI capabilities and human intuition, emphasizing that human expertise is essential for understanding intent behind actions in cybersecurity. Understanding the data landscape is vital for maximizing the effectiveness of security tools and ensuring a strong return on investment. The role of automation in reducing the noise from tier one and tier two security alerts, allowing teams to focus on complex issues. Insights on building a detection-as-code pipeline to facilitate rapid implementation of security measures in response to emerging vulnerabilities. The significance of collaboration between security teams and privacy experts to ensure compliance and protect customer data in AI initiatives. The future of cybersecurity operations, including the potential for AI to automate many routine tasks and enhance overall operational efficiency. The necessity for ongoing education and adaptation in the cybersecurity field to keep pace with technological advancements and evolving threats. Resources Mentioned: Brandon Kovitz on LinkedIn Outreach website
We explore Augusta University's role in the future of cybersecurity! Rodd Arthur, Director of Cybersecurity Operations, and Owen Mullins, a dedicated cybersecurity student, give us a glimpse into the fast-paced environment of the Security Operations Center (SOC) at the Georgia Cyber Innovation and Training Center. Plus, Lynsey Steinburg and Aaron Cummings introduce us to the center's new Makerspace, explaining how it can be a creative hub for students and the community to bring their innovative ideas to life.Learn more about the Georgia Cyber Innovation and Training Center: https://www.gacybercenter.org
Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedInEpisode Title:
In our latest podcast episode featuring Jeremy Snyder, Founder & CEO of FireTail.io, we explored the evolving cybersecurity landscape and the crucial role of API security in protecting modern enterprises and IoT devices.
How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS. John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams. Impactful Moments: 00:00 – Introduction 01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS 02:30 – Overview of the SANS Cyber Defense Curriculum 03:30 – The Role of AI in Cybersecurity 05:30 – How AI is Shaping Threat Detection in SOCs 09:00 – Automation and AI: Practical Use Cases 15:00 – AI in Network Traffic Analysis 19:00 – The Future of SOC Operations with AI Links: Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/ Check out the SANS Cybersecurity Courses & Certifications: https://www.sans.org/cyber-security-courses/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
In this episode of Reimagining Cyber, host Rob Aragao is joined by Tiffany Snyder, the Deputy Chief of Cybersecurity Mission Integration at NASA. Tiffany delves into her journey from the Air National Guard to leading cybersecurity efforts at NASA, where she oversees the protection of one of the most technologically advanced organizations in the world. She highlights the unique cybersecurity challenges NASA faces, including safeguarding mission-critical systems that power space exploration and scientific discovery. Tiffany discusses the importance of collaboration across government agencies, international partners, and industry experts to strengthen NASA's cybersecurity posture.The episode covers key areas such as supply chain security, ensuring the integrity of systems that support both space and ground operations, and how NASA handles massive amounts of data securely. Tiffany also touches on the role of emerging technologies, including artificial intelligence and machine learning, in enhancing NASA's cybersecurity framework. Tune in to hear how NASA is navigating the complex landscape of cybersecurity in space and beyond.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Welcome to "To The Point Cybersecurity," the podcast where we dive deep into the most pressing issues in global cybersecurity, explore emerging threats, and discuss innovative solutions. In this episode, titled "E302 - Philippe_mixdown," our hosts Rachael Lyon and Vince Spina welcome Philippe Humeau, CEO of CrowdSec, an expert in adaptive cybersecurity measures. Philippe brings to light the evolving challenges of managing IP reputations and the complexities cybercriminals face in influencing systems globally. He critiques the traditional use of honeypots and advocates for the richer insights gained from real-world data. Philippe delves into the use of data science and deep learning to detect and block malicious IPs, emphasizing adaptive and dynamic firewall systems over static rules. Rachael and Vince guide the conversation through various intriguing topics, from the economic and logistical difficulties of mass manipulation by attackers to the importance of crowdsourcing and collaboration in defense strategies. Philippe's thoughts on AI's escalating role in cybersecurity, the need for shared intelligence, and the impactful concept of multiplayer firewalls are discussed at length. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e301
Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud Topics: What is the Defender's Advantage and why did Mandiant decide to put this out there? This is the second edition. What is different about DA-II? Why do so few defenders actually realize their Defender's Advantage? The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach? Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC? Many organizations don't seem to want to make detections at all, what do we tell them? What is this thing called “Mission Control”- it sounds really cool, can you explain it? Resources: Defender's Advantage book The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper “Threat-informed Defense Is Hard, So We Are Still Not Doing It!” blog Mandiant blog
In today's episode, we'll hear from Craig Jeffery on pentests. What are they, who performs them, and why are they vital for cyber security? Listen in to learn more.
Feds derail Raptor Train Newmark creates Volunteer Network for Civil Cyber Defense US to host global AI safety summit Thanks to today's episode sponsor, Conveyor Does the next security questionnaire that hits your inbox make you want to throw your laptop out the window? If so, don't do it. You should check out Conveyor first. Conveyor is the market-leader in instant, generative AI answers to entire security questionnaires no matter the format they are in. Yes, that's right. Upload any file like excels, word docs and even PDFs for instant processing and tackle any portal-based questionnaire with a browser extension that auto-scrolls and fills in answers for you. Try a free proof of concept today at www.conveyor.com. Get the story behind the headlines at CISOSeries.com.
Guest: Rock Lambros, CEO and founder of RockCyber [@RockCyberLLC]On LinkedIn | https://www.linkedin.com/in/rocklambros/On Twitter | https://twitter.com/rocklambros____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn a recent On Location episode recorded at Black Hat USA 2024, Sean Martin and Rock Lambros explore the prevailing topics and critical insights from the event's AI Summit. Sitting in the media room, not on the bustling show floor, the paid dissect the impact of artificial intelligence (AI) on cybersecurity, shedding light on its multifaceted implications.Rock Lambros, Founder and CEO of RockCyber, shares his observations about the predominance of AI in every corner of the conference. He notes how AI's presence is ubiquitous, even saturating advertisements at the airport. Lambros provides an overview of the AI Summit, highlighting the diversity of sessions ranging from high-level talks to vendor pitches. While some were mere product promotions, others provided substantial insights and valuable statistics, which Lambros is keen to share on platforms like LinkedIn.The discussion progresses to the remark by Nvidia's CEO, Bartley Richardson, suggesting that cyber is fundamentally a data problem, and AI could be the solution. Lambros concurs with this in part but emphasizes the necessity of maintaining human oversight in the process. Martin and Lambros reflect on the potential of AI to augment cybersecurity tasks, particularly for tier one analysts. There is a focus on leveraging AI to expedite responses to threats, potentially reducing the reaction time, which currently lags significantly behind the speed of AI-driven attacks.Lambros presents a balanced perspective, warning against the risk of reducing entry-level jobs in cybersecurity due to AI advancements, advocating instead for upskilling these professionals to handle more complex roles. The conversation touches on governance and risk management, with Lambros stressing the importance of integrating AI governance into existing frameworks without rendering AI oversight an exclusive domain for data scientists alone. He highlights the EU AI Act and Colorado AI Act as critical regulatory frameworks that emphasize this need.Lambros also brings attention to DARPA's open-source resources aimed at securing AI, encouraging practitioners to utilize these tools. Towards the end, a poignant observation from Robert Flores, former CISO of the CIA, underscores the difficulty governments face in keeping up with AI's rapid evolution. Lambros reflects on the mixed audience at the summit, a blend of technical practitioners and policy leaders, all grasping the significant impact and challenges AI brings to the field.The episode underscores the crucial balance between embracing technological advancements and maintaining human oversight and governance within cybersecurity. The insights shared by Rock Lambros and Sean Martin offer a nuanced perspective on the current state of AI in the field, emphasizing a collaborative approach to integrating these innovations responsibly.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsLevelBlue: https://itspm.ag/levelblue266f6cCoro: https://itspm.ag/coronet-30deSquareX: https://itspm.ag/sqrx-l91Britive: https://itspm.ag/britive-3fa6AppDome: https://itspm.ag/appdome-neuv____________________________Follow our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasOn YouTube:
A Note from James:Is our military way behind other countries in terms of using the latest technology with AI, with drones, with biotech, with cybersecurity? I think for many years we know we're behind on supersonic weapons. Are we behind on AI? How did Hamas send undetected a thousand or so paragliders into Israel without Israel detecting it? Are we behind on the AI that's in sensors? What is going on?So, with the help of Chris Kirchhoff, who wrote the book "Unit X: How the Pentagon and Silicon Valley are Transforming the Future of War," we answer these questions and more.Episode Description:In this episode, James Altucher hosts Christopher Kirchhoff to explore the critical question: Is the US military lagging behind in technology? They discuss the current technological shortcomings of the military, historical contexts, and how metrics of military power are evolving. Kirchhoff provides an insightful analysis of the Hamas attack as a case study to highlight technological vulnerabilities and failures. The conversation expands to cover the rise of drones, the innovative Replicator Initiative, and the crucial role of AI and machine learning in military operations. Kirchhoff shares his experiences bridging the gap between Silicon Valley and the Pentagon, offering a rare glimpse into the challenges and successes of modern military technology integration.What You'll Learn:Technological Shortcomings: Understand the areas where the US military is currently falling behind other nations in technology.Impact of Drones: Learn about the transformative role drones play in modern warfare and their potential to change military strategies.Replicator Initiative: Discover the Pentagon's innovative approach to building low-cost autonomous weapon systems.AI in Military Operations: Gain insights into how AI and machine learning are being integrated into military strategies and operations.Bridging Technology Gaps: Explore the challenges and successes of connecting Silicon Valley's rapid innovation with the Pentagon's strategic needs.Chapters:01:30 Introduction: Is the US Military Lagging in Technology?02:15 Current Technological Shortcomings03:20 Historical Context of Military Superiority03:59 Changing Metrics of Military Power06:42 Hamas Attack: A Case Study08:15 Technological Vulnerabilities and Failures10:22 US Military's Technological Lag11:42 The Rise of Drones in Modern Warfare14:52 The Replicator Initiative17:54 Bridging the Gap Between Silicon Valley and the Pentagon24:39 Challenges in Government Contracting28:35 Innovative Contracting Solutions31:17 Discovering Joby Aviation: The Future of Flying Cars32:24 Military Applications and Collaboration with Joby34:53 The Rise of Drones in Modern Warfare37:12 Rogue Squadron: The Military's First Commercial Drone Unit39:32 Anduril and the Future of Combat Collaborative Aircraft45:14 AI and Machine Learning in Military Operations51:31 Ethical Issues in Military Technology01:04:02 Strategic Stability and the Future of Warfare01:09:35 Conclusion: Bridging Silicon Valley and the MilitaryAdditional Resources:Unit X: How the Pentagon and Silicon Valley are Transforming the Future of WarJoby AviationAnduril IndustriesDefense Innovation Unit (DIU)DARPA ------------What do YOU think of the show? Head to JamesAltucherShow.com/listeners and fill out a short survey that will help us better tailor the podcast to our audience!Are you interested in getting direct answers from James about your question on a podcast? Go to JamesAltucherShow.com/AskAltucher and send in your questions to be answered on the air!------------Visit Notepd.com to read our idea lists & sign up to create your own!My new book, Skip the Line, is out! Make sure you get a copy wherever books are sold!Join the You Should Run for President 2.0 Facebook Group, where we discuss why you should run for President.I write about all my podcasts! Check out the full post and learn what I learned at jamesaltuchershow.com------------Thank you so much for listening! If you like this episode, please rate, review, and subscribe to “The James Altucher Show” wherever you get your podcasts: Apple PodcastsiHeart RadioSpotifyFollow me on social media:YouTubeTwitterFacebookLinkedIn