Podcasts about cyber division

  • 43PODCASTS
  • 50EPISODES
  • 37mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 30, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber division

Latest podcast episodes about cyber division

Washington AI Network with Tammy Haddad
29: FBI's Jonathan Lenzner and Bryan Vorndran on the bureau's approach to AI

Washington AI Network with Tammy Haddad

Play Episode Listen Later Aug 30, 2024 38:12


FBI Chief of Staff Jonathan Lenzner and Cyber Division assistant director Bryan Vorndran join host Tammy Haddad for a live interview at FBI headquarters to discuss the FBI's approach to all things AI. From combating threats from domestic and foreign nefarious actors to protecting children, senior citizens, and families against the harms of AI, Lenzner and Vorndran highlight how the nation's top investigators are working with industry to protect American innovation with the rise of AI in this new digital age.

Progress, Potential, and Possibilities
Susan Ferensic - Assistant Director, Weapons of Mass Destruction Directorate (WMDD), FBI - Science And Technology To Mitigate Threats From Chemical, Biological, Radiological, Nuclear And Explosive Weapons

Progress, Potential, and Possibilities

Play Episode Listen Later Feb 27, 2024 47:36


Susan Ferensic is Assistant Director of the Weapons of Mass Destruction Directorate (WMDD) at FBI Headquarters where her unit leads the FBI's efforts to mitigate threats from chemical, biological, radiological, nuclear, and explosive weapons. The FBI or Federal Bureau of Investigation is the domestic intelligence and security service of the United States and its principal federal law enforcement agency (https://www.fbi.gov/). Ms. Ferensic most recently served as the special agent in charge of the Columbia Field Office in South Carolina. Ms. Ferensic joined the FBI in 1997 as a computer forensic examiner in the Laboratory Division and was selected for new agent training in 2000, and then as a new agent, she was assigned to investigate criminal and national security computer intrusion matters in the Washington Field Office. In 2007, Ms. Ferensic was promoted to supervisory special agent in the Cyber Division at FBI Headquarters, where she was a program manager for criminal computer intrusion investigations. She then transferred to the Albuquerque Field Office in New Mexico in 2009 to lead the cyber and technically trained agent squad, and later she served and supervised Albuquerque's Joint Terrorism Task Force which included oversight of WMD coordinators and bomb technicians. Ms. Ferensic was promoted in 2014 to special assistant to the executive assistant director of the Science and Technology Branch at FBI Headquarters, providing advice on broad program management and administrative matters. In 2016, she was promoted to assistant special agent in charge of the Criminal Branch of the Sacramento Field Office in California. In 2018, Ms. Ferensic became section chief of the Digital Forensics and Analytics Section in the Operational Technology Division at FBI Headquarters. The next year, she was promoted to chief of staff of the Criminal, Cyber, Response, and Services Branch at FBI Headquarters. She was named special agent in charge of the Columbia Field Office in 2020. Ms. Ferensic earned a bachelor's degree in mathematics from the University of Maryland. Prior to working at the FBI, she was a computer scientist at the Department of Defense. Important Episode Links - Internet Crime Complaint Center (IC3) - https://www.ic3.gov/ FBI Electronic Tip Form - https://tips.fbi.gov/ Support the show

The Lawfare Podcast
A Conversation with Bryan Vorndran, Assistant Director of the FBI Cyber Division

The Lawfare Podcast

Play Episode Listen Later Dec 19, 2023 61:05


Bryan Vorndran is Assistant Director of the FBI's Cyber Division, a position he's held since around March 2021. Prior to that, he was the special agent in charge in New Orleans, and he's worked in Afghanistan and on the Joint Terrorism Task Force at the Washington Field Office.David Kris, Lawfare contributor and former Assistant Attorney General for the National Security Division, and Bryan Cunningham, Lawfare contributor and Executive Director of the University of California, Irvine's Cybersecurity Policy & Research Institute, sat down with Bryan to talk about his career trajectory, the FBI's top cyber challenges, the Bureau's relationships with other agencies and private sector entities, and the challenges posed by the People's Republic of China. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

GovCast
Inside Top Federal IT Issues in 2023

GovCast

Play Episode Listen Later Dec 12, 2023 23:28


GovCast had a banner year in 2023, featuring dozens of interviews with federal IT leaders, officials and experts. We take a look back at the year's work around AI, zero-trust implementation and many other issues and topics facing all IT staffs throughout government. On this year-end episode of GovCast, Managing Editor Ross Gianfortune, and Staff Writers Jayla Whitfield and Jordan McDonald as they reflect on the most memorable episodes and themes of 2023. Featured conversations include: 1:00: Brian Mazanec, Deputy Director, Office of Preparedness in the Administration for Strategic Preparedness and Response 5:15: Will Cahoe, 10x Program Communications Lead, GSA 9:00: Wayne Jacobs, Special Agent in Charge, Criminal and Cyber Division, FBI Washington Field Office 13:00: Francis O'Hearn, CIO, U.S. Mint 14:45: Melvin Brown II, Deputy CIO, Office of Personnel Management

healthsystemCIO.com
Q&A with Alan McHugh, Chief, FBI Cyber Division, Cyber Crime Tactical Intelligence Unit: “The Time to Call the FBI is Now”

healthsystemCIO.com

Play Episode Listen Later Nov 27, 2023 41:29


Most CISOs understand that one of their key phone calls after a ransomware incident will be to the FBI, but what they may not appreciate is that it shouldn't be their first to that organization. That's because the emergency call will be much more effective, and the response much more efficient, if a relationship has […] Source: Q&A with Alan McHugh, Chief, FBI Cyber Division, Cyber Crime Tactical Intelligence Unit: “The Time to Call the FBI is Now” on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

Cyber Crime Junkies
FBI vs Cyber Crime

Cyber Crime Junkies

Play Episode Listen Later Oct 11, 2023 25:08


Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the fbi and cyber crime, fbi vs cyber crime, truth about fbi vs cyber crime, how the fbi helps cyber crime victims Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.Don't miss our extension of family at blushingintrovert.com. You will look and feel good and be treated like family and know that any purchase will help a great cause as portions of all proceeds go to support mental health awareness initiatives. Women's sweatshirts, tumblers, stickers, journals, bracelets and more. All in stock. All Handmade. Ready to ship straight to your door. Support the showThank you listening! Don't miss the Video episode!Help us simply by subscribing to our YouTube Channel where you get access to all 130+ episodes and behind the scenes content. It's FREE. It helps us with the algorithm so we can bring you more content. Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg

CISO-Security Vendor Relationship Podcast
Is This Just Bad Or “Call The Feds” Bad?

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Sep 12, 2023 38:33


All links and images for this episode can be found on CISO Series. In everyday life, it's often clear when to call in the authorities. Someone egging your house might not rise to the occasion, but a break-in gets a call to the cops. It's less clear when it comes to a cyberattack. What constitutes a significant attack and what are the regulatory requirements? Once you make the call, how do they help in your response? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our special guest, David Ring, section chief at FBI, Cyber Division. Thanks to our podcast sponsor, Hunters Hunters SOC Platform is a SIEM alternative, delivering data ingestion, built-in and always up-to-date threat detection, and automating correlation and investigation processes to reduce risk, complexity, and cost for security teams. Learn more at hunters.security. In this episode: What constitutes a significant attack and what are the regulatory requirements? Once you make the call, how do they help in your response? How do you approach "skills-and competency-based" hiring? And are there certain positions for which a 4-year degree is necessary?

@BEERISAC: CPS/ICS Security Podcast Playlist
Esti Peshin VP & GM @Cyber Division IAI-ELTA on cyber in aviation state CERTs and the love of flight

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 11, 2023 56:10


Podcast: ICS Cyber Talks PodcastEpisode: Esti Peshin VP & GM @Cyber Division IAI-ELTA on cyber in aviation state CERTs and the love of flightPub date: 2023-09-07Nachshon Pincu hosts Esti Peshin, VP and General Manager of the Cyber Division at IAI-ELTA, in a conversation about cybersecurity trends, cyber aviation challenges, and protection of state critical infrastructures. What are the cyber trends and the assessments required? On AI, we hear a lot of prophecies and, unfortunately, quite a bit of disinformation. Can you please make some order for us? Cyber protection in the aviation industry came into our awareness years ago after white hacker Chris Roberts broke into airplane systems during a flight. Let's start with the challenges facing those in charge of cyber protection for civilian aircraft. The regulation in the aviation industry is very tight. In the cyber issue, what are the trends of the regulatory bodies in Europe and the USA on this issue? Elta's cyber division provides systems to manage cyber risks and alerts at the country level. What are the primary defenses between SOC at the country level and SOC for a company? From where came the passion for flight and becoming a pilot? נחשון פינקו מארח את אסתי פשין, סמנכ"לית באלתא-תעשייה אווירית ומנכ"לית חטיבת הסייבר בשיחה על מגמות אבטחת סייבר, אתגרי סייבר בתעופה והגנת סייבר ברמת מדינה מהן מגמות הסייבר העתידיות ומה היא ההערכות הנדרשות נושא האינטלגנציה המלאכותית, אנחנו שומעים הרבה נבואות זעם ולמרבה הצער גם לא מעט דיסאינפורמציה. את יכולה בבקשה לעשות לנו קצת סדר הגנת הסייבר בתעשיית התעופה הגיעה למודעות שלנו לפני שנים לאחר שההאקר הלבן כריס רוברטס פרץ למערכות מטוסים במהלך טיסה. מה הם האתגרים העומדים בפני האחראים על הגנת סייבר למטוסים אזרחיים הרגולציה בענף התעופה מאוד הדוקה ואני מניח שגם בסוגיית הסייבר, מהן המגמות של הגופים הרגולטוריים באירופה ובארה"ב בנושא זה חטיבת הסייבר של אלתא מספקת מערכות לניהול סיכוני סייבר והתראות ברמת המדינה. מה ההבדלים המרכזים בין סוק ברמת מדינה לבין סוק עבור חברה מהיכן הגיע התשוקה לטיסה ולהיות טייסתThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Geopolitics Decanted by Silverado
Why 702 is America's most valuable intelligence program: Interview with the FBI

Geopolitics Decanted by Silverado

Play Episode Listen Later Sep 7, 2023 52:09


Dmitri Alperovitch sits down with Bryan Vorndran, Assistant Director of FBI's Cyber Division, to discuss why FISA Section 702 is by far the most valuable intelligence program in the US government's arsenal and is responsible for the majority of the most valuable intelligence the country collects. In this episode, Vorndran provides some examples of 702 successes including disrupting attempted assassination plots of American officials by a foreign country and identifying the perpetrator of the Colonial Pipeline hack and recovering the paid ransom. Vorndran also highlights compliance issues that the FBI has faced with the program and what it is doing to address them going forward.

ICS Cyber Talks Podcast
Esti Peshin VP & GM @Cyber Division IAI-ELTA on cyber in aviation state CERTs and the love of flight

ICS Cyber Talks Podcast

Play Episode Listen Later Sep 7, 2023 56:10


Nachshon Pincu hosts Esti Peshin, VP and General Manager of the Cyber Division at IAI-ELTA, in a conversation about cybersecurity trends, cyber aviation challenges, and protection of state critical infrastructures. What are the cyber trends and the assessments required? On AI, we hear a lot of prophecies and, unfortunately, quite a bit of disinformation. Can you please make some order for us? Cyber protection in the aviation industry came into our awareness years ago after white hacker Chris Roberts broke into airplane systems during a flight. Let's start with the challenges facing those in charge of cyber protection for civilian aircraft. The regulation in the aviation industry is very tight. In the cyber issue, what are the trends of the regulatory bodies in Europe and the USA on this issue? Elta's cyber division provides systems to manage cyber risks and alerts at the country level. What are the primary defenses between SOC at the country level and SOC for a company? From where came the passion for flight and becoming a pilot? נחשון פינקו מארח את אסתי פשין, סמנכ"לית באלתא-תעשייה אווירית ומנכ"לית חטיבת הסייבר בשיחה על מגמות אבטחת סייבר, אתגרי סייבר בתעופה והגנת סייבר ברמת מדינה מהן מגמות הסייבר העתידיות ומה היא ההערכות הנדרשות נושא האינטלגנציה המלאכותית, אנחנו שומעים הרבה נבואות זעם ולמרבה הצער גם לא מעט דיסאינפורמציה. את יכולה בבקשה לעשות לנו קצת סדר הגנת הסייבר בתעשיית התעופה הגיעה למודעות שלנו לפני שנים לאחר שההאקר הלבן כריס רוברטס פרץ למערכות מטוסים במהלך טיסה. מה הם האתגרים העומדים בפני האחראים על הגנת סייבר למטוסים אזרחיים הרגולציה בענף התעופה מאוד הדוקה ואני מניח שגם בסוגיית הסייבר, מהן המגמות של הגופים הרגולטוריים באירופה ובארה"ב בנושא זה חטיבת הסייבר של אלתא מספקת מערכות לניהול סיכוני סייבר והתראות ברמת המדינה. מה ההבדלים המרכזים בין סוק ברמת מדינה לבין סוק עבור חברה מהיכן הגיע התשוקה לטיסה ולהיות טייסת

@BEERISAC: CPS/ICS Security Podcast Playlist
The Gate 15 Interview EP 38: Jeff Troy, President, Aviation ISAC, on public service, cybersecurity, understanding threats (and… colonizing the ocean?)

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 29, 2023 44:33


Podcast: The Gate 15 Podcast ChannelEpisode: The Gate 15 Interview EP 38: Jeff Troy, President, Aviation ISAC, on public service, cybersecurity, understanding threats (and… colonizing the ocean?)Pub date: 2023-08-28In this episode of The Gate 15 Interview, Andy Jabbour visits with Jeff Troy, President, CEO at Aviation Information Sharing and Analysis Center (A-ISAC). Over the past five years, Jeff has led the Aviation ISAC, a trust-based community focused on the sharing of threat intelligence and best practices. He has developed the strategic plans, driven the team's expansion of services and overseen extensive growth in membership. He established relationships with global regulators, industry associations and private sector companies to drive cyber risk reduction across the aviation eco-system. He co-authored a white paper on Ransomware and continues to partner with international groups on the ransomware threat. Concurrently, Jeff is on the National Defense ISAC Board of Directors. Jeff spent 25 years as a Special Agent of the FBI. He served as Chief, Cyber Division, and retired as the Deputy Assistant Director for Cyber National Security and Cyber Criminal Investigations.  ·       Jeff on LinkedIn. ·       Email:  jtroy@a-isac.com ·       Web:  a-isac.com   In the discussion we address:  ·       Serving in the FBI and ideas for young people thinking about their futures ·       Transitioning from the public sector to the private sector ·       Key ideas on how to building a successful information sharing community ·       Understanding how to think about threats ·       Responsibly and thoughtfully reducing risk and building reslience ·       Blended Threats ·       The importance of patching and baking security into technology ·       The upcoming Aviation ISAC Summit in Ireland ·       The Ocean State ·       Deep ocean colonies ·       More!   Some links from our discussion include: ·       Aviation Cybersecurity Summit, 12-14 Sep 2023 in Dublin, Ireland ·       NBC News: FBI says mastermind of botnet nabbed, 27 Jul 2010The podcast and artwork embedded on this page are from Gate 15, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Gate 15 Podcast Channel
The Gate 15 Interview EP 38: Jeff Troy, President, Aviation ISAC, on public service, cybersecurity, understanding threats (and… colonizing the ocean?)

The Gate 15 Podcast Channel

Play Episode Listen Later Aug 28, 2023 44:33


In this episode of The Gate 15 Interview, Andy Jabbour visits with Jeff Troy, President, CEO at Aviation Information Sharing and Analysis Center (A-ISAC). Over the past five years, Jeff has led the Aviation ISAC, a trust-based community focused on the sharing of threat intelligence and best practices. He has developed the strategic plans, driven the team's expansion of services and overseen extensive growth in membership. He established relationships with global regulators, industry associations and private sector companies to drive cyber risk reduction across the aviation eco-system. He co-authored a white paper on Ransomware and continues to partner with international groups on the ransomware threat. Concurrently, Jeff is on the National Defense ISAC Board of Directors. Jeff spent 25 years as a Special Agent of the FBI. He served as Chief, Cyber Division, and retired as the Deputy Assistant Director for Cyber National Security and Cyber Criminal Investigations.  ·       Jeff on LinkedIn. ·       Email:  jtroy@a-isac.com ·       Web:  a-isac.com   In the discussion we address:  ·       Serving in the FBI and ideas for young people thinking about their futures ·       Transitioning from the public sector to the private sector ·       Key ideas on how to building a successful information sharing community ·       Understanding how to think about threats ·       Responsibly and thoughtfully reducing risk and building reslience ·       Blended Threats ·       The importance of patching and baking security into technology ·       The upcoming Aviation ISAC Summit in Ireland ·       The Ocean State ·       Deep ocean colonies ·       More!   Some links from our discussion include: ·       Aviation Cybersecurity Summit, 12-14 Sep 2023 in Dublin, Ireland ·       NBC News: FBI says mastermind of botnet nabbed, 27 Jul 2010

GovCast
Season 6 Episode 15 - FBI Eyes Evolving Tech to Combat ‘Cybercrime as a Service'

GovCast

Play Episode Listen Later Jul 11, 2023 20:48


The Federal Bureau of Investigation (FBI)'s Criminal and Cyber Division in its Washington Field Office is putting itself in a position to better tackle the new cyber attack landscape that is growing evermore sophisticated with the widespread use of things like wearables and social media that threat actors are exploiting. This includes emerging threats like “cybercrime as a service.” The office's Special Agent in Charge Wayne Jacobs, whose career as a law enforcement agent includes tackling violent crime and gangs, highlights these new emerging threats, how he's prioritizing the evolving threat landscape, and how he sees technology supporting field agents to identify and track targets as well as communicate instantaneously.

Left to Our Own Devices
Esti Pesin: Flying Cyber (with Guest Host Michael Engstler)

Left to Our Own Devices

Play Episode Listen Later May 24, 2023 28:15


We sat down with Esti Peshin, VP, General Manager, Cyber Division at Israel Aerospace Industries - ELTA, and our guest host Michael Engstler, co-founder and CTO of Cybellum, to discuss what flying a plane can teach you about cybersecurity. Under Esti's management, IAI's cyber activity was expanded from a Directorate to a Division. Esti also served as the Director General of the Israeli Hi-Tech Caucus at the Knesset, the Israeli Parliament, and was a partner in multiple private equity firms. Esti is also a licensed pilot, as shown in the fantastic videos she shares on social media.

Cyber Insurance Leaders
Ep 22 - The Wonders and Perils of Global Digitalization and the Subsequent Rise of Systemic Risk - with Dan Trueman

Cyber Insurance Leaders

Play Episode Listen Later Apr 27, 2023 52:28


AXIS is a specialist in the most complex and misunderstood of all insurance sectors: cyber. In this episode, Global Head of Cyber and Technology Dan Trueman talks about how his team stays ahead of the curve with internal training, webinars and market-leading courses, and how modern claims data is helping the industry to set standards and manage risk.You'll learn:1. The impact of cyber insurer underwriting and insights on the cybersecurity industry2. How AXIS shares its expertise with internal and external training3. How the insurance industry can pin down systemic risk and create general rules of thumb4. Dan's take on war exclusions and their effect on the global cyber insurance marketAbout Dan:Dan Trueman is the Global Head of Cyber and Technology at AXIS. Dan is an experienced multi-class underwriter with expertise in Cyber, Reputational Risk, Intellectual Property, Supply Chain insurance, Political Risks, Contract Frustration, Marine Consequential loss, Marine War, Marine Hull, Piracy, Physical Damage and Energy. Prior to AXIS, Dan was the Chief Innovation Officer and Unit Head for the Cyber Division of Novae from 2014 until 2017, when the company was acquired by AXIS. Dan was previously at ANV, where he was Lead Underwriter for its Enterprise Risk Division. Prior to this he spent 10 years at Kiln, most recently as Active Underwriter of the Enterprise Risk Division of Syndicate 510.__________About AXIS:AXIS is a specialty insurer and reinsurer, focused on helping businesses navigate dynamic risks.  Our underwriters are known for their business acumen and technical expertise. Our claims teams champion customers' needs with an honest approach and quick decision-making. Website: http://www.axiscapital.com/Industry: Finance, Financial Services, InsuranceCompany size: 2,200Headquarters: Hamilton, BermudaFounded: 2001__________About the host, Anthony:Anthony is passionate about cyber insurance. He is the CEO of Asceris, a company that enables its clients to respond to cyber incidents quickly and effectively. Anthony is originally from the US but now lives in Europe with his wife and two children. Get in touch with Anthony on LinkedIn: https://www.linkedin.com/in/anthonyhess/ or email: ahess@asceris.com__________This podcast is produced by our friends at SAWOO 

The Other Side Of The Firewall
AT&T Selling Off Cyber Division

The Other Side Of The Firewall

Play Episode Listen Later Feb 27, 2023 11:24


What's up, everyone?! In this episode, Ryan and Shannon discuss AT&T's plans to sell off its cyber division in an attempt to pay off more debt. Please LISTEN

The CyberWire
Updates on the cyber phases of a hybrid war. Alleged booters busted. Progress report from the US anti-ransomware task force. Suspicion in AIIMS hack turns toward China.

The CyberWire

Play Episode Listen Later Dec 15, 2022 34:37


Trojanized Windows 10 installers are deployed against Ukraine. Alleged booters have been collared, and their sites disabled. A progress report on US anti-ransomware efforts. Suspicion in a cyberattack against India turns toward China. Bryan Vorndran from the FBI's Cyber Division talks about deep fakes. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance (NCA) on the launch of their Historically Black Colleges and Universities Career Program. And hybrid war and fissures in the underworld. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/239 Selected reading. Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government (Mandiant) Federal Prosecutors in Los Angeles and Alaska Charge 6 Defendants with Operating Websites that Offered Computer Attack Services (US Department of Justice) Global crackdown against DDoS services shuts down most popular platforms | Europol (Europol)  Readout of Second Joint Ransomware Task Force Meeting (Cybersecurity and Infrastructure Security Agency) US finds its ‘center of gravity' in the fight against ransomware (The Record by Recorded Future)  AIIMS cyber attack may have originated in China, Hong Kong (The Times of India)  AIIMS Delhi Servers Were Hacked By Chinese, Damage Contained: Sources (NDTV.com) Russia-Ukraine war reaches dark side of the internet (Al Jazeera)

SpyCast
“The FBI & Cyber” – with Cyber Division Chief Bryan Vorndran (Part 2 of 2)

SpyCast

Play Episode Listen Later Nov 29, 2022 40:18


Summary Bryan Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Bryan says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber  Weakening cyber adversaries  Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Bryan Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Bryan serves as the Assistant Director of the FBI's Cyber Division.  What changed in those 20 years to bring Bryan to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber?  Tune into this week's SpyCast episode to find out!  The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries?  And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world.  Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017)  Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015)  DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020)  The Evolving Attack Surface (2020) Primary Sources  Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021)  Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!

SpyCast
“The FBI & Cyber” – with Cyber Division Chief Bryan Vorndran (Part 1 of 2)

SpyCast

Play Episode Listen Later Nov 22, 2022 50:33


Summary Brian Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Brian says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber  Weakening cyber adversaries  Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Brian Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Brian serves as the Assistant Director of the FBI's Cyber Division.  What changed in those 20 years to bring Brian to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber?  Tune into this week's SpyCast episode to find out!  The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries?  And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world.  Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017)  Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015)  DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020)  The Evolving Attack Surface (2020) Primary Sources  Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021)  Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!

IoT: The Internet of Threats
You've been hacked. Should you call the FBI?

IoT: The Internet of Threats

Play Episode Listen Later Aug 11, 2022 21:38


On this episode of the IoT: The Internet of Threats podcast, Jeff Tricoli, Former Section Chief at the FBI's Cyber Division joins podcast host Eric Greenwald to discuss what to know about working with the FBI on cybercrime, the evolution and ethical implications of the ransomware industry, and the differences between cyberattacks from Russia and China.   Interview with Jeffrey Tricoli:    For nearly 20 years, Jeffrey Tricoli served in a variety of roles at the FBI's Cyber Division and most recently as its Sector Chief in charge of overseeing national cyber investigations. Jeff graduated from the University of Syracuse's Maxwell School with an M.P.A. in Public Policy Analysis and holds a Bachelor of Arts from Canisius College. Jeff is now a senior executive at a financial services company responsible for technology and security risk.   The FBI's Cyber division investigates and responds to malicious cyber activities that threaten the safety of the US public and the country's national and economic security.   In this interview, Eric and Jeff discuss: The different motives that drive Russian and Chinese cyberattacks How events like the war in Ukraine or trade wars with China amplify the threats of destructive cyberattacks and intellectual property theft How companies should approach their relationship with law enforcement before, during, and after a cyberattack What it's like to collaborate with the FBI when your organization faces a threat or breach The challenging ethics that businesses face when they're presented with a ransom demand to recover their data   Find Jeff on LinkedIn Jeffrey Tricoli: https://www.linkedin.com/in/jeffrey-tricoli-b5791aaa   Learn more about the FBI's efforts to combat cyber threats: https://www.fbi.gov/investigate/cyber   Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems.   If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast.   To learn more about building a robust product security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/.

The CyBUr Guy Podcast
The CyBUr Guy Podcast Ep 69: One man's FBIHQ Experience with Ed Parmalee

The CyBUr Guy Podcast

Play Episode Listen Later Apr 19, 2022 48:57


In this episode of TCG, I welcome fellow retired FBI SSA Ed Parmelee to talk about his career arc and his time at FBIHQ in both the Counterterrorism Division and the Cyber Division.  It is a great discussion on some of the ins and outs of the FBI puzzle palace. I also discuss the 2021 IC3 crime report, the threat of the week is the biggest ongoing threat for everyone, and I close up with another successful cyber conviction courtesy of the US Secret Service.  Give a listen, tell a friend. Feel free to email me at darren@thecyburguy.com or follow me at linkedin.com/in/darrenmott.  

U.S. National Privacy Legislation Podcast
64 | The FBI's Novel Approach to Eradicating Malware: Search & Seizure on Company Computers

U.S. National Privacy Legislation Podcast

Play Episode Listen Later Apr 19, 2022 48:11


This week, we are joined by three cybercrime experts, John Bandler, Scott Giordano, and John Bates, to discuss how the FBI is obtaining court orders to enter companies' computers and seize harmful malware — and take other actions — in a new approach to countering cybercrime. The FBI's Cyber Division coordinated with the UK and private companies to disrupt a two-tiered global botnet of infected devices controlled by a cybercriminal aligned with the Russian Intelligence Unit GRU. This episode's guests are: John Bandler, Founder, Bandler Law Firm PLLC John G. Bates, Manager, Ernst & Young LLP, Cybersecurity Scott M. Giordano, V.P., Corporate Privacy, and General Counsel

Pardon My American
Hunter Biden's Laptop Entered Into Congressional Record

Pardon My American

Play Episode Listen Later Mar 30, 2022 63:01


During an oversight hearing of the FBI's Cyber Division, Rep. Matt Gaetz requested for material from Hunter Biden's infamous laptop to be entered into the Congressional Record.  The request came after FBI Assistant Director of Cyber Division, Bryan Vorndran, claimed that he didn't know where Hunter's laptop was located because it "wasn't in his purview."  Gaetz also introduced legislation to strip all security clearances from the intelligence officials who claimed Hunter Biden's laptop was merely "Russian misinformation."   There are increasing reports of "imminently approaching" solar storms caused by huge eruptions on the Sun's surface.  These could cause massive disruptions in global navigation systems, pipelines, and even power grids.  We're also seeing cyber attacks on the rise, including the recent attack on the Ukraine's military major internet provider.  Something is coming - when it happens and for how long is what everyone should make plans for.   Pardon My American podcast (PMA) is an opinion-based podcast that explores local and global politics, entertainment, paranormal, and culture all while having a good laugh. They keep things lighthearted as they dive into subjects that inspire you to think and ask questions.   Support Our Sponsors ► Aura ► GhostBed   Support Our Show ► Website ► Buy Merch ► Patreon   Follow Our Show ► YouTube ► Rokfin ► Instagram ► Telegram ► Rumble

Lessons from the School of Cyber Hard Knocks
David Scott: People Are Our Most Valuable Tool

Lessons from the School of Cyber Hard Knocks

Play Episode Listen Later Mar 30, 2022 17:29


Today's guest is David Scott, Cyber Division Deputy Assistant Director at the FBI. In this episode, David discusses his time in the military to his past roles and now current role in the Cyber Division at the FBI, his current main priorities, who the FBI coordinates with to prevent cyber attacks, who the bad actors are, how he got his start in cyber, new tools and technologies in development, and as always, his toughest lesson learned.

Washington Post Live
Securing Cyberspace with Jeremy Sheridan, Dmitri Alperovitch and Tonya Ugoretz

Washington Post Live

Play Episode Listen Later Jan 13, 2022 54:06


Washington Post national security reporter Ellen Nakashima speaks with Jeremy Sheridan, the assistant director of Office of Investigations at U.S. Secret Service, Dmitri Alperovitch, the co-founder and chair of the Silverado Policy Accelerator, and Tonya Ugoretz, deputy assistant director of the Cyber Division at the F.B.I, in a series of conversations about the path forward for public and private entities to secure cyberspace.

Along Those Lines
Amid Rise in EVs, New Cybersecurity Considerations Emerge

Along Those Lines

Play Episode Listen Later Oct 19, 2021 16:22


With the influx of electric vehicles into the U.S. market, utilities—including electric cooperatives—and other interests are working to build EV infrastructure that can keep pace with the expected demand, and this growing web of connected charging stations will create a host of new cybersecurity vulnerabilities. To learn more about what those vulnerabilities are and how to mitigate them, we're joined by Shannon Murry with the FBI's Cyber Division along with NRECA's Brian Sloboda.

Along Those Lines
How Can Electric Co-ops Avoid Becoming Victims of Ransomware?

Along Those Lines

Play Episode Listen Later Oct 11, 2021 24:30


First in a two-part series for Cybersecurity Awareness Month: Ransomware became a household word earlier this year when the Colonial Pipeline, a major fuel delivery source on the East Coast, was shut down for several days after hackers attacked the company's billing system. These highly disruptive and costly network intrusions are on the rise in the United States and globally, and businesses across the spectrum are being targeted. How can electric cooperatives avoid becoming victims of this sophisticated malware? And what should they do if they are attacked? To answer those and other questions, we're joined by Ryan Newlon, NRECA's principal for cybersecurity solutions, and Dave Eisenreich, a special agent with the FBI in the Cyber Division and that group's liaison to the energy sector. Stay tuned next week for more on cybersecurity from Along Those Lines.

Smart Business Dealmakers
Cy Sturdivant, Cyber Division Director at BKD

Smart Business Dealmakers

Play Episode Listen Later Sep 17, 2021 25:21


Without a basic understanding of cybersecurity, companies can stand to lose a great deal. As BKD's Cyber Division Director Cy Sturdivant points out, companies that acquire businesses with weak defenses may see their ROI compromised as easily as systems with weak passwords. Cy offers his take on the cyberthreat environment, what cybersecurity means in practice, and just how troubling digital threats are for players in the M&A world.

The Great Conversation
The Chrysalis Mindset

The Great Conversation

Play Episode Listen Later Aug 31, 2021 36:42


Mike Mason, the former CSO of Verizon, shares the mindset he developed to lead his organization and his life. “I am not a finished product.” This conversation took place last year right before his retirement. Michael A. Mason joined Verizon Communications in January 2008 as the company's Chief Security Officer. He oversaw and coordinated global security efforts throughout Verizon and all its business units, including enterprise-wide security strategy and programs, physical security, cyber security, and law enforcement liaison and security matters. Before Verizon, he was responsible for the Criminal Branch of the FBI, to include the Criminal Division, Cyber Division, Office of International Operations and the FBI's Critical Incident Response Division and the Office of Law Enforcement Liaison. ”

RSA Conference
Fraud on the Rise! An In-Depth Look at the FBI’s 2020 Internet Crime Report

RSA Conference

Play Episode Listen Later Mar 25, 2021 24:07


The FBI’s Internet Crime Complaint Center received more than 791,000 complaints in 2020—a record number, representing a 69% increase over 2019. Join us for an in-depth discussion as we examine details of the report with FBI’s Cyber Division's Deputy Assistant Director Herb Stapleton. Speakers: Herb Stapleton, Deputy Assistant Director, Cyber Division, FBI Kacy Zurkus, Content Strategist, RSA Conference

imperfect: The Heart-Centered Leadership Podcast
Episode 79: Leading in the Prevention of Organizations from Becoming the Next Cyber Crime Victim

imperfect: The Heart-Centered Leadership Podcast

Play Episode Listen Later Mar 5, 2021 50:06


This episode is sponsored by CORE. How do you ensure emotional agility with your team? Click hereScott Augenbaum - Connect with Scott on LinkedIn!After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI's Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.Website: https://www.scotteaugenbaum.com/ This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit debcrowe.substack.com

Getting Into Infosec
Eric Strom - From Lawyer to FBI Cyber Division Unit Chief

Getting Into Infosec

Play Episode Listen Later Oct 24, 2020 44:25


Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division’s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticated criminal organizations as well as nation state actors.NotesEric has been with the FBI for 21 years, since June 1999Originally a lawyer practicing criminal defense and civil defense then went to nonprofitEarly on in the FBI, they had to do a lot of workarounds. Cyber wasn't so straightforward.56 Field offices were all doing something different, then became consolidated centrally as a service organization.Quotes"No, it's funny. None of us really had a traditional cyber background. Tom started out his career as a geologist and Keith actually started out selling like furniture. He was a salesman.""But I mean, from the legal standpoint, you've got third party liability and other things. So we really had to walk a kind of a tight rope when it came to what types of malware we were infecting ourselves with. And then how far we'd let it go.""And so as we're taking it over, it was really interesting to sit behind one of the malware analysts and watch a Wireshark and watch the instructions coming out. I crossed the wire. It was really cool. And when it really kind of sunk in, because to me it was like a tangible thing. I can actually see it happening as it was going on.""It's (cybersecurity) probably the most rewarding thing you'll ever do in your life."LinksFBI: https://www.fbi.gov/Intro Music: https://trash80.com/#/content/133/weeklybeats-2012-week5Outro Music: https://freemusicarchive.org/music/KieLoKaz/Free_Ganymed/Alte_Herren_Kielokaz_ID_364Getting Into InfosecBreaking IN: A Practical Guide to Starting a Career in Information Security: https://www.amazon.com/dp/B07N15GTPC/T-Shirts, Mugs, and more: https://gettingintoinfosec.com/shop/Stay in touch and sign up for sneak peaks, updates, and commentary: https://pages.gettingintoinfosec.com/subscribeAyman on Twitter: https://twitter.com/coffeewithayman

Cool Things Entrepreneurs Do
From FBI Agent to Entrepreneur with Scott Augenbaum

Cool Things Entrepreneurs Do

Play Episode Listen Later Oct 22, 2020 35:56


Six years ago Scott Augenbaum discovered the medium of podcasts.  The first show he ever downloaded was "Cool Things Entrepreneurs Do" (now "Making Waves at C-Level") and he was hooked.  He later reached out to the host, Thom Singer, to talk more about what he was learning.  Thom invited Scott on the show to talk about Cyber Security, and they became friends.   Over the years Scott has retired from the FBI and has become a professional speaker and author.  He reinvented himself at age 50 and is now living a new life educating people about how to stay safe online.  He gives credit to this podcast and Thom for inspiring his journey.   For episode 606 Thom has invited Scott Augenbaum back on the show to share his journey (and to talk a little bit about cyber security).     About Scott Augenbaum   After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI’s Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.   Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.   Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.   Email Scott at saugenbaum@gmail.com to get his free chapters and other handouts about cyber security.   https://www.thomsinger.com/podcast/scott-augenbaum2

Cybercrime Magazine Podcast
Ransomware Warning. Hospitals & Patients At Risk. Herb Stapleton, FBI Cyber Division Section Chief.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 12, 2020 26:11


For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF

The Weekly Defence Podcast
Germans chop helo plan, 3D AESA radar for drone detection, and grey warfare in the 21st century

The Weekly Defence Podcast

Play Episode Listen Later Oct 2, 2020 69:30


In this episode of The Weekly Defence Podcast, we talk to Blighter Surveillance Systems about 3D drone detection radar technology; we explore the concept of hybrid and grey zone warfare in an interview with QinetiQ; and we chat to our sponsor IAI about cyber security challenges facing governments in a post-Covid world.Newsround (00:45)In the Caucasus, fighting between Armenia and Azerbaijan over Nagorno-Karabakh has flared up again. The latest round of the conflict is notable for the use on the Azeri side of Bayraktar TB2 UCAVs supplied by Turkey. Meanwhile, Armenia has fired Serbian-made G2000 rockets from Grad multiple launch rocket systems at Azerbaijani positions.News in focusNews Editor Ben Vogel gives out an highlight on the capabilities on display at the Zolfaghar-99 exercise, in which Iran showcased new and existing UAVs and anti-ship missile capabilities.In a dramatic turn of events, Germany announced the cancellation of its long-running heavy-lift helicopter replacement tender.  Air Editor Tim Martin gives an expert insight on what this means for the country's air capabilities and considers the potential repercussions. Tim also reports on the results of the  national referendum held in Switzerland earlier this week, when voters decided by a slim margin to proceed with buying new fighter jets.The Netherlands  announced its intention to procure  new tracked vehicles for the Marine Corps. The platforms will be acquired under the multinational Collaborative All-Terrain Vehicle (CATV) procurement programme. Land Reporter Flavia Camargos Pereira reports.Interview- Blighter Surveillance Systems (21:14)Ben Vogel is on the line with Mark Radford, Blighter co-founder and Chief Technology Officer, to talk about the company's new 3D drone detection radar, wider C-UAS technology and industry developments.Interview – QinetiQ (42:11)Multimedia Journalist Noemi Distefano grabs a chat with QinetiQ's CTO Mike Sewart for an insight on Qinetiq's newly released report ‘Confidence in Chaos', which explores how emerging technologies can help organisations countering threats in the grey zone.Industry Voice – IAI (58:00)Shephard Media's Creative Director Tony Skinner talks to Esti Peshin, General Manager of IAI's Cyber Division, about the likely cyber security challenges facing governments in a post-COVID world.This episode was produce by Noemi Distefano, music and sound mixing by Fred Prest 

Speaking Startup
Speaking Startup: Beware the coronavirus cyberattacks

Speaking Startup

Play Episode Listen Later Jul 17, 2020 19:55


With businesses disrupted, employees working remotely and lots of people seeking the latest information about the coronavirus, the pandemic has been something of a perfect storm for cybersecurity. Since the start of the pandemic, cyberattacks have gone up by 300%, according to the FBI’s Cyber Division. On this week’s podcast we explore the roots of that increase in cyberattacks and how people can protect themselves and their information. Plus, we speak with Ann Duplessis, senior vice president at Liberty Bank, the only Black-owned bank in the state. Duplessis discusses how the bank is faring and how it supports the Black community.

RIMScast
Cybersecurity in a COVID-19 World with Luke Wilson

RIMScast

Play Episode Listen Later Jul 7, 2020 23:29


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   Even amid the COVID-19 pandemic, cybercrime is a threat that risk professionals need to keep on their risk registers. In this episode, Luke Wilson is joining RIMScast for the second time to discuss the current environment of cyber threats among the coronavirus pandemic. A lot has changed since he and Justin last spoke in October of 2019 — so there is much to discuss!   As a refresher, Luke Wilson is the Vice President of Intelligence at 4iQ. With over 15 years of working within federal law enforcement, the Department of Defense, and the intelligence community, he brings a wealth of knowledge and expertise. Previous to his role at 4iQ, Luke served as the Vice President of Business at Elliptic and also worked in the Federal Bureau of Investigation’s Cyber Division and Counterterrorism Division for over nine years.   In their discussion today, Luke Wilson outlines some of the best practices for companies, employees, and remote workers to practice good cyber hygiene; shares some of the major takeaways he has learned over the course of the pandemic; and explains how COVID-19 could be — and in some cases, is — opening the door to cyber-attacks.   Key Takeaways: [:00] About the RIMS Membership. [:50] About today’s episode! [:58] About RIMS newest available webinar and where to access RIMS on-demand webinars. [1:30] About the RIMS Coronavirus Information Center. [1:41] About today’s episode and guest, Luke Wilson. [2:05] Justin welcomes Luke Wilson back to RIMScast! [2:26] Luke explains how COVID-19 could eventually open the door to a cyber attack and how it has opened the door. [4:44] How to not be the target of a cyber attack. [5:29] Which industries and sectors have been the most vulnerable targets in the last six months? [8:48] Luke shares what he has learned over the course of this pandemic as well as some of his major takeaways. [10:08] Luke shares his thoughts regarding nation-state actors. [11:48] With a long career in cybersecurity, would Luke say that these are unprecedented times? [12:54] If there turns out to be a second wave of the coronavirus, what could companies, employees, and remote workers do to prepare and practice good cyber hygiene? [15:38] With there being so much uncertainty in the world right now, if there’s a second wave of COVID-19, what does Luke think some businesses and remote employees could do to prepare for such an event as part of their ‘cyber hygiene’? [19:54] Luke provides some parting thoughts for the global RIMScast audience. [21:39] Justin thanks Luke Wilson for joining RIMScast and highlights some of the important links to check out in today’s show notes.   Mentioned in this Episode: RIMS July 16th Webinar — Sponsored by Resolver: Developing, Defining, and Quantifying Your Risk Appetite Upcoming RIMS Webinars On-Demand Webinars RIMS Advisory Services — Ask a Peer RIMS Coronavirus Information Center RIMS Advocacy: Coronavirus Advocacy Information RM Magazine Risk Management Monitor RIMS-Certified Risk Management Professional (RIMS-CRMP) RIMS-CRMP Stories RIMS Membership — Discover why 10,000 of your peers from more than 60 countries are a part of the RIMS community! Download any episode of RIMScast. RIMScast Episode (Oct. 8th, 2019): “Luke Wilson on Virtual Currencies, Blockchain Technology, and the FinTech Industry”   Want to Learn More? Keep up with the podcast on RIMS.org and listen on iTunes. Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook and Twitter, and join the RIMS Group on LinkedIn.   Follow up with Our Guest: Luke Wilson 4iQ

Life Unplugged
Part 2: Cybersecurity For Your Family In An Online World | With Scott Augenbaum

Life Unplugged

Play Episode Listen Later Apr 13, 2020 31:45


Join James and Teri with guest Scott Augenbaum, former FBI Special Agent, who specialized in the Cyber Division and Cyber Crime Fraud Unit, as they continue their talk about real cybersecurity issues and tips we all need to know about! To Contact Scott Augenbaum:https://www.scotteaugenbaum.comRelated Resources: www.twofactorauth.orgwww.ic3.govSupport the show (http://www.thenovusproject.org/donate)

Life Unplugged
Cybersecurity For Your Family In an Online World | With Former FBI Special Agent Scott Augenbaum

Life Unplugged

Play Episode Listen Later Apr 6, 2020 31:52


Join James and Teri Craft with guest Scott Augenbaum, former FBI Special Agent, who specialized in the Cyber Division and Cyber Crime Fraud Unit, as they talk about real cybersecurity issues we all need to know about. In the first part of this 2 part series, listen in as Scott gives families the reality of what they are facing in our online world. To contact Scott Augenbaum:www.ScottEAugenbaum.comRelated Resources:www.twofactorauth.orgwww.ic3.govSupport the show (http://www.thenovusproject.org/donate)

iHeartRadio Gulf Coast Focus
MPD's Cyber Division

iHeartRadio Gulf Coast Focus

Play Episode Listen Later Dec 13, 2019 29:02


Commander Kevin Levy and Cyber Specialist Jeremiah Moody talk about the MPD's Cyber Division, and how to protect yourself from crime, both online and in the real world.

The Progressive Dentist
Gone Phishing: Cybercrime in Small and Midsized Businesses, with John Iannarelli

The Progressive Dentist

Play Episode Listen Later Oct 30, 2019 18:34


John G. Iannarelli retired from the FBI after more than 20 years of service, during which time he was a member of the FBI SWAT Team and participated in the investigations of the Oklahoma City Bombing, the 9/11 attack, the shooting of Congresswoman Gabrielle Giffords and the Sony Hack. Among his many FBI assignments, John previously served in Washington, D.C. as the FBI National Spokesperson and later a member of the Executive Staff of the FBI's Cyber Division. He was a Squad Supervisor before becoming the Assistant Special Agent in charge of the FBI's Phoenix Division, the number two position overseeing all criminal, cyber and counterintelligence investigations throughout Arizona. During his FBI tenure, John was also the recipient of the FBI Director's Distinguished Service Award, for which he was selected from the ranks of the Bureau's 35,000 employees. A former San Diego Police Officer and a graduate of the University of San Diego School of Law and international studies at Oxford, England, John is also an attorney admitted to the practice of law in California, Maryland and the District of Columbia. In addition, John is the recipient of an Honorary Doctorate of Computer Science in recognition of his contributions to the field of cyber investigations. An engaging and entertaining speaker, John is the author of four books, including Why Teens Fail and What to Fix, a parents' guide to protecting their children from Internet predators and other dangers, Information Governance Security about how businesses can protect their important information from loss or compromise and How to Spot A Terrorist Before It's Too Late, a guide to help people recognize and prevent terrorism before it can occur. His soon to be released fifth book, Disorderly Conduct, examines the lighter side of law enforcement and the humorous moments working for the FBI. John is a frequent on-air contributor for the Fox News Channel and other national media, to include having provided live on-scene coverage from Las Vegas of the Mandalay Bay shooting as it occurred. John is now a highly sought-after keynote speaker, known for sharing his intriguing insights combined with his sense of humor. He has presented to numerous Fortune 500 companies, domestic and international audiences, the United Nations, and the Vatican, where he has personally met on several occasions with Pope Francis. What You Will Learn: Best practices for keeping your IT infrastructure safe from criminals Common hacker techniques for breaching your security Phishing, spyware, malware, and what they do The best methods for educating your employees about cybercrime How to practice preventative cybersecurity measures through the hiring process Which businesses are at the highest risk for cybercrime The risks of wire transfers and how to conduct them safely Ransomware and how to protect your servers in the medical field How to contact John Iannarelli Website: www.FBIJohn.com Twitter: @FBIJohn LinkedIn: //www.linkedin.com/in/fbijohn?trk=author_mini-profile_title

The PR Maven Podcast
Episode 59: John Iannarelli, FBI Agent

The PR Maven Podcast

Play Episode Listen Later Oct 8, 2019 42:45


About the guest:   John Iannarelli retired from the FBI after more than 20 years of service, during which time he was a member of the FBI SWAT team and participated in the investigations of the Oklahoma City bombing, the 9/11 attack, and Congresswoman Gabrielle Giffords' shooting. Among his many FBI assignments, John previously served in Washington, D.C. as the FBI national spokesperson and later on the executive staff of the FBI's Cyber Division. He was a squad supervisor before becoming the assistant special agent in charge of the FBI's Phoenix Division, the number two position overseeing all criminal, cyber and counter-intelligence investigations throughout Arizona. During his FBI tenure, John was also the recipient of the FBI Director's Distinguished Service Award, for which he was selected from the ranks of the Bureau's 35,000 employees.  A former San Diego police officer and a graduate of the University of San Diego School of Law and international studies at Oxford, England, John is also an attorney admitted to the practice of law in California, Maryland and the District of Columbia. In addition, John is the recipient of an Honorary Doctorate of Computer Science in recognition of his contributions to the field of cyber investigations.  An energetic and entertaining speaker, John is the author of four books, including Why Teens Fail and What to Fix, a parents' guide to protecting their children from internet predators and other dangers, Information Governance Security about how businesses can protect their important information from loss or compromise and How to Spot A Terrorist Before It's Too Late, a guide to help people recognize and prevent terrorism before it can occur. His soon-to-be-released fifth book, Disorderly Conduct, examines the lighter side of law enforcement and the humorous moments during John's FBI career.   John is a frequent on-air contributor for the national news media, including the Fox News Channel and CNN and provided live on-scene coverage from Las Vegas of the Mandalay Bay shooting as it occurred. John is now a highly sought-after keynote speaker, known for sharing his intriguing insights combined with his sense of humor. He has presented to numerous Fortune 500 companies, domestic and international audiences, the United Nations, and the Vatican, where he has personally met on several occasions with Pope Francis.     In the episode:    3:51 – John explains how his career started as a police officer in San Diego before being recruited into the FBI.   5:03 – If he had it to do over, John would have joined the cyber squad in the FBI right when it was created, rather than waiting a few years.    7:43 – John says he uses social media mainly to share when he is being featured on a news program, which brings his follower's attention to the news channel and creates a mutually beneficial cycle.  8:59 – John talks about evolving with technology and the times.   11:48 – John shares that he is using new techniques every day, such as specific targeting.    13:14 – Nancy asks John if he does speaking engagements on staying safe on social media.   14:26 – John shares his top tip for staying safe on social media.    15:56 – John explains how he has set himself apart from others providing a similar service as he does.    23:02 – John says that he travels all over the U.S. and the world for speaking engagements on cyber security, including being invited to the Vatican for a personal meeting with Pope Francis.   25:55 – John provides his website and Twitter handle, urging listeners to follow him for daily tips on how to keep yourself safe.   27:10 – Some measurements John uses include social media comments, number of followers and simply the fact that he is earning a living.   28:39 – John says that, without a doubt, he has grown his network intentionally.   29:56 – John's network has helped to advance his career by sharing word of mouth with other people who might benefit from his message.    31:51 – John shares that you have to stay current, which he does by making a point to learn something new every day.   33:13 – John suggests setting a Google alert for whatever interests you so you can stay on the cutting edge.   37:39 – John shares that there is a lot of competition, but there are a lot of clients, too, so as long as you are providing quality services or products you should go after your dreams.   39:27 – John shares one parting thought.     Quote:          " Don't worry about getting your slice of the pie, worry about making it a bigger pie. There is work for everyone as long as you're providing something of quality that people want to have. So go after it.” — John Iannarelli, FBI Agent             Links:         Website: fbijohn.com   How To Spot A Terrorist: Before It's Too Late by John Iannarelli  Information Governance and Security: Protecting and Managing Your Company's Proprietary Information by John Iannarelli and Michael O'Shaughnessy   W.T.F.: Why Teens Fail - What to Fix by John Iannarelli and nine others   The eighty thieves: American P.O.W.s in World War II Japan by Anthony Iannarelli     Looking to connect:          Email: John@FBIJohn.com   LinkedIn:  www.linkedin.com/in/fbijohn   Twitter: @FBIJohn 

RIMScast
Luke Wilson on Virtual Currencies, Blockchain Technology, and the FinTech Industry

RIMScast

Play Episode Listen Later Oct 8, 2019 22:27


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   Today’s topic is virtual currencies, blockchain technology, and the FinTech industry. This episode will be an introduction to these concepts and help you determine if implementing these new technologies are right for you and your organization.   Joining Justin today to discuss these topics is guest Luke Wilson! Luke is the Vice President of Intelligence at 4iQ. With over 15 years of working within federal law enforcement, the Department of Defense, and the intelligence community, he brings a wealth of knowledge and expertise. Previous to his role at 4iQ, Luke served as the Vice President of Business at Elliptic and also worked in the Federal Bureau of Investigation’s Cyber Division and Counterterrorism Division for over nine years.   With Luke’s deep understanding of currency and blockchain technology, he gives his insights on the upsides and downsides to virtual currencies and blockchain technology. He explains some of the ways that businesses use blockchain technology, some of the challenges that companies face when implementing blockchain, and some of the ways that businesses have illicitly used virtual currency — both wittingly and unwittingly.   Key Takeaways: [:13] About today’s episode. [:26] About upcoming RIMS events! [1:09] More about today’s topic and guest, Luke Wilson. [1:51] Justin welcomes Luke to RIMScast. [1:56] When in Luke’s career did blockchain first show up? [3:45] Did Luke find there was criminal activity behind it? [4:25] Was Luke shocked to find that something so new was already being exploited and used for criminal activity? [5:45] What are some of the ways that businesses have illicitly used virtual currency — wittingly or unwittingly? [8:17] Why should businesses use blockchain technology? [10:05] What are the challenges that most companies will experience when implementing blockchain? [12:49] What has Luke’s experience been with risk professionals and risk managers? [15:00] The key business risks in using blockchain technology. [17:14] Since the field is still new, would Luke suggest that companies do their research before talking to someone who claims to be an “expert?” [18:24] Based on Luke’s experience, how does the National Cyber Security Awareness Month tie into the booming industry that is virtual currency and blockchain technology? [21:02] Justin thanks Luke for joining RIMScast. [21:21] About the show notes links.   Mentioned in this Episode: Register here for the RIMS ERM Conference 2019 and enter code ANDERSON2019 to receive 10% off! (Nov. 4th–5th in New Orleans, LA) RIMS Risk Forum India 2019 (Nov. 22nd in Mumbai, India)RIMS RiskTech Forum 2019 (Dec. 9th in New York City) Upcoming RIMS Events RM Magazine Risk Management Monitor RIMS-Certified Risk Management Professional (RIMS-CRMP) RIMS Membership — Discover why 10,000 of your peers from more than 60 countries are a part of the RIMS community! Luke Wilson 4iQ Elliptic Ethereum Monero National Cyber Security Awareness Month   Want to Learn More? Keep up with the podcast on RIMS.org and listen on iTunes. Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook and Twitter, and join the RIMS Group on LinkedIn.   Follow up with Our Guest: Luke Wilson’s Profile on 4iQ

a16z
16 Minutes on the News #9: All the Recent Phone Hacks

a16z

Play Episode Listen Later Sep 23, 2019 19:51


This is episode #9 of our news show, 16 Minutes, where we quickly cover recent headlines of the week, the a16z way -- why they’re in the news; why they matter from our vantage point in tech -- and share our experts’ views on the trends involved.This week we do a short but deep dive to tease apart the FUD from the facts on all the phone hacks of late (also, arguably, one of the worst years on record for certain device manufacturers) -- given the following news:Just this week, the FBI’s Cyber Division released a notification to private industry on “Cyber Criminals Use Social Engineering and Technical Attacks to Circumvent Multi-Factor Authentication”;Last week, a telecom security firm reported a vulnerability called “Simjacker” where SMS containing spyware-like code "takes over" a phone's SIM card in order to retrieve and perform sensitive commands, regardless of platform or device;Over the past month, Google and Apple have been going back and forth over a post the former released, “A very deep dive into iOS Exploit chains found in the wild”, where a small collection of hacked websites were using iPhone zero-day vulnerabilities to target China's Uyghur Muslim community (though Google is not the one who revealed the specific websites, Apple did confirm it in their response a week later) -- what do we make of this exchange; of the fact that zero-day hacks are now more expensive on Android than on Apple; and of Apple's ethos when it comes to a third-party ecosystem for security?Finally, how should we think about phone authentication overall when it comes to security, and what can we do to secure ourselves? Our a16z experts -- general partner Martin Casado and former chief security officer/ operating partner for security Joel de la Garza -- share their thoughts on all this and more with host Sonal Chokshi, in this episode of 16 Minutes.---The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation.This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments for which the issuer has not provided permission for a16z to disclose publicly as well as unannounced investments in publicly traded digital assets) is available at a16z.com/investments.Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see a16z.com/disclosures for additional important information.

16 Minutes News by a16z
All the Recent Phone Hacks (#9)

16 Minutes News by a16z

Play Episode Listen Later Sep 22, 2019 19:51


This is episode #9 of our news show, 16 Minutes, where we quickly cover recent headlines of the week, the a16z way -- why they’re in the news; why they matter from our vantage point in tech -- and share our experts’ views on the trends involved.This week we do a short but deep dive to tease apart the FUD from the facts on all the phone hacks of late (also, arguably, one of the worst years on record for certain device manufacturers) -- given the following news:Just this week, the FBI’s Cyber Division released a notification to private industry on “Cyber Criminals Use Social Engineering and Technical Attacks to Circumvent Multi-Factor Authentication”;Last week, a telecom security firm reported a vulnerability called “Simjacker” where SMS containing spyware-like code "takes over" a phone's SIM card in order to retrieve and perform sensitive commands, regardless of platform or device;Over the past month, Google and Apple have been going back and forth over a post the former released, “A very deep dive into iOS Exploit chains found in the wild”, where a small collection of hacked websites were using iPhone zero-day vulnerabilities to target China's Uyghur Muslim community (though Google is not the one who revealed the specific websites, Apple did confirm it in their response a week later) -- what do we make of this exchange; of the fact that zero-day hacks are now more expensive on Android than on Apple; and of Apple's ethos when it comes to a third-party ecosystem for security?Finally, how should we think about phone authentication overall when it comes to security, and what can we do to secure ourselves? Our a16z experts -- general partner Martin Casado and former chief security officer/ operating partner for security Joel de la Garza -- share their thoughts on all this and more with host Sonal Chokshi, in this episode of 16 Minutes.---The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation.This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments for which the issuer has not provided permission for a16z to disclose publicly as well as unannounced investments in publicly traded digital assets) is available at a16z.com/investments.Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see a16z.com/disclosures for additional important information.

FBI Retired Case File Review
Episode 169: Scott Augenbaum – Secrets of Cyber Security

FBI Retired Case File Review

Play Episode Listen Later Jun 5, 2019 68:30


Retired agent Scott Augenbaum served in the FBI for nearly 30 years, six as a support employee and 24 as a special agent. His first agent assignment was the Syracuse Division where he became the “cyber guy” working, almost exclusively, computer crime cases. In this episode of FBI Retired Case File Review, Scott reviews several cybercrime cases, and provides several cyber security tips that he learned during his FBI career that will, hopefully, protect you from cybercriminals stealing your stuff. During his FBI career, Scott Augenbaum was promoted to the Cyber Division, Cyber Crime Fraud Unit, at FBI headquarters and was responsible for managing the FBI’s Cyber Task Force Program, and Intellectual Property Rights Program. He was later transferred to the Memphis Division, where he helped launch the FBI’s first local Computer Intrusion/Counterintelligence squad. During the last ten years of Scott Augenbaum’s FBI career, he provided more than one thousand cybercrime threat briefings to corporations and other public groups to educate the community on emerging computer intrusion threats and how to avoid becoming the victim of a data breach. After retiring from the Bureau, Scott launched Hero Publishing, a company devoted to educating the public about the dangers of cybercrimes and published The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime. You can learn more about Scott Augenbaum by visiting his website scottaugenbaum,com. Join my Reader Team to get the FBI Reading Resource - Books about the FBI, written by FBI agents, the 20 clichés about the FBI Reality Checklist, and keep up to date on the FBI in books, TV, and movies via my monthly email. Join here.   Jerri Williams, a retired FBI agent, author and podcaster, attempts to relive her glory days by writing crime fiction about greed and hosting FBI Retired Case File Review, a true crime/history podcast. Her novels—Pay To Play and Greedy Givers—inspired by actual true crime FBI cases, feature temptation, corruption, and redemption, and are available on Amazon.   

Way of the Renaissance Man Starring Jim Woods
FBI Counterterrorism Expert John Iannerelli Shoots the Breeze with the Renaissance Man

Way of the Renaissance Man Starring Jim Woods

Play Episode Listen Later Nov 7, 2018 17:05


Personal preparedness is a Renaissance Man's obligation to himself and those he loves to protect and keep them safe. John Iannarelli, Retired FBI Special Agent Executive engages Jim with thought-provoking conversation at FreedomFest about the importance of being prepared, the value of achievement, and how to spot a terrorist. Welcome to the Way the Renaissance Man podcast. This is a show about ideas, personal empowerment, and celebrating the rational life. Our goal is to help each other discover the tools needed to better focus our minds, integrate our thoughts with actions, and live the lives we really want with your host Jim Woods. Who's On: Today's Guest is an FBI Special Agent Executive (Ret.), author of the book How To Spot A Terrorist: Before It's Too Late and FOX News contributor John Iannarelli. John retired from the FBI after more than 20 years of service, during which time he was a member of the FBI SWAT Team and participated in the investigations of the Oklahoma City Bombing, the 9/11 attack, and Congresswoman Gabrielle Giffords’ shooting. Among his many FBI assignments, John previously served in Washington, D.C. as the FBI National Spokesperson and later on the Executive Staff of the FBI’s Cyber Division. He was a Squad Supervisor before becoming the Assistant Special Agent in Charge of the FBI’s Phoenix Division, the number two position overseeing all Criminal, Cyber and Counter Intelligence investigations throughout Arizona. During his FBI tenure, John was also the recipient of the FBI Director’s Distinguished Service Award, for which he was selected from the ranks of the Bureau’s 35,000 employees. What's Discussed: Why preparedness for unlikely scenarios and insurance have in common What the FBI looks for as suspicious activity before a catastrophic event like terrorism What it was like a Ground Zero during the Las Vegas shooting rampage What steps John took to fulfill his childhood dream What John means when he says, "I've never learned anything by doing it right." And much more... Learn More with Links: John Iannarelli's Website: johniannarelli.com/   Jim Woods Resources:  Successful Investing Intelligence Report Fast Money Alert JimWoodsInvesting.com   Tags: John Iannarelli, FBI, Special Agent, terrorism, cyber security, cybersecurity, investing, inflation, market crash, foreign currencies, precious metals, gold, silver, platinum, palladium, rare coins, jim woods, successful investing, renaissance man

FBI Retired Case File Review
Episode 030: Shawn Henry – Cybercrime, Computer Intrusion

FBI Retired Case File Review

Play Episode Listen Later Aug 12, 2016 47:24


Retired agent Shawn Henry served in the FBI for 24 years. When he left the Bureau in 2012, he was overseeing all criminal and cyber investigations worldwide as an Executive Assistant Director (EAD). In this episode of FBI Retired Case File Review, Shawn Henry is interviewed about cybercrime, the global computer intrusion threat and cyber security. During his career, Shawn held multiple positions relating to cybercrime and computer intrusions, including Deputy Assistant Director and Assistant Director of the Cyber Division at FBI Headquarters; Supervisor of the FBI Cyber Crime Squad in Baltimore; and Chief of the Computer Investigations Unit within the FBI-led National Infrastructure Protection Center. He managed computer crime investigations spanning the globe, including denial-of-service attacks, bank and corporate breaches, and state-sponsored computer intrusions. Currently, Shawn is the president of CrowdStrike Services and leads a team of cybersecurity professionals who investigate and mitigate targeted attacks on computer networks.

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 54:41


As one of the pioneers of partnerships for the FBI, Dan Larkin of the FBI’s Cyber Division will outline how the FBI has taken this concept from rhetoric to reality over the past 5 years. This presentation will explore how the mantra "make it personal" has aided the FBI in forging exceptional alliances with key stake holders from industry, academia and law enforcement both domestically and abroad. This presentation will also outline how such collaborations have helped to proactively advance the fight against an increasingly international and organized, cyber crime threat. Dan Larkin became unit chief of the Internet Crime Complaint Center (IC3), which is a join initiative between the FBI and the National White Collar Crime Center (NW3C) in January 2003. Before that he was a supervisory special agent (SSA) in the White Collar Crime area for ten years. In that capacity he supervised and coordinated numerous joint agency initiatives on both regional and national levels involving corruption and fraud associated with a variety of federal, state, and local agencies. SSA Larkin acted as the congressional investigative team leader in the "Operation Illwind" Pentagon scandal corruption investigation. The combined effort of this team led to record settlements and convictions involving numerous top defense contractors, as well as public officials. Prior to his current assignment UC Larkin developed and supervised the High Tech Crimes Task Force in Western Pennsylvania, one of the first such initiatives in the United States. UC Larkin also developed a national initiative known as the National Cyber Forensics and Training Alliance (NCFTA) This progressive initiative maximizes overlapping public/private sector resources, in identifying and proactively targeting escalating cyber-crime perpetrators both domestically and abroad. This project also serves to attract a perpetual stream of key Subject Matter Experts (SME's) from industry, government and academia, creating a dynamic cyber-nerve-center, for tactical and proactive response, forensics and vulnerability analysis, and the development of advanced training. UC Larkin also co-authored the FBI’s re-organization plan in 2002 which established Cyber Crime as a top priority, and underscored the need for additional Public/Private Alliances in combating priority cyber crimes word-wide."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 54:41


"As one of the pioneers of partnerships for the FBI, Dan Larkin of the FBI’s Cyber Division will outline how the FBI has taken this concept from rhetoric to reality over the past 5 years. This presentation will explore how the mantra make it "personal" has aided the FBI in forging exceptional alliances with key stake holders from industry, academia and law enforcement both domestically and abroad. This presentation will also outline how such collaborations have helped to proactively advance the fight against an increasingly international and organized, cyber crime threat. Dan Larkin became unit chief of the Internet Crime Complaint Center (IC3), which is a join initiative between the FBI and the National White Collar Crime Center (NW3C) in January 2003. Before that he was a supervisory special agent (SSA) in the White Collar Crime area for ten years. In that capacity he supervised and coordinated numerous joint agency initiatives on both regional and national levels involving corruption and fraud associated with a variety of federal, state, and local agencies. SSA Larkin acted as the congressional investigative team leader in the "Operation Illwind" Pentagon scandal corruption investigation. The combined effort of this team led to record settlements and convictions involving numerous top defense contractors, as well as public officials. Prior to his current assignment UC Larkin developed and supervised the High Tech Crimes Task Force in Western Pennsylvania, one of the first such initiatives in the United States. UC Larkin also developed a national initiative known as the National Cyber Forensics and Training Alliance (NCFTA) This progressive initiative maximizes overlapping public/private sector resources, in identifying and proactively targeting escalating cyber-crime perpetrators both domestically and abroad. This project also serves to attract a perpetual stream of key Subject Matter Experts (SME's) from industry, government and academia, creating a dynamic cyber-nerve-center, for tactical and proactive response, forensics and vulnerability analysis, and the development of advanced training. UC Larkin also co-authored the FBI’s re-organization plan in 2002 which established Cyber Crime as a top priority, and underscored the need for additional Public/Private Alliances in combating priority cyber crimes word-wide."