POPULARITY
Katie Bochnowski is the Senior Vice President of Customer Success & Services at NowSecure. Katie shares her journey from studying cyber forensics at Purdue University to becoming an expert in mobile app security and forensics. She discusses the impactful work her team does in securing mobile apps, especially in the medtech industry. Katie also offers valuable advice on building relationships within organizations, the importance of security best practices, and staying curious as a professional. Guest links: https://www.linkedin.com/in/katiestrzempka/ | https://www.nowsecure.com/ Charity supported: Save the Children Interested in being a guest on the show or have feedback to share? Email us at theleadingdifference@velentium.com. PRODUCTION CREDITS Host & Editor: Lindsey Dinneen Producer: Velentium Medical EPISODE TRANSCRIPT Episode 070 - Katie Bochnowski [00:00:00] Lindsey Dinneen: Hi, I'm Lindsey and I'm talking with MedTech industry leaders on how they change lives for a better world. [00:00:09] Diane Bouis: The inventions and technologies are fascinating and so are the people who work with them. [00:00:15] Frank Jaskulke: There was a period of time where I realized, fundamentally, my job was to go hang out with really smart people that are saving lives and then do work that would help them save more lives. [00:00:28] Diane Bouis: I got into the business to save lives and it is incredibly motivating to work with people who are in that same business, saving or improving lives. [00:00:38] Duane Mancini: What better industry than where I get to wake up every day and just save people's lives. [00:00:42] Lindsey Dinneen: These are extraordinary people doing extraordinary work, and this is The Leading Difference. Hello, and welcome back to another episode of The Leading Difference podcast. I'm your host, Lindsey, and today I am absolutely delighted to introduce you to my guest, Katie Bochnowski. Katie is Senior Vice President of Customer Success and Services at NowSecure co-author of the book, "iPhone and iOS Forensics," and a recognized expert in mobile forensics and app security testing. Katie holds a master's in Cyber Forensics and Bachelor's of Science and Computer Technology from Purdue University. In her current role, Katie oversees customer support, onboarding and success departments, as well as the mobile AppSec Professional Services Organization that is responsible for pen testing, training, and consulting. All right. Well, welcome. Thank you so much for being here. I'm so delighted to speak with you today. [00:01:37] Katie Bochnowski: Awesome. I'm really happy to be here. [00:01:39] Lindsey Dinneen: Excellent. Well, I would love, if you wouldn't mind just starting off by telling us a little bit about yourself, your background, and what led you to medtech. [00:01:48] Katie Bochnowski: Awesome. Sure. So, I'm Katie Bochnowski. I work for a company called NowSecure. My background, dating back many years to school is in computer technology and more specifically cyber forensics. Where I am now is mobile app security. How I got into that industry is, is really from that forensic background. Our company used to do data recovery and forensic investigations on mobile devices, and we kind of quickly realized that mobile apps are storing a lot of data. So we shifted into proactively working with organizations to secure those apps that reside on devices. And in terms of medtech, obviously you can probably make that connection, but we began working closely with first, companies that really care about the data that's being stored, and transmitted on those apps, which absolutely includes medtech industry. [00:02:43] Lindsey Dinneen: Awesome. Okay, so going back a little bit. So when you were first deciding on college paths and career paths and all those lovely things, what drew you to where you ended up? [00:02:55] Katie Bochnowski: You know, I don't have a great, like "aha" moment for this question. It was just one of those things. I grew up, I had a computer in my house. I did Typing Tutor when I was really young on MS Dos, and I just always en enjoyed that. I had a friend in high school and we both got interested in making our own website with HTML. So, it was just enjoying being around computers and also tinkering to figure out what was wrong with something from a technology perspective. Purdue is where I attended. Purdue had a more generic computer technology degree that I didn't have to know exactly what I wanted to do. You could try different paths, so that's kind of what got me into it. It's not like I knew I wanted to do that my whole life, but I never really went back or questioned it. I always just kind of enjoyed it along the way. [00:03:45] Lindsey Dinneen: Yeah. Excellent. Okay, so the phrase cyber forensics is just exciting. So, can you dive a little bit more into exactly what that means and entails and what it looks like? [00:03:57] Katie Bochnowski: Yeah, absolutely. So, it is exciting- -so much so, in fact, that my senior year of college, the very first time they offered this class, it was called Cyber Forensics, it was an elective and it sounded amazing. And, it was amazing. It was really cool. We went through from start to finish, how you collect evidence from a computer and technology perspective, how you keep it pristine, how you collect the data off of it. We even got to work with local law enforcement as part of an internship to do all that, so I was very lucky in that my very last semester of my four years, they offered this and I just really, really liked it. It always was there in the back of my mind. So yeah, cyber forensics is really the collective of all things digital, which is everything, now. I don't do, necessarily, that work anymore, but I can't even imagine all of the data collection off of Alexas and, and all of those devices. But yeah, that's, that's kind of how I got into that. [00:04:56] Lindsey Dinneen: Wow, that's really cool. Yeah. So, okay, so talking about this data collection and all of these things, I'm curious, what are maybe one or two things that just really surprised you when you started getting into the industry and doing the work? [00:05:11] Katie Bochnowski: I know people always said this, and it shouldn't have been a surprise, but when I first started working for NowSecure-- which was actually called Via Forensics back in the day when I first started-- we worked on a lot of individual cases, so people saying, " Can you recover my deleted text messages, and pictures..." and things like that, and the amount of data that really does reside on those devices still after you delete them, going back months, years. So, I don't know if that's still the case now. I don't know if they do a better job of that, but that was surprising to us. What was also surprising was how much apps are storing and transmitting data on those devices when you don't think about it. So a lot of these cases that we would work on, they would focus so much on voicemails, emails, photos, and text messages, but nobody ever said, "Hey, can you go check the Facebook app or the Messenger app you're using?" That was something we realized pretty quickly, and were shocked to see-- this was 15 years ago-- how many apps were storing incredibly sensitive information on those devices. [00:06:20] Lindsey Dinneen: Yeah. And so now that there's more awareness of this and people are maybe, hopefully taking a little bit more ownership of even their own awareness and education with all of it, what do you see are the changes and shifts towards better protection? [00:06:38] Katie Bochnowski: Yeah. Great question. So there's a couple things: One, people are more aware, so they are leveraging the best practices really for these things. So there's places you should and shouldn't store data on devices, and you should use encryption for sensitive information and encryption that can't easily be broken into. The platforms themselves, too--Android, iOS-- have also made improvements in protecting those sandboxes. But, it's not everything, so you absolutely still have to be mindful of that. A lot of organizations like medtech companies and financial organizations do add a lot of those extra protections. But a lot of people don't, still. They're not either, don't think about it as much or aren't aware of it. And then the other thing that we see is everyone could have, you know, a hundred percent perfect intentions in storing and protecting that data, but you make a mistake, or you accidentally leave a debug flag on or something like that, where this information still can be accessed even though developers and security organizations are following the best practices there. [00:07:51] Lindsey Dinneen: Hmm. Yeah. So as you look toward the future of device security in general and cybersecurity, what are you looking forward to in terms of improvements, and hope for the future? Because I know there's a lot of things to worry about, just in life. But, what are some of the things that you're hopeful about? [00:08:11] Katie Bochnowski: Yeah. I'm hopeful for the--I'm going to call it the camaraderie--we're seeing between security and development groups. Not that there was argument or debate between them before-- there probably was a little bit-- but we are seeing a lot more organizations have what they refer to as a Security Champions Program, which brings those groups together. Security used to be seen, and probably in a lot of cases still, is seen as that blocker. Developers are being rushed and pushed to release features quickly. They have deadlines, timelines, and then if security finds an issue, it has to go back to the drawing board to remediate. But, with these programs, we're seeing either a development group that has a security champion there, or just teams kind of melding together a little bit more to build that testing earlier on. That's a trend we're seeing increase more and more. And, I believe that's going to only continue because it's just the right thing to do for everyone all around. [00:09:12] Lindsey Dinneen: Yeah, and that collaboration piece is so critical to eventual success, or hopefully even shorter-term success, like said, so that there's not as many iterations. It's like, "No, let's just integrate and do this from the start well together." Yeah. [00:09:27] Katie Bochnowski: Yep. [00:09:27] Lindsey Dinneen: Cool. Okay, so, you started with NowSecure, and then eventually you got your first medtech client. Could you talk about that experience? [00:09:36] Katie Bochnowski: Yeah, absolutely. Actually, before I even started with NowSecure, I worked for a Fortune 100 company in their security department doing firewall rule management. And, it was all good and everything, but I remember thinking throughout my career, I'm the type of person that likes to do things meaningful, making an impact on people. So, for many years, I was like, "Okay, what am I doing? I'm just executing firewall rules, I'm recovering data..." That's why the forensic work was so appealing to me because you were actually helping assist with investigations that mattered. Then, getting into the mobile app security industry was certainly important, but it took it to a whole new level for me when we got our first medtech client. I remember going on site and seeing some of the things that the apps can do in conjunction with medical devices, implants, et cetera, and thinking, "If you get this wrong, this can impact a human life." That helped bring all of this to a whole new level, and it's something I talk about internally within our organization as well to help people understand how meaningful it is --what we do, what the medtech industry does, and how important it is to get security right. It's just helped me with a new perspective. I love working with our medtech industry clients. It's contagious to be around them and see how much they care about what they do, and, how important it is to their lives --makes an impact on the way I work as well, then. [00:11:06] Lindsey Dinneen: Yeah, I love that. I think that's so true. I get so inspired by even just talking with these incredible founders, their devices and their heart behind why they're doing what they're doing. It's not an easy road so choosing to do so, and then hearing that passion is what drives them sometimes in those crazy late nights, early mornings, hassle in between, you know? So you started getting medtech clients, and now you've developed a niche offering for that group. I'm wondering, what are some of the common themes that you see companies maybe aren't aware to consider when they're starting their development of their devices and apps? And, perhaps just some general advice: What should people be on the lookout for? [00:11:50] Katie Bochnowski: Yeah, so I guess you-- I shouldn't say unique, but specific to organizations like medtech industry or, financial or healthcare and the apps they build-- is that highly sensitive information. And so I guess my advice and the thing I would point out that I see in those types of applications is not only, of course, best security practices and understanding what's unique in mobile is super important because web apps have been developed for many, many years. Mobile apps now have been many years, but people don't necessarily know that it is unique in the way that they are developed and the different attack surface, right? You have the local device attack surface. You have the attack surface of other apps that could be malicious that are installed on that device. So, understanding what those mobile unique security best practices are is my number one piece of advice for developers. Number two would then be multiple layers of security protection. So, developing a secure app is one part of it, and a very important part of it. What we see is a lot of organizations sometimes are dependent on either the protections of the device OS itself--the Android OS protections or iOS protections. And, there are tools out there that offer protections like tamper detection: If you detect the app is being tampered with, don't launch it. If you detect the app is installed on an exploited, rooted, jailbroken device, don't launch it. Or, don't allow login. Those are important, but those can be bypassed and so I say multiple layers of protection. I'm not against those protections. I think they're very important. I think you should do them, but you should also assume in some cases they can be bypassed, and you need to have that foundational security in the way you develop your applications. [00:13:48] Lindsey Dinneen: Yeah. So, you've had a really interesting career so far, and I'm sure you've seen a lot of things over the years. What are some moments that really stand out to you, especially with your medtech clients, as, as hitting home that, "Wow, I am in the right place at the right time, making an impact." [00:14:09] Katie Bochnowski: I think it's hard because it's not like there's one single moment. Because what you want to avoid in this industry is a breach, is something like this "oh my gosh," this big negative moment. And so honestly, it's seeing the organizations we work with, not having that happen. When you do see a breach that might be mobile-specific, I immediately jump in and see, "Okay, what happened? How did they exploit this? What was the actual vulnerability that led to this?" We check for that, and we help our customers test for that and knowing, "Okay, whew. They're covered." And we see that kind of stuff all the time. So I don't have, necessarily, a big moment, but I do have those moments along the way where it's like, you see something in the news, and you are not surprised by the way that was exploited. It's something that is foundational to mobile app security, and you know your customers are protected. [00:15:09] Lindsey Dinneen: Yeah. Well, that's a really good reminder in general because sometimes you get those big, crazy, sort of in-your-face moments that are going, "Yes, okay, I know why I'm here." But then, those don't happen all that much, usually. So having those little encouragements along the way of, "No, you're on the right path, you're doing the right things is incredibly... [00:15:30] Katie Bochnowski: It's funny; it actually reminds me of sometimes we'll work with customers and they'll use our products or services--and, they'll be upset because we haven't found anything in a certain amount of time. Seriously. And they're like, "You must not be testing enough" or " You haven't found anything high risk in six months." Sometimes, we have to remind them that's good. "Green is good," is what we always say. "Green is good." And, of course you want to check and make sure you're doing everything, in depth as possible. But, if you do a full two-week pen test and nothing big is found, that's good. You're doing a great job. So, take the win. Green is good. [00:16:07] Lindsey Dinneen: Green is good. I love it. Words to live by. You have had a really interesting trajectory even through NowSecure, but throughout your career and you've stepped into different kinds of leadership roles. I'm wondering how has that evolution been for you as a leader? What are some of your key takeaways that you've discovered work really well, and maybe some lessons learned? [00:16:29] Katie Bochnowski: Yeah, so I was not the person coming out of college that said, "I want to get my MBA, I want to be a CEO, I want to be, you know, high up in an organization." I just knew I liked computer technology, I liked tinkering--that kind of stuff. So I wanted to do things that were interesting. Via forensics, and now, NowSecure really was amazing for me because I got to do all of that. I got to grow with the company. I was really the first employee with the co-founder here, and as the company grew, I naturally started developing the managerial and the leadership roles as we hired more people and got more clients. So for me, I learned on the job, along the way, and when I think about it, I see people that are very ambitious to be a manager and, that's okay too. The best leaders that I've seen have been leaders that have naturally and organically developed a mutual respect, trust, and collaboration with their teams, seeing them as partners and peers and not someone to delegate things to in an authoritative way. And that's not just necessarily from a managerial perspective, because I see individual contributors, on my team for example, that exhibit amazing leadership skills, developing those relationships with other departments. And when you do that, you get-- I don't mean this in the way it's gonna sound, but you get people to do things for you because they want to, because they want to support you. And so that's what I always like to focus on is, just building those relationships, having empathy for other people. And, of course there's delegation that comes with that, but when you do that, then they want to do that for you or for the organization because you've, you've built that foundation. [00:18:20] Lindsey Dinneen: Yes. That's great advice. I really appreciate that. There were several things in there that, stood out to me. One of them was your comment about even individual contributors can be leaders, so even if you are not technically in a managerial role, or you don't have anyone working underneath you at the moment, doesn't mean you can't develop those skill sets and lead yourself and lead your own direction. So I think that's a really important note. And, something to give a little bit of perhaps inspiration, too. So if you want to be in that leadership role at some point, but you're not there yet, doesn't mean you can't build the skills along the way. [00:18:54] Katie Bochnowski: Yeah, absolutely. And I think about, I, I have heard people in the past say, "Oh, I can't go ask them to do something. I don't have the authority to do that." I hear that a lot. " I'm not their manager. I can't tell them to do that." And then there's people that don't even think that way, and just build that relationship and get others to collaborate and work with them. Those are the natural leaders that managers are going to see and want to promote to be the next manager. Right? So, if I'm gonna give another piece of advice, it would say, never say, "I don't have the authority, or I don't have the power to do that." Or "It's above my pay grade" is something that I'm like, "Oh, don't say that," because nothing is. You just need to learn to work with others to figure out how to do that. [00:19:41] Lindsey Dinneen: Yeah, and I think you're absolutely right about relationship building and collaboration being such a key to success in general. I mean, I think about all of the opportunities that are created and these sort of magical, what feel like magical, synergistic moments that happen, but they're not magical. They're because of intentionally cultivating these relationships. So yeah, I love that. And then helping people come up alongside you. So that's actually a concept I'd love to hear about your experience, either as a mentor or mentee, or anything like that that you've experienced that has really been inspirational to you. [00:20:18] Katie Bochnowski: Yeah. Well, I guess I have maybe two examples. I had someone that was working on my team many years ago and, again, we worked very closely as, I saw him as a partner and he got to a place basically at the organization where I would always tell him, "We could switch jobs, and you could do this and I could report to you and it doesn't matter," because I saw him grow that quickly. And he is now in another position that's probably double my pay and I don't know. But that's... you want to see that. And, some people might be threatened by that, but you shouldn't be, if you are doing the right thing because you want to see people grow into those roles. I don't know if this directly answers your question, but there is a leader who's a CEO of another organization who I have always looked up to, and I just see this is exactly how she leads. You know, everybody respects her. Everybody wants to support her and her mission at her company. Even when you're not working at her company like me, you just see the way she leads and the way she has built relationships throughout all of the employees in her organization. It's just something that I aspire to. [00:21:27] Lindsey Dinneen: Yeah, absolutely. And sometimes it's really helpful 'cause you'll get your share of... well I think most people at least have had the experience of getting their share of people in leadership roles that they would maybe not wish to emulate. So getting to be inspired by the people who are doing it correctly is is lovely. Yeah. Yeah. I love that. What is your number one, if you could boil it down, piece of advice for ordinary folks who are looking to up their own security game and just be more aware. [00:22:04] Katie Bochnowski: Be curious; don't wait for someone to show you or teach you how to do something. Part of what I oversee is managing a group of mobile app pen testers, and the best pen testers that I've seen are not the ones that have tons of experience or skill. It's actually, we've had two interns come straight out of school, come in and just dive into things without being asked, and just go figure it out and learn. And so be curious. Go try online exams and labs, even if you have no clue what you're doing, just try it, research and figure it out, and be curious. And I guess that's my biggest thing. [00:22:45] Lindsey Dinneen: I love it. Yeah. Curiosity gets you far in life. Yeah. I love that. Okay, so pivoting the conversation a little bit, just for fun. Imagine that you were to be offered a million dollars to teach a masterclass on anything you want. It doesn't have to be in your industry, but it could be. What would you choose to teach? [00:23:07] Katie Bochnowski: Okay, this might take a nerdy turn. [00:23:11] Lindsey Dinneen: Excellent. [00:23:12] Katie Bochnowski: And I would need a lot of education or somebody else who's an expert in this to actually teach the class. But, I've personally gotten really interested the last couple years into brain health, neuroplasticity, managing stress, and the importance of it. And, this is from a personal situation that I went through and not really understanding how just everyday, little stressors--I never saw myself as a highly stressed person. I was actually quite the opposite--but, when you internalize a lot of, just like I said, everyday stressors, doesn't have to be anything big-- arguing with my daughter every morning to get dressed before school has an impact on your body and your brain health. And it started having physical symptoms in me that got scary, right? I don't need to dive into that, but from that, it helped me in meeting with a bunch of health experts and learning that what an impact your brain health really has on you. So if I could go back and teach some of the exercises that I was given--super simple things like these little games on your app that just help work different areas of your brain that you don't normally work. When you get into a routine at work, and every morning you wake up, send your kid to school, sit down at your desk, do the same meetings, emails, you have the same routine every day--you don't have, just a change in your routine, or try new hobbies, things like that, then your brain doesn't grow and, and that affects your health, and your mood, and all of that. I've just learned so much about that, and I remember getting to a point where I was like, "Why isn't this a class, a required class, in high school, college, and beyond. It should be part of onboarding at every job. So I guess that's my answer. I don't think I'm quite qualified to teach it, but I'd love to attend it. [00:25:14] Lindsey Dinneen: There you go. You can facilitate it. How about that? [00:25:16] Katie Bochnowski: Yeah. [00:25:17] Lindsey Dinneen: Excellent. Excellent. Yeah, and how do you wish to be remembered after you leave this world? [00:25:24] Katie Bochnowski: Oh, this is the hard one for me. I think it's probably a cliche answer, but just, you know, caring for others, doing things for others, being kind-- just being a good person... [00:25:38] Lindsey Dinneen: Yeah. [00:25:38] Katie Bochnowski: ...is really all I want. [00:25:40] Lindsey Dinneen: Yeah. Very nice. And then final question. What is one thing that makes you smile every time you see or think about it? [00:25:50] Katie Bochnowski: Oh, this is also gonna be probably a common answer--my daughter, my daughter, who is six, going on 16, very much a teenager, but I remember a friend of mine telling me 'cause I remember asking her, when your child grows up, isn't it so sad that, oh, they're no longer a baby, they're no longer one, like to see them grow up. And she said, "Well, maybe a little bit. Each stage is something so new that you're so proud of, of what they've developed and grown that you don't even really think about that." Oh, and it's so true. It's just seeing her read and seeing her-- she's going to be a future leader. I guarantee it. [00:26:27] Lindsey Dinneen: Yay! [00:26:28] Katie Bochnowski: Just the way I've seen her, and so just seeing that, that pride overcomes any kind of, oh, I miss that one. But, of course, I still miss her when she was a baby. But, yeah, so that makes me smile. That and yoga! [00:26:42] Lindsey Dinneen: Yes. Yoga is so wonderful. I mean. Yeah. And speaking of ways to help de-stress, calm down a bit. Yeah. [00:26:51] Katie Bochnowski: It has helped me dramatically, for sure. So... [00:26:53] Lindsey Dinneen: Excellent. Excellent. Well, it has been a true pleasure and honor to have you here today, Katie. So thank you so much for spending a little bit of time, and we are so honored to be making a donation on your behalf as a thank you for your time today to Save the Children, which works to end the cycle of poverty by ensuring communities have the resources to provide children with a healthy, educational, and safe environment. So thank you so much for choosing that charity to support, and also thank you for continuing to work to change lives for a better world. We're grateful, and I wish you the most amazing continued success. [00:27:33] Katie Bochnowski: Thank you for having me. This was awesome. I appreciate it. [00:27:37] Lindsey Dinneen: Awesome. And yeah. Thank you also to our listeners for tuning in, and if you're feeling as inspired as I am right now, I'd love it if you shared an episode with a colleague or two, and we'll catch you next time. [00:27:52] Dan Purvis: The Leading Difference is brought to you by Velentium Medical. Velentium Medical is a full service CDMO, serving medtech clients worldwide to securely design, manufacture, and test class two and class three medical devices. Velentium Medical's four units include research and development-- pairing electronic and mechanical design, embedded firmware, mobile app development, and cloud systems with the human factor studies and systems engineering necessary to streamline medical device regulatory approval; contract manufacturing-- building medical products at the prototype, clinical, and commercial levels in the US, as well as in low cost regions in 1345 certified and FDA registered Class VII clean rooms; cybersecurity-- generating the 12 cybersecurity design artifacts required for FDA submission; and automated test systems, assuring that every device produced is exactly the same as the device that was approved. Visit VelentiumMedical.com to explore how we can work together to change lives for a better world.
Welcome back to another episode of Forcepoint's "To The Point Cybersecurity Podcast." This week, hosts Rachael Lyon and Jonathan Knepher continue their conversation with Dr. Josh Brunty, professor of Cyber Forensics and Cybersecurity at Marshall University and head coach of the U.S. Cyber Team for the U.S. Cyber Games. In part two of this insightful series, Josh shares his expert perspective on the evolving role of digital forensics and incident response in today's cybersecurity landscape, drawing from recent headline-making breaches like the F5 incident. Together, they explore the challenges organizations face in identifying lingering threats and discuss why proactive incident response is critical for all sectors—not just law enforcement. The conversation takes a deep dive into cyber education, debating whether our academic institutions are keeping pace with industry needs and what steps can bridge the workforce skills gap. Josh also reveals what it's like to lead and nurture some of the brightest young cyber talent in America, and how early investment in education and hands-on experience can shape the future of cybersecurity. If you're curious about the latest thinking on cyber forensics, practical incident response strategies, and the future pipeline of cyber talent, you won't want to miss this episode. Stay tuned for a lively and forward-looking discussion that'll leave you inspired and more informed about the ever-changing world of cybersecurity. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e356
Welcome to this week's episode of Forcepoint's “To the Point Cybersecurity Podcast.” Hosts Rachael Lyon and Jonathan Knepher are joined by Dr. Josh Brunty, Professor of Cyber Forensics and Cybersecurity at Marshall University and the head coach of the U.S. Cyber Team for the U.S. Cyber Games. Together, they dive into the latest trends in cybersecurity education, the evolving demands of the cyber workforce, and how hands-on competitions prepare the next generation of talent for real-world cyber challenges. Dr. Brunty shares his journey from industry practitioner to academic trailblazer, his perspective on building forward-thinking curriculum, and the rise of specialization among cyber students. The conversation highlights the innovative strategies powering the U.S. Cyber Team's international success—including the role of AI and automation in competition—and discusses pathways into cybersecurity for young talent, with or without a college degree. Plus, hear inspiring stories about the entrepreneurial spirit flourishing among these future cyber leaders. Whether you're a student, a parent, or a cybersecurity professional, this episode is packed with insights on how to succeed and thrive in the fast-changing world of cyber. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e355
Recorded Live at Marshall University In Recognition of Domestic Violence Awareness MonthIn this special episode, recorded live at Marshall University, Branches Domestic Violence Shelter joins forces with Marshall's Title IX Office and the Violence Prevention & Response Program for a thought-provoking panel and podcast discussion: “Privacy and Power: The Role of Tech in Relationships.”Technology touches nearly every part of our lives—and our relationships are no exception. This conversation explores how technology can both empower and endanger, especially in the context of intimate partner violence. Our panelists examine the evolving role of privacy, control, and digital safety in modern relationships, and share practical tools for promoting healthy, respectful use of technology.Panelists:Jodie Penrod, Chief Information Officer, Marshall UniversityJessica Donahue Rhodes, Esq., Title IX Coordinator, Marshall UniversityJustin Clevenger, Marshall University Alum in Cyber Forensics & SecurityModerated by: Sara Blevins O'Toole, Director of Development, Branches Domestic Violence ShelterRecorded: October 14, 2025 Location: Shawkey Dining Room, Marshall University Student Center
Enjoying the content? Let us know your feedback!This week episode, we dive into one of the most fascinating aspects of digital investigations: Windows forensic artifacts.It does not matter who you are: a security professional, an aspiring investigator, or simply curious about how experts uncover the digital breadcrumbs left on your computer, this episode will walk you through the essential pieces of evidence, known as _forensic artifacts_.We'll dip our hand into that Shellbags...wait what bags? I heard you say, Don't worry we will break down those complex terms, discuss real-world cases, and provide you with an in-depth understanding of artifacts like Shellbags, Prefetch files, and more. Before we go any futher, we will review one top trending security news, this week... and that is: Microsoft NTLM Zero Won't get fixed until April 2025!- https://blog.0patch.com: NTLM Hash Disclosure Vulnerability (0day) - https://www.splunk.com: Cyber Forensics- https://www.coursera.org: Digital Forensics ConceptsBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.
Podcast: ICS Cyber Talks PodcastEpisode: Adv. Rami Tamam & Jack Altal, leaders of the Cyber Forensics MBA @Ono AC, about managers and cyberPub date: 2024-07-03עולם הסייבר הולך ומתרחב, יותר ויותר רגולציות ונושאים בהם נדרשים מנהלים לקחת החלטות שיהיו להן השפעות לטווח ארוך, איך מתמודדים ומה צריך לעשות על מנת לוודא שננקטו הצעדים הנכונים? נחשון פינקו מארח את עו"ד רמי תמם וג'קי אלטל מובילי תוכנית לתואר שני בסייבר פורנזיקה בקריה האקדמית אונו, בשיחה על הצורך והחשיבות של מנהלים להבין סייבר גם אם זה לא מרכז עיסוקם. The cyber-world is expanding, more and more regulations and issues require managers to make decisions that will have long-term effects. How do you cope, and what should be done to ensure that the proper steps have been taken? Nachshon Pincu hosts attorney Rami Tamm and Jackie Altal, leaders of a master's degree program in cyber forensics at the Ono Academic College, in a conversation about the need and importance of managers to understand cyber even if it is not their focus.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
עולם הסייבר הולך ומתרחב, יותר ויותר רגולציות ונושאים בהם נדרשים מנהלים לקחת החלטות שיהיו להן השפעות לטווח ארוך, איך מתמודדים ומה צריך לעשות על מנת לוודא שננקטו הצעדים הנכונים? נחשון פינקו מארח את עו"ד רמי תמם וג'קי אלטל מובילי תוכנית לתואר שני בסייבר פורנזיקה בקריה האקדמית אונו, בשיחה על הצורך והחשיבות של מנהלים להבין סייבר גם אם זה לא מרכז עיסוקם. The cyber-world is expanding, more and more regulations and issues require managers to make decisions that will have long-term effects. How do you cope, and what should be done to ensure that the proper steps have been taken? Nachshon Pincu hosts attorney Rami Tamm and Jackie Altal, leaders of a master's degree program in cyber forensics at the Ono Academic College, in a conversation about the need and importance of managers to understand cyber even if it is not their focus.
“The speed at which this happens is faster than anything we've seen before.”In this episode, Seize & Desist host Aidan Larkin is joined by Jarod Koopman, the Executive Director of Cyber and Forensic Services at IRS Criminal Investigations.As the only federal law enforcement agency to focus completely on fighting financial crimes, IRS Criminal Investigations has seized more digital assets than any other agency in the world. Aidan and Jarod discuss the secret to IRS-CI's status as a world leader in digital currency investigations, the reliability of blockchain analytics data in court and the lasting impact of asset seizures on criminal behaviour.Jarod shares his thoughts on the legitimacy of cryptocurrency transactions, the necessary compliance guidelines, and the parallels between Brazilian jiu-jitsu and cryptocurrency investigations.Timestamps01:00 - IRS's Expertise in Cybercrime and Asset Seizures05:30 - Unveiling the Success Behind Major Investigations07:00 - Revolutionizing Transactional Analysis with Blockchain Tools11:30 - Collaborative Innovation in Cybercrime Investigations13:30 - Evaluating FATF's Effectiveness in Asset Recovery16:00 - Balancing Privacy and Crime Prevention19:30 - Explaining Cryptocurrency Mixers and Blockchain Laundering20:00 - Legitimate Uses of Cryptocurrency Amongst the Illicit Activity25:30 - The Impact of Asset Seizure in Fighting Crime30:00 - Law Enforcement and the Evolving Digital Landscape33:00 - Fostering Resilience and Innovation36:00 - Why Martial Arts Promotes Success in the Investigative Services41:00 - Civil Forfeiture in Asset Recovery44:00 - Validating Blockchain Analytics in Legal JudgmentsResources Mentioned:Jarod on the TRM Talks PodcastSamourai Wallet Founders Arrested and Charged With Money Laundering IRS Criminal Investigations on LinkedIn About our Guest:Jarod Koopman is the Executive Director of Cyber and Forensic Services at IRS Criminal Investigations and a black belt in Brazillian Jiu-Jitsu.He joined the IRS directly after college, rising through the ranks to become the agency's first director of cybercrime. In this role, Jarod oversees all global operations involving cyber and forensic activities, including policy, procedures, budget and investigative services. He also oversees the operation of their new centralised Advanced Collaboration and Data Center (ACDC) which specialises in training and support for crypto compliance.DisclaimerOur podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material.The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.
Podcast: ICS Cyber Talks PodcastEpisode: Danit Leybovich-Shati Founder @Alpha Forensics DE & “Why cyber!?” Podcaster on Cyber Forensics valuePub date: 2024-05-08פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Cyber Talks PodcastEpisode: Danit Leybovich-Shati Founder @Alpha Forensics DE & “Why cyber!?” Podcaster on Cyber Forensics valuePub date: 2024-05-08פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.
“Blockchain analytics firms only capture a floor of illicit activity, not the ceiling” In this insightful episode of "Seize & Desist," Aidan Larkin hosts cybersecurity expert Carole House for a rich discussion on the complexities of digital assets, cryptocurrency, and the pressing issue of ransomware. As a veteran in the field, Carole shares her unique perspective on the growth of crypto-related crime and the importance of debunking myths surrounding illicit finance statistics.Carole and Aidan navigate through the thorny subject of quantifying illicit activities within the blockchain, how misinformation about these metrics can undermine efforts in combating crime, and the role of regulatory institutions like FinCEN.Stay tuned for Part 2, where the duo address the persistent underestimation of cyber threats posed by state-sponsored actors such as North Korea, and the challenges inherent in our existing countermeasures against the sophisticated use of cryptocurrency in ransomware-as-a-service models.Timestamps2 | Carole's major role in public sector policy in crypto and background 13 | Blockchain analytics firms only capture a floor of illicit activity, not the ceiling20 | The effectiveness of regulations in combating crypto-related crimes 26 | The ongoing debate of surveillance tools and a decentralised crypto society 31 | Lack of regulation and industry responsibility internationally 35 | Info sharing and other lessons from cybersecurity Resources Mentioned:Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes (UNODC 2-5% stat source)Congressional Hearing: Crypto Crime in Context Part II: Examining Approaches to Combat Illicit ActivityCounter-ransomware initiative (International Counter Ransomware Initiative (CRI) -)Book: Investigating Cryptocurrencies (by Nick Furneaux)Book: Currency Cold War (by David Birch)Podcast: The Lazarus Heist (by Geoff White) About our Guest:Carole House is a cybersecurity and risk management specialist with a background in U.S. military intelligence.Throughout her decorated career, she has held several senior positions in the government, including Senior Cyber and Emerging Tech Policy Officer at the US Treasury; Head of Virtual Assets at FinCen and Director of Cybersecurity and Secure Digital Innovation at the White House. In these roles, she spearheaded initiatives to strengthen digital infrastructure and counter cyber-enabled national security threats.Carole currently serves as the Executive in Residence at Terranet Ventures, where she advises start-ups and non-profits on strategies to protect against emerging cyber threats.DisclaimerOur podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material.The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.
Today Kevin and Laura speak with David Adeoye Abodunrin about cyber threat intelligence, compliance versus cyber security and human firewalls. We get into a debate about Zuckerburg vs. Musk, being a prince and much more!With a remarkable track record spanning over two decades, David Adeoye Abodunrin PMP, CSM, CSPO, CSP-SM, MSC is a distinguished authority in Project/Program Management, Agile Transformations, Human Capital Management, Cybersecurity, and Coaching, offering a multifaceted approach to personal and professional and enterprise growth. Holding a plethora of certifications, including being a Certified Scrum Professional- Scrum Master(CSP-SM), Certified Management Consultant (CMC) and Project Management Professional (PMP), he stands as a versatile figure equipped to navigate complex landscapes.Armed with a master's degree in Cybersecurity and specialization in Cyber Forensics and Threat Intelligence, David illuminates strategies to combat cyber threats, safeguard digital ecosystems, and address the nuances of cyberwarfare. His insights resonate with individuals and organizations seeking to fortify their online security measures.David's Agile PM, HR and Corporate leadership acumen sets him apart. By harmonizing his psychology, coaching, project management, and agile expertise, he empowers organizations to embrace agility in their enterprise practices, fostering leadership excellence. His holistic approach extends beyond conventional methodologies, enabling businesses to navigate dynamic environments with adaptability and innovation.
In this episode of "Know and Grow your Value," we sit down with the incredible David Adeoye Abodunrin directly from the UK to unravel the layers of effective communication.Devid after his MBA-Hult International Business School and specialization in MSc-Cybersecurity,Cyber Forensics &Threat Intelligence dedicate his carrer in PMO, Program & Project Management, Agile Coaching & Transformations and Organizational & HR Futurism also getting the Award Winning Coach. Join us as David shares his unique insights and experiences, offering practical tips on how to navigate conversations with finesse. From the power of empathy to the art of asking thoughtful questions, each moment is a valuable lesson in enhancing your communication skills. Discover the keys to building stronger connections, both personally and professionally, and gain a deeper understanding of the dynamics that shape meaningful dialogues. Whether you're a seasoned communicator or just starting your journey, this episode promises to be a source of inspiration and actionable wisdom. Tune in and embark on a transformative exploration of communication with "Dialogue Dynamics: Insights on Effective Communication with David Adeoye Abodunrin."Get in contact with David on Linkedin:https://www.linkedin.com/in/abodunrinadeoyedavid/Follow me on my social media and connect via email:nicolino.camarda@gmail.comSupport the showFollow me on Facebookhttps://www.facebook.com/personalgrowthpodcast?mibextid=ZbWKwL
The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre's journey, from the Anoka County Sheriff's Office, through the Illinois Attorney General's Office, to the state of Minnesota, provides fascinating insights into a career in stopping cyber-crime. Andre also recounts his time managing a digital forensics laboratory, shedding light on the intricate balance between risk and technology in the digital landscape. He shares stories about investigating arson cases, using phone evidence to reveal the diversity of online predators. His anecdotes provide a sobering perspective on the challenges and rewards of a career in cyber forensics. Finally, Andre breaks down the reality of the cyber security field beyond what you see in TV and film. His experiences range from putting together reports for the courtroom, dealing with data breaches and ransomware, to handling HR investigations. The conversation takes a darker tone as we address the chilling reality of online predators while Andre provides valuable advice on ways to keep children safe online.
In questo episodio parliamo di un Manuale dedicato alle investigazioni digitali e ai cybercrimes.
In the face of cyber threats, how do nations & organisations safeguard personal data & secure the digital systems we rely on? In this episode, host David Karsten is joined by Dr Nickson Karie, a cybersecurity and forensics expert to discuss the looming threat of cyberattacks, the potential impacts of cyberwarfare on a nation, and what we can all do to keep our information safe in cyberspace.What is cyberwarfare? [00:57]The future of cyber-defence and AI [06:23]The likelihood of a catastrophic cyberattack [09:20]What inspires Dr Karie [20:20]Learn moreCurtin Institute for Data Science (Formerly Curtin Centre for Computation)Bachelor of Science (Cyber Security)Connect with our guestsDr Nickson M KarieDr Karie is an accomplished cybersecurity and forensics professional with more than ten years of academic teaching and research. He is currently a Senior Lecturer in Cybersecurity and Forensics at Curtin University.Dr Karie uses his cybersecurity and forensics skills and knowledge to contribute to the technological advances happening in different industries. He believes that security is not only a fundamental part of our daily life but also key to the future of our globaldigital economy.Dr Karie graduated from the University of Pretoria, South Africa in 2016 with a PhD in Computer Science. His research interests are in cloud forensics, critical infrastructure security, cybersecurity, digital forensics, incident handling and intrusion detection,IoT forensics, and mobile forensics. Join Curtin UniversityThis podcast is brought to you by Curtin University. Curtin is a global university known for its commitment to making positive change happen through high-impact research, strong industry partnerships and practical teaching.Work with usStudy a research degreeStart postgraduate educationGot any questions, or suggestions for future topics?Email thefutureof@curtin.edu.auSocial mediaTwitterFacebookInstagramYouTubeLinkedInTranscriptRead the transcriptBehind the scenesHost: David KarstenContent creator: Alex FootProducer and Recordist: Emilia JolakoskaSocial Media: Amy HoskingExecutive Producers: Anita ShoreFirst Nations AcknowledgementCurtin University acknowledges the traditional owners of the land on which Curtin Perth is located, the Whadjuk people of the Nyungar Nation, and on Curtin Kalgoorlie, the Wongutha people of the North-Eastern Goldfields; and the First Nations peoples on all Curtin locations.MusicOKAY by 13ounce Creative Commons — Attribution-ShareAlike 3.0 Unported — CC BY-SA 3.0 Music promoted by Audio Library.Curtin University supports academic freedom of speech. The views expressed in The Future Of podcast may not reflect those of Curtin University.
TW/CW: Su*cideIn April of 2009, Boston police detectives were hot on the trail of a killer who had robbed women at gunpoint before. He was escalating and they needed to stop him, but with very few forensic clues, they faced a brick wall...until they discovered that the killer found his victim on Craigslist. They had to use cyber forensics to trace his digital steps to catch him before he could kill again. But how did cyber forensics start? With a man named Clifford Stoll at the Berkley Lawrence Lab in California in 1986 when he noticed that some money, seventy five cents to be precise, was missing from the accounting system. Following clues left by the 'thief' he uncovered actual espionage and is the reason we have cyber forensics today! Discord, merch, Tarot readings, star charts, patreon, kofi and much more right here: https://linktr.ee/cruelteaContact Lillian: lillianasterios@icloud.com (for questions, tarot readings, art commissions and more!)Do you own a small business? Would you like for us to feature your business on our podcast? Please contact Lillian for more information!It's Lil and Merris's TEN YEAR ANNIVERSARY! Show some love (if you can, of course
Welcome to the daily304 – your window into Wonderful, Almost Heaven, West Virginia. Today is Wednesday, May 24 Did you know the Appalachian Trail runs through two parts of WV? Tourism has the scoop, along with what to see and do while you're hiking…learn more about Marshall's cyber forensics and security program…and grab your kilts for the WV Wild and Wonderful Celtic Festival and Highlands Games next month…on today's daily304. #1 – From WV TOURISM – Stretching from Georgia to Maine, the Appalachian Trail spans through 14 states and leads hikers alongside 2,200 miles of rugged terrain surrounded by astounding beauty all the way. Completing the trail is a daunting task and takes an average of 4 to 6 months to complete. However, The Mountain State is the perfect place for those looking to explore a portion of this nationally known wonder. The historic town of Harpers Ferry is home to four miles of the Appalachian Trail as well as the conservancy – the trail's headquarters. Stop by the Visitor's Center to pick up resources such as guides and maps, shop souvenirs and learn more about the perfect day-hikes available. A portion of this famous footpath also weaves in and out of southern West Virginia for about 20 miles along the Virginia border in Monroe County. The trail can be accessed along the crest of Peters Mountain by hiking up Groundhog Trail from Sugar Camp Farm. Learn more: https://wvtourism.com/how-to-hike-the-appalachian-trail-in-west-virginia/ #2 – From MARSHALL UNIVERSITY – Looking for an interesting and rewarding career? The Cyber Forensics and Security program at Marshall University gives a well-rounded learning experience that provides students with the best of both cyber forensics and the cyber security world. Students will gain hands-on experience with forensic collection techniques and evidence processing and be exposed to the world of testifying from the forensics aspect of the curriculum, while the security side provides students with the tools they need to do network analysis and defense, penetration testing, and open-source intelligence. The CFS program aims to provide students with a 50/50 split across the two fields to create the “Swiss Army Knife” student post-graduation. The Cyber Forensics and Security program actively seeks to create lasting collaborative efforts between Marshall and outside organizations, whether that be non-profits, private organizations, or local/state/federal agencies. Our collaboration efforts thus far have provided our students with access to high-end virtual cyber ranges, opportunities to support investigations worldwide, and funding for research and assistantships. Learn more: https://www.marshall.edu/cfs/prospective-students/ #3 – From WBOY-TV – The West Virginia Wild and Wonderful Celtic Festival and Highland Games is set to kick off June 17 for the first time at 4H Camp Pioneer in Beverly. Clan Ferguson is carrying on the tradition to educate and share the Scottish and Celtic heritage along with its traditions, values, and qualities from the past relating to the history of Celtic heritage found in the state. The festival will feature Highland Games that will be sanctioned by the Mid-Atlantic Scottish Athletics. “Young or old, Celtic or not, the festival is quite enjoyable for anybody, especially people of Celtic heritage. If they have some kind of lineage they can go to the clan tents, they can probably do some research on their ancestry and heritage,” Timothy Ferguson, President of the WV Wild and Wonderful Celtic Festival said. “The highland games is a great thing to witness, it is a very serious competition.” Read more: https://www.wboy.com/news/harrison/wv-wild-and-wonderful-celtic-festival-showcases-scottish-and-celtic-heritage/ Find these stories and more at wv.gov/daily304. The daily304 curated news and information is brought to you by the West Virginia Department of Commerce: Sharing the wealth, beauty and opportunity in West Virginia with the world. Follow the daily304 on Facebook, Twitter and Instagram @daily304. Or find us online at wv.gov and just click the daily304 logo. That's all for now. Take care. Be safe. Get outside and enjoy all the opportunity West Virginia has to offer.
Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist
Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
This week on Hacker And The Fed we sit down with Bill Gardner, professor and Chair Department of Cyber Forensics & Security at Marshall University. Bill offers insight into the professional and academic path into the industry and the future of cybersecurity. Links from the episode: Follow Bill Gardner: Twitter: https://twitter.com/oncee Linkedin: https://www.linkedin.com/in/304blogs/ Marshall University Prospective Students Two papers written by Bill Gardner “I Did What I Believe Is Right”: A Study of Neutralizations among Anonymous Operation Participants Social Engineering in Non-Linear Warfare Support this episode's sponsors: Drata: Get 10% off and waived implementation fees at drata.com/partner/hacker-fed DeleteMe: Visit JoinDeleteMe.com/FED and use promo code: FED20 -- For more information on Chris and his current work visit naxo.com Follow Hector @hxmonsegur
In this episode we will look into: What strategy can you use to generate leads to a new website. You can use Search Engine optimization (a.k.a. SEO) to build visibility in search engines so that your website generates leads and increses your revenue. Sponsor of this Episode: Econry is an international training academy focused on innovative subjects. Companies, government employees and students use this to upskill their talents. In Germany the department of labour sponsers courses for unemployed. In other countries there are other options to help finance this additional education. Econry also cooperates with several universities and academies focused on other complementary niches. You might ask what econry focuses on. With AI being an important element of business, econry is looking to provide knowledge where this technology is relevant. Hence, this also applies to marketing, sales and even cyber security. Any company pumping marketing content into the inernet space needs to ensure that customer data is safely transmitted and stored. If this is poorly done, the trust will be lost and any great sales person will have difficulty convincing a buyer that they are safe with you. You can take courses from Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. Most of the courses are streamed live but some are also available at on demand video in combination with live workshops. If you want to learn a subject properly you need some level of human help. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Entrepreneurs differ from small business owners by the way they invest their profits back into the company. Based on this narrative we will look at Why you need to use Twitter blue to get new qualified leads. Generating leads does not automatically mean that you spam peoples inboxes. This insane strategy is the general BS that some Sales Gurus try to tell you to do. That will not get you to a sustainable level of revenue. Find out how to do it properly on Twitter and linkedin. Sponsor of this Episode: Econry is an international training academy focused on innovative subjects. Companies, government employees and students use this to upskill their talents. In Germany the department of labour sponsers courses for unemployed. In other countries there are other options to help finance this additional education. Econry also cooperates with several universities and academies focused on other complementary niches. You might ask what econry focuses on. With AI being an important element of business, econry is looking to provide knowledge where this technology is relevant. Hence, this also applies to marketing, sales and even cyber security. Any company pumping marketing content into the internet space needs to ensure that customer data is safely transmitted and stored. If this is poorly done, the trust will be lost and any great sales person will have difficulty convincing a buyer that they are safe with you. You can take courses from Neural Networks to Multi-plattform development (.NET MAUI), Cyber Security, SEO and HR Retention. Most of the courses are streamed live but some are also available at on demand video in combination with live workshops. If you want to learn a subject properly you need some level of human help. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Topic of this podcast: The new model for transforming customer acquisition with the intersection between paid search [Value-based bidding & automation], data science, and performance creative at scale. Who is today's guest? Paris Childress is an Ex-Googler, the CEO & Founder of Hop-Online, and the host of the Paris Talks Marketing Podcast. Paris has grown the agency to a highly recognized and awarded global performance marketing agency. Today, Hop Online is a Premium Google Partner Agency, managing over $20 million in annual performance advertising spend across Google and Facebook. You can find Paris Childress here at LinkedIn: https://www.linkedin.com/in/parischildress/ Sponsor of this Episode: Econry is an innovative training academy focused on innovative subjects. From Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Topic of this podcast: The new model for transforming customer acquisition with the intersection between paid search [Value-based bidding & automation], data science, and performance creative at scale. Who is today's guest? Paris Childress is an Ex-Googler, the CEO & Founder of Hop-Online, and the host of the Paris Talks Marketing Podcast. Paris has grown the agency to a highly recognized and awarded global performance marketing agency. Today, Hop Online is a Premium Google Partner Agency, managing over $20 million in annual performance advertising spend across Google and Facebook. You can find Paris Childress here at LinkedIn: https://www.linkedin.com/in/parischildress/ Sponsor of this Episode: Econry is an innovative training academy focused on innovative subjects. From Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
While cybercrime is relatively new, criminals tend to organize themselves in traditional ways. Vincent D'Agostino, Head of Cyber Forensics and Incident Response at BlueVoyant, has had plenty of experience with traditional organized crime during his time at the FBI which has given him insights into his current work in cybercrime. That experience and those insights make him a perfect guest for The Cyber Crime Lab Podcast. Vincent and host Andy Anderson discuss: that cybercrime crews, like businesses, have niches, and hence no business is entirely safe from attack the hierarchy and “outsourcing” methods used by some of the top-level cybercrime organizations how and why criminals are “early adopters” of the newest technology and software You'll also hear how geopolitics and US federal law factor into how ransomware is deployed and paid for (or sometimes not). The Cyber Crime Lab Podcast is brought to you by DataStream Insurance When the worst happens, you want the best financial, legal, and technical support to get you back up and running again. With Cyber Insurance from DataStream, we offer the most comprehensive insurance coverage on the market alongside critical post-incident customer support — all for the price of a cup or two of coffee each day. Make DataStream part of your business continuity plans today. Book a meeting with us at datastreaminsurance.com
Welcome to the Cyber Security Happy Hour Podcast. Host: Christie Topic: Cyber Forensics What is Computer Forensics? Examples of Cyber Forensics? Forensics Procedures Types of computer forensics Skills and Knowledge required to become a Cyber Forensics Examiner. Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ This is Cyber and Information Security Podcast - do not forget to protect your data in transit and maintain your privacy by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/ Do not forget to subscribe to the podcast so you never miss an episode. Email: podcast@intexit.co.uk Website: https://intexit.co.uk
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Gary Warner, Director of Research in Computer Forensics' for the University of Alabama at Birmingham (UAB) and the Director of Threat Intelligence for DarkTower. From his LinkedIn bio, “Gary is the ‘Director of Research in Computer Forensics' for the University of Alabama at Birmingham (UAB). In this role, which brings together the Computer Science and Criminal Justice departments, he is concentrating on research that will help law enforcement and other security professionals to identify, apprehend, prosecute and convict those who are committing cybercrime, and spread information to victims and potential victims about cybercrime issues. 90 analysts and programmers work in the UAB Computer Forensics Lab building tools and providing intelligence for a variety of clients around Cybercrime, Fraud, and Terrorism, as well as the Social Media aspects of more traditional crimes, including Gang Activity and Transnational Drug Networks. In addition to his duties at UAB, Warner serves as the Director of Threat Intelligence for DarkTower, a subsidiary of Queen Associates in Charlotte, North Carolina. Gary Warner was the founding president of the Birmingham InfraGard chapter, and has served as secretary and member of the board of the InfraGard National Members Alliance, among other roles. Read more on LinkedIn. Gary on Twitter: @GarWarner. Gary's blog: CyberCrime & Doing Time; A Blog about Cyber Crime and related Justice issues. “Malware analysis is a team sport” – Gary Warner, on information sharing, during our podcast recording In the discussion we address: • Gary's backstory and the work he's doing today • Information sharing and the value of plugging into information sharing communities • The great work being done by the FBI and CISA • The importance of knowing your competition, China, Russia, and ongoing threats • Some of Gary's go-to resources • Gary talks about haikus, Talking Heads, GarBot, birdwatching, and more! “CISA, it's a new era of info sharing in the government” before giving some shout outs to CISA's first Director, Chris Krebs, and current Director, Jen Easterly A few references mentioned in or relevant to our discussion include: • CISA's Known Exploited Vulnerabilities Catalog (KEVC), something Gate 15's Jen Walker raves about often, including in our recent Risk Roundtable: The Risk Roundtable EP 27: Don't let bias guide your preparedness (07 Mar 22). https://www.cisa.gov/known-exploited-vulnerabilities-catalog • Gary discussed this event: Justice Department Announces Court-Authorized Effort to Disrupt Exploitation of Microsoft Exchange Server Vulnerabilities (13 Apr 21) https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-effort-disrupt-exploitation-microsoft-exchange • BITNET https://bit.net • FBI SENTINEL System https://www.fbi.gov/services/information-management/foipa/privacy-impact-assessments/sentinel • Intellipedia https://en.wikipedia.org/wiki/Intellipedia • REN-ISAC https://www.ren-isac.net • Gary's four CISA “must watch” sites from the CISA cyber landing page: o Current activity: https://www.cisa.gov/uscert/ncas/current-activity o Alerts: https://www.cisa.gov/uscert/ncas/alerts o Bulletins: https://www.cisa.gov/uscert/ncas/bulletins o Analysis: https://www.cisa.gov/uscert/ncas/analysis-reports • Gary strongly encouraged listeners to check CISA Director Jen Easterly's “about” section in her LinkedIn profile to understand why she is so excellently qualified to be the woman leading CISA today (something Chris Krebs, her predecessor at CISA agrees with)
In this episode of the Simple Cyber podcast, Chris Lawley, our CCO, and our Co-Founder & CEO Robert Potter, discuss the new approach to cyber forensics and intelligence analysis that Internet 2.0 is pioneering. This episode focuses on how diversity of skills, experience, and domain knowledge can improve the functions of a team, and how this collective thinking approach helped uncover one of the more significant discoveries from Internet 2.0 in recent memory; the 'unusual levels' of PCR procurement in Wuhan. After listening in, you can get more information on the report discussed by visiting here to download the full report.
Ep:099 Award-winning author, C. L. Brees, was born and raised in rural Indiana, a place where the environment was a bit too restrictive to contain his overactive imagination. He needed a place where he could expand his horizons. In 2011, after relocating to Maryland, he followed his passion for forensics and law enforcement and enrolled at the University of Baltimore. Four years later he earned not only a B.S. in Police Studies but also an M.S. in Cyber Forensics.C.L. Brees WebsiteC.L. Brees Amazon Author PageC.L. Brees on FacebookMurder Most Lovely by Hank Edwards and Deanna WadsworthCash Out by Marshall ThorntonThe Postscript Murders by Elly GriffithsPaul Rudd Video of the WeekHistory Briefs Podcastbradshreve.comRequeered Tales.com
This week the Mat and Mike welcome Dr. Marcus Rogers from Purdue University to the show. They discuss cybercrime and cyber forensics, the Purdue High Tech Crimes Unit, and why Johnny Mnemonic is required viewing in Dr. Rogers' class.-------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu
Lam Nguyen, Director of the Cyber Forensics Laboratory at the US Department of Defense, tells Tonya Hall how the lab protocols were safeguarded when the pandemic forced them to telework. Learn more about your ad choices. Visit megaphone.fm/adchoices
Lam Nguyen, Director of the Cyber Forensics Laboratory at the US Department of Defense, tells Tonya Hall how smart cars are an endless source of forensic data during criminal investigations. Learn more about your ad choices. Visit megaphone.fm/adchoices
All of his books are available here: https://amzn.to/3pJ3CHPwebsite: https://www.fredericklane.com/Sponsors:https://mybookie.com Promo Code minddoghttps://record.webpartners.co/_6_DFqqtZcLQWqcfzuvZcQGNd7ZgqdRLk/1https://apply.fundwise.com/minddoghttps://myvitalc.com/minddog. promo code minddogtvhttps://skillbuilder.academy/dashboard?view_sequence=1601856764231x540742189759856640&promoCode=MINDDOG30OFF
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
Richard Stiennon, leading author and analyst, speaks with Mark Rasch, well-known attorney, on the charges against Joe Sullivan, former Uber CSO. With more than 30 years of experience in cybersecurity and data privacy – including within the U.S. Department of Justice, where he created the DOJ Computer Crime Unit and Cyber-Forensics practice, Mark discusses the implications and what it could mean for CSOs and CISOs.
Welcome to Episode 28 of The Main Thing Podcast and another dose of wisdom! I'm your host, Skip Lineberg, and today I am thrilled to introduce you to my special guest, Bill Gardner. Bill is an Assistant Professor at Marshall University, in Huntington, West Virginia, where he teaches in the Cyber Forensics and Security Degree Programs. Prior to joining the faculty at Marshall Univ., Bill co-founded the SecureWV/Hack3rCon cyber security conference. He also helped to start 304geeks, a non-profit technology organization based in Charleston, WV. Bill Gardner is an active member of the cyber security community and has spoken at a number of professional conferences including AIDE, DerbyCon and Shmoocon. He has co-authored two books: "Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats" and “Google Hacking For Penetration Testers.” He has also written a number of academic & non-academic journal articles. Get ready! Over the next 9-minutes you will discover why Bill Gardner is, without a doubt, one of the wisest people I know. Connect Bill Gardner on LinkedIn Free Poster! Thank you for being a loyal listener! Here's your link to download your free poster. It's a professionally designed work of art, emblazoned with the core wisdom lessons from our first seven guests in Season One. Credits Graphic Designer Emma Malinoski Editor and Technical Advisor Bob Hotchkiss Want to Help Support the Growth of this Podcast? Become a subscriber. Share the podcast with one or two friends. Buy some Main Thing Merch from our Merchandise Store. Become a patron of the show and consider supporting us on Patreon with a nominal, goodwill monetary donation.
How does an organization know which security controls, applications, or programs to implement, when everything is a threat and every system is vulnerable? Looking at cybersecurity through a risk management lens is one way of reducing the noise of the threat environment. This presentation will discuss why having a Cyber Risk Management (CRM) program is a critical piece to an effective cybersecurity program. This presentation discuss the various Cyber Risk Management frameworks, the building blocks of an effective CRM program, regulatory & standards bodies driving cyber-risk management, metrics, CRM life cycle, and finally, how CRM fits into the overall Enterprise Risk Management program. At the end of the presentation the attendees will have the building blocks to start building a Cyber Risk Management program in their organizations. Additionally, this presentation will look at a few case studies through the cyber risk lens and how a CRM program would have aided in identifying those issues and risks. About the speaker: Nick Sturgeon currently serves as a Director of Information Security for IU Health and IU School of Medicine. His responsibilities include supporting the IU School of Medicine cyber risk management program and leading IU Health's Security Research & Red Team. Nick has worked in Information Technology for over 15 years, with 10 years in Cybersecurity, nine years in Law Enforcement, and 10 years in State Government. Nick earned his Bachelor of Science in Management Information Systems from Indiana State in 2003 and a Master of Science in Cyber Forensics from Purdue 2015. Nick has extensive experience in incident response, digital investigations, criminal investigations, digital media recovery, criminal law, data governance, end point protection, network & log analysis, vulnerability management, security operations, incident management, project management, as an instructor, and service implementation of managed security services. Throughout his career he has supported multiple industries and sectors including, academia, StateLocalTribalTerritorial (SLTT) Governments, healthcare, Information Technology and manufacturing. In addition to his current duties, Nick is a host on two podcasts, is a part time Information Security Instructor at UTSA and Adjunct Professor at the University of Southern Indiana. He also serves as a board member for the Cyber Resilience Institute, Ohio River valley Chapter of the Cloud Security Alliance, and the National Council of Registered ISAOs.
In this episode, Susan speaks with Dr. Scott Belshaw, Director of the Cyber Forensics Lab at UNT, and Lab Research Assistant, Lorrin Underwood. They explain the Dark Web, which is a difficult-to-access region of the internet where many users conduct illegal business and bypass the censorship measures of repressive governments. They also discuss the Lab's role in developing cybersecurity tools for the military and law enforcement, as well as a wand they’ve developed to help merchants detect “skimmers” that may be stealing their customers’ credit card information. Finally, they share a preview of Dr. Belshaw's forthcoming book, Dark Web Unfiltered. Follow the UNT Cyber Forensics Lab Twitter account: @UNTcyberlab. For more information about OLLI at UNT, please visit our website, https://olli.unt.edu/, or send an email to olli@unt.edu.
With the rise of cybercrime comes the need for cyber forensics, and this episode’s guest, Dr. LeGrande Gardner has been in the field of digital evidence for more than 30 years. Currently, he is an instructor in the Criminology Department at the University of South Florida, where he also serves as the Director of the MS in Cybercrime degree program and administrates the Graduate Certificate Program in Digital Forensics. Co-hosts Bill McQueen and Ernie Ferraresso joined Dr. Gardner for a discussion about digital evidence, its role in the justice community, and opportunities for the future. The field of cyber forensics started rather simply, as a way to detect and connect the pieces of a crime. As evidence was being submitted into the justice system, a need for increased scientific methodologies and protocols grew to preserve legal integrity and the rights of the accused. Cyber forensic professionals are able to examine a range of devices, networks--even the cloud--to uncover criminal activity and gather evidence that can lead to legal prosecution. Dr. Gardner discusses how advances in computer science have made an impact in the ability to locate criminals. In his first example, he shares how hash algorithms are used to catch pedophiles and provide a digital footprint to catch larger pedophile rings. Next, he details the Target breach, where criminals were able to hack the nationwide retailer via their air conditioning’s computerized system. Then, he talks about how search warrants involving cybercrime uncovered how criminals were using their neighbor’s open IP addresses, putting routers unknowingly in their attics, and other deviousness that thwarted detection and capture. Unfortunately, Dr. Gardner reveals, international criminals are even more elusive, but that having solid cyber forensics can help law enforcement agencies from multiple countries coordinate efforts.Cyber forensics now has several sub-specialties, such as cloud forensics, network forensics, malware forensics, IoT forensics, and vehicle forensics. Many colleges and universities are developing programs and training around these expanding and evolving sub-specialties. Dr. Gardner points out that this is a great time to be a cybercriminal and there will be an increased need for cyber forensic technicians and digital evidence specialists to combat the widespread crime. There is a push for law enforcement officers to receive training in cyber forensics to facilitate crime scene collections, recognize patterns, and maintain protocols. Dr. Gardner’s history in law enforcement and as a Task Force Agent with the FBI’s Cyber Crime Unit gave him a special insight to device and data collection at crime scenes and he shares his thoughts on training opportunities in police academies. Hackers and cyber criminals aren’t the only reasons the field of cyber forensics is growing. Corporations are also employing their own forensic teams. Companies use digital evidence to substantiate their security and to protect themselves if a situation with an employee requires documentation. Civil matters are increasingly including digital evidence, and professionals are being called upon to provide expert testimony.The need for cyber forensics professionals is growing exponentially, according to Dr. Gardner. There is no end in sight for the potential of this field and the importance it will play in protecting our security and stopping crime.TIME STAMPS00:43 Meet Our New Co-host: Ernie Ferraresso, Associate Program Director of Cyber Florida02:43 Who is Dr. LeGrande Gardner, Director of the MS in Cybercrime Degree Program, University of South Florida03:15 What is Cyber Forensics and Digital Evidence?04:47 Recognizing the field of Cyber Forensics05:59 Following the Rules of Evidence and Procedure06:33 The Growing Impact of Digital Evidence and Digital Exploitation 07:35 Evolving Field of Cyber Forensic Careers08:58 Collecting Cyber Forensic Data 09:51 Digital Evidence as a Science12:52 Components of Digital Evidence13:45 Hash Algorithms, Digital DNA14:25 Child Pornography Hash Algorithms14:55 Hash Algorithms are like Fingerprints 16:37 Verifying and Preserving Digital Evidence Using Scientific Protocols18:29 Training to be a Cyber Forensic Technician or Specialists21:34 Specialized Cyber Forensic Fields24:01 Criminals, Digital Evidence & Law Enforcement26:30 Training Law Enforcement for Digital Evidence Collection28:24 Finding Breaches and Identifying Vulnerabilities31:00 How to Start a Cyber Forensic Investigation31:29 Cyber Forensic Incident Response34:38 Cyber Police of the Future35:35 Trends in Cyber Forensic Prosecutions37:05 International Cyber Criminals and Cyber Forensics38:19 Every Cop as a Cyber Cop38:39 How is Cybercrime Changing 41:26 The Future of the Cyber Forensic Field42:24 Corporate Digital Forensic Units and Civil Courts44:43 Cyber Forensic Academics, Digital Certifications and Careers
Former Secret Service Agent, Computer Forensic Expert, and founder of the security company Cyber Forensics, Gus Dimitrelos appears on Episode #103 of Task Force 7 Radio to talk to our audience about real life scenarios where Cyber Forensic Investigations have determined the outcome of trials where the defendants have been accused of some of the most heinous crimes. Listen as Dimitrelos describes the importance of computer forensics, cellular triangulation, and cell phone forensics in proving, and in some cases disproving, allegations of kidnapping, aggravated assault, murder, and acts of terrorism. Dimitrelos also gives his view on the privacy vs. security debate around cell phone encryption technology, what Apple is doing to thwart authorities from conducting forensics on their phones, and whats more secure: Apple IOS or Windows operating systems. All this and much, much more on Episode #103 of Task Force 7 Radio - the Voice of Cyber Security.
Learn about research that is shaping global policies for digital forensics and redefining what is possible in cyber investigations. How do the latest solid state drives and cloud computing effect evidence recovery? How do criminologists profile online predators and understand the effects of social networking in criminal behavior?
In this episode, August talks with one of the world's foremost experts in Cyber Forensics. Bryan Neumeister, head of USA Forensic, helps law enforcement, government agencies and the legal system. He can find erased information on cell phones--your bank accounts, exactly where you've been, the passwords to all your accounts and so much more. He can do the same with your laptop, as well as pick out a single voice in a crowded airport and help identify people on grainy video footage. Bryan and August talk about the best ways for you to keep your online information private and give you Bryan's top 7 tips to protect yourself and your family.
Cybersecurity threats are constantly evolving and becoming more sophisticated. This has been observed through advanced spear phishing campaigns, increase in ransomware families/variants and the use of IoT devices for DDOS attacks. As well, the tactics, techniques and procedures (TTPs) utilize by bad actors are evolving with the technology and seemingly staying one step ahead of security technologies. This presentation will look at some of the trends from the past year and look at the emerging cyber threats for 2017 and beyond. About the speaker: Nick Sturgeon is the Manager of the Indiana Information Sharing and Analysis Center (IN-ISAC) and the Security Operations Center (SOC). As the Manager of the IN-ISAC, Nick is responsible for overall strategic planning, budget planning, project oversite, and ensures all efforts are focused on achieving the IN-ISAC's mission. Nick also provides management and oversight of the IN-ISAC's Security Awareness and Training program, as well as direction on IN-ISAC/SOC policy and procedure development. As the SOC Manager, Nick is responsible for all day to day operations of the SOC. Additionally, Nick serves as the Deputy Director for Cyber for the Indiana Intelligence Fusion Center (IIFC). As the Deputy Director for Cyber, Nick is responsible for developing and distributing cyber threat information to multiple sectors. Nick is actively involved with the Information Sharing and Analysis Organization's Standards Organization's (ISAO-SO), were he serves as a co-lead for Working Group 4 and is a member of three other ISAO-SO Working Groups. Before joining the Indiana Office of Technology, Nick spent eight years with the Indiana State Police serving various roles. Nick held ranks of Trooper, Sergeant and First Sergeant. His last assignment was in the Criminal Justice Data Division and serving as the Assistant Commander of the Information Technology Section. Nick earned a B.S. in Management Information Systems from Indiana State University 2003, and a M.S. with a specialization in Cyber Forensics from Purdue University in 2015.
The Indiana Information Sharing and Analysis Center (IN-ISAC) is an entity developed by the State of Indiana and key partners to mitigate cybersecurity risks for the State of Indiana. The IN-ISAC will accomplish this through sharing threat information and collaborating with the public, private industry, local government and other governmental agencies. About the speaker: Nick Sturgeon is the Manager of the Indiana Information Sharing and Analysis Center (IN-ISAC) and the Security Operations Center (SOC). As the Manager of the IN-ISAC, Nick is responsible for overall strategic planning, budget planning, project oversite, and ensures all efforts are focused on achieving the IN-ISAC's mission. Nick also provides management and oversight of the IN-ISAC's Security Awareness and Training program as well as direction on IN-ISAC/SOC policy and procedure development. As the SOC Manager, Nick is responsible for all day to day operations of the SOC. Nick is also involved with two Crit-Ex working groups and the State of Indiana Cybersecurity Coordination group. Nick also serves as the Deputy Director for Cyber Intelligence for the Indiana Intelligence Fusion Center (IIFC). Before joining the Indiana Office of Technology, Nick spent eight years with the Indiana State Police serving various roles. Nick held ranks of Trooper, Sergeant and First Sergeant. His last assignment was in the Criminal Justice Data Division and serving as the Assistant Commander of the Information Technology Section. Nick earned a B.S. in Management Information Systems from Indiana State University, and a M.S. with a specialization in Cyber Forensics from Purdue University.
This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
Barry Lewis concludes his introduction to Cyber Forensics, with specific implementation examples.Pubcast Episode 142160;Download the160;160;Full Audio Fileaudiohttp://www.discussit.co.za/_media/_audio/itsp/Pubcast_Episode_143.mp3/a...
Barry Lewis provides an introduction to Cyber Forensics, leading in with five principles: - Do no harm; - Use copies (never originals); - Establish and maintain an audit trail; - Ensure other parties can replicate your work; and - Always ...
In our ever connected society, security has become an essential component for all facets of life. Businesses, government, academics, and individually, all facets have a need to protect and secure technology. Over the past 5-10 years, the demand for cyber security professionals has significantly increased. According to the Bureau of Labor Statistics, employment for Cyber Security Specialists is expected to increase much faster than the average career over the course of the next 10 years. Despite the growing demand, women represent an alarmingly low percentage. This can be demonstrated in nearly any university's technology courses. Cyber security especially is highly male-dominated. Research shows that having a balance of male and female perspectives facilitates diverse and creative innovation and problem solving, within the ever changing realm of cyber security.The NSF SFS funded Broadening Participation of Women in Cybersecurity Project, which aims to build a movement towards diversifying Cyber Security. The program put on the Women in Cyber Security Conference (WiCyS), in Nashville, TN, April 11-12. I will discuss my experience at this conference. I will also discuss takeaways from this conference, and important information for anyone interested in pursuing a career in this ever evolving and highly demanded field. About the speaker: Rachel Sitarz is a PhD student in Cyber Forensics at Purdue University. She studies under the guidance of Dr. Marcus Rogers. She obtained her Master degree in Cyber Forensics in 2010 from Purdue University. She received her undergraduate degrees in Law and Society, Psychology and Forensics in 2007 from Purdue University. Over the past three years, while being a full-time student, Rachel worked full-time for the Indiana State Police, as a Criminal Intelligence Analyst, on the Internet Crimes Against Children Task Force. Currently, Rachel works for the IT Security and Policy section at Purdue, where she builds analytical products from the current threats that are seen on the Purdue network. Rachel is also an Adjunct Professor, teaching Research Methods. Rachel's area of research interest is on the psychological and behavioral analysis of cyber criminals. She aims to understand the user behind the crime. How they are behaving, what programs they are using to facilitate their crimes, how do they engage with other criminals, are among many of her areas of study.
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducted research indicates the evidence found on older file structures, such as Windows XP, as well as outdated versions of Yahoo! Messenger. Several differences were found within the Yahoo Messenger's registry keys and directory structure on Windows Vista and Windows 7 as compared to Windows XP. About the speaker: Final year PhD student in Cyber Forensics in College of Technology. Completed my under graduate studies in India in Electronics and Telecommunications Engineering. Completed my Masters from Oklahoma State University in Telecommunications Management. Got interested in the filed of Digital Forensics in my last semester at Oklahoma State University after taking a course in Digital Forensics. Area of interest is social networking in teens, forensic investigation.