Podcasts about cyber intelligence

Use of technological force within cyberspace

  • 123PODCASTS
  • 193EPISODES
  • 36mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 17, 2025LATEST
cyber intelligence

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber intelligence

Latest podcast episodes about cyber intelligence

The International Risk Podcast
Episode 216: Cyber Threats and Geopolitical Risks: Safeguarding Businesses in a Digital Age with Kailyn Johnson

The International Risk Podcast

Play Episode Listen Later Mar 17, 2025 32:13


This week, Dominic Bowen welcomes Kailyn Johnson to The International Risk Podcast for an insightful discussion on the evolving landscape of cyber threats and their impact on businesses worldwide. Together, they explore the evolving role of cyber crimes, and the risks businesses face when they neglect their software supply chain security. They also explore how cybercriminal organizations are becoming more sophisticated, the implications of democratized access to dark web tools, and why businesses must integrate geopolitical and technological awareness into their risk management frameworks.Kailyn Johnson is the Cyber Intelligence and Geopolitical Risk Lead at Sibylline, where she specializes in analyzing cyber threats within a geopolitical context. Her expertise lies in cyber risk forecasting, corporate espionage, and the intersection of cyber operations with global security. With a background in cyber threat intelligence consulting and security investigations, she has advised major corporations on mitigating risks from evolving cybercriminal tactics. Kailyn has also presented at leading cybersecurity conferences worldwide, sharing insights on the increasing accessibility of cyber tools and the challenges this poses for organizations.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors. This weekly podcast dives deep into international relations, emerging risks, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, the podcast brings together global experts to share insights and actionable strategies.Dominic's 20+ years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them.The International Risk Podcast – Reducing risk by increasing knowledge. Follow us on LinkedIn for all our great updates.Tell us what you liked!

The Social-Engineer Podcast
Ep. 293 - Security Awareness Series - From Banker to Spy to Cyber Security Expert with Peter Warmka

The Social-Engineer Podcast

Play Episode Listen Later Feb 17, 2025 33:14


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Peter Warmka. Peter is a Former Senior Intelligence Officer with the CIA with over 20 years' experience in breaching the security of organizations overseas. Peter is the founder of the Orlando-based firm Counterintelligence Institute, LLC and an Adjunct Professor at Webster University's Masters Cybersecurity Program. Peter is passionate about using his expertise in helping city, state, and federal government entities, non-profits, academic institutes, private companies, and individuals safeguard their sensitive proprietary and/or personal data. He is also the author of two books. [Feb 17, 2025]   00:00 - Intro 00:21 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:25 - Peter Warmka Intro 03:14 - Getting Recruited 12:11 - Working Above Cybersecurity 21:33 - Identifying Potential Candidates 23:20 - Tip to CISO's: Learn About AI 25:17 - The Importance of Guardrails 28:37 - Peter's Books -          Confessions of a CIA Spy - Peter Warmka -          Why Are You Messing With Me? - Peter Warmka 31:10 - Find Peter Warmka online -          LinkedIn: in/peterwarmka -          Website: counterintelligence-institute.com 32:18 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

The BRIGHTON PARKast
Andy Boyd: Inside the Cyber Frontier

The BRIGHTON PARKast

Play Episode Listen Later Jan 16, 2025 43:12


In this episode, Andy Boyd, former Director of the CIA's Center for Cyber Intelligence, delves into the complex world of cybersecurity and its implications for national and corporate security. With a rich career spanning roles as an Air Force intelligence officer, a diplomat, and a CIA leader, Andy discusses the distinction between cyber crime and cyber threats and how global adversaries like China and Russia focus their cyber activities. He emphasizes the importance of collaboration between public and private sectors, challenges corporate executives to integrate CISOs into boardroom discussions, and shares his perspective on the importance of extending cybersecurity education beyond the office and into our personal lives. Hosted on Acast. See acast.com/privacy for more information.

@BEERISAC: CPS/ICS Security Podcast Playlist
Ohad Zaidenberg former Head of Intel @InBev Researcher & Forbes 30 under 30 about cyber Intelligence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 24, 2024 50:07


Podcast: ICS Cyber Talks PodcastEpisode: Ohad Zaidenberg former Head of Intel @InBev Researcher & Forbes 30 under 30 about cyber IntelligencePub date: 2024-12-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationמודיעין סייבר הוא חלק בלתי נפרד משכבות ההגנה הנדרשות בכול ארגון, מודיעין איכותי מאפשר לדייק את הכנה למתקפה צפויה עד למניעה. נחשון פינקו מארח את אוהד זינדנברג לשעבר ראש מחלקת מודיעין סייבר בחברת יצור הבירות הגדולה בעולם איי.ביי אינבוו. ומי שנבחר ע"י פורבס להיות מה 30 המובילים מתחת לגיל 30 בשיחה על מודיעין סייבר איך הפך אוהד להיות האויב כמעט מספר אחד של אירן עד כדי פרסום תמונתו ופרטיו האישים בעיתונות האירנית. מה החשיבות של מודיעין הסייבר לארגונים מהו מודיעין גלוי ואיך ניתן להפוך את המידע לכלי הגנה פרק זה מוקדש לזכרו של סרן אריאל טופז שנפצע אנושות בפיגוע דריסה רצחני בצריפין ונלחם על חייו עד שהפציעה הכריע אותו, יהי זכרו ברוך.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ICS Cyber Talks Podcast
Ohad Zaidenberg former Head of Intel @InBev Researcher & Forbes 30 under 30 about cyber Intelligence

ICS Cyber Talks Podcast

Play Episode Listen Later Dec 19, 2024 50:07


מודיעין סייבר הוא חלק בלתי נפרד משכבות ההגנה הנדרשות בכול ארגון, מודיעין איכותי מאפשר לדייק את הכנה למתקפה צפויה עד למניעה. נחשון פינקו מארח את אוהד זינדנברג לשעבר ראש מחלקת מודיעין סייבר בחברת יצור הבירות הגדולה בעולם איי.ביי אינבוו. ומי שנבחר ע"י פורבס להיות מה 30 המובילים מתחת לגיל 30 בשיחה על מודיעין סייבר איך הפך אוהד להיות האויב כמעט מספר אחד של אירן עד כדי פרסום תמונתו ופרטיו האישים בעיתונות האירנית. מה החשיבות של מודיעין הסייבר לארגונים מהו מודיעין גלוי ואיך ניתן להפוך את המידע לכלי הגנה פרק זה מוקדש לזכרו של סרן אריאל טופז שנפצע אנושות בפיגוע דריסה רצחני בצריפין ונלחם על חייו עד שהפציעה הכריע אותו, יהי זכרו ברוך.

Canadian Politics is Boring
Meet Dustin Rekunyk

Canadian Politics is Boring

Play Episode Listen Later Nov 18, 2024 37:03


Dustin is of Canadian Ukrainian descent, his great-grandmother emigrated to Canada from Ukraine in 1927 to escape Stalin's collectivization policies. He joined the Canadian Forces, enlisting in January 2007, spending 15 years, beginning with the 3rd Battalion, Princess Patricia's Canadian Light Infantry and ending as an Intelligence Operator involved in Cyber Intelligence and Warfare. His passion for his heritage and service led him to the front lines of Ukraine in 2022 after the illegal Russian occupation, sustaining injuries from artillery as a foreign fighter.But most importantly, Dustin is a listener of this podcast. He joined us to talk about why he's running as a candidate in the 2024 Nova Scotia election for Colchester North.All our links:https://bio.to/canboringThis podcast is hosted two idiots and created purely for entertainment purposes. By accessing this Podcast, I acknowledge that the CIB Podcast makes no warranty, guarantee, or representation as to the accuracy or sufficiency of the information featured in this Podcast. The information, opinions presented in this Podcast are for general entertainment and humor only and any reliance on the information provided in this Podcast is done at your own risk. However, if we get it badly wrong and you wish to suggest a correction, please email canadianpoliticsisboring@gmail.com Hosted on Acast. See acast.com/privacy for more information.

Bytes with Bec and Benji
Episode 7: The Increasing Threat of Cyber Warfare with Katherine Mansted

Bytes with Bec and Benji

Play Episode Listen Later Sep 11, 2024 41:56


In this episode, we sit down with Katherine Mansted, Director of Cyber Intelligence at CyberCX, to explore the world of cyber threat intelligence and how it impacts organisations and individuals alike. Katherine shares insights into her daily routines, the collaborative nature of her work, and the strategies her team uses to stay ahead of emerging cyber threats. Whether you're a cyber security enthusiast or just curious about how this field affects your day-to-day life, this episode will spark your interest and leave you with a deeper understanding of the vital role cyber intelligence plays in keeping us secure.

ITSPmagazine | Technology. Cybersecurity. Society
An Introduction to CyberTech NYC Conference 2024 with Event Director Steve Corrick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 26, 2024 21:44


Guest: Steve Corrick, Director, Cybertech New YorkOn LinkedIn | https://www.linkedin.com/in/stevecorrick/On Twitter | https://x.com/scorrickOn Facebook | https://www.facebook.com/stephen.corrick____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesA Virtual Road Trip to CyberTech NYCIn a lively pre-event discussion, we embark on a metaphorical journey across the States, representing our excitement for the CyberTech NYC Conference, happening on September 5th, 2024, at the Metropolitan Pavilion in Chelsea. The idea of this "drive" is a fun nod to the interconnectedness of our virtual world and our anticipation of the event.Event Spotlight: Why CyberTech NYC MattersWe kick things off by highlighting the significance of this event, mentioning that it starts early on September 4th with pre-event activities, leading up to the main event on the 5th. Steve Corrick, one of the key organizers, provides a behind-the-scenes look at the planning process and explains how this third edition of CyberTech NYC has become a distinctive fixture in the cyber ecosystem.The Global and Local Impact of CyberTechSteve takes us through the journey of CyberTech as a global series, tracing its roots from Tel Aviv to its expansion across multiple continents. What sets CyberTech NYC apart, he says, is its dual focus on both global trends and local innovation. New York City, now a burgeoning hub for tech and cybersecurity, plays host to an event that showcases local talent, startups, and established players alike.Comprehensive Coverage of Cyber TopicsThe event's agenda is packed with content designed to tackle critical issues, such as:Cyber Talent Initiative: Programs for everyone, from students to professionals looking to upskill.VC and Investor Focus: The Investing in the Best initiative to help startups boost their funding.Government and Agency Involvement: Discussions on how localities can strengthen their cyber ecosystems.Main Stage Content: Keynotes on fake news, the role of cyber in elections, and other pressing topics.Inclusivity and Innovation: A Diverse Speaker LineupWe appreciate the diversity of speakers and the range of topics covered. With big names like Walmart, AWS, and various innovative startups, the event promises to offer something for everyone. Steve also explains the event's blend of formats, including main stage panels, roundtables, and think tanks, all aimed at fostering in-depth discussions and knowledge sharing.The Evolving Cyber LandscapeReflecting on how cybersecurity events have evolved over the years, Steve notes the shift from niche gatherings to mainstream importance. With cyber threats becoming part of our daily lives, collaboration among countries and industries has become essential for enhancing global security.Local Focus with Global ReachWe commend the event's ability to balance global participation with a strong local focus. Steve agrees, emphasizing their collaboration with local and state-level initiatives in New York, further solidifying the city's place on the global cybersecurity map.Looking Forward to CyberTech NYC 2024Our conversation wraps up with a sneak peek at the event's schedule, including a Happy Cyber Hour on the evening of September 5th and additional pre-event activities on the 4th. Steve and his team are excited to connect with participants from around the globe, and we'll be sharing more updates as CyberTech NYC 2024 approaches.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More

Redefining CyberSecurity
An Introduction to CyberTech NYC Conference 2024 with Event Director Steve Corrick | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Aug 26, 2024 21:44


Guest: Steve Corrick, Director, Cybertech New YorkOn LinkedIn | https://www.linkedin.com/in/stevecorrick/On Twitter | https://x.com/scorrickOn Facebook | https://www.facebook.com/stephen.corrick____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesA Virtual Road Trip to CyberTech NYCIn a lively pre-event discussion, we embark on a metaphorical journey across the States, representing our excitement for the CyberTech NYC Conference, happening on September 5th, 2024, at the Metropolitan Pavilion in Chelsea. The idea of this "drive" is a fun nod to the interconnectedness of our virtual world and our anticipation of the event.Event Spotlight: Why CyberTech NYC MattersWe kick things off by highlighting the significance of this event, mentioning that it starts early on September 4th with pre-event activities, leading up to the main event on the 5th. Steve Corrick, one of the key organizers, provides a behind-the-scenes look at the planning process and explains how this third edition of CyberTech NYC has become a distinctive fixture in the cyber ecosystem.The Global and Local Impact of CyberTechSteve takes us through the journey of CyberTech as a global series, tracing its roots from Tel Aviv to its expansion across multiple continents. What sets CyberTech NYC apart, he says, is its dual focus on both global trends and local innovation. New York City, now a burgeoning hub for tech and cybersecurity, plays host to an event that showcases local talent, startups, and established players alike.Comprehensive Coverage of Cyber TopicsThe event's agenda is packed with content designed to tackle critical issues, such as:Cyber Talent Initiative: Programs for everyone, from students to professionals looking to upskill.VC and Investor Focus: The Investing in the Best initiative to help startups boost their funding.Government and Agency Involvement: Discussions on how localities can strengthen their cyber ecosystems.Main Stage Content: Keynotes on fake news, the role of cyber in elections, and other pressing topics.Inclusivity and Innovation: A Diverse Speaker LineupWe appreciate the diversity of speakers and the range of topics covered. With big names like Walmart, AWS, and various innovative startups, the event promises to offer something for everyone. Steve also explains the event's blend of formats, including main stage panels, roundtables, and think tanks, all aimed at fostering in-depth discussions and knowledge sharing.The Evolving Cyber LandscapeReflecting on how cybersecurity events have evolved over the years, Steve notes the shift from niche gatherings to mainstream importance. With cyber threats becoming part of our daily lives, collaboration among countries and industries has become essential for enhancing global security.Local Focus with Global ReachWe commend the event's ability to balance global participation with a strong local focus. Steve agrees, emphasizing their collaboration with local and state-level initiatives in New York, further solidifying the city's place on the global cybersecurity map.Looking Forward to CyberTech NYC 2024Our conversation wraps up with a sneak peek at the event's schedule, including a Happy Cyber Hour on the evening of September 5th and additional pre-event activities on the 4th. Steve and his team are excited to connect with participants from around the globe, and we'll be sharing more updates as CyberTech NYC 2024 approaches.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More

The Exit - Presented By Flippa
Cyber Intelligence and Serial Exits: Roy Zur's Entrepreneurial Journey

The Exit - Presented By Flippa

Play Episode Listen Later Aug 12, 2024 30:18


Want a quick estimate of how much your business is worth? With our free valuation calculator, answer a few questions about your business and you'll get an immediate estimate of the value of your business. You might be surprised by how much you can get for it: https://flippa.com/exit -- This week on The Exit: Roy Zur, former founder and current CEO of ThriveDX's Enterprise Division, shares insights from his journey as a serial entrepreneur with multiple successful exits in the cybersecurity space. Roy discusses his background in Israel's Cyber Intelligence Unit and briefly working in law at the Israeli Supreme Court, and how these experiences influenced his entrepreneurial path. Despite his first venture being acquired after two years, it felt more like luck to him as it was a business built by focusing more on a solution than a customer problem. With his second business, Cybint, Roy's growth and exit was more intentional, and he decided to sell at a time when market conditions for acquisitions were particularly favorable. Throughout it all, Roy stresses the importance of approaching problems with humility and continuous learning. For more details and insights from his entrepreneurial journey, listen to the latest episode of The Exit. -- Roy Zur is a serial entrepreneur and Founder and CEO of ThriveDX's Enterprise Division, the global education company committed to transforming lives through digital skills training and solutions. In August of 2021, ThriveDX acquired Cybint Solutions where he also served as CEO since founding the company in 2014. In addition to steering the vision of ThriveDX's Enterprise Division, Roy serves as adjunct professor of risk management in cybersecurity at IDC Herzliya in Israel. He is also Founder and Chairman of the non-profit Israeli Institute for Policy and Legislation, and a member of the Forbes Business Council. LinkedIn: https://www.linkedin.com/in/royzur/ Check Out Flippa's Data Insights Tool: https://flippa.com/data-insights -- The Exit—Presented By Flippa: A 30-minute podcast featuring expert entrepreneurs who have been there and done it. The Exit talks to operators who have bought and sold a business. You'll learn how they did it, why they did it, and get exposure to the world of exits, a world occupied by a small few, but accessible to many. To listen to the podcast or get daily listing updates, click on flippa.com/the-exit-podcast/

Public Key
Operation Cronos: Infiltrating the LockBit Ransomware Syndicate

Public Key

Play Episode Listen Later Aug 6, 2024 35:03


Ever wonder what goes into taking down the world's biggest ransomware group. Well in this episode   Ian Andrews (CMO, Chainalysis) speaks to  Phil Larratt (Director of Investigations, Chainalysis) and William Lyne (Head of Cyber Intelligence, National Crime Agency (NCA)), who share how UK law enforcement along with their International partners were able to infiltrate and eventually shutdown the most prolific ransomware ecosystem, LockBit. The trio discuss LockBit, the major ransomware-as-a-service threat and provide a detailed account of Operation Cronos, a sophisticated takedown that compromised LockBit's system and eventually led to the takedown of their operations Phil and William explain the intricacies of crypto tracing, International law enforcement collaboration, and the innovative tactics used to protect victims and hinder cybercrimes, like ransomware. This is one of the few episodes that provides a riveting inside look at one of the most significant crypto ransomware operations to date and the ripple effects on the larger cybercrime ecosystem. Minute-by-minute episode breakdown 2 | William Lyne's background going from Astro-Physics into Cyber Crime at NCA 4 | Introduction to Phil Larratt and unpacking a 100 Million Pound “Vishing” fraud case  8 | The scale of the LockBit Ransomware syndicate and affiliates 14 | Operation Cronos and how law enforcement infiltrated an entire ransomware ecosystem  18 | Blockchain intelligence's role in fighting cyber crimes like ransomware 23 | Government's covert operations against ransomware hackers 27 | The impact on the ransomware ecosystem post-LockBit takedown  30 | New UK Law enhances crypto asset seizure capabilities to fight cyber crime  Related resources Check out more resources provided by Chainalysis that perfectly complement this episode of the Public Key. Website: National Crime Agency (NCA): The deployment of ransomware remains the greatest cyber serious and organised crime threat to the UK News: Operation Cronos: International investigation disrupts the world's most harmful cyber crime group Project: RUSI:  Ransomware Harms and the Victim Experience Blog: U.S. and U.K. Disrupt Lockbit Ransomware Group and Indict Two Russian Nationals While OFAC Levies Sanctions Announcement: Announcing Chainalysis' 2024 U.S. Public Sector Customer Awards Program Report: Chainalysis Money Laundering and Cryptocurrency Report (Available Now) Report: [REPORT PREVIEW] Malign Interference and Crypto: How Crypto Transaction Tracing Can Expose and Disrupt Malign Influence Efforts YouTube: Chainalysis YouTube page Twitter: Chainalysis Twitter: Building trust in blockchain Tik Tok: Building trust in #blockchains among people, businesses, and governments. Telegram: Chainalysis on Telegram  Speakers on today's episode Ian Andrews * Host * (Chief Marketing Officer, Chainalysis)  William Lyne (Head of Cyber Intelligence, National Crime Agency (NCA)) Phil Larratt (Director of Investigations, Chainalysis)  This website may contain links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. Our podcasts are for informational purposes only, and are not intended to provide legal, tax, financial, or investment advice. Listeners should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material.  Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Chainalysis. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Chainalysis employees are those of the employees and do not necessarily reflect the views of the company.

RTL Matin
ÉCRANS - 3 questions à Damien Bancale, expert en cyber-intelligence

RTL Matin

Play Episode Listen Later Jun 13, 2024 4:49


Addiction aux écrans : Emmanuel Macron veut interdire les téléphones portables aux moins de 11 ans. Réaliste ? Damien Bancale, expert en cyber-intelligence et high-tech, est l'invité de Jérôme Florin. Ecoutez Les trois questions de RTL Petit Matin avec Jérôme Florin et Marina Giraudeau du 13 juin 2024

L'invité de RTL
ÉCRANS - 3 questions à Damien Bancale, expert en cyber-intelligence

L'invité de RTL

Play Episode Listen Later Jun 13, 2024 4:49


Addiction aux écrans : Emmanuel Macron veut interdire les téléphones portables aux moins de 11 ans. Réaliste ? Damien Bancale, expert en cyber-intelligence et high-tech, est l'invité de Jérôme Florin. Ecoutez Les trois questions de RTL Petit Matin avec Jérôme Florin et Marina Giraudeau du 13 juin 2024

Reasons We Serve
Episode 62 retired United States Secret Service Special Agent Richard LaTulip

Reasons We Serve

Play Episode Listen Later May 26, 2024 67:49


Years of Service: 1995-2020Richard began his law enforcement career with the United States Border Patrol in 1995. Richard was stationed in the San Diego Sector, Chula Vista Station. In 1998, Richard was hired by the United States Secret Service and was assigned to the San Diego Field Office. Richard's career with the Secret Service was atypical of a normal Secret Service Special Agent in that he quickly developed expertise in Cyber Intelligence and often investigated financial and cyber crimes and conducted critical infrastructure analysis. Richard was the undercover agent for an international cybercriminal operation called Operation Carder Kaos from 2005 to 2008. During his time with the Secret Service, operations took him all over the world including Macau, China, Bangkok, Turkey, and Dubai.

ITSPmagazine | Technology. Cybersecurity. Society
Unveiling the World of Bad Bots: Insights from Imperva's 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2024 21:38


The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.Unraveling the Bad Bot LandscapeThe conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.Delving into Key StatisticsErez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.Industry Insights and Use CasesThe conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.Transforming Data into ActionSean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.AI's Role in Bot EvolutionThe discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.Safeguarding Against Bot AbuseThe conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.ConclusionAs the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Erez Hasson, Product Marketing Manager at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/erezh/ResourcesLearn more and catch more stories from Imperva: https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Unveiling the World of Bad Bots: Insights from Imperva's 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later May 7, 2024 21:38


The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.Unraveling the Bad Bot LandscapeThe conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.Delving into Key StatisticsErez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.Industry Insights and Use CasesThe conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.Transforming Data into ActionSean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.AI's Role in Bot EvolutionThe discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.Safeguarding Against Bot AbuseThe conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.ConclusionAs the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Erez Hasson, Product Marketing Manager at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/erezh/ResourcesLearn more and catch more stories from Imperva: https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Future of Everything presented by Stanford Engineering

With TikTok in the hands of 170 million Americans, cybersecurity expert Amy Zegart says it's time to talk about consequences. Foreign access to all that data on so many Americans is a national security threat, she asserts. For those as concerned as she, Zegart has good news and bad. The government has gotten better at fighting cyberthreats, but artificial intelligence is making things very complicated, very fast. The US needs to adapt quickly to keep pace, Zegart tells host Russ Altman on this episode of Stanford Engineering's The Future of Everything podcast.Episode Reference Links:Amy Zegart's Stanford ProfileHoover Institution Profile: WebsiteEp.20 How Vulnerable Are We to Cyber Attacks? (Amy's previous episode on The Future of Everything)Connect With Us:Episode Transcripts >>> The Future of Everything WebsiteConnect with Russ >>> Threads or Twitter/XConnect with School of Engineering >>> Twitter/XChapters:(00:00:00) Introduction Host Russ Altman introduces guest Amy Zegart, a cybersecurity expert from Stanford University.(00:02:37) Government and Cybersecurity SpeedsHow AI has changed the pace at which both government and cyber attackers operate, and the evolving dynamics of cybersecurity efforts.(00:04:12) Corporate CybersecurityThe unexpected role of the SEC in regulating corporate cybersecurity efforts and how the cyber attack surface has expanded beyond traditional big industries(00:07:30) Global Cyber Threats and PreparednessInsights into the strategic use of cyber operations by other countries, and the multifaceted nature of international cyber relations.(00:09:13) Cyber Dynamics in the Russia-Ukraine ConflictThe cyber aspects of the Russia-Ukraine conflict and its implications for global cybersecurity strategies.(00:11:35) Misinformation and Disinformation DynamicsThe difference between misinformation and disinformation, their impacts on society and the challenges in combating them.(00:15:04) TikTok and National SecurityRisks associated with TikTok as a platform controlled by Chinese interests, discussing data privacy and potential for foreign influence.(00:20:11) Corporate Power in AI and National SecurityThe role of corporations in national security through their control over AI, and the challenges this poses for regulation and innovation.(00:22:47) Learning from Cybersecurity to Manage AI RisksLessons from cybersecurity that could help manage emerging AI risks, highlighting the need for developing independent AI research capacities.(00:26:44) European Regulation and Global AI SafetyThe European approach to AI regulation and data protection, advocating for international AI safety norms and collaborative efforts.(00:29:21) AI's Role in Enhancing IntelligenceHow AI can transform intelligence services, and advancements that could lead to significant efficiency gains in national security.(00:31:23) Conclusion  Connect With Us:Episode Transcripts >>> The Future of Everything WebsiteConnect with Russ >>> Threads or Twitter/XConnect with School of Engineering >>> Twitter/X

Intelligence Matters: The Relaunch
Cyber Intelligence: Andrew Boyd

Intelligence Matters: The Relaunch

Play Episode Listen Later Apr 24, 2024 37:30


Andy speaks with former CIA Center for Cyber Intelligence Director Andrew Boyd about protecting systems from the most sophisticated cyber terrorism and hacking attempts. Andrew outlines the current cyber threats posed by China, Russia, Iran, North Korea, and non-state actors like ransomware groups. Andy and Andrew also discuss the US cybersecurity strategy, partnerships between the government and the private sector, and challenges around emerging technologies like AI. 

A Journey Into Fraud Prevention
Episode with Jeannie Tully

A Journey Into Fraud Prevention

Play Episode Listen Later Mar 20, 2024 37:51


On today's episode, I had the pleasure of chatting with Jeannie Tully, Fraud and Risk professional with diverse experience in Banking, Fintech, eCommerce, and Cyber Intelligence. Jeannie is working on a very important consumer project together with Elena, who came to my podcast a couple of episodes ago. The project proves that Jeannie has a big heart and a project focused on helping people who end up in very hard situations.

State Secrets
Villains, Victims and Vendors in Cyberspace

State Secrets

Play Episode Listen Later Feb 19, 2024 34:00


Former Director of CIA's Center for Cyber Intelligence (and Cipher Brief Expert) Andrew Boyd talks to State Secrets about the dynamic relationship between villains, victims and vendors operating in cyberspace. The CIA, he says, has been paying close attention to cyberspace “since the dawn of IP”, so what lessons can he share about how spies, thieves and nation states are using the domain to find and exploit victims and how the private sector and government are partnering to track them down.

Les matins
Palantir, quand la sulfureuse entreprise de cyber intelligence devient rentable !

Les matins

Play Episode Listen Later Feb 13, 2024 3:03


durée : 00:03:03 - Un monde connecté - par : François Saltiel - Palantir, société américaine de Big Data, est devenue rentable pour la première fois.

A Journey Into Fraud Prevention
Episode with Elena Chen Michaeli

A Journey Into Fraud Prevention

Play Episode Listen Later Jan 31, 2024 60:02


On today's episode, I had the pleasure of chatting with Elena Chen Michaeli, a seasoned Fraud and Risk Strategist with diverse experience in Banking, Fintech, eCommerce, and Cyber Intelligence. Her holistic approach encompasses mentoring, advocacy, and roles like advising on the CPFPP certification, cementing her commitment to fortifying digital realms. In this episode, she shares her journey in fraud prevention as a professional from a different perspective, as an individual consumer. Elena also published the Udemy course: Introduction To The Neuroanalytics Of Fraud. The course outlines the necessary skills and partnerships that are paramount in fraud prevention. We're offering FREE course registration to the FIRST 100 students who use the exclusive code POYEHALI during registration. Don't miss this limited opportunity to delve into the world of fraud prevention and cyber intelligence with Elena Michaeli. Elevate your knowledge and skills today! Follow the link for a complimentary registration: https://www.udemy.com/course/neuroanalytics-of-fraud/?couponCode=POYEHALI Do you want to know about Elena's journey jump on it and listen!

Small World, Big Problems
Inside Cyber Intelligence: Exploring the Global Cyber Threat Landscape and US Cyber Policy

Small World, Big Problems

Play Episode Listen Later Jan 26, 2024 36:02


Cyber operations are becoming increasingly ubiquitous as a means for nation state and non-nation state actors to engage in intelligence collection, subversion, and strategic competition more broadly. As our world becomes more thoroughly networked and as more data travels throughout cyberspace, the potential power of cyber operations and the urgency of cyber security grow exponentially. Cyberspace has increasingly become a heated, persistent domain of competition between nation state and non-nation state actors alike, and both the US government and private sector are working feverishly to increase their capacity to understand it and operate within it.Luke Litle sits down with Prof. Andrew Boyd, who recently retired as the director of the CIA's Center for Cyber Intelligence (CCI) and is now serving as an adjunct professor in the Alperovitch Institute at JHU SAIS. They discuss his transition from the human intelligence field to cyber intelligence, the ways US competitors and adversaries are using cyber tools to advance their national interest, current US efforts to develop and define its own cyber policy, the fusion of public and private sector cyber security efforts, and opportunities to serve in the cyber realm within the US government and private sector.

The National Security Podcast
Why big tech is now in the geopolitical driver's seat

The National Security Podcast

Play Episode Listen Later Jan 11, 2024 47:02


Technological innovation is now one of the most consequential realms of geopolitical contestation. And in the era of big tech, the private sector has assumed power that once resided with governments. In response, we've seen a reassertion of industry policy, with governments trying to re-establish control. What happens to Australia's national security when private companies, such as TikTok, are in the geopolitical driver's seat? And how can policymakers keep up with this ever-changing industry? In this episode of the National Security Podcast, Bec Shrimpton from the Australian Strategic Policy Institute, joins Katherine Mansted in conversation to explore the rapidly changing landscape of big tech. Bec Shrimpton is the Director, Defence Strategy and National Security at the Australian Strategic Policy Institute.Katherine Mansted is a Senior Fellow at the ANU National Security College, and the Executive Director, Cyber Intelligence at CyberCXShow notes: National Intelligence Community and National Security College Scholarship for Women: find out more This episode was first published on Thursday, March 30, 2023.We'd love to hear from you! Send in your questions, comments, and suggestions to NatSecPod@anu.edu.au. You can tweet us @NSC_ANU and be sure to subscribe so you don't miss out on future episodes. The National Security Podcast is available on Acast, Apple Podcasts, Spotify, and wherever you get your podcasts. Hosted on Acast. See acast.com/privacy for more information.

Bribe, Swindle or Steal
Pegasus and Compliance in the Age of Cyber Intelligence

Bribe, Swindle or Steal

Play Episode Listen Later Jan 3, 2024 24:04


Chaim Gelfand, Vice President, Compliance, at NSO Group joins the podcast to talk about managing compliance for a product that has, baked into its design, complex privacy, corruption and human rights implications. Because of the controversial nature of spyware, we will hear from journalist Khadija Ismayilova next week about the allegation that spyware was installed on her cell phone and her concerns about abuse of the technology. Podcast originally aired: March 8, 2023

Main Street
Cyber Intelligence for Non-Techies ~ The Blenders Holiday Tour ~ Natural North Dakota

Main Street

Play Episode Listen Later Dec 11, 2023 49:12


Monday, December 11, 2023 – We visit with former NPR Investigative Reporter Dina Temple-Raston about her new podcast, Click Here. It examines the world of cyber intelligence. A special 5-part series is airing on Prairie Public. ~~~ Originally from Fargo, North Dakota, The Blenders have been based in Minneapolis, MN since 1994, and are renowned for their distinctive vocal and harmony-driven music, which they've been showcasing across the U.S. for over three decades. The Blenders' Annual Holiday Soul Tour returns to The Historic Fargo Theater for their 24th year December 12-17! ~~~ We share a Natural North Dakota essay, Animals in Winter.

Smart City
DEDUCE: allo studio il primo sistema automatico di moderazione dei social che tiene conto della personalità dell'utente

Smart City

Play Episode Listen Later Nov 27, 2023


La ricerca di soluzioni all’epidemia di odio e disinformazione sui social media, include lo sviluppo di sistemi automatici di moderazione dei contenuti che possano disinnescare la diffusione di falsità o comportamenti violenti. A questa situazione tenterà di porre rimedio DEDUCE, progetto ideato da Stefano Cresci, ricercatore dell’unità Cyber Intelligence dell’IIT-CNR, a cui lo European Research Council ha assegnato uno starting grant da 1,5 milioni di euro per sviluppare un sistema di moderazione automatica di nuova concezione. Al contrario dei sistemi odierni, DEDUCE sarà capace di tenere conto del profilo dell’utente, oltre che indipendente, verificato e open source. Ne parliamo con Stefano Cresci.

Cybercrime Magazine Podcast
Hidden Risk. Investing In Cyber Intelligence. Bob Maley, Black Kite.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 23, 2023 8:43


Bob Maley is the Chief Security Officer at Black Kite. In this episode of Hidden Risk, he joins host Charlie Osborne to discuss the topic of investing in cyber intelligence. An award-winning intelligence platform, Black Kite is disrupting traditional third-party risk management practices worldwide by providing cybersecurity experts with full visibility they've never experienced before. Learn more about our sponsor at https://blackkite.com.

Private Practice Made Perfect
Understanding Cybersecurity & Cyber Intelligence in the Allied Health Space

Private Practice Made Perfect

Play Episode Listen Later Oct 8, 2023 41:30


Worried about your clinic's cybersecurity? Make sure you tune into this jam-packed episode with Martin Haak – the Founding Director of Infinite Edge. To put it simply, Infinite Edge helps their clients elevate their cyber intelligence.  Listen as Marty discusses how Allied Health business owners use technology and the strengths, weaknesses, opportunities, and threats associated with it. He dives deep into the importance of knowing where your data is, why you need to implement proper training, the differences between IT and cybersecurity that every business owner should know, and how fast the cyber intelligence scene is moving. Topics covered on tackling cybersecurity, cyber intelligence, and using AI: Discover what is considered the weakest link in cybersecurity, the most common cyber scams to look out for, and why you need solid onboarding and offboarding processes. Knowing the risks of cyber intelligence, busting common cyber intelligence misconceptions, and the art of optimising and securing. The risks Marty sees in using AI in business, what you need to prepare for, and his top tips for navigating AI platforms like ChatGPT. Connect with Martin Visit Martin's Website  Follow Martin on Instagram (@infiniteedgetechnology)  Connect with Martin on Facebook  Connect with Martin on LinkedIn    Connect with Nacre Consulting:  Join the Accelerator Mastermind  Complete the Allied Health Biz Quiz  Let's connect on Instagram  Follow us on Facebook  Let's connect on LinkedIn  Join our Facebook Group online community  More about The Private Practice Made Perfect Show:  The Private Practice Made Perfect podcast is a much loved conversation for those wanting to hear real life Australian Allied Health business stories, adventures and the occasional confession.  The outstanding guest list includes business owners and wonderful small business supporters such as accountants, marketers, bookkeepers, IT wizards, virtual assistants, lawyers and more.  As you know, it takes a village to run a business. Cathy gathers the tribe, captures the collective wisdom and conveniently delivers it to your earbuds.  All episodes are chatty, honest and practical… warning… we often stray from the topic, talk of wine and laugh loudly. See omnystudio.com/listener for privacy information.

Parenting Our Future
Outfoxing Cyber Criminals

Parenting Our Future

Play Episode Listen Later Jul 11, 2023 49:10


This interview blew my mind!! You are going to love it! And not only that, you're going to want to share it with everyone you know! Cyber security expert, Maria-Kristina is my guest and not only does she have an impressive resume (worked at the Pentagon to name one), she is so fun to talk to! We are talking about how to protect your family from cyber criminals. Maria-Kristina breaks things down in a really simple to understand way which is one of the reasons I love her! We talk about the two main areas of risk to look out for, how to be the “Chief Information Officer” of your home, and what to do if you have been involved in a cyber security breach. In this episode, we talk about teaching our kids to have a “general scepticism”, to notice if they feel fear or shame when interacting online, and using those feelings as a red flag to alert them that something's not right. It's time to talk to our kids about ai and deep fakes because they are becoming more and more common and sophisticated. She also suggests that we use the “grocery store rule” in sharing personal information with others.  From the episode, the links we mentioned are below: Sextortion video: https://youtu.be/v5d9-zifXn4 Cyber Security Breach: www.haveibeenpwned.com Keeping your information out of the hands of criminals using Kanary: https://www.kanary.com/?outfoxm#sign-up (Get one month free with this link) Please share this episode with friends and family. You will save them from worry and stress that can absolutely be avoided. For Maria-Kristina's "Home Network Security 1-Pager", you can download it from the Parent Toolbox. www.parent-toolbox.com About Maria-Kristina Hayden Maria-Kristina is an internationally recognized expert in cyber hygiene and resiliency. Her mission is to raise global levels of cyber-risk awareness and enable organizations (and individuals) to take control back from cybercriminals. She has delivered security awareness sessions and wargames to over 15,000 people worldwide. She is a sought-after keynote speaker, author, and 2022 recipient of the Women in Technology Excellence “Security Leader of the Year” award. Maria-Kristina is CEO & founder of OUTFOXM INC, the world's first boutique consulting firm advising Fortune 500 enterprises on immersive cyberattack simulations and human-cyber risk. In prior positions she led the Bank of New York Mellon's Cyber Wargaming program, served as a Cyber Intelligence Officer for the Defense Intelligence Agency (DIA), supported the U.S. military as an Air Force civilian at the Pentagon, and served as a Congressional researcher in the House of Representatives. She holds a Master's degree in Cyber Intelligence from the National Intelligence University and a Bachelor's degree in Security Studies from Georgetown. Social Media: Website: https://www.outfoxm.com  LinkedIn: https://www.linkedin.com/company/outfoxm/ Facebook: @outfoxm Instagram: @outfoxm YouTube: @outfoxm About Robbin Robbin is a Certified Parent Coach, author, podcaster and speaker. Her work focuses on building and strengthening the parent child relationship so that children grow up with resilience, confidence and strong emotional intelligence. She works with parents to help them understand their own emotions and frustrations in parenting, so they can help build their children's sense of self without losing themselves in the process! Robbin's award-winning podcast, Parenting our Future, is ranked in the top one percent of all podcasts globally. And she is recognized as one of the “Top Moms in Podcasting” by Podcast Magazine in 2020 & 2022.   Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Eric Tillman: A creative way into cyber. [Intelligence] [Career Notes]

The CyberWire

Play Episode Listen Later Jul 9, 2023 11:24


Eric Tillman, Chief Intelligence Officer at N2K Networks sits down and shares his incredibly creative journey. Eric loved being creative from a young age. When he started to think about a career he wanted to incorporate his love of creativity into his love for tech and turn it into an intelligence career. Eric started by joining the Navy, which set him on this path to work in cyber where he shared his talents with several big companies, including, Booz Allen Hamilton, Lockheed Martin, and Okta, eventually ending up at our very own N2K Networks. Eric shares the advice that there is something for everyone in this field, and even though he wanted to start his journey in a creative way, he found that combining his love for tech and art helped him to pave the way to where he is now. He says " A lot of people get here from a very technical background and um, it really almost doesn't matter um, where you came from, there is something in cybersecurity that takes advantage of the skills that you bring to the table and, um, either way, there's plenty of room here for everyone." We thank Eric for sharing his story with us.

Career Notes
Eric Tillman: A creative way into cyber. [Intelligence]

Career Notes

Play Episode Listen Later Jul 9, 2023 11:24


Eric Tillman, Chief Intelligence Officer at N2K Networks sits down and shares his incredibly creative journey. Eric loved being creative from a young age. When he started to think about a career he wanted to incorporate his love of creativity into his love for tech and turn it into an intelligence career. Eric started by joining the Navy, which set him on this path to work in cyber where he shared his talents with several big companies, including, Booz Allen Hamilton, Lockheed Martin, and Okta, eventually ending up at our very own N2K Networks. Eric shares the advice that there is something for everyone in this field, and even though he wanted to start his journey in a creative way, he found that combining his love for tech and art helped him to pave the way to where he is now. He says " A lot of people get here from a very technical background and um, it really almost doesn't matter um, where you came from, there is something in cybersecurity that takes advantage of the skills that you bring to the table and, um, either way, there's plenty of room here for everyone." We thank Eric for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Bribe, Swindle or Steal
Pegasus and Compliance in the Age of Cyber Intelligence

Bribe, Swindle or Steal

Play Episode Listen Later Jul 5, 2023 24:04


The first episode of a two-part series, Chaim Gelfand, Vice President, Compliance, at NSO Group talks about managing compliance for a product that has, baked into its design, complex privacy, corruption and human rights implications. Because of the controversial nature of spyware, we hear from journalist Khadija Ismayilova in the second episode about the allegation that spyware was installed on her cell phone and her concerns about abuse of the technology. (This episode was originally published in March 2023.)

hive with us podcast network
Ep 375: Entrepreneurship, Burnout, And Chat GPT/ Cyber Intelligence With Dr. Lance Knaub

hive with us podcast network

Play Episode Listen Later May 30, 2023 48:57


www.denaliconsultingteam.com 210-972-1842 text "course" to learn how to make 6 figures on one land deal, Text "Hive" to learn more about the hivemind. Text "apple" to schedule a 1-on-1 call with Anthony & Daniel. Text "land" to join The Million Dollar Land Mastermind Sign up at hivemindcrm.io Need Inbound Real Estate Leads. www.hiveleads.io Follow Us On YouTube https://www.youtube.com/channel/UCbulcrC4WbOy5Fzu0eWzNVQ/?sub_confirmation=1 Follow Us On Instagram https://www.instagram.com/hivemindcrm/ Follow Us On TikTok https://www.tiktok.com/@hivemindcrm?lang=en Join The FB Group https://www.facebook.com/groups/137799891494707 Help support the show https://anchor.fm/hivemindcrm/support --- Support this podcast: https://podcasters.spotify.com/pod/show/hivemindcrm/support

... Just To Be Nominated
Guy Pearce betrays his country in 'A Spy Among Friends'

... Just To Be Nominated

Play Episode Listen Later Apr 3, 2023 15:20


Whether it's Sean Connery, Roger Moore or others portraying James Bond, or Tom Cruise as Ethan Hunt in the "Mission: Impossible" film series, we find ourselves sucked into the world of espionage thanks to the spy genre of television shows and movies. In this week's episode of Streamed & Screened, hosts Bruce Miller and Terry Lipshetz have a brief discussion of the genre to set up a conversation with Guy Pearce, the star of "Spy Among Friends," a limited series available now on MGM+. Read more: Guy Pearce, Damian Lewis ponder betrayal with 'Spy Among Friends' About the show Streamed & Screened is a podcast about movies and TV hosted by Bruce Miller, a longtime entertainment reporter who is now the editor of the Sioux City Journal in Iowa and Terry Lipshetz, a senior producer for Lee Enterprises based in Madison, Wisconsin. Episode transcript Note: The following transcript was generated by Podium.page and may contain misspellings and other inaccuracies as it was generated automatically: 0:00:03Welcome everyone to another episode of streamed and screened in an entertainment podcast about movies and TV from Lee Enterprises. I'm Terry Lipshetz, a senior producer at Lee and cohost of the program with Bruce Miller, editor of the Sioux City Journal and a longtime entertainment reporter. Bruce, I I wanna pass you a note. I've got some secrets. Do you have any secrets? Can you share anything? Yeah. Send me a text. Okay? That might be the best. 0:00:28In the old days, you know, spies were so much different because they would sit on a park bench and they pass an envelope between each other. Right? Right? Now it's like we're hacking into systems and we're going to we always you notice how they always have that clock that counts down until the file is uploaded, and it's like, oh, is it gonna happen? Is it gonna happen? Well, there, all you had to worry about was did somebody grab the envelope or are you just letting it go? So it is a different world. 0:00:57And there's a new mini series or limited series, whatever you wanna call it, that has been airing in Great Britain already, and it got huge reviews. They loved it over there. It's called a spy among friends. And we're getting it now on MGM Plus. And it is the the sort of true story of Kim Philby. You probably have never heard of Kim Philby at all. But he was a traitor to Great Britain. He was a spy, but he was getting information from Russia. And when they found out that he was defecting to Russia, they sent his friend to try and talk to him about all of this. And, like, would you keep this information? I don't know how I could ever be a spy because I talk too much. And I think I I would tell too much. But that your your best friend could not guess that you were gonna be a traitor. And, you know, wouldn't you have dropped some kind of message about this? I find that just really hard to believe. Yeah. But but yeah. And that was a big scandal in the sixties. And people remember the name Kim Philby because he was this trader who went to Russia. And he was very well known. Today, it doesn't graze the radar. People really don't know who he is, or who his friends were. 0:02:17But the film, which kind of looks at the class system that's very popular in Great Britain, tries to explain all of that by that because there was a group of young man who thought that they were if you will, better than other people because they went to the right schools, they had the right majors, they had the right connections, their parents were probably somebody. And as Damian Lewis says, they dabbled in communism. And so they thought that this was kind of a cool thing that we could do, and they wouldn't be caught for anything like this. Well, Kim Philby, didn't just dabble. He was doing a little bit more with all of that. And I got a chance to talk to Guy Pierce who plays Kim and he was talking about acting acting and acting as a spy. How much acting is involved with all of that? Do you really Do you feel you need to pretend all the time? And he said this class system is something that kind of it didn't matter. You didn't have to do that because they just accepted whatever you were doing was just temporary, and they were allowed to do that. And he and the the creator of the series, Alexander Carey, talk about how this is kind of important again today. Because we're seeing a class system that's being created in just all parts of the world, where some people think they're above the law, and they don't have to worry about consequences. And then others who don't don't seem to be able to catch a break no matter what. That's fascinating. 0:04:00What's your general thought on on spy movies and TV shows in general? Do you do you enjoy them? Do you get sucked in? Oh, you know it. I I it's strange how something like James Bond has changed so drastically. Because in those early days, you know, with Sean Connery, maybe Roger Moore, who didn't they did a lot of things that was they they were just conversational. That's how they got their information. And then they started getting all those toys. And then they started having gadgets and, you know, I mean, come on. Where do you find all this stuff? And how would you be able to create all this? And then you have all these kind of inched people. How do you keep anything from somebody else that they wouldn't know? Today, it's so over the top. Look at how, you know, it takes several years for somebody like Tom Cruise to make one of his spy films. So it's a it's a different game. I think it's changed. But I think they suck you in all the time because you always wonder That was the bad guy. I'm not really sure I know who the bad guy is. 0:05:06Did you see the spy a couple years ago. That was the one. It starred Sasha Baron Cohen, you know, who everybody knows is Borr at, but he did a really serious take He played Eli Cohen, who's a Israeli, and he was spying in the nineteen sixties. And ultimately was caught, but it was the the true life story and it was a very serious role for him. But it was a real fascinating look into into espionage. 0:05:36Could you be a spy? I thought about it. I I think I could. Really? Yeah. I don't know how you do that in school, where you say, alright, I'd like to go on the spy track, please. Could I please take those classes that are necessary for that? I I couldn't. I know I couldn't. Because the I mean, I can keep a secret, but I don't think I could like the Americans, I don't know I could do what they did, where you just suddenly assume new identities and live among people for years, and then you're kind of trying to get a little bit of information out to the others. I don't know that I could do that. At some point, I would break. 0:06:12And I think where they always go wrong with these kinds of films is they have families. Right. And I think a true spy has no connections. That's why you see James Bond as such a good spy. Because he always seems to be a loner. Once they get him with somebody, then it becomes, uh-oh, I've got to worry about somebody killing this person. You know, to get to me. So if you're as bi, you should be a loner. It never worked out well for for James Bond in those movies because he would he would either meet someone and they would end up dead or they would end up turning on him. 0:06:51Well, could you imagine that this day if you were, like, googling pussy galore, I think it's a reminder. I think it's a reminder. You know, they in when that movie became out, they released trading cards for that movie. Did you say that? No. Because I I wasn't born back numbers, but but they changed the name of that character to Kitty Galore because we couldn't we couldn't go that. It's a little too dirty for the kids back in the sixties. So, yeah, that that was always kind of fun, Goldfinger. But, yeah, I I don't know if I could be a spy. 0:07:29Like, it it always sounds cool, but then you think about, well, you got all these crazy secrets. You can't settle down with the family. Somebody's gonna keep a secret in your own house. If you get kids, come on. They don't have work. They do. Right? 0:07:43I always wonder too when watching things like mission impossible. You know, that that that this recording will self destruct in ten seconds. But it it goes up in flames. Nobody notices that. Nobody sees this, like, flaming package that's sitting next to you on the train and and it does it not set off as smoke alarm? 0:08:02You know, for many years, studios would send out DVDs of their films. And they would disintegrate. I mean, after you had watched it once, you couldn't watch it again. And they always said, well, that's how they should have done that stuff. Because a tape recorder that's burning yeah. That's not gonna happen. Not a problem. That might that might raise a couple of red flags. 0:08:25Well, and you could never rerun. You know, you never could go back and look at a scene again. You saw once. It's on your computer. That's it. It's done. Now you can go back to screening lengths and go back and see things if you wanna look at the more than once. 0:08:39But yeah. So the spy world? No. The the best best thing about me is I couldn't remember anything because I think I've learned so much in my lifetime. There's so much crap in my head. That we have to we have to empty the trash at some point to try and remember these things. So if you put me under oath and had a lie detector and everything hooked up, I'd be good because I couldn't remember a darn thing that you'd told me. 0:09:04Does did Guy Pierce talk about at all? Like, how he how he researched for this. Yes. You're using. He did. And and that's that's in the interview. I want you to listen to the interview, you know, talk to some of the kind of research he did. And how it would kind of work for him? How he would be as a if he could be a spy? So there's a lot of interesting things there. I think you should unpack it. It's not that long. 0:09:29We have Guy Pierce and Alexander Carey talking about a spy among friends. Can a spy really have a friend? I think I think friendship is the main currency of of spies. I think that I think I think I mean, it's a good question because on one side of the relationship, yes, that question is pertinent. On the other one, it's pertinent in a different in completely the opposite way. Yeah. It it just it struck me as if I were a spy, I would not be friendly with anybody. I would just let it go. But there also is an element of acting that's involved. And Guy, would you make a good spy? Well, look, I I may make a good spy, you know, on the surface, but I mean, of course, I can work as an actor on screen but it's never a life or death situation. I don't know how I'd I don't know how if I've got the Hutzpa to to, you know, act as well when I know that there are lives or countries or at stake. So probably not, I think, is the answer. 0:10:40How does spies operate today when there's just so many ways that the truth could come out? Is it a a whole different world and what? Because the the sixties is kind of a a a real romantic period at at least for spies. Well, you're I think in the sixties, human intelligence, in other words, human to human getting information in sort of bars and on park benches and all the rest of it was a reality. And and was the the the the the main way of of getting and passing information these days. There's a lot more of sort of cyber espionage and all the rest of it. And I think you'll find that in various intelligence agencies. There are also still two factions. You know, there's the there's the one that goes, well, human intelligence is really the only the way that you're gonna get the definitive stuff or the stuff that's gonna be, you know, keep on giving. And then there are people who are gonna go, no. Let's just put a drone up. So so So, you know, they're very different these days. But Yeah. But that's the friendship thing. The friendship thing is important for a spy. Yeah. It doesn't seem as much fun, but maybe I'm wrong, never been a spy, can't can't weigh in. 0:11:52Guy, how much did you read about him before you actually started doing this? Did you know much about him or not? I didn't know a lot. No. I mean, I'd seen a couple of films that had been made and I'd seen a documentary once about the Cambridge five. So I didn't know a lot. I knew of Kim Filby, of course, but knew no detail about about him really and certainly knew nothing about this relation it between he and Nicholas Elliott. 0:12:17I read a number of books before we started and through the course of making the show. One in particular, I think, was a was a helpful piece, which was written by Eleanor, his third wife, his American wife, the wife that he was with in Beirut when he when he left. She wrote a book that that that looked at some of the letters between the two of them, you know, that published the letters between the two of them through that time. So there was something personal and human about the way she wrote. And so that was an interesting little way in for me into into Filby. But, yeah, I read I read bits and pieces of all sorts of things before we started. But of course, I always would would come back to the the script. 0:13:07And at a certain point, I find I have to sort of let the let the research material go. Were there things you could relate to? And did you like him at all or not? I never know the answer to the liking question because whilst making I'm so in I'm so embedded in into him that I lose myself in a way. So it's not necessarily that I have then have an opinion of him. I'm I'm I'm so sort of, yeah, lost in trying to just become and understand him. I think the bigger question is is is whether I understand him and and, you know, I'm that's what I'm searching to do through the process and and, you know, you can probably only understand any character, you know, this much at the best of times when you're dealing with someone like Philby, you can probably only understand him this this much because he's a mystery to everybody. So it was a complex and challenging process. Yeah. Well, thank you. Both it's been so exciting to watch this unfold. And I'm just playing dumb through the whole thing. I'm not I'm not looking ahead to find out anything. I don't wanna know anything, but it is fascinating. It's a a different world, a different time. So thank you so much. Thank you very much. Thanks, Bruce. Nice to meet you. Alright, Bruce. Thanks for that interview. A fascinating discussion there. 0:14:37Did you get to talk to anybody else from that Phils from that series. Who is who plays the friend that, you know, has to try and talk to this Kim Philsby. I did get to talk to him. And I do have a story Maybe you can add a link to this. And if you don't wanna read, you'll see some more stuff from him about this whole project. But it's a six part limited series on MGM plus. And, Eric, could you do anything this next week that I worry about? I'll know you're a spy. Sounds good, Bruce. So we'll have a link to that article in the show notes of this episode. And otherwise, we will see you next week with another episode of streamed and screamed. Have a great one.See omnystudio.com/listener for privacy information.

The National Security Podcast
Why big tech is now in the geopolitical driver's seat

The National Security Podcast

Play Episode Listen Later Mar 30, 2023 47:26


Technological innovation is now one of the most consequential realms of geopolitical contestation. And in the era of big tech, the private sector has assumed power that once resided with governments. In response, we've seen a reassertion of industry policy, with governments trying to re-establish control. What happens to Australia's national security when private companies, such as TikTok, are in the geopolitical driver's seat? And how can policymakers keep up with this ever-changing industry?In this episode of the National Security Podcast, Bec Shrimpton from the Australian Strategic Policy Institute, joins Katherine Mansted in conversation to explore the rapidly changing landscape of big tech.Bec Shrimpton is a Director at the Australian Strategic Policy Institute, responsible for convening The Sydney Dialogue. Katherine Mansted is a Senior Fellow at the ANU National Security College, and the Director of Cyber Intelligence and Public Policy at CyberCX. Show notes: National Intelligence Community and National Security College Scholarship for Women: find out more We'd love to hear from you! Send in your questions, comments, and suggestions to NatSecPod@anu.edu.au. You can tweet us @NSC_ANU and be sure to subscribe so you don't miss out on future episodes. The National Security Podcast is available on Acast, Apple Podcasts, Spotify, and wherever you get your podcasts. Hosted on Acast. See acast.com/privacy for more information.

Bribe, Swindle or Steal
Pegasus and Compliance in the Age of Cyber Intelligence

Bribe, Swindle or Steal

Play Episode Listen Later Mar 8, 2023 24:04


Chaim Gelfand, Vice President, Compliance, at NSO Group joins the podcast to talk about managing compliance for a product that has, baked into its design, complex privacy, corruption and human rights implications. Because of the controversial nature of spyware, we will hear from journalist Khadija Ismayilova next week about the allegation that spyware was installed on her cell phone and her concerns about abuse of the technology.

Risky Business
An interview with Andrew Boyd, director of the CIA's Centre for Cyber Intelligence

Risky Business

Play Episode Listen Later Feb 23, 2023 52:39


In this interview the director of the CIA's Center for Cyber Intelligence (CCI) sits down with Risky Business podcast host Patrick Gray to talk about: What CCI actually does The CIA's role in cyber intel and operations What lessons have been learned from Russia's cyber campaigns targeting Ukraine Why a cyber conflict with China will be very, very different His views on the ransomware threat Much, much more

Risky Business
An interview with Andrew Boyd, director of the CIA's Centre for Cyber Intelligence

Risky Business

Play Episode Listen Later Feb 23, 2023


In this interview the director of the CIA's Center for Cyber Intelligence (CCI) sits down with Risky Business podcast host Patrick Gray to talk about: What CCI actually does The CIA's role in cyber intel and operations What lessons have been learned from Russia's cyber campaigns targeting Ukraine Why a cyber conflict with China will be very, very different His views on the ransomware threat Much, much more

Jacobs: If/When
Talent Enablement: Bringing Out Their Best

Jacobs: If/When

Play Episode Listen Later Feb 21, 2023 29:22


Shannon Miller is an Executive Vice President and President of Jacobs' Divergent Solutions operating unit, responsible for delivering creative innovative, next generation cloud, cyber, data and digital solutions across the company to enable our customers and partners globally.  She leads our Cyber & Intelligence, Platforms, Technologies & Software Solutions and Technology & Innovative Solutions business units and partners with our Critical Mission and People & Places lines of business to accelerate growth by creating scale in the related skills and business approaches, driving meaningful value for our clients and partners around the globe. Over her almost 25-year career at Jacobs, Shannon has had a rich and varied journey, starting as a process engineer and evolving into project management, sales, operations and human resources leadership – spanning multiple industries including technology, resources, infrastructure, pharmaceutical and consumer products with assignments in the U.S., Europe, Australia and Canada. Most recently Shannon was Chief Growth Officer and lead for Enterprise Risk Management. She holds a Bachelor of Science degree in Chemical Engineering from the Colorado School of Mines.

עוד פודקאסט לסטארטאפים
[מובילי חדשנות] על תחבורה ציבורית, בינה מלאכותית ומה שביניהם

עוד פודקאסט לסטארטאפים

Play Episode Listen Later Jan 31, 2023 78:13


"חדשנות על הבר" היא סדרה מיוחדת במסגרתה מובילי עולם הכלכלה והחדשנות הישראלית מרואיינים על ידי בכירי רשות החדשנות. קצת על האירוע:  הפעם, נשאל איך שילוב טכנולוגיה של בינה מלאכותית בעולם התחבורה ישפיע על הפקקים שלנו, יוריד את העומס בכבישים, יסייע בהאצת מהפיכת הרכבים האוטונומיים ועוד. קצת על הדוברים: שי אגסי, משמש כיו"ר מאקאלו אופטיקס, הוא יזם בתחומים מגוונים. הוא הקים מספר סטארטאפים שנמכרו לחברת סאפ העולמית, שם שימש כנשיא החברה עד שנת 2007 והוביל שינויים גדולים בפלטפורמה הטכנולוגית ובמוצרי החברה. אחרי עזיבתו יזם את חברת התשתיות למכוניות חשמליות בטר פלייס - חברה שהובילה את מהפכת התחבורה החשמלית בעולם. מאז הפרדותו מבטר פלייס כשנה לפני קריסת החברה אגסי עובד עם יזמים טכנולוגים (Deep Tech) בחברות במובילות שינוי בתחומים נרחבים. כיום הוא יו״ר פעיל של מספר חברות, החשובה שבהן היא מאקאלו אופטיקס אשר מפתחת לידאר מהפכני בתחום הרכב האוטונומי.זיו קציר, מנהל התכנית הלאומית לתשתיות בינה מלאכותית ברשות החדשנות, אחראי במסגרת תפקידו על תכלול וניהול התשתיות הלאומיות ל AI בפורום תל"ם. קציר, 44, בילה את עיקר דרכו המקצועית בחברת ורינט, שם כיהן כ-15 שנים בשרשרת של תפקידי ניהול טכנולוגי והובלת יזמות. בתפקידו האחרון כיהן כ-CTO של חטיבת ה-Cyber Intelligence אשר לימים הונפקה בתור החברה העצמאית Cognyte. בנוסף, בימים אלו קציר מסיים את לימודי הדוקטורט בתחום הבינה המלאכותית באוניברסיטת בן גוריון. מבית "עוד פודקאסט לסטארטאפים", בשיתוף רשות החדשנות והמיזם החברתי Wize.   (*) עקבו אחרינו ב"עוד פודקאסט לסטארטאפים" וקבלו פרק מדי שבוע (טוב נו, כמעט): עוד פודקאסט ב-Spotify:https://open.spotify.com/show/0dTqS27ynvNmMnA5x4ObKQ אפל פודקאסט:https://podcasts.apple.com/podcast/id1252035397 גוגל פודקאסט:https://bit.ly/3rTldwq עוד פודקאסט - האתר שלנו:https://omny.fm/shows/odpodcast ה-RSS פיד שלנו:https://www.omnycontent.com/.../f059ccb3-e0c5.../podcast.rssSee omnystudio.com/listener for privacy information.

WE'RE IN!
Selena Larson on Cyber Intelligence, "Evil" Threat Actors and TOAD Attacks

WE'RE IN!

Play Episode Listen Later Jan 19, 2023 41:24


In the latest episode of WE'RE IN!, Selena Larson shares insights into malicious hackers and scammers she's tracking as senior threat intelligence analyst for Proofpoint. Business email compromise, ransomware, sextortion, multi-factor authentication bypass techniques – dealing with the onslaught of modern cyberthreats “is very much like playing whack-a-mole,” she said. By unpacking attackers' motivations and psychological profiles, defenders can train themselves and their teams to avoid falling into common traps. -------More reasons you should listen: * Hear Selena discuss what makes threat intelligence actionable, versus extra noise for a SOC* Find out about an alarming cyber espionage campaign that recently targeted journalists* Learn why Selena despises evil TOADs – “telephone-oriented attack delivery” attacks

Career Notes
Encore: Michael DeBolt: From acting to cyber. [Intelligence]

Career Notes

Play Episode Listen Later Dec 25, 2022 7:38


Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices

Anatomy of a Scam
The individual building blocks of scams and fraud

Anatomy of a Scam

Play Episode Listen Later Nov 8, 2022 21:16


In Australia, a cyber breach is reported roughly every eight minutes. Often these attacks involve the theft of data prized by scammers: our private, personal information. As a result, scams are rising in frequency and sophistication, fuelled by stolen personal data, and tailored to the intended victim. Understanding how your data can be used against you might help you spot a scam in the wild…  Anatomy of a Scam is hosted by Deborah Knight and features: Detective Superintendent Matt Craft - NSW Police Cybercrime Squad Commander Katherine Manstead - Director of Cyber Intelligence, CyberCX Troy Hunt - Microsoft VP and founder of HaveIBeenPwned.com   Anatomy of a Scam is made in collaboration with CommBank. Stay CommBank safe with services that help protect you from scams and fraud 24/7. Remember 3 simple steps: Stop. Check. Reject. See omnystudio.com/listener for privacy information.

Reimagining Cyber
Inside cybercrime with Raveed Laeb

Reimagining Cyber

Play Episode Listen Later Sep 19, 2022 23:36


Raveed Laeb, Vice President of Product for KELA (pronounced Kay-la), a cyber intelligence technology company, gives us a behind-the-curtain view of the world of cybercriminals in the latest Reimagining Cyber episode, “Inside cybercrime with Raveed Laeb.” 

Trail of Bits
W/Internships

Trail of Bits

Play Episode Listen Later Jun 20, 2022 21:33


Featured Voices in this Episode:Trent BrunsonTrent Brunson is a Principal Security Engineer and Research Practice Manager at Trail of Bits. He has worked in computer security since 2012 as a researcher and engineer at Assured Information Security in Rome, NY, and at the Georgia Tech Research Institute, where he served as the Threat Intelligence Branch Chief and the Associate Division Chief of Threat Intelligence & Analytics. Dan GuidoDan Guido is the CEO of Trail of Bits, a cybersecurity firm he co-founded in 2012 to address software security challenges with cutting-edge research. In his tenure leading Trail of Bits, Dan has grown the team to more than 80 engineers, led the team to compete in the DARPA Cyber Grand Challenge, built an industry-leading blockchain security practice, and refined open-source tools for the endpoint security market. In addition to his work at Trail of Bits, he runs Empire Hacking, a 1,500-member meetup group focused on NYC-area cybersecurity professionals. His latest hobby coding project, AlgoVPN, is the Internet's most recommended self-hosted VPN.Suha HussainSuha Hussain is a software security engineer who specializes in machine learning assurance. Her work also involves data privacy, program analysis, and applied cryptography. She's currently an intern at Trail of Bits, where she's worked on projects such as PrivacyRaven and Fickling. She's also pursuing a BS in Computer Science at Georgia Tech.Sam AlwsSam Alws is a computer science student at Vanderbilt University, hoping to take part in shaping the future of tech. He was a Trail of Bits wintern and also previously interned at Bloomberg LP. He serves as a volunteer software developer for Change++, writing code for charities, and spent two years with Project Spark, designing a programming curriculum for schools in India.Nick Selby (Host)An accomplished information and physical security professional, Nick leads the Software Assurance practice at Trail of Bits, giving customers at some of the world's most targeted companies a comprehensive understanding of their security landscape. He is the creator of the Trail of Bits podcast, and does everything from writing scripts to conducting interviews to audio engineering to Foley (e.g. biting into pickles). Prior to Trail of Bits, Nick was Director of Cyber Intelligence and Investigations at the NYPD; the CSO of a blockchain startup; and VP of Operations at an industry analysis firm. Production StaffStory Editor: Chris JulinAssociate Editor: Emily HaavikExecutive Producer: Nick SelbyExecutive Producer: Dan GuidoRecordingRecorded at Rocky Hill Studios, Ghent, NY - Nick Selby, Engineer22Springroad Tonstudio, Übersee, Germany - Volker Lesch, EngineerRemote recordings: New York, NY; Brooklyn, NY; Virginia; Atlanta, GA (Emily Haavik); Silver Spring, MD (Jason An). Trail of Bits supports and adheres to the Tape Syncers United Fair Rates Card.Edited by Emily Haavik and Chris JulinMastered by Chris Julin  Special ThanksDominik CzarnotaJosselin FeistMusicTRAIL OF BITS THEME: DISPATCHES FROM TECHNOLOGY'S FUTURE, Chris JulinELEMENT, Frank BentleyFOUR AM, Curtis ColeDRIVING SOLO, Ben FoxOPEN WINGS, Liron MeyuhasSHAKE YOUR STYLE, Stefano MastronardiTHE QUEEN, Jasmine J. WalkerILL PICKLE, Phil DavidPIRATE BLUES, Leon LaudenbackSCAPES, Gray NorthReproductionWith the exception of any Copyrighted music herein, Trail of Bits Season 1 Episode 2; Internships and Winternships © 2022 by Trail of Bits is licensed under Attribution-NonCommercial-NoDerivatives 4.0 International.  This license allows reuse: reusers may copy and distribute the material in any medium or format in unadapted form and for noncommercial purposes only (noncommercial means not primarily intended for or directed towards commercial advantage or monetary compensation), provided that reusers give credit to Trail of Bits as the creator. No derivatives or adaptations of this work are permitted. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/. Referenced in this Episode:Learn more about the work done by Trail of Bits interns over the years on the company blog.Apply for an internship or winternship at https://www.trailofbits.com/careersSuha Hussain and lead engineer Evan Sultanik describe the Fickling project: Never a Dill Moment: Exploiting Machine Learning Pickle Files. The Python manual refers specifically to the security issues discussed in this episode:  "The pickle module is not secure. Only unpickle data you trust... It is possible to construct malicious pickle data which will execute arbitrary code during unpickling. Never unpickle data that could have come from an untrusted source, or that could have been tampered with."Read more about PrivacyRaven and watch Suha's video introducing the project: PrivacyRaven Has Left the NestSam Alws describes his journey to speed up Echidna: Optimizing a Smart Contract FuzzerFor those interested in CTFs, especially for those who seek to start their own, Trail of Bits has posted a CTF Field Guide in the company github repository. It contains details on past CTF challenges, guidance to help you design and create your own toolkits, and case studies of attacker behavior – both in the real world, and in past CTF competitions. Each lesson is supplemented by links to supporting reference materials.Check out the AngstromCTF site here: angstromctf.comAnd here's the Montgomery Blair High School Cybersecurity Club's github repository: github.com/blairsecThe Blair students you met in this podcast were Jason An, Clarence Lam, Harikesh Kailad and Patrick Zhang. Meet the Team:Chris JulinChris Julin has spent years telling audio stories and helping other people tell theirs. These days he works as a story editor and producer for news outlets like APM Reports, West Virginia Public Broadcasting, and Marketplace. He has also taught and mentored hundreds of young journalists as a professor. For the Trail of Bits podcast, he serves as story and music editor, sound designer, and mixing and mastering engineer.Emily HaavikFor the past 10 years Emily Haavik has worked as a broadcast journalist in radio, television, and digital media. She's spent time writing, reporting, covering courts, producing investigative podcasts, and serving as an editorial manager. She now works as an audio producer for several production shops including Us & Them from West Virginia Public Broadcasting and PRX, and APM Reports. For the Trail of Bits podcast, she helps with scripting, interviews, story concepts, and audio production.

Trail of Bits
It Depends

Trail of Bits

Play Episode Listen Later Jun 20, 2022 21:05


FEATURED VOICES IN THIS EPISODEClint BruceClint Bruce is a former Navy Special Warfare Officer, a graduate of the US Naval Academy, decorated athlete, and seasoned entrepreneur. A 4-year letter winner at Navy playing middle linebacker, captain and MVP of the '96 Aloha Bowl Championship team, he was named to multiple all-star teams his senior year. He enjoyed opportunities with both the Baltimore Ravens and New Orleans Saints and was inducted into the Navy/Marine Corps Stadium Hall of Fame in 2009. Clint's desire to serve was deep and firmly rooted. He left the NFL to pursue becoming a Navy SEAL and successfully completed BUDS (Basic Underwater Demolition SEAL Training) in 1998 with Class 217. Joining SEAL Team FIVE, Clint completed multiple deployments pre and post-911 directly involved in counter-terrorism and national security missions globally. He is a co-founder of Carry the Load, which was founded to restore true meaning to Memorial Day and celebrate the service and sacrifice of Police, Fire, and Rescue personnel and their families during the month of May. Clint lives in Dallas with his college sweetheart and three daughters who are not impressed that he played football or was a Navy SEAL.Patrick GrayPatrick Gray is the producer and presenter of the Risky Business weekly information security podcast, a weekly podcast that launched in 2007. He formerly was a journalist for publications including Wired.com, ZDNet Australia, The Sydney Morning Herald, The Age, The Bulletin (magazine) and Men's Style Australia.Eric OlsonEric Olson is the Director of Threat Intelligence for Jet Blue Airways. A threat intelligence professional for more than 20 years, Eric has had executive roles including Senior Vice President of Product Management and Vice President, Intellugence Operations, at LookingGlass Cyber Solutions, and was VP of Product Strategy at Cyveillance.Allan FriedmanAllan Friedman is Senior Advisor and Strategist at the United States Cybersecurity and Infrastructure Security Agency, and one of the nation's leading experts on Software Bill of Materials. Allan leads CISA's efforts to coordinate SBOM initiatives inside and outside the US government, and around the world. He is known for applying technical and policy expertise to help audiences understand the pathways to change in an engaging fashion, and is frequently invited to speak or keynote to industry, academic, and public audiences. Wearing the hats of both a technologist and a policy maker, Allan has over 15 years of experience in international cybersecurity and technology policy. His experience and research focuses on economic and market analyses of information security. On the practical side, he has designed, convened, and facilitated national and international multistakeholder processes that have produced real results, helping diverse organizations finding common ground on contentious, cutting edge issues.Evan Sultanik, PhDEvan Sultanik is a Principal Computer Security Researcher at Trail of Bits. A computer scientist with extensive experience both in industry (as a software engineer) and academia, Evan is an active contributor to open source software. He is author of more than two dozen peer-reviewed academic papers, and is particularly interested in intelligent, distributed/peer-to-peer systems. Evan is editor of and frequent contributor to the International Journal of PoC||GTFO. William WoodruffWilliam Woodruff is a senior security engineer at Trail of Bits, contributing to the engineering and research practices in work for corporate and governmental clients. He has developed several of our open-source projects (e.g., twa, winchecksec, KRF, and mishegos). His work focuses on fuzzing, program analysis, and automated vulnerability reasoning. Outside of Trail of Bits, William helps to maintain the Homebrew project, the dominant macOS package manager. Before joining Trail of Bits, he was a software engineering intern at Cipher Tech Solutions, a small defense subcontractor. He has participated in the Google Summer of Code for four years (two as a student, two as a mentor) and taught a class in ethical hacking as a college senior. William holds a BA in philosophy from the University of Maryland (2018).HOST: Nick SelbyAn accomplished information and physical security professional, Nick leads the Software Assurance Practice at Trail of Bits, giving customers at some of the world's most targeted companies a comprehensive understanding of their security landscape. He is the creator of the Trail of Bits podcast, and does everything from writing scripts to conducting interviews to audio engineering to Foley (e.g. biting into pickles). Prior to Trail of Bits, Nick was Director of Cyber Intelligence and Investigations at the NYPD; the CSO of a blockchain startup; and VP of Operations at an industry analysis firm.PRODUCTION STAFFStory Editor: Chris JulinAssociate Editor: Emily HaavikExecutive Producer: Nick SelbyExecutive Producer: Dan GuidoRECORDINGRecorded at Rocky Hill Studios, Ghent, NY - Nick Selby, Engineer;22Springroad Tonstudio, Übersee, Germany - Volker Lesch, EngineerRemote recordings were conducted at Whistler, BC, Canada (Nick Selby); Clint Bruce was recorded in a Google Meet session; Patrick Gray provided recordings of himself from Australia, courtesy of the Risky Business podcast. Eric Olson recorded himself on an iPhone. Washington, DC (tape sync of Allan Friedman by George Mocharko). Trail of Bits supports and adheres to the Tape Syncers United Fair Rates Card.Edited by Emily Haavik and Chris JulinMastered by Chris JulinMUSICDispatches From Technology's Future, the Trail of Bits theme, Chris JulinEVERYBODY GET UP - No Vocals & FX - Ian PostJD SCAVENGER by Randy SharpRIPPLES by Tamuz DekelFUTURE PERFECT, Evgeny BardyuzhaTHE SWINDLER, The Original Orchestra]BLUE - ALTERNATIVE - INSTRUMENTAL VERSION by Faith RichardsOU ALLONS NOUS D'ICI - INSTRUMENTAL, Dan ZeituneLITTLE EDGY, Chris JulinSCAPES: Gray NorthReproductionWith the exception of any Copyrighted music herein, Trail of Bits Season 1 Episode 3; It Depends © 2022 by Trail of Bits is licensed under Attribution-NonCommercial-NoDerivatives 4.0 International. This license allows reuse: reusers may copy and distribute the material in any medium or format in unadapted form and for noncommercial purposes only (noncommercial means not primarily intended for or directed towards commercial advantage or monetary compensation), provided that reusers give credit to Trail of Bits as the creator. No derivatives or adaptations of this work are permitted. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.Referenced in this Episode:The original blog post announcing the availability of It Depends describes the history you just heard with more technical specificity, and also of course links to the GitHub repository where you can download It Depends and try it for yourself. That blog post also links to the repository where you can download pip-audit, and give that a whirl.In the 2021 Executive Order on Improving the Nation's Cybersecurity, the Biden Administration announced that it would require SBOMs for all software vendors selling to the federal government.Dependabot is a tool available to GitHub users. If you're interested in the catalog of open source projects Trail of Bits participates in and contributes to, please read the blog post Celebrating our 2021 Open Source Contributions. There, you can read about our work contributing for example to LLVM - the compiler and toolchain technologies we discuss in the Podcast episode Future - to Pwndbg, a GDB plug-in that makes debugging with GDB “suck less.” The post includes links to contributions our engineer consultants have made to a huge range of open source projects from assert-rs to ZenGo-X.Meet the Team:CHRIS JULINChris Julin has spent years telling audio stories and helping other people tell theirs. These days he works as a story editor and producer for news outlets like APM Reports, West Virginia Public Broadcasting, and Marketplace. He has also taught and mentored hundreds of young journalists as a professor. For the Trail of Bits podcast, he serves as story and music editor, sound designer, and mixing and mastering engineer.EMILY HAAVIKFor the past 10 years Emily Haavik has worked as a broadcast journalist in radio, television, and digital media. She's spent time writing, reporting, covering courts, producing investigative podcasts, and serving as an editorial manager. She now works as an audio producer for several production shops including Us & Them from West Virginia Public Broadcasting and PRX, and APM Reports. For the Trail of Bits podcast, she helps with scripting, interviews, story concepts, and audio production.

Trail of Bits
Future

Trail of Bits

Play Episode Listen Later Jun 20, 2022 21:37


FEATURED VOICES IN THIS EPISODEDan GuidoDan Guido is the CEO of Trail of Bits, a cybersecurity firm he founded in 2012 to address software security challenges with cutting-edge research. In his tenure leading Trail of Bits, Dan has grown the team to 80 engineers, led the team to compete in the DARPA Cyber Grand Challenge, built an industry-leading blockchain security practice, and refined open-source tools for the endpoint security market. In addition to his work at Trail of Bits, he's active on the boards of four early-stage technology companies. Dan contributes to cybersecurity policy papers from RAND, CNAS, and Harvard. He runs Empire Hacking, a 1,500-member meetup group focused on NYC-area cybersecurity professionals. His latest hobby coding project -- AlgoVPN -- is the Internet's most recommended self-hosted VPN. In prior roles, Dan taught a capstone course on software exploitation at NYU as a faculty member and the Hacker in Residence, consulted at iSEC Partners (now NCC Group), and worked as an incident responder for the Federal Reserve System.Nat ChinNat Chin is a security engineer 2 at Trail of Bits, where she performs security reviews of blockchain projects, and develops tools that are useful when working with Ethereum. She is the author of solc-select, a tool to help switch Solidity versions. She worked as a smart contract developer and taught as a Blockchain Professor at George Brown College, before transitioning to blockchain security when she joined Trail of Bits.Opal WrightOpal Wright is a cryptography analyst at Trail of Bits. Two of the following three statements about her are true: (a) she's a long-distance unicyclist; (b) she invented a public-key cryptosystem; (c) she designed and built an award-winning sex toy.Jim MillerJim Miller is the cryptography team lead at Trail of Bits. Before joining Trail of Bits, Jim attended graduate programs at both Cambridge and Yale, where he studied and researched both Number Theory and Cryptography, focusing on topics such as lattice-based cryptography and zero-knowledge proofs. During his time at Trail of Bits, Jim has led several security reviews across a wide variety of cryptographic applications and has helped lead the development of multiple projects, such as ZKDocs and PrivacyRaven.Josselin FeistJosselin Feist is a principal security engineer at Trail of Bits where he participates in assessments of blockchain software and designs automated bug-finding tools for smart contracts. He holds a Ph.D. in static analysis and symbolic execution and regularly speaks at both academic and industrial conferences. He is the author of various security tools, including Slither - a static analyzer framework for Ethereum smart contracts and Tealer - a static analyzer for Algorand contracts.Peter GoodmanPeter Goodman is a Staff Engineer in the Research and Engineering practice at Trail of Bits, where he leads all de/compilation efforts. He is the creator of various static and dynamic program analysis tools, ranging from the Remill library for lifting machine code into LLVM bitcode, to the GRR snapshot/record/replay-based fuzzer. When Peter isn't writing code, he's mentoring a fleet of interns to push the envelope. Peter holds a Master's in Computer Science from the University of Toronto.Host: Nick SelbyAn accomplished information and physical security professional, Nick leads the Software Assurance practice at Trail of Bits, giving customers at some of the world's most targeted companies a comprehensive understanding of their security landscape. He is the creator of the Trail of Bits podcast, and does everything from writing scripts to conducting interviews to audio engineering to Foley (e.g. biting into pickles). Prior to Trail of Bits, Nick was Director of Cyber Intelligence and Investigations at the NYPD; the CSO of a blockchain startup; and VP of Operations at an industry analysis firm.Production StaffStory Editor: Chris JulinAssociate Editor: Emily HaavikExecutive Producer: Nick SelbyExecutive Producer: Dan GuidoRecordingRocky Hill Studios, Ghent, New York. Nick Selby, EngineerPreuss-Projekt Tonstudio, Salzburg, Austria. Christian Höll, EngineerRemote recordings:Whistler, BC, Canada; (Nick Selby) Queens, NY; Brooklyn, NY; Rochester, NY (Emily Haavik);Toronto, ON, Canada. TAPES//TYPES, Russell W. Gragg, EngineerTrail of Bits supports and adheres to the Tape Syncers United Fair Rates CardEdited by Emily Haavik and Chris JulinMastered by Chris JulinMusicDISPATCHES FROM TECHNOLOGY'S FUTURE, THE TRAIL OF BITS THEME, Chris JulinOPEN WINGS, Liron MeyuhasNEW WORLD, Ian PostFUNKYMANIA, Omri Smadar, The Original OrchestraGOOD AS GONE, INSTRUMENTAL VERSION, Bunker Buster ALL IN YOUR STRIDE, AbeBREATHE EASY, Omri SmadarTREEHOUSE, LingerwellLIKE THAT, Tobias BergsonSCAPES,  Gray NorthReproductionWith the exception of any Copyrighted music herein, Trail of Bits Season 1 Episode 0; Immutable © 2022 by Trail of Bits is licensed under Attribution-NonCommercial-NoDerivatives 4.0 International. This license allows reuse: reusers may copy and distribute the material in any medium or format in unadapted form and for noncommercial purposes only (noncommercial means not primarily intended for or directed towards commercial advantage or monetary compensation), provided that reusers give credit to Trail of Bits as the creator. No derivatives or adaptations of this work are permitted. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.Meet the Team:CHRIS JULINChris Julin has spent years telling audio stories and helping other people tell theirs. These days he works as a story editor and producer for news outlets like APM Reports, West Virginia Public Broadcasting, and Marketplace. He has also taught and mentored hundreds of young journalists as a professor. For the Trail of Bits podcast, he serves as story and music editor, sound designer, and mixing and mastering engineer.EMILY HAAVIKFor the past 10 years Emily Haavik has worked as a broadcast journalist in radio, television, and digital media. She's spent time writing, reporting, covering courts, producing investigative podcasts, and serving as an editorial manager. She now works as an audio producer for several production shops including Us & Them from West Virginia Public Broadcasting and PRX, and APM Reports. For the Trail of Bits podcast, she helps with scripting, interviews, story concepts, and audio production.

The Watchdog
Elon Musk's Pentagon Ties and Links to Israeli Cyber Intelligence

The Watchdog

Play Episode Listen Later Jun 10, 2022 55:00


Elon Musk is not some crusading rebel railing against the establishment; he's one of the key drivers of the U.S. surveillance state. That is the message that Alan MacLeod gave Lowkey in this latest episode of “The Watchdog.”While commentators have been heartened and dismayed in equal measure at the prospect of the South African billionaire's takeover of Twitter, they all appear to agree that Musk will make huge changes to the platform. Yet very few have acknowledged the basic fact that Musk's fortune comes in no small part due to his close connections to the national security state.As MacLeod explained, SpaceX was only able to get off the ground with the help of In-Q-Tel, the venture capitalist wing of the CIA, as well as with huge financial backing from NASA. Today, the company competes with Lockheed Martin and Boeing for gigantic military rocket contracts, helping organizations like the Air Force and the National Reconnaissance Office launch their spy satellites into orbit, thereby performing a crucial service to the global surveillance system.The MintPress podcast “The Watchdog,” hosted by British-Iraqi hip hop artist Lowkey, closely examines organizations about which it is in the public interest to know – including intelligence, lobby, and special interest groups influencing policies that infringe on free speech and target dissent. The Watchdog goes against the grain by casting a light on stories largely ignored by the mainstream, corporate media.Support the show

The CyberWire
Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]

The CyberWire

Play Episode Listen Later Apr 3, 2022 7:08 Very Popular


Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.