Podcasts about cyber investigations

  • 22PODCASTS
  • 34EPISODES
  • 42mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber investigations

Latest podcast episodes about cyber investigations

Forensic Focus
Hexordia's Jessica Hyde: Navigating The Future Of Digital Forensics

Forensic Focus

Play Episode Listen Later May 13, 2025 58:26


Jessica Hyde from Hexordia joins the Forensic Focus Podcast to discuss her unique journey from Marine Corps avionics technician to digital forensics expert. Jessica shares how her military background provided transferable skills for forensic investigations, emphasizing the importance of documentation, troubleshooting, and diverse perspectives in finding truth in digital evidence. The conversation explores critical topics including IoT forensics challenges, the urgent need for timely data acquisition before evidence degrades, and the role of AI in forensic analysis. Jessica also discusses her experience teaching at George Mason University since 2016, how students' questions enhance her own knowledge, and why interdisciplinary teams create better forensic outcomes. With candid reflections on maintaining perspective while handling difficult cases and thoughts on the future challenges of policy and law keeping pace with technology, this episode offers valuable insights for both seasoned professionals and those new to digital forensics. #DigitalForensics #MobileForensics #CyberInvestigation #DFIR #AI 00:00 Introduction and Guest Welcome 01:02 Jessica Hyde's Unique Career Path 03:06 Transition to Digital Forensics 13:17 Teaching and Learning in Digital Forensics 20:12 Hands-On Forensics and IoT Devices 24:19 The Importance of Interdisciplinary Teams 27:12 Humor and Levity in Forensics 29:38 The Role of Cyber Investigators 31:07 Bias in Cyber Investigations 32:01 Generational Perspectives in Technology 33:51 Privacy Concerns in Digital Forensics 36:53 The Importance of Timely Data Acquisition 44:28 Challenges with AI in Digital Forensics 54:42 Policy and Legal Challenges in Digital Forensics 56:56 Conclusion and Final Thoughts Show Notes Hexordia - https://www.hexordia.com George Mason University - https://dfor.gmu.edu/person/jessica-l-hyde SWGDE - https://www.swgde.org  

Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation missing person malware cyberbullying justice system community support defamation true crime podcasts personality disorders blackmail court cases encryption emotional abuse taser risk assessment data protection crime scene emotional resilience media coverage extortion social engineering narcissistic abuse private investigators criminal justice reform personal freedom emergency preparedness trauma recovery background checks healing from trauma situational awareness emergency response cyber threats spyware peeping toms mental resilience revenge porn forensic science criminal charges post traumatic stress legal action restraining orders security policies whistleblowing home security data breaches surveillance state it security federal laws mental health resources digital literacy security cameras security breach forensic psychology psychological warfare doxxing victim blaming criminal defense internet safety personal boundaries threat intelligence pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection digital security public records news coverage crisis hotline ethical hacking legal protection cyberstalking cyber defense digital rights emotional manipulation threat assessment security tips online harassment emotional distress public awareness internet privacy personal security mobile security protective services gps tracking email security online fraud crime scene investigations identity fraud criminal behavior identity protection forensic investigations onlinepredators behavioral analysis victim support local law enforcement emotional recovery privacy settings detective work legal advocacy criminal profiling security awareness training criminal intent aggressive behavior crime reporting protective gear police reports personal rights digital evidence home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing cyber investigations technology safety
ITSPmagazine | Technology. Cybersecurity. Society
Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 19, 2024 1:53


Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

Redefining CyberSecurity
Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine

Redefining CyberSecurity

Play Episode Listen Later Nov 19, 2024 1:53


Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

ON Point with Alex Pierson
Can We Really Protect Our Youth From A.I.?

ON Point with Alex Pierson

Play Episode Listen Later May 9, 2024 10:41


A.I.- generated deepfakes are spreading across Canada, and disturbingly is helping to fuel child exploitation and pornography...can this wave be slowed? To get a better handle on this issue, host Alex Pierson is joined by Bill McGarry, the director of Cyber Investigations for Investivative Solutions Network Inc. (ISN) who also served as a Toronto Police officer for over 30 years. Bill breaks down to Alex just how fast the technology is advancing, and tactics police are using to attempt to keep up. Learn more about your ad choices. Visit megaphone.fm/adchoices

canada youth protect toronto police cyber investigations alex pierson
Digital Forensic Survival Podcast
DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle

Digital Forensic Survival Podcast

Play Episode Listen Later Mar 26, 2024 30:51


This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also involves ensuring clear communication protocols and conducting regular training and testing.  I'll explore preparation from the perspective of the investigation life cycle, where success is the reward for preparation. Join me as I uncover the importance of preparation in incident response and how it lays the foundation for success in investigations.

lifecycle guiding lights cyber investigations
ITSPmagazine | Technology. Cybersecurity. Society
Cyber Investigations: Methodology over Tools | A Conversation with Christopher Salgado | Redefining CyberSecurity Podcast with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 11, 2024 51:05


Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Cyber Investigations: Methodology over Tools | A Conversation with Christopher Salgado | Redefining CyberSecurity Podcast with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Mar 11, 2024 51:05


Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Ankura Podcast
Cyber Series: The Evolution of Cyber Investigations with Ted Theisen

The Ankura Podcast

Play Episode Play 42 sec Highlight Listen Later Sep 15, 2023 25:10


Following his keynote speech at MENA Information Security Conference 2023, Senior Managing Director and former FBI Special Agent Ted Theisen, speaks with Kajen Subramoney in the latest edition of The Cyber Series. In this episode, they discuss the development of the cybersecurity sector and the evolution of the cyber threat landscape throughout their careers. Ted shares his insights on his top three points on what people should have front of mind when considering their approach to cybersecurity:  Be flexible.Plan as if you are being attacked.Look outside of your organization.

She Said Privacy/He Said Security
Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings

She Said Privacy/He Said Security

Play Episode Listen Later Feb 9, 2023 35:59


Chris Bullock is the Founder, CEO, and Managing Member of Cyber Investigations and Intelligence Agency (CI2A), a company that provides world-class cybersecurity and cybercrime solution services. He is also an award-winning chief information security officer and a decorated law enforcement veteran. As a leader and program builder, Chris has built and managed several successful cybersecurity programs at large and small organizations across many business verticals and governments. He holds multiple certifications including Certified Information Systems Security Professional (CISSP) and Certified Cybercrime Examiner (CCCE). Chris frequently speaks at major security conferences and writes articles on cybersecurity, and in 2012, he was voted “85th Top Ranking CISO in the US.” In this episode… Open-source intelligence has provided public access to personal information on the internet, allowing hackers to compromise anyone's digital profile. With technology becoming increasingly pervasive in our daily lives, what steps can you take to reduce your digital footprint? According to Chris Bullock, attackers can steal data from your personal devices to be exchanged on the dark web. Most users aren't aware that seemingly mundane settings on these devices can collect and release your data. To prevent unwanted attacks, Chris recommends disabling location services, photo, and microphone access for all apps and deactivating the auto-join feature for Wi-Fi and Hotspots.  In today's episode of She Said Privacy/He Said Security, Jodi and Justin Daniels welcome Chris Bullock, Founder, CEO, and Managing Member of CI2A, to discuss tips for protecting your digital profile. Chris also explains open-source intelligence, the impact of privacy laws on data security, and how security attacks against high-profile individuals have evolved.

The CyberWire
Living security: the current state of XDR. [CyberWire-X]

The CyberWire

Play Episode Listen Later Apr 3, 2022 30:28 Very Popular


In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.

Banfield
Exposing online scammers, Sgt. grabs officer by the throat and a winter wrath

Banfield

Play Episode Listen Later Jan 18, 2022


Hackers and scammers have declared war on all of us and right now, they are winning. Nicole Vowell, a former news reporter who covered scams for nearly 10 years, was recently taken for $13,000 in an online scam. She joins the show. Chris Swecker, former head of the FBI

The Cyber Tap
In the Line of Cyber Fire with Ken Graf - S6E6

The Cyber Tap

Play Episode Play 32 sec Highlight Listen Later Dec 16, 2021 41:56


This week, Mat and Mike welcome Ken Graf from the U.S. Secret Service to chat about BIG10 sports, global credit card rings, and the Secret Service's connection to Lincoln. -------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu

The CyberWire
Ransomware gangs talk about retiring, and about deception. High-level Russo-American talks. US sanctions four spyware vendors. CISA tells US agencies to patch known, exploited vulnerbalities.

The CyberWire

Play Episode Listen Later Nov 3, 2021 23:15


The BlackMatter ransomware gang says that it's retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn't exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/212

She Said Privacy/He Said Security
The Ins and Outs of Ransom Negotiation

She Said Privacy/He Said Security

Play Episode Listen Later Oct 28, 2021 12:18


Mike Snader is the Associate Director of Cyber Investigations at Kivu Consulting. Kivu helps companies prevent and manage cyber ransoms and theft. In this role, Mike negotiates with cyber-terrorists after they have locked a company's data in order to avoid the worst outcomes. Mike joined Kivu's team in January of 2020 after 25 years at the Scottsdale Police Department. He spent most of his police career in investigations, including nearly a decade on the United States Secret Service Electronic Crimes Task Force. Mike is also a Resident Security Agent for Major League Baseball. In this episode… You've walked into the office and none of the computers work. You call the IT team and they find an unnerving message on the screen: “We've stolen your data and you must pay for it to be unlocked.” You only have one question while the sudden dread settles in: What do I do now? Thankfully, Kivu Consulting's got your back. Their team of highly-trained investigators are ready to negotiate with cyber terrorists in any situation. It's similar to sending the SWAT team to negotiate for hostages at a bank robbery — but with specialized training for invisible, online attackers. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Mike Snader, the Associate Director of Cyber Investigations at Kivu Consulting, to discuss ransomware negotiations. Mike explains the negotiation process, how Kivu assists clients, and his tips for avoiding future scams. Stay tuned.

Private Eye Confidential
Eli Wilkerson and Cyber Investigations

Private Eye Confidential

Play Episode Listen Later Jun 15, 2021 39:22


ELI WILKERSON AND CYBER INVESTIGATIONS | EPISODE 55 | JUN 15, 2021 Eli Wilkerson and cyber investigations is the topic this week. Mr. Wilkerson is a Texas private investigator and certified fraud examiner (CFE). Furthermore, he is a certified expert in cyber investigations and the principal at Praxis Detection Services, LLC in Amarillo, Texas If […]

Task Force 7 Cyber Security Radio
Ep. 173: The Beginning of An Era - Data Breach Investigations

Task Force 7 Cyber Security Radio

Play Episode Listen Later Mar 8, 2021 54:33


Retired Cyber Investigator Dave Ostertag joins co-host Andy Bonillo on Episode #173 of Task Force 7 Radio to provide his perspective on the beginning of the data breach investigations era. Dave describes when the first payment data compromise happened and how that set the stage for future investigations, fraud analytics, standards, and investigatory tactics. Mr. Ostertag also highlights how things don't change and we can predict future attacks based on the past, especially in the national security arena. The pair wrap up the show with a call to action to those fighting the good cyber fight to share what they know with each other. All this and much, much more on Episode #173 of Task Force 7 Radio.

Task Force 7 Cyber Security Radio
Ep. 173: The Beginning of An Era - Data Breach Investigations

Task Force 7 Cyber Security Radio

Play Episode Listen Later Mar 8, 2021 54:33


Retired Cyber Investigator Dave Ostertag joins co-host Andy Bonillo on Episode #173 of Task Force 7 Radio to provide his perspective on the beginning of the data breach investigations era. Dave describes when the first payment data compromise happened and how that set the stage for future investigations, fraud analytics, standards, and investigatory tactics. Mr. Ostertag also highlights how things don't change and we can predict future attacks based on the past, especially in the national security arena. The pair wrap up the show with a call to action to those fighting the good cyber fight to share what they know with each other. All this and much, much more on Episode #173 of Task Force 7 Radio.

Zoldersessions
#28 - John Fokker

Zoldersessions

Play Episode Listen Later Feb 26, 2021 167:38


John is Head of Cyber Investigations & Principal Engineer bij McAfee. Daar houdt hij zich bezig met onderzoek naar vooral cybercriminaliteit en werkt regelmatig samen met internationale opsporingsinstanties bij acties tegen grote malware bendes, zoals recent met Emotet. Voor zijn tijd bij McAfee, werkte hij bij het Team High-Tech Crime (THTC) van de Nederlandse Politie. En daarvoor was hij marinier en is uitgezonden op verschillende missies zoals in Afghanistan en Somalië. Dus John heeft veel boeiende dingen te vertellen, niet in de laatste plaats vanuit de frontline tegen georganiseerde cybercriminalteit.

The Gate 15 Podcast Channel
The Gate 15 Interview EP 5: Elections Security 2020, with the FBI and the Elections Infrastructure ISAC

The Gate 15 Podcast Channel

Play Episode Listen Later Oct 26, 2020 61:32


In this episode of The Gate 15 Interview, Andy Jabbour talks with Ben Spear, Director of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) and Al Murray, currently serving as the Assistant Special Agent in Charge over Cyber Investigations at FBI's Washington Field Office (WFO). In our discussion we address: Recent election history and security issues; Threats to the upcoming 2020 election; What to expect on election day (and after); Words of wisdom for citizens and elections officials. Please enjoy this episode of The Gate 15 Interview on Anchor, Apple, Spotify, as well as other locations.

Reduce Cyber Risk Podcast
RCR 057 - CISSP Exam Questions for Cyber Investigations (Domain 8)

Reduce Cyber Risk Podcast

Play Episode Listen Later Jan 11, 2020 7:04


Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.  In this episode, Shon will talk about questions for Domain 8 (Software Development Security) of the CISSP Exam. BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ Want to find Shon Gerber elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS:  ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources TechTarget https://searchsecurity.techtarget.com/quiz/CISSP-Domain-8-quiz-Law-Investigations-and-Ethics?q0=1&q1=0&q2=2&q3=1&q4=1&q5=1&q6=2&q7=0&q8=2&q9=0&q10=1&q11=3&q12=0&q13=3&q14=2&x=69&y=11

Task Force 7 Cyber Security Radio
Ep. 103: The Role of Cyber Forensics in Murder Investigations

Task Force 7 Cyber Security Radio

Play Episode Listen Later Oct 7, 2019 69:06


Former Secret Service Agent, Computer Forensic Expert, and founder of the security company Cyber Forensics, Gus Dimitrelos appears on Episode #103 of Task Force 7 Radio to talk to our audience about real life scenarios where Cyber Forensic Investigations have determined the outcome of trials where the defendants have been accused of some of the most heinous crimes. Listen as Dimitrelos describes the importance of computer forensics, cellular triangulation, and cell phone forensics in proving, and in some cases disproving, allegations of kidnapping, aggravated assault, murder, and acts of terrorism. Dimitrelos also gives his view on the privacy vs. security debate around cell phone encryption technology, what Apple is doing to thwart authorities from conducting forensics on their phones, and whats more secure: Apple IOS or Windows operating systems. All this and much, much more on Episode #103 of Task Force 7 Radio - the Voice of Cyber Security.

Global CISO Forum Podcast
Global CISO Forum Podcast: Michael F D Anaya, Head of Global Cyber Investigations at DEVCON

Global CISO Forum Podcast

Play Episode Listen Later Oct 2, 2019 31:55


In this Podcast: On this episode, Amber Pedroncelli interviews Michael F D Anaya, Head of Global Cyber Investigations at DEVCON. Listen Download this PodcastThe post Global CISO Forum Podcast: Michael F D Anaya, Head of Global Cyber Investigations at DEVCON appeared first on EC-Council.

Parent Pump Radio
Cyber Security for the Whole Family (Part 2 of 2) Show #137

Parent Pump Radio

Play Episode Listen Later Aug 14, 2019 26:38


For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What are some of the best ways of keeping an eye on what our kids are doing online? How do we know what information apps, websites, etc. are collecting from our kids What are some simple steps that we can do to help automatically protect the privacy of our kids and ourselves when browsing the web? Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more----  He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies.  He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator". Webpage: https://briansemrau.com Resource & Research: https://semsec.net Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches.  (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.)  If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use):  https://www.lastpass.com/ 1Password:  https://1password.com/ Dashlane:  https://www.dashlane.com/ KeePass:  https://keepass.info/ 3. Browser extensions: HTTPS Everywhere:  https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger:  https://www.eff.org/privacybadger - helps to block tracking as your browse the web.  (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin:                          a. Chrome:  https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en                          b. FireFox:  https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/                          c. Edge:  https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab                          d. Safari:  https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4.  Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android:  https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple:  https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh  #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity

Parent Pump Radio
Cyber Security for the Whole Family (Part 1 of 2) Show #136

Parent Pump Radio

Play Episode Listen Later Aug 7, 2019 26:50


For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What is the Dark Web and do we need to be concerned about it? Chrome and other browsers have recently started marking a lot of sites as "not secure".  Are they truly not safe to use? How do we protect our social security numbers as well as our children’s?  Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more----  He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies.  He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator".  Webpage: https://briansemrau.com Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches.  (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.)  If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use):  https://www.lastpass.com/ 1Password:  https://1password.com/ Dashlane:  https://www.dashlane.com/ KeePass:  https://keepass.info/ 3. Browser extensions: HTTPS Everywhere:  https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger:  https://www.eff.org/privacybadger - helps to block tracking as you browse the web.  (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin:                          a. Chrome:  https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en                          b. FireFox:  https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/                          c. Edge:  https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab                          d. Safari:  https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4.  Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android:  https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple:  https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh  #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity

Securing Tomorrow
ST04: Ransomware Trends with Raj Samani and John Fokker

Securing Tomorrow

Play Episode Listen Later Apr 23, 2019 20:40


Raj Samani, Chief Scientist and McAfee Fellow, and John Fokker, Head of Cyber Investigations for McAfee Advanced Threat Research, discuss various ransomware attacks and how it's evolving.

Information Security Podcast
How Private Partnerships Impact Cyber Investigations

Information Security Podcast

Play Episode Listen Later Mar 18, 2019 40:26


Title: How Private Partnerships Impact Cyber Investigations Description: This episode of the Information Security Podcast features a presentation delivered by SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch M

Task Force 7 Cyber Security Radio
Ep. 63: How to Turn Intelligence into a Risk Based Discussion

Task Force 7 Cyber Security Radio

Play Episode Listen Later Dec 17, 2018 63:08


One of the most experienced and prolific Cyber Investigations Professionals in the world, Mr. Paul Cavicchia, joins Episode #63 of Task Force 7 Radio to talk about the importance of implementing a proactive enterprise wide intelligence function, the process of fusing different kinds of intelligence together to get unique optics into threats to your firm, and how intelligence and investigative reporting should be formatted to promote a risk discussion with line of business executives who routinely make critical business decisions for the firm. Host George Rettas also leveraged Cavicchia's storied career by asking him how he pivoted from Law Enforcement to the private sector, what kind of skills law enforcement officers should emphasize when seeking to make the transition from the public sector the private sector, and how law enforcement officers can leverage their unique skills sets to solve problems and mitigate risks for large Fortune 500 companies.

Task Force 7 Cyber Security Radio
Ep. 49: The Importance of a Robust Cyber Intelligence Program

Task Force 7 Cyber Security Radio

Play Episode Listen Later Sep 24, 2018 75:47


Former United States Secret Service Agent and current Executive Vice President of Q6 Cyber, Robert Villanueva, joins Task Force 7 Radio Host George Rettas and Guest Hosts Tom Pageler and Paul Jackson to discuss the importance of implementing a robust Cyber Intelligence capability in your organization. Villanueva, who founded the Secret Service's Cyber Intelligence Section and also led the USSS Miami Electronic Crimes Task Force, talks about how he had the foresight to pioneer intelligence capabilities in the Cyber Space long before anyone else was thinking about it. Villanueva also shares his experiences as an Undercover Secret Service Agent infiltrating Cyber Organized Crime Groups around the world. TF7 Radio Hosts also ask Villanueva questions on today's fast changing threat environment and the challenges organizations face from the scourge of organized crime.

Excelsior Life
Today in Cybersecurity: Cyber Investigations....What is the Procedure?

Excelsior Life

Play Episode Listen Later Oct 21, 2014 7:37


In this podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).  

CJUS363 - Computer and Cyber Forensics
Legal considerations for Cyber investigations

CJUS363 - Computer and Cyber Forensics

Play Episode Listen Later Jan 6, 2012 9:05


legal considerations cyber investigations