Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 10,731PODCASTS
  • 55,689EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Dec 13, 2024LATEST
cybersecurity

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Windows 11 and TPM https://techcommunity.microsoft.com/blog/windows-itpro-blog/tpm-2-0-%E2%80%93-a-necessity-for-a-secure-and-future-proof-windows-11/4339066 https://www.forbes.com/sites/zakdoffman/2024/12/12/microsoft-warns-400-million-windows-users-do-not-update-your-pc/ Microsoft Azure MFA Bypass https://www.oasis.security/resources/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass Struts 2 Arbitrary File Upload CVE-2024-53677 https://cwiki.apache.org/confluence/display/WW/S2-067 Russian actor Secret Blizzard using tools of other groups to attack Ukraine https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/

    The Tech Blog Writer Podcast
    3117: AI, Supply Chains, and Cybersecurity

    The Tech Blog Writer Podcast

    Play Episode Listen Later Dec 13, 2024 25:14


    Have you ever wondered how businesses can better manage supply chain risks in an era of increasing cyber threats and regulatory complexities? In this episode of The Tech Talks Daily Podcast, we sit down with Haydn Brooks, CEO and founder of Risk Ledger, to explore how his innovative platform is reshaping third-party risk management. Risk Ledger, founded in 2018, operates as a secure social network for supply chain risk management. Haydn shares how his transition from neuroscience to cybersecurity sparked the creation of this dynamic platform, which has already supported major initiatives like the NHS COVID-19 Test and Trace program. Designed to provide real-time insights and foster collaboration, Risk Ledger is redefining traditional approaches to supply chain security. In our conversation, Haydn discusses the platform's ability to share threat intelligence across a network of suppliers, helping both public and private sector organizations stay ahead of emerging challenges. He also delves into the critical role of AI in supply chain management—both as a risk and a tool—highlighting how Risk Ledger ensures AI governance and assists suppliers in navigating complex security requirements. Looking ahead, Haydn outlines Risk Ledger's ambitious plans for 2025, including enhanced threat response capabilities and international expansion into Northern Europe and the US. With the rise of new regulatory frameworks like DORA and NIS2, Haydn emphasizes how the platform supports compliance while addressing the unique needs of diverse industries. Join us as we unpack the future of supply chain risk management with Haydn Brooks and explore how Risk Ledger is empowering organizations to tackle threats and seize opportunities in an increasingly interconnected world. What strategies do you think are essential for managing supply chain risks in your industry? Let us know your thoughts after the episode!

    Paul's Security Weekly
    The 2024 Cybersecurity Market Review - Mike Privette, Rew Islam - ESW #387

    Paul's Security Weekly

    Play Episode Listen Later Dec 13, 2024 107:09


    For our second year now, Mike Privette, from Return on Security and the Security, Funded newsletter joins us to discuss the year's highlights and what's to come in the next 12 months. In some ways, it has been a return to form for funding, though some casualties of a tough market likely had to seek acquisition when they might have otherwise raised another round and stayed independent a while longer. We'll cover some stats, talk 2025 IPO market, and discuss the likelihood of (already) being in another bubble, particularly with regards to the already saturated AI security market. It won't be all financial trends though, we'll discuss some of the technical market trends, whether they're finding market fit, and how ~50ish AI SOC startups could possibly survive in such a crowded space. In this segment, we discuss two new FIDO Alliance standards focused on credential portability. Specifically, if passwordless is going to catch on, we need to minimize friction and maximize usability. In practice, this means that passkeys must be portable! Rew Islam of Dashlane joins us to discuss the new standards and how they'll help us enter a new age of secure authentication, both for consumers and the enterprise. Segment Resources: Elevating Passwordless Security With AWS Nitro Synced Passkeys Will Be Portable FIDO Alliance Publishes New Specifications to Promote User Choice and Enhanced UX for Passkeys This week, in the enterprise security news, NOTE: We didn't get to 2, 3, 5, or 7 due to some technical difficulties and time constraints, but we'll hit them next week! The show notes have been updated to reflect what we actually discussed this week: https://www.scworld.com/podcast-segment/13370-enterprise-security-weekly-387 Snowflake takes security more seriously Microsoft takes security more seriously US Government takes telecom security more seriously Cleo Capital takes security more seriously EU's DORA takes effect soon Is phishing and security awareness training worthless? CISOs need financial literacy Supply chain firewall is basic but useful All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-387

    Help Me With HIPAA
    Incident Panic to Plan for SMB Execs - Ep 488

    Help Me With HIPAA

    Play Episode Listen Later Dec 13, 2024 50:09


    Cybersecurity incidents can feel like a punch in the gut, but with the right plan, you can roll with the hits instead of flailing in panic. In this episode, we're diving into executive strategies for tackling the unexpected, from building response teams to keeping business operations afloat when chaos strikes. Along the way, we also cover a recent corrective action plan that serves as a cautionary tale for getting your protocols in order before trouble comes knocking. This is your go-to guide for staying cool when the heat is on! More info at HelpMeWithHIPAA.com/488

    The Human Upgrade with Dave Asprey
    Ex Google-Exec: AI is Going to Kill Us in 2027. (Only to Make us Happier!) | Mo Gawdat (Part 2) : 1231

    The Human Upgrade with Dave Asprey

    Play Episode Listen Later Dec 12, 2024 23:58


    Will the next nuclear bomb be AI Superintelligence? The intelligence we're building will reshape the world in ways we never imagined—for better or worse? But more importantly, what side will humanity take? In this episode, Mo Gawdat, bestselling author of Scary Smart and former Chief Business Officer of Google X, joins Dave to tackle the profound challenges and opportunities artificial intelligence presents. This isn't about dystopian robots or tech hype—it's about redefining what it means to be human in the age of machines. There's hope, don't worry! Mo dives into the reality of how AI is already shaping our behavior, our ethics, and even our potential for happiness. He reveals the critical need for aligning intelligence—human or artificial—with values that promote global abundance and collaboration. Dave and Mo mix data, philosophy, and bold visions, to show why our future depends on shifting from competition to cooperation. But most importantly, why all of this is going to make you a better YOU. What You'll Learn: • The real reason AI is reshaping human behavior—and how to take back control • Why intelligence without ethics could lead to catastrophe • How abundance thinking can unlock limitless possibilities for humanity • The crucial mindset shifts leaders need to adopt before it's too late • Practical insights for ensuring AI supports human flourishing, not destruction Resources: 2025 Biohacking Conference – https://biohackingconference.com/2025 Mo Gawdat's Book: Scary Smart – https://a.co/d/6DukqyW Mo Gawdat's Book: Unstressable – https://a.co/d/hrbpY9O Follow Mo Gawdat on Instagram – https://www.instagram.com/mo_gawdat/ Danger Coffee – https://dangercoffee.com Dave Asprey's Website – https://daveasprey.com Dave Asprey's Book: Smarter Not Harder – https://daveasprey.com/books Dave Asprey's Linktree – https://linktr.ee/daveasprey Upgrade Collective: Join The Human Upgrade Podcast Live – https://www.ourupgradecollective.com Own an Upgrade Labs – https://ownanupgradelabs.com Upgrade Labs – https://upgradelabs.com 40 Years of Zen – Neurofeedback Training for Advanced Cognitive Enhancement – https://40yearsofzen.com Sponsors: - Zbiotics | Go to https://zbiotics.com/DAVE for 15% off your first order. - fatty15 | Go to https://fatty15.com/dave and save an extra $15 when you subscribe with code DAVE. Timestamps: • 00:00 The Ethical Dilemma of AI in Warfare • 00:31 Introduction to Part Two with Mo Gawdat • 00:58 AI and Human Happiness: A Complex Relationship • 03:18 The Power and Responsibility of Technology • 05:08 The Rise of AI and Its Impact on Society • 08:31 The Future of AI: Abundance or Destruction? • 19:53 The Role of Ethics in AI Development • 22:39 Conclusion and Final Thoughts See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Vulnerability Symbiosis: vSphere's CVE-2024-38812 and CVE-2024-38813 https://isc.sans.edu/diary/Vulnerability%20Symbiosis%3A%20vSphere%3Fs%20CVE-2024-38812%20and%20CVE-2024-38813%20%5BGuest%20Diary%5D/31510 Apple Updates Everything (iOS, iPadOS, macOS, watchOS, tvOS, visionOS) https://isc.sans.edu/diary/Apple+Updates+Everything+iOS+iPadOS+macOS+watchOS+tvOS+visionOS/31514/ Widespread exploitation of Cleo file transfer software (CVE-2024-50623) https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild https://labs.watchtowr.com/cleo-cve-2024-50623/

    PwC's accounting and financial reporting podcast
    PwC's global investor survey: What's top of mind for 2025?

    PwC's accounting and financial reporting podcast

    Play Episode Listen Later Dec 12, 2024 43:33


    Did you enjoy this episode? Text us your thoughts and be sure to include the episode name.PwC recently released the results of our 2024 Global Investor Survey, which was conducted to better understand investor expectations and concerns about corporate reporting and the evolving business landscape. The annual survey results highlight the importance of transparency in technology use, especially Artificial Intelligence (AI), and the need for companies to adapt to global threats, climate change, and regulatory developments.This week, host Heather Horn is joined by Nadja Picard, PwC Global Reporting Leader, to break down the results and discuss the sometimes differing expectations between companies and investors. They also address how companies can better meet investor expectations through both action and communication.In this episode, we discuss:01:31 – Purpose of the 2024 global investor survey and demographics of survey participants05:11 – Highlights from the global investor survey, including what surprised our Global Reporting Leader most10:19 – Expectations to continue investing in AI, while upskilling the workforce14:09 – How investors are thinking about climate adaptation and transition19:41 – How investors evaluate trust and communication year over year25:15 – Cybersecurity ranks number one threat33:28 – Executing well and communicating well to address investor concerns36:29 – Advice for companies navigating a challenging reporting landscapeLooking for the latest developments in sustainability reporting? Follow this podcast on your favorite podcast app and subscribe to our weekly newsletter to stay in the loop for the latest thought leadership on sustainability standards. Nadja Picard is PwC's Global Reporting Leader. In this role, she leads PwC's global initiative to help clients transform their corporate reporting to meet investor and stakeholder demands for trusted and assured reporting beyond financial reporting. Nadja also advises companies on the accounting, corporate reporting, and investor relations requirements in advance of capital markets transactions, especially IPOs.Heather Horn is the PwC National Office Sustainability and Thought Leader, responsible for developing our communications strategy and conveying firm positions on accounting, financial reporting, and sustainability matters. In addition, she is part of PwC's global sustainability leadership team, developing interpretive guidance and consulting with companies as they transition from voluntary to mandatory sustainability reporting. She is also the engaging host of PwC's accounting and reporting weekly podcast and quarterly webcast series.Transcripts available upon request for individuals who may need a disability-related accommodation. Please send requests to us_podcast@pwc.com.

    Marketing Today with Alan Hart
    449: Cybersecurity and the New CMO Profile with Brian Goldfarb, CMO of SolarWinds

    Marketing Today with Alan Hart

    Play Episode Listen Later Dec 11, 2024 41:41


    Brian Goldfarb is the Senior Vice President and Chief Marketing Officer at SolarWinds. After earning his A.B. in Computer Science and Economics from Duke University, Brian initially explored a career on Wall Street but soon transitioned to product management at Microsoft, marking the start of his two-decade journey in the tech industry. At Google, Brian played a key role in launching the Cloud Platform. He later led platform marketing at Salesforce, and before joining SolarWinds, he served as CMO at both Splunk and Tenable. Now, after nearly a year with SolarWinds, Brian oversees the company's global marketing strategy, covering its industry-leading observability, database, and service management solutions.SolarWinds is a leading IT management software provider that helps businesses monitor and manage their IT infrastructure, applications, and networks. Known for its user-friendly and scalable solutions, SolarWinds serves a broad range of industries, focusing on identifying and resolving IT challenges. SolarWinds continues to deliver solutions that empower IT professionals to maintain reliable and secure environments.In today's show, Alan and Brian dive into cybersecurity, discussing SolarWinds and the solutions they offer. They examine the major cybersecurity incident that impacted both the company and the industry and how SolarWinds successfully recovered from it. Additionally, they explore what marketing looks like at SolarWinds, how the role of CMO has evolved, and what we should consider about the future of this role.In this episode, you'll learn:Insights for successfully recovering from a massive cyberattackTips for creating a strong marketing structureThe profile of the modern CMO and how it has evolvedKey Highlights:[01:15] Brush with fame on a game show[03:08] Career path to CMO at SolarWinds[05:29] Story behind Kubernetes [07:23] Scope of SolarWinds[10:39] Recovering from a massive cyberattack[14:25] How marketing is structured at SolarWinds[15:52] What CMO role should be focused on[17:56] How the CMO role interacts with the rest of the team [21:20] “Lack of novelty is not a bad thing”[27:30] An experience from your past that defines you[30:24] Advice to your younger self[31:36] A topic that you and other marketers need to learn more about[33:11] Trends or subcultures others should follow[36:30] OOH Advertising's impact internally [37:30] Largest opportunity or threat to marketers todayLooking for more?Visit our website for the full show notes, links to resources mentioned in this episode, and ways to connect with the guest! Become a member today and listen ad-free, visit https://plus.acast.com/s/marketingtoday. Hosted on Acast. See acast.com/privacy for more information.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Microsoft Patch Tuesday December 2024 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20December%202024/31508 Ivanty Security Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773?language=en_US Visual Studio Code Tunnels https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/ Mitigating NTLM Relay Attacks https://msrc.microsoft.com/blog/2024/12/mitigating-ntlm-relay-attacks-by-default/

    The Roundtable
    12/11/24 Panel

    The Roundtable

    Play Episode Listen Later Dec 11, 2024 73:52


    The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin, an advance Lead for the White House and former Chief of Staff for State Senator Michelle Hinchey and former Assistant County Executive for Pat Ryan Anna Markowitz, Executive Director of The Legal Aid Society of Northeastern New York Nic Rangel, and Albany Law School Professor Sarah Rogerson.

    ITSPmagazine | Technology. Cybersecurity. Society
    Data Security Posture Management — DSPM. What, why, when, and how: All The Insights You Need To Know | An Imperva Brand Story Conversation with Terry Ray

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 11, 2024 49:37


    In this latest episode of the Imperva Brand Story on ITSP Magazine, Sean Martin and Marco Ciappelli sit down with Terry Ray, CTO for Data Security at Imperva. Together, they discuss the pressing challenges and transformative innovations shaping the future of safeguarding information.Unpacking Data Security Posture ManagementTerry Ray introduces Data Security Posture Management (DSPM), comparing it to inspecting a home—where identifying vulnerabilities is just as important as fixing them. He emphasizes that data security requires constant vigilance, urging organizations to develop a deep understanding of their infrastructure while staying agile against emerging threats.Moving Beyond Compliance to Real SecurityThe conversation highlights the often-misunderstood relationship between compliance and genuine security. While meeting regulatory requirements is necessary, Terry argues that true data protection requires a broader, risk-based approach, addressing vulnerabilities in both regulated and non-regulated systems to prepare for audits and unforeseen breaches.The Power of Automation and Machine LearningTerry underscores Imperva's dedication to leveraging advanced automation, AI, and machine learning technologies to process vast data sets and detect threats proactively. By adopting innovative strategies, companies can transition from reactive to proactive measures in protecting their digital ecosystems.Fostering Collaboration and Security AwarenessA standout point from the discussion is the importance of collaboration across organizational roles—from compliance officers to database managers and security teams. By fostering a culture of continuous learning and teamwork, businesses can better allocate resources and adapt to evolving security priorities.Embracing Security's Ever-Changing NatureThe conversation concludes with a powerful reflection on the unpredictable nature of cybersecurity. As new threats and technologies emerge, organizations must remain adaptable, forward-thinking, and prepared for the unexpected to stay ahead in an ever-changing security landscape.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Terry Ray, SVP Data Security GTM, Field CTO and Imperva Fellow [@Imperva]On Linkedin | https://www.linkedin.com/in/terry-ray/On Twitter | https://twitter.com/TerryRay_FellowResourcesLearn more and catch more stories from Imperva: https://www.itspmagazine.com/directory/impervaAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    CURLing for Crypto on Honeypots https://isc.sans.edu/diary/CURLing%20for%20Crypto%20on%20Honeypots/31502 Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ Android Monthly Update https://source.android.com/docs/security/bulletin/pixel/2024-12-01 RCS Not Always Encrypted https://daringfireball.net/linked/2024/12/04/shame-on-google-messages

    Packet Pushers - Full Podcast Feed
    PP043: The Perils and Perks of the CISO Track

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Dec 10, 2024 39:49


    A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technical teams actually running security operations.... Read more »

    Packet Pushers - Fat Pipe
    PP043: The Perils and Perks of the CISO Track

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Dec 10, 2024 39:49


    A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technical teams actually running security operations.... Read more »

    ITSPmagazine | Technology. Cybersecurity. Society
    Rebalancing Cyber Security: Prioritizing Response and Recovery in Governance | An Australian Cyber Conference 2024 in Melbourne Conversation with Asaf Dori and Ashwin Pal | On Location Coverage with Sean Martin and Marco Ciappelli

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 10, 2024 28:36


    Guests: Asaf Dori, Cyber Security Lead, Healthshare NSWOn LinkedIn | https://www.linkedin.com/in/adori/Ashwin Pal, Partner – Cyber Security and Privacy Services, RSM AustraliaOn LinkedIn | https://www.linkedin.com/in/ashwin-pal-a1769a5/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesAt the AISA CyberCon 2024 in Melbourne, Sean Martin sat down with Asaf Dori and Ashwin Pal to explore the often-overlooked areas of the NIST Cybersecurity Framework: response and recovery. Both guests highlighted the critical gaps organizations face in these domains and shared practical insights on addressing them.Asaf Dori, a cybersecurity professional in healthcare and a researcher at the University of Sydney, underscored the need for governance-driven awareness to improve response and recovery capabilities. His research revealed that while organizations invest heavily in prevention and detection, they frequently neglect robust recovery plans. He emphasized the importance of comprehensive disaster recovery exercises over isolated system-based approaches. By linking governance to practical outcomes, Dori argued that organizations could better align their strategies with business resilience.Ashwin Pal, a partner at RSM with 26 years of experience in IT security, brought a field perspective, pointing out how recovery strategies often fail to meet business requirements. He discussed the disconnect between IT recovery metrics, such as RPOs and RTOs, and actual business needs. Pal noted that outdated assumptions about recovery timeframes and critical systems frequently result in misaligned priorities. He advocated for direct business engagement to establish recovery strategies that support operational continuity.A key theme was the role of effective governance in fostering collaboration between IT and business stakeholders. Both speakers agreed that engaging business leaders through tabletop exercises is an essential starting point. Simulating ransomware scenarios, for instance, often exposes gaps in recovery plans, such as inaccessible continuity documents during a crisis. Such exercises, they suggested, empower CISOs to secure executive buy-in for strategic improvements.The discussion also touched on the competitive advantages of robust cybersecurity practices. Dori noted that in some industries, such as energy, cybersecurity maturity is increasingly viewed as a differentiator in securing contracts. Pal echoed this, citing examples where certifications like ISO have become prerequisites in supply chain partnerships.By reframing cybersecurity as a business enabler rather than a cost center, organizations can align their response and recovery strategies with broader operational goals. This shift requires CISOs and risk officers to lead conversations that translate technical requirements into business outcomes, emphasizing trust, resilience, and customer retention.This dialogue provides actionable insights for leaders aiming to close the response and recovery gap and position cybersecurity as a strategic asset.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

    ITSPmagazine | Technology. Cybersecurity. Society
    The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 10, 2024 26:02


    Guest: Ravi Nayyar, PhD Scholar, The University Of SydneyOn LinkedIn | https://www.linkedin.com/in/stillromancingwithlife/At AISA AU Cyber Con | https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.The Cyber Zoo: Ravi Nayyar's Research FocusRavi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.The Role of Humans in CybersecurityAt the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.The Case for Stronger Cyber LawsRavi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.Global Cooperation and the Fight Against Regulatory ArbitrageThe discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.Incentivizing Secure PracticesDelving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.Closing Thoughts: Collaboration for a Safer Digital WorldSean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesThe theory of saving the world: Intervention requests and critical infrastructure: https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNriflLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

    ITSPmagazine | Technology. Cybersecurity. Society
    Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon Wijckmans

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 10, 2024 33:21


    In a recent episode of Brand Story, Simon Wijckmans, founder and CEO of c/side, discussed the critical need to secure third-party scripts on websites, a frequently overlooked aspect of cybersecurity. Drawing on his experience with companies like Cloudflare and Vercel, Wijckmans outlined why traditional methods fall short in addressing dynamic threats and how c/side is redefining client-side security.Third-party scripts—commonly used for analytics, marketing, and chatbots—are vital for website functionality but come with inherent risks. These scripts operate dynamically, allowing malicious actors to inject harmful code under specific conditions, such as targeting particular users or timeframes. Existing security approaches, such as threat feeds or basic web crawlers, fail to detect these threats because they often rely on static assessments. As Wijckmans explained, these limitations result in a false sense of security, leaving businesses exposed to significant risks.C/side provides a proactive solution by placing itself between users and third-party script providers. This approach enables real-time analysis and monitoring of script behavior. Using advanced tools, including AI-driven analysis, c/side inspects the JavaScript code and flags malicious activity. Unlike other solutions, it offers complete transparency by delivering the full source code of scripts in a readable format, empowering organizations to investigate and address potential vulnerabilities comprehensively.Wijckmans stressed that client-side script security is an essential yet underrepresented aspect of the supply chain. While most security tools focus on protecting server-side dependencies, the browser remains a critical point where sensitive data is often compromised. C/side not only addresses this gap but also helps organizations meet compliance requirements like those outlined in PCI-DSS, which mandate monitoring client-side scripts executed in browsers.C/side's offerings cater to various users, from small businesses using a free tier to enterprises requiring comprehensive solutions. Its tools integrate seamlessly into cybersecurity programs, supporting developers, agencies, and compliance teams. Additionally, c/side enhances performance by optimizing script delivery, ensuring that security does not come at the cost of website functionality.With its innovative approach, c/side exemplifies how specialized solutions can tackle complex cybersecurity challenges. As Wijckmans highlighted, the modern web can be made safer with accessible, effective tools, leaving no excuse for neglecting client-side security. Through its commitment to transparency, performance, and comprehensive protection, c/side is shaping a safer digital ecosystem for businesses and users alike.Learn more about c/side: https://itspm.ag/c/side-t0g5Note: This story contains promotional content. Learn more.Guest: Simon Wijckmans, Founder & CEO, c/side [@csideai]On LinkedIn | https://www.linkedin.com/in/wijckmans/ ResourcesLearn more and catch more stories from c/side: https://www.itspmagazine.com/directory/c-sideAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

    ITSPmagazine | Technology. Cybersecurity. Society
    The Art & Science of Metawar | A Conversation with Winn Schwartau | Cyber Cognition Podcast with Hutch and Len Noe

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 10, 2024 57:10


    ITSPmagazine | Technology. Cybersecurity. Society
    Thrive: Proven Paths to Career Growth! | A Conversation with Jennifer Brick | The Soulful CXO Podcast with Dr. Rebecca Wynn

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 10, 2024 16:22


    Guest: Jennifer Brick, CEO & Founder, Capdeca SolutionsLinkedIn: https://www.linkedin.com/in/jenniferbrickYouTube: https://www.youtube.com/channel/UCmem-D5aeCsSRyXTZkH_gKQTwitter: https://www.tiktok.com/@jenniferbrickInstagram: https://www.instagram.com/ccjenniferbrick/Website: https://www.capdecasolutions.com/Host: Dr. Rebecca WynnOn ITSPmagazine  

    Microsoft Business Applications Podcast
    Navigating Tech Challenges and Cybersecurity Threats Amidst Political Dynamics

    Microsoft Business Applications Podcast

    Play Episode Listen Later Dec 10, 2024 46:17 Transcription Available


    Send me a Text Message hereIn 2024, we celebrated seven years of the Microsoft Business Applications podcast. Now, we step into 2025 with a fresh new name. Welcome to the Microsoft Innovation podcast! Our new name reflects a broader vision, exploring the intersection of people, business, technology, and AI. 90 Day Mentoring ChallengeMicrosoft Business Applications Career Mentor for the Power Platform and Dynamics 365 Justin WelshJustin Welsh's LinkedIn Operating System—the guide to finding your voice on LinkedIn.Support the showIf you want to get in touch with me, you can message me here on Linkedin.Thanks for listening

    Data Protection Gumbo
    277: Why Business Continuity Plans Often Fail - Strata Identity

    Data Protection Gumbo

    Play Episode Listen Later Dec 10, 2024 23:21


    Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights real-world applications, such as failover scenarios for cruise ships and military operations, emphasizing the importance of resilient identity systems. Listeners are encouraged to explore his book, Identity Orchestration for Dummies, for actionable insights.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Bypassing WAFs with the Phantom Version Cookie https://portswigger.net/research/bypassing-wafs-with-the-phantom-version-cookie URL File NTLM Hash Disclosure https://blog.0patch.com/2024/12/url-file-ntlm-hash-disclosure.html Ultralytics Library Infected with Miner https://github.com/ultralytics/ultralytics/issues/18027#issuecomment-2521578169 DaMAgeCard attack targets memory directly thru SD card reader https://swarm.ptsecurity.com/new-dog-old-tricks-damagecard-attack-targets-memory-directly-thru-sd-card-reader/

    Heads Talk
    236 - Sametria Mckinney, CISO, H: Cyber Protect Series, The Bahamas Office of the Prime Minister - Cyber Reef

    Heads Talk

    Play Episode Listen Later Dec 9, 2024 45:53


    Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedInEpisode Title:

    On Record PR
    Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use

    On Record PR

    Play Episode Listen Later Dec 9, 2024 9:32


    In this episode of On Record PR, sponsored by Lawline, Gina Rubel goes on record with Mary Hildebrand CIPP/US/E/AIGP, founder & chair emeritus of the Data, Privacy & Cybersecurity Practice at Lowenstein Sandler, to discuss important considerations for law firms when developing generative AI policies that serve their needs. Learn More Mary J. Hildebrand founded, led and now serves as Chair Emeritus of the firm's Data, Privacy & Cybersecurity Practice with the primary goal of enabling companies to launch and grow their businesses while staying in compliance with complex global regulations governing the collection and commercial use of personal information. Mary's extensive experience in intellectual property and technology in a broad array of industries enhances her ability to understand the data-driven challenges companies face today. For more than 30 years, clients have turned to her as a trusted advisor; she has successfully guided business leaders and general counsel through difficult decisions and hundreds of sophisticated tech/data deals from concept to closing. She regularly serves as lead counsel to both public and private companies in complex commercial and compliance matters, helping clients commercialize, protect, and manage their intellectual property, technology, and database assets around the world; she also counsels startups on the transactions and foundational legal structures needed to launch their businesses.

    Identity At The Center
    #322 - Identity Security Posture Management with Saviynt's Henrique Teixeira

    Identity At The Center

    Play Episode Listen Later Dec 9, 2024 69:38


    In this episode of the Identity at the Center podcast, hosts Jeff and Jim dive into the concept of Identity Security Posture Management (ISPM) with Henrique Teixeira, Senior Vice President of Strategy at Saviynt and former Gartner analyst. Henrique explains ISPM as an Apple Watch for your identity program, focusing on preventive measures before an attack occurs. The discussion also covers the upcoming Gartner IAM Summit, AI's impact on identity management, and the anticipated trends for 2025. Additionally, they explore the differences between AI copilot, agent, and bot, and the future of non-human identity management. Henrique shares insights on balancing ITSM front ends with IGA systems and emphasizes the importance of continuous security investment. Tune in for a comprehensive look at ISPM, AI, and the evolving identity security landscape. Chapters 00:00 Welcome to the Podcast 01:47 Gartner IAM Summit Preview 04:48 Guest Introduction: Henrique Teixeira 05:28 Henrique's Career Transition 10:12 Conference Experiences and Insights 14:10 Understanding ISPM and ITDR 29:16 AI in Identity Management 35:58 Debating the Future of AI in IGA Systems 37:09 Evolution of Access Request Systems 37:59 The Rise of ChatOps in Identity Management 40:26 Multi-Channel Identity and Access Management 45:54 Influencers and Inspirations in Identity Strategy 49:06 Reflecting on 2024: Trends and Predictions 54:31 Looking Ahead: Identity and AI in 2025 01:02:50 Boxing Talk: Mike Tyson vs. Jake Paul 01:08:17 Wrapping Up: Final Thoughts and Farewells Connect with Henrique: https://www.linkedin.com/in/bernardes Learn more about Saviynt: https://saviynt.com/ Prevention + ITDR Venn Diagram - https://www.linkedin.com/posts/rezasoltani_identitysecurity-ispm-itdr-activity-7203522819014500353-8Kv_/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Keywords: Identity Security, IAM, Digital Identity, AI, Artificial Intelligence, ISPM, ITDR, IGA, Gartner IAM Summit, Cybersecurity, Cloud Security, Machine Identity, Non-Human Identity, Podcast, Interview, Saviynt, Henrique Teixeira, Jim McDonald, Jeff Steadman

    The Cybertraps Podcast
    Being Cyber Aware with Mark Neufville #inch360'24

    The Cybertraps Podcast

    Play Episode Listen Later Dec 9, 2024 10:00


    This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Mark Neufville from Spokane Falls Community College. They discuss Mark's involvement with the conference, cyber security education for young people, and the importance of cyber awareness in the community. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

    The CyberWire
    Digital Mindhunters: a novel look at cybersecurity and artificial intelligence. [Special Edition]

    The CyberWire

    Play Episode Listen Later Dec 8, 2024 46:37


    In this special edition podcast, N2K's Executive Editor Brandon Karpf talks with author, CEO and cybersecurity advisor Dr. Bilyana Lilly about her new novel "Digital Mindhunters." Book Overview In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country. About the author Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Security Conversations
    Inside the Turla Playbook: Hijacking APTs and fourth-party espionage

    Security Conversations

    Play Episode Listen Later Dec 7, 2024 107:08


    Three Buddy Problem - Episode 24: In this episode, we did into Lumen/Microsoft's revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution. We also discuss Citizen Lab's findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu)and Ryan Naraine (https://twitter.com/ryanaraine).

    Cyber Security Today
    Cyber Security Today Weekend Panel: Month In Review, December 7th, 2024

    Cyber Security Today

    Play Episode Listen Later Dec 7, 2024 57:47 Transcription Available


    Cyber Security Today: Navigating Novel Phishing Campaigns and Ransomware Tactics Join host Jim Love and the Cyber Security Today panel featuring Terry Cutler of Cyology Labs, David Shipley of Beauceron Security, and cybersecurity executive John Pinard. In this episode, they delve into pressing cybersecurity challenges such as novel phishing tactics using corrupted Word documents, the importance of robust offboarding processes in light of breaches at major companies like Disney, and the ramifications of a major ransomware attack on the City of Hamilton. Topics also include the recurring issue of session cookie theft, the implications of third-party cybersecurity risk as seen in the Blue Yonder ransomware attack impacting Starbucks, and the rise of hacktivism. Tune in for valuable insights and discussions aimed at improving cybersecurity measures in an ever-evolving threat landscape. 00:00 Introduction and Panelist Introductions 00:40 David Shipley's Cyber Risk Talk 02:39 Novel Phishing Campaign Discussion 06:08 Fileless Malware and Human Error 10:44 Offboarding and Internal Audits 19:48 Vendor Responsibility and Ransomware 27:06 City of Hamilton Cyber Attack 28:19 Keynote Talks and Cybersecurity Challenges 29:30 The Reality of Cyber Attacks 29:46 Ransomware and Business Email Compromise 31:21 Cyber Insurance and Its Pitfalls 32:44 Andrew Tate Hack and Hacktivism 36:04 Chinese State-Sponsored Hacks 41:26 Canadian Cybersecurity Issues 44:53 Session Cookies and Two-Factor Authentication 49:45 AI in Software Development 56:42 Concluding Thoughts and Final Remarks

    Cybercrime Magazine Podcast
    Cybercrime Wire For Dec. 7-8, 2024. Weekend Update. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 7, 2024 1:17


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Paul's Security Weekly TV
    Cybersecurity from Santa, office surveillance, Apple work/life balance issues, & more - ESW #386

    Paul's Security Weekly TV

    Play Episode Listen Later Dec 7, 2024 49:35


    This week, in the enterprise security news, Funding and acquisition news slows down as we get into the “I'm more focused on holiday shopping season” North Pole Security picked an appropriate time to raise some seed funding Breaking news, it's still super easy to exfiltrate data The Nearest Neighbor Attack Agentic Security is the next buzzword you're going to be tired of soon Frustrations with separating work from personal in the Apple device ecosystem We check in on the AI SOC and see how it's going Office surveillance technology gives us the creeps All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-386

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Business E-Mail Compromise https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Business%20Email%20Compromise/31474 Where There s Smoke, There s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/ https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 Lorex 2K Indoor Wi-Fi Security Camera https://www.rapid7.com/globalassets/_pdfs/research/pwn2own-iot-2024-lorex-2k-indoor-wi-fi-security-camera-research.pdf https://www.lorex.com/products/2k-indoor-wi-fi-security-camera HPE Aruba Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US Alan Paller Inducted into the Cybersecurity Hall of Fame https://cybersecurityhalloffame.org/

    CrossroadsET
    FBI Warns Americans to Stop Sending Text Messages as CCP Breaches Networks

    CrossroadsET

    Play Episode Listen Later Dec 6, 2024 60:09


    A new warning is being sent out to Americans to stop sending text messages amid a large-scale breach of U.S. networks by Chinese hackers. The FBI, Cybersecurity and Infrastructure Security Agency, and U.S. Cyber Defense Agency are now telling people to use encrypted apps for chats and phone calls amid the current breach. We'll discuss this topic and others, in this episode of Crossroads. Views expressed in this video are opinions of the host and guests and do not necessarily reflect the views of The Epoch Times.     ⭕️

    The BradCast w/ Brad Friedman
    'BradCast' 12/6/2024 (Encore: Hunter's Pardon; Biden-Harris cybersecurity chief questions 2024 results; Trump's latest corrupt appointments)

    The BradCast w/ Brad Friedman

    Play Episode Listen Later Dec 6, 2024 58:09


    Business of Tech
    Exploring 1Password's Strategy, Cybersecurity Trends, and AI on Data Governance w/ Jason Eberhardt

    Business of Tech

    Play Episode Listen Later Dec 6, 2024 15:43


    Dave Sobel sits down with Jason Eberhardt from 1Password to discuss the evolving landscape of cybersecurity and the role of managed service providers (MSPs) within it. Eberhardt shares insights into 1Password's commitment to building relationships with MSPs, highlighting the company's transition from a consumer-focused product to one that actively engages with the MSP channel. With over 150 partners and millions of users, 1Password is now prioritizing its offerings for MSPs, aiming to create a unique value proposition in a crowded market.The conversation delves into the complexities of the cybersecurity market, where numerous players vie for attention. Sobel and Eberhardt explore the tension between best-in-breed solutions and the push towards platform-based offerings. Eberhardt emphasizes the importance of direct relationships with MSPs, explaining how 1Password is adapting its approach to better serve this channel. He discusses the need for structured pricing that rewards MSPs based on their engagement and performance, ensuring transparency and understanding in the vendor-partner relationship.As they discuss the challenges of channel conflict, Eberhardt reveals that 1Password has recently hired a channel chief to navigate the complexities of reselling and distribution. He outlines a tiered pricing structure designed to incentivize MSPs while maintaining clarity about why certain partners receive better discounts. This approach aims to foster collaboration and trust between 1Password and its MSP partners, ultimately leading to a more effective partnership.The episode concludes with a forward-looking perspective on the role of artificial intelligence (AI) in cybersecurity. Eberhardt identifies AI as a critical trend to watch, noting its potential impact on security practices and the necessity for robust data governance. He emphasizes that while AI presents opportunities, it also introduces new risks that organizations must manage. The discussion highlights the importance of ongoing dialogue between vendors and MSPs to adapt to these changes and ensure that security solutions remain effective in an evolving landscape. Supported by: https://tdsynnex.com/StreamOneIon/  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

    ITSPmagazine | Technology. Cybersecurity. Society
    Securing Digital Legacies: Ethical Challenges and Insights Based on a True Story | An Australian Cyber Conference 2024 in Melbourne Conversation with Peter Gigengack | On Location Coverage with Sean Martin and Marco Ciappelli

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 6, 2024 35:27


    Guest: Peter Gigengack, Director Cyber Security, Capability, Department of Premier and Cabinet of WAOn LinkedIn | https://www.linkedin.com/in/peter-gigengack/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe digital era has reshaped nearly every aspect of our lives, but it has also introduced new challenges to end-of-life planning. Peter Gigengack shares his insights on this pressing issue, recounting how he navigated the emotional and logistical hurdles of managing a loved one's digital footprint after their passing.A Personal Story of Loss and DiscoveryPeter's journey into the realm of digital legacies began when his elderly relative, "John," passed away. The family was left not only with John's physical belongings but also his vast and complicated online presence.Without access to passwords or guidance from John, the family faced a daunting task. Drawing on his technical expertise, Peter took the lead, discovering firsthand the difficulties that come with managing digital identities without preparation.Ethical and Legal ConsiderationsThe discussion moves into the ethical and legal complexities of managing digital legacies. Peter admits that while his family's choices were driven by love and respect, they highlighted a significant gray area between honoring someone's memory and navigating privacy laws.These questions are universal: What rights do families have to access a loved one's digital accounts? How can individuals protect their online presence while providing their families with the tools they need to manage it?Preparing for the InevitableSean and Marco discuss proactive steps, such as assigning digital heirs, securing access to critical accounts, and incorporating digital assets into estate planning. They also challenge technology providers to offer clearer solutions for managing digital legacies responsibly and ethically.The conversation emphasizes the need for individuals to take ownership of their digital afterlives while advocating for systemic changes that ease the burden on grieving families.The Future of Digital ImmortalityThe episode explores the broader implications of digital immortality. In an age where online personas often outlast their creators, society must grapple with how we remember, honor, and even interact with the deceased.Marco, Sean, and Peter discuss potential technologies, like AI-driven tools that could simulate conversations with late loved ones, and the ethical dilemmas they may bring. The trio reflects on the balance between preserving memories and respecting boundaries in a rapidly advancing digital world.Key TakeawaysPeter encourages families to have honest conversations about their digital legacies, ensuring everyone is prepared for life's uncertainties. Sean underscores the cybersecurity perspective, drawing parallels to how businesses prepare for digital risks.The episode ends with a call to action: Start planning your digital legacy today, and advocate for policies that simplify the process for future generations.ConclusionThis episode tackles a timely and often overlooked topic, urging listeners to consider the impact of their digital footprints after death. Whether you're looking for practical guidance or contemplating the philosophical questions of digital immortality, the conversation offers valuable perspectives for navigating this evolving landscape.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More