Podcasts about Cyber security awareness

  • 382PODCASTS
  • 662EPISODES
  • 29mAVG DURATION
  • 1WEEKLY EPISODE
  • Apr 14, 2025LATEST
Cyber security awareness

POPULARITY

20172018201920202021202220232024


Best podcasts about Cyber security awareness

Latest podcast episodes about Cyber security awareness

Paisa Vaisa
Visa India on Digital Payments & Safety | Ft. Vipin Surelia

Paisa Vaisa

Play Episode Listen Later Apr 14, 2025 27:52


In this episode of Paisa Vaisa with Anupam, our host is joined by Vipin Surelia, Head of Risk Services at Visa, India & South Asia, to dive deep into the world of secure digital payments. Vipin shares how India has emerged as a key market for Visa and reflects on the major shifts in the country’s payments landscape over the past decade. As scams and frauds grow alongside digital adoption, Vipin discusses the evolving nature of cyber threats, and how Visa is working to stay one step ahead. He also offers essential safety tips that every consumer should follow to stay protected in today’s digital world.

ITSPmagazine | Technology. Cybersecurity. Society
Protecting What Matters, With Chris Pierson of BlackCloak | A RSAC Conference 2025 Pre-Event Conversation | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 9, 2025 17:35


As the cybersecurity world gears up for RSAC 2025 in San Francisco, we hit the road again—this time with Chris Pierson, Founder and CEO of BlackCloak, for a pre-event chat packed with insight, community spirit, and some big news.Chris is no stranger to the RSA stage—this year marks his 21st year presenting—and he's bringing his energy to two powerful sessions. The first, titled “Protecting What Matters: Your Family and Home,” kicks off bright and early on Monday, April 28. It's not about blinky lights or enterprise networks—it's about us. The cybersecurity community often talks about protecting organizations, but what about protecting ourselves and our families? Chris will explore how security pros can apply their skills at home, covering identity theft, scams, and home network safety. It's a refreshing and much-needed call to action that connects the personal and professional.On Wednesday, Chris returns with co-presenter James Shreve for a two-hour Learning Lab, “When Things Go Boom: Supply Chain Risk.” This Chatham House Rule session dives deep into one of today's most complex challenges: managing third-party risk without stopping the business in its tracks. Participants will step into different roles—board members, CISOs, legal, finance—to engage in a live, collaborative scenario that pushes them to think beyond checklists. Real talk. Real collaboration. And practical takeaways.But that's not all. BlackCloak is also unveiling its new Digital Executive Protection Framework, designed to help organizations assess and strengthen protections for executives and their families. Chris teases that this framework includes 14 essential tenets that blend physical, digital, and organizational awareness—and he'll be sitting down with us again at the event to go deeper.With 15–20 BlackCloak team members on site, a full schedule of meetings, events, and community conversations, this year is shaping up to be a milestone for BlackCloak at RSAC. If you're attending, keep an eye on their LinkedIn page for updates, booking links, and suite details.As Chris says, it's about lifting our heads, scanning the horizon, and showing up for our community—and our families.Keywords: RSAC2025, Chris Pierson, BlackCloak, cybersecurity, RSA Conference, digital protection, executive protection, supply chain risk, identity theft, privacy, home network security, third-party risk, CISOs, cybersecurity community, digital executive protection framework, GRC, threat intelligence, infosec, personal security, cybersecurity awareness______________________Guest: Chris Pierson, Founder & CEO of BLACKCLOAK | Digital Executive Protection | Concierge Cybersecurity & Privacy Protection . . . in their Personal Lives | On LinkedIn: https://www.linkedin.com/in/drchristopherpierson/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBLACKCLOAK:https://itspm.ag/itspbcweb____________________________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageChris SessionsProtecting What Matters—Your Family & Home https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtUWhen Things Go Boom! Your Supply Chain Riskhttps://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwMBLACKCLOAK WEBSITE:https://itspm.ag/itspbcweb____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Cybercrimeology
DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Cybercrimeology

Play Episode Listen Later Apr 1, 2025 38:32


Episode Notes:Dr. Reeves' Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form of disengagement where employees lose motivation to follow security practices due to overload and conflicting advice.Not Just Apathy – Fatigue often affects people who initially cared about cybersecurity but were worn down by excessive or ineffective interventions.Training Shortcomings – Lecture-style, one-way training is frequently perceived as boring, irrelevant, or contradictory to users' experiences.Compliance vs. Effectiveness – Many organizations implement security training to meet legal requirements, even if it fails to change behavior.Reactance in Security – Users may intentionally ignore advice or rules to assert control, especially when training feels micromanaging or patronizing.Better Through Design – Reeves argues that secure systems should reduce the need for user decisions by simplifying or removing risky options altogether.Remove Rather Than Train – Limiting administrative rights is often more effective than trying to educate users out of risky behaviors.Mismatch With Reality – Generic training that conflicts with real policies or system restrictions can confuse or alienate users.Cognitive Load and Decision-Making – Under stress or fatigue, users rely on mental shortcuts (heuristics), which attackers exploit.Personal Example of Being Fooled – Reeves recounts nearly falling for a scam due to time pressure, illustrating how stress weakens judgment.Cybersecurity Buddy System – Recommends encouraging users to consult peers when making sensitive decisions, especially under pressure.Cyber Deception Strategies – Reeves now researches ways to mislead and trap attackers inside systems using decoys and tripwires.Applying Psychology to Attackers – The same behavioral models used to study users can help predict and manipulate attacker behavior.Empowering Defenders – Deception technologies can help security teams regain a sense of agency, shifting from reactive defense to proactive engagemenAbout our guest:Dr. Andrew Reeveshttps://www.linkedin.com/in/andrewreevescyber/https://research.unsw.edu.au/people/dr-andrew-reeveshttps://www.unsw.edu.au/research/ifcyberPapers or resources mentioned in this episode:Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue. SAGE Open, 11(1).https://doi.org/10.1177/21582440211000049Reeves, A., Calic, D., & Delfabbro, P. (2023). Generic and unusable: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. Computers & Security, 128, 103137.https://doi.org/10.1016/j.cose.2023.103137Reeves, A., & Ashenden, D. (2023). Understanding decision making in security operations centres: Building the case for cyber deception technology. Frontiers in Psychology, 14, 1165705.https://doi.org/10.3389/fpsyg.2023.1165705Other:UNSW Institute for Cyber Security (IFCYBER)https://www.unsw.edu.au/research/ifcyber

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Financial Freedom for Physicians with Dr. Christopher H. Loo, MD-PhD

Cybersecurity Awareness for Businesses is more critical than ever as cyber threats continue to evolve. In this episode, we sit down with Brett Gallant, a cybersecurity expert dedicated to helping businesses protect their data and prevent cyber attacks. If you're a business owner, entrepreneur, or IT professional, you need to know how to safeguard your business from cyber threats before it's too late.From Cybersecurity Best Practices to Phishing Attack Prevention, Brett shares real-world insights on how to strengthen your business's security defenses. Whether you're worried about ransomware, data breaches, or weak employee training, this episode gives you the tools and knowledge you need to take action today.✔️ How to implement Cyber Threat Prevention strategies that keep hackers out.✔️ The role of Cybersecurity Training for Employees in stopping social engineering attacks.✔️ Why small businesses are prime targets for hackers and what to do about it.✔️ The importance of a Cybersecurity Risk Assessment and how it helps secure your business.✔️ Why a Multi Layered Cybersecurity Strategy is key to protecting your organization.✔️ The best Cybersecurity Tools for Businesses to defend against modern cyber threats.✔️ How Endpoint Detection and Response EDR can save your company from a disaster.

Afternoon Drive with John Maytham
POPIA unpacked: Why won't these marketing calls stop?

Afternoon Drive with John Maytham

Play Episode Listen Later Mar 12, 2025 7:37


John Maytham is joined by John Giles, Managing Director and Digital, Data, and Tech Attorney at Michalsons Attorneys, to unpack the Protection of Personal Information Act (POPIA) and why data privacy matters now more than ever.See omnystudio.com/listener for privacy information.

Community IT Innovators Nonprofit Technology Topics
Cybersecurity Awareness Training Tips pt 2 with Matt Eshleman

Community IT Innovators Nonprofit Technology Topics

Play Episode Listen Later Mar 7, 2025 32:27


Are your staff as ready as they can be for the next attack?Our cybersecurity training team manages hundreds of clients and shares our knowledge on what works to keep your staff prepared, not just scared.Matt Eshleman, our CTO and cybersecurity expert answers your questions on how to manage frequent, timely, and engaging training.Part 1 covers the cybersecurity landscape and types of threats facing nonprofits, our framework for how to think about cybersecurity and where staff training fits in your strategy, and the basic philosophy of security awareness training. Pt 2 gets into the details and examples of a typical cybersecurity training program, and Matt answers audience Q&A.Cybersecurity Awareness Training TipsWe often say that staff training is a foundation for cybersecurity protections. As the risks are always evolving, your training needs to be current too. Gone are the days when your staff could be adequately protected by watching an hour long video with a quiz once a year. But managing more frequent training is difficult. We will discuss the tool we use, KnowBe4, which makes it easy to stay up to date and administer training to all staff. There are other training tools out there that work for nonprofit staff – the most important tip is to commit to training and to prioritize it as a team. Your staff and leadership are your best defense of the organization you care about.In addition, with new auditing requirements SAS145 your auditor must assess IT risks to your financial processes – and it will be necessary to demonstrate staff cybersecurity training in your audits. Learn about these issues and more with our experts! If you've been putting off implementing a comprehensive cybersecurity awareness training regime, don't wait any longer. Join CTO Matthew Eshleman and host Carolyn Woodard to learn how to implement an up-to-date and flexible cybersecurity awareness training program this year.As with all our webinars, this presentation is appropriate for an audience of varied IT experience.Community IT is proudly vendor-agnostic and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community. There are multiple cybersecurity awareness training vendors with products that work for nonprofits. We will be discussing the tool we have selected and use, KnowBe4, which offers nonprofit discounts, but our insights and tips will be useful no matter what training program you are using, or if you want to create and run cybersecurity awareness training in house.Many questions asked at registration or live at the virtual event will be answered in the transcript. Check back after the webinar for additional resources. _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.

The Free Lawyer
296. How Can Law Firms Strengthen Their Cybersecurity Posture?

The Free Lawyer

Play Episode Listen Later Mar 6, 2025 29:17


In this episode of "The Free Lawyer," host Gary converses with Sonal Chandler, founder and CEO of Minerva Consulting, about the critical importance of cybersecurity for small to mid-sized law firms. They discuss common vulnerabilities such as weak passwords and lack of multi-factor authentication, emphasizing the need for a cultural shift towards security awareness. Sonal provides practical steps for protecting client data and integrating AI into legal practices. The episode underscores the significance of training, risk management, and fostering a supportive environment for cybersecurity initiatives, aiming to help law firms navigate the evolving digital landscape confidently.Sonal Chandler is the Founder and CEO of Minerva Consulting, a WBENC-certified consulting firm that helps small to mid-sized organizations with: Cyber risk management and compliance AI readiness & integrationThrough Minerva Consulting, Sonal provides fractional vCISO services, including risk assessments, information security program development, and compliance readiness. The firm also conducts Intro to AI workshops and helps businesses embrace AI to drive efficiency and innovation.With experience spanning Fortune 500 companies, boutique consulting firms, and startups, Sonal takes a business-focused approach to cybersecurity and AI, ensuring organizations can implement these technologies without unnecessary complexity.Beyond her consulting work, she hosts Minerva Meets, a podcast exploring the intersection of business, cybersecurity, and AI, and shares insights through her blog, Mind Spark.Cybersecurity Vulnerabilities in Law Firms (00:01:14)Creating a Culture of Security Awareness (00:03:03)Practical Steps for Protecting Client Data (00:04:41)Importance of Cybersecurity (00:05:45)Building Information Security Programs (00:06:53)Challenges of Digital Transformation (00:08:18)Transforming a Law Firm's Cybersecurity Approach (00:10:43)Addressing Remote Work Security Challenges (00:15:53)Integrating AI into Law Practices (00:17:32)Balancing Efficiency and Ethical Obligations (00:20:27)Creating a Culture of Cybersecurity Awareness (00:22:04)Advice for Overwhelmed Lawyers (00:23:48)Setting Clear Objectives (00:24:50)Choosing the Right Solutions (00:25:47)First Steps in Cybersecurity (00:26:06)Would you like to learn more about Breaking Free or order your copy? https://www.garymiles.net/break-free Would you like to schedule a complimentary discovery call? You can do so here: https://calendly.com/garymiles-successcoach/one-one-discovery-call

Community IT Innovators Nonprofit Technology Topics
Cybersecurity Awareness Training Tips pt 1 with Matt Eshleman

Community IT Innovators Nonprofit Technology Topics

Play Episode Listen Later Feb 28, 2025 34:23


Are your staff as ready as they can be for the next attack?Our cybersecurity training team manages hundreds of clients and shares our knowledge on what works to keep your staff prepared, not just scared.Matt Eshleman, our CTO and cybersecurity expert answers your questions on how to manage frequent, timely, and engaging training.Part 1 covers the cybersecurity landscape and types of threats facing nonprofits, our framework for how to think about cybersecurity and where staff training fits in your strategy, and the basic philosophy of security awareness training. Pt 2 gets into the details and examples of a typical cybersecurity training program, and Matt answers audience Q&A.Cybersecurity Awareness Training TipsWe often say that staff training is a foundation for cybersecurity protections. As the risks are always evolving, your training needs to be current too. Gone are the days when your staff could be adequately protected by watching an hour long video with a quiz once a year. But managing more frequent training is difficult. We will discuss the tool we use, KnowBe4, which makes it easy to stay up to date and administer training to all staff. There are other training tools out there that work for nonprofit staff – the most important tip is to commit to training and to prioritize it as a team. Your staff and leadership are your best defense of the organization you care about.In addition, with new auditing requirements SAS145 your auditor must assess IT risks to your financial processes – and it will be necessary to demonstrate staff cybersecurity training in your audits. Learn about these issues and more with our experts! If you've been putting off implementing a comprehensive cybersecurity awareness training regime, don't wait any longer. Join CTO Matthew Eshleman and host Carolyn Woodard to learn how to implement an up-to-date and flexible cybersecurity awareness training program this year.As with all our webinars, this presentation is appropriate for an audience of varied IT experience.Community IT is proudly vendor-agnostic and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community. There are multiple cybersecurity awareness training vendors with products that work for nonprofits. We will be discussing the tool we have selected and use, KnowBe4, which offers nonprofit discounts, but our insights and tips will be useful no matter what training program you are using, or if you want to create and run cybersecurity awareness training in house.Many questions asked at registration or live at the virtual event will be answered in the transcript. Check back after the webinar for additional resources. _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.

Late Tech Show
Sicurezza fisica e cyber, AI Act e aziende, customer experience nel retail - S06e21

Late Tech Show

Play Episode Listen Later Feb 19, 2025 68:40


Questa settimana ho avuto il piacere di chiacchierare con una serie di professionisti che stanno plasmando il futuro del business e della tecnologia.2:10 Anna Capoluongo, avvocato e DPO, ci ha illuminato sulle sfide e le opportunità dell'#AIAct e della protezione dei dati.21:19 Vittorio D'Alessio di Infobip ha svelato come la #CustomerExperience si sta evolvendo grazie all'intelligenza artificiale, con un focus sull'omnicanalità e la personalizzazione.38:37 Lina Novetti di CyberSecurity Awareness ha condiviso preziose strategie per aumentare la consapevolezza sulla #CyberSecurity nelle PMI, trasformando la difesa in un vero e proprio sport di squadra.54:24 Dario Schiraldi di Genetec ha spiegato come la sicurezza fisica si integra con la tecnologia, e come una piattaforma unificata può fare la differenza nella gestione del rischioContattami: https://forms.gle/jtcv577NAd6gLWbi8

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode #128 - Executive Cybersecurity Awareness Training

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later Feb 7, 2025 25:21


This week, we're launching a brand-new series of free cybersecurity training content designed to empower executive leaders and high-profile individuals. In this special training episode, the guys dive into the critical threats targeting executives and decision-makers—covering key tactics, real-world risks, and essential strategies to protect both personal and organizational security.This episode is built for action. Use it as a ready-made cybersecurity awareness training module for your leadership team to strengthen their defenses against cyber threats. Don't wait—equip yourself and your executives with the knowledge to stay ahead of evolving risks.Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!

Cyber Security Today
Deep Seek Disruptions, NVIDIA Vulnerabilities and More: Cyber Security Today Weekend Panel for February 1, 2024

Cyber Security Today

Play Episode Listen Later Feb 1, 2025 48:22 Transcription Available


Cybersecurity Today: DeepSeek AI Disruptions, Nvidia Breach, and TalkTalk Hack Revisited In this weekend edition of Cybersecurity Today, our panel reviews the most significant cybersecurity stories of the past month. This episode features Laura Payne from White Tuque, David Shipley from Beauceron Security, and Dana Proctor from IBM. Key topics include the sudden emergence of DeepSeek AI, Nvidia's vulnerabilities and their effect on stock prices, and TalkTalk's latest data breach. Additionally, the discussion covers the soaring API security vulnerabilities reported by Wallarm and the UK's potential legislative action on ransomware payments. Stay tuned for expert insights and analysis on these pressing issues in the world of cybersecurity. 00:00 Introduction and Panel Welcome 00:41 DeepSeek AI Disruption 02:09 Security Concerns and Reactions 04:06 NVIDIA's Vulnerabilities and AI Security 07:15 Economic and Geopolitical Implications 12:13 AI in Business and Security Practices 20:57 Open Source AI and Cybersecurity Risks 25:37 Responsibility in Data Management 26:25 AI's Unstoppable Progress 26:53 API Security Concerns 28:41 Non-Human Identities and API Challenges 30:36 The State of Cybersecurity Awareness 35:05 Legislative Hopes and Cybersecurity 37:25 TalkTalk Breach Revisited 44:10 Ransomware Legislation Proposals 45:34 Shoutout to Cyber Police 47:04 Closing Remarks and Audience Engagement

The Other Side Of The Firewall
Why Are People Selling Their Likeness On The Dark Web?

The Other Side Of The Firewall

Play Episode Listen Later Dec 31, 2024 13:49


In this episode, the hosts discuss a concerning trend in cybersecurity where individuals are voluntarily selling their identities on the dark web. They explore the implications of this practice, the role of facial recognition technology, and the potential future of cybersecurity as threats evolve. The conversation highlights the need for awareness and caution in an increasingly digital world. Article: Dark Web Facial ID Farm Warning—Hackers Build Identity Fraud Database https://www.forbes.com/sites/daveywinder/2024/12/27/dark-web-face-id-farm-warning-as-hackers-build-identity-fraud-database/ Please LISTEN

@BEERISAC: CPS/ICS Security Podcast Playlist
Cyber Resilience in Food and Agriculture: Andrew Rose & Dr. Darin Detwiler (Part 1)

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 22, 2024 45:30


Podcast: Bites & Bytes PodcastEpisode: Cyber Resilience in Food and Agriculture: Andrew Rose & Dr. Darin Detwiler (Part 1)Pub date: 2024-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Kristin Demoranville sits down with AgFuturist Andrew Rose and food safety advocate Dr. Darin Detwiler to discuss why cybersecurity is a growing concern for the food and agriculture industries. Andrew Rose, an advisor to BIO-ISAC and a leader in agricultural innovation, shares his insights into protecting farmers and food supply chains from cyber threats.  Dr. Detwiler, a renowned food safety expert, educator, and author, explains why inaction is the greatest cost to our global food systems.  Tune in for an eye-opening conversation on resilience, risks, and real solutions for protecting what feeds us all.

The Other Side Of The Firewall
The Best of 2024 Compliation Ep3

The Other Side Of The Firewall

Play Episode Listen Later Dec 18, 2024 15:11


In this episode, the hosts discuss Kaspersky's withdrawal from the US market and the subsequent transition to Ultra AV. They explore the implications of this change for users, including concerns about security and the importance of user awareness in cybersecurity. The conversation emphasizes the need for vigilance regarding email notifications and the potential risks associated with new software installations. The hosts also highlight the importance of choosing reliable antivirus solutions and staying informed about cybersecurity developments. Article: Kaspersky Rolls Back for US Customers, Makes Way for UltraAV https://www.darkreading.com/application-security/kaspersky-rolls-back-us-customers-ultraav?fbclid=IwY2xjawFoMQhleHRuA2FlbQIxMAABHRVKzPzM1A0kuHdVfGjNoIcW8O-5lMk27gkjSVHlDbZOHdftQ5wgfiyEEw_aem_-2xmDDF_pjw_5GMesPJ-6A Please LISTEN

ITSPmagazine | Technology. Cybersecurity. Society
From Bytes to Rights: The Intersection of Law and Cyber Security | An Australian Cyber Conference 2024 in Melbourne Conversation with EJ Wise | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 4, 2024 27:30


Guest: EJ Wise, Founder & Principal, WiseLawOn LinkedIn | https://www.linkedin.com/in/wiselaw3/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesAgainst the energetic backdrop of Melbourne's CyberCon, hosted by ISA, the conversation dives into the global nature of technology's influence. The trio reflects on pressing topics such as privacy, cybersecurity, and the shifting landscape of cyber law, all while situated in one of Australia's most tech-forward cities.EJ Wise's Journey and PerspectiveEJ Wise shared her remarkable career path, starting as a member of the U.S. Air Force JAG Corps and later founding her boutique law firm in Australia in 2018. Her firsthand experience sheds light on Australia's relatively recent introduction of comprehensive cyber laws and the ongoing need to bridge the gap between technological innovation and legislative action.Educating Consumers: A Shared ResponsibilityA key focus of the conversation was consumer awareness. EJ highlighted the critical need for industries to take responsibility for educating the public, much like banks have historically done with financial literacy. The discussion also touched on embedding technological literacy into early education, ensuring children grow up with a clear understanding of privacy and digital security.Technology and Ethics in TensionThe group examined the ethical challenges posed by advancing technologies, especially regarding surveillance and data privacy. From facial recognition in retail spaces to the increasing capabilities of modern devices to monitor user behavior, the conversation drew thought-provoking parallels between these innovations and the history of advertising practices.The ethical implications of such technologies go far beyond convenience, raising questions about transparency, consent, and societal norms in the digital age.Legal Frameworks and Industry ResponsibilityMarco and Sean explored the evolving role of legal frameworks in holding industry players accountable for consumer safety and privacy. EJ's insights provided a grounded perspective on how regulatory environments are adapting—or struggling to adapt—to these challenges.The discussion underscored a growing trend: companies must not only comply with existing laws but also anticipate and mitigate the societal impacts of their technologies.Encouraging Dialogue and ReflectionThroughout the episode, the importance of open dialogue and introspection emerged as a recurring theme. By examining how technology shapes society and law, the discussion encouraged listeners to reflect on their digital habits and the privacy trade-offs they make in their daily lives.ConclusionWhile the conversation didn't provide all the answers, it illuminated the complexities of the interplay between technology, law, and society. EJ, Marco, and Sean left listeners with an invitation to remain curious, question norms, and consider their role in shaping a more ethically aware digital future.This episode captures the spirit of CyberCon 2024—sparking ideas, inspiring debate, and reinforcing the need for thoughtful engagement with the challenges of our hybrid analog-digital society.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Coffee w/#The Freight Coach
1082. #TFCP - Why Cybersecurity Should Be A Top Priority!

Coffee w/#The Freight Coach

Play Episode Listen Later Nov 29, 2024 41:25 Transcription Available


Today's mashup episode recorded from the NMFTA Conference features two incredible guests, Piyush Panchal of IANA and Joe Ohr of NMFTA! Our guests focus on the critical data management practices necessary for securing sensitive information in the transport industry, the evolving cybersecurity threats facing critical infrastructure, the importance of comprehensive training, awareness programs for staff, and collaboration among industry players, and fostering greater cybersecurity awareness and testing protocols within the industry. This is another episode you shouldn't miss!   About Piyush Panchal Piyush Panchal is the Assistant Vice President of Information Technology at the Intermodal Association of North America(IANA). He's been associated with IANA for about 15 years, and overall, he has 21+ years of IT experience in software development, system architecture, project management, and cloud infrastructure management.  He led many IT projects, transformed legacy applications into modern architecture, consistently optimized IT operations, and elevated the technological landscape for IANA. He's recently tasked to oversee IANA's security landscape and elevate the overall security posture of IANA's IT infrastructure in the cloud. Visit IANA website at https://intermodal.org/.     About Joe Ohr Joe Ohr has more than two decades of experience in technical operations, customer success management, customer support, and product support. Currently serving as the Chief Operating Officer for the National Motor Freight Traffic Association, Inc. (NMFTA)™, he plays a pivotal role in helping to advance the industry through digitization, classification, and cybersecurity. Prior to Ohr's role at NMFTA, he served as in numerous engineering and operations positions at Qualcomm and Eaton, and most recently held the position of Senior Vice President of Operations/Customer Experience at Omnitracs. Throughout his career, Ohr has provided strategic guidance, vision, and a roadmap for addressing long-term customer challenges. He has played a key role in accelerating revenue growth and has collaborated closely with IT, product, and engineering teams to foster stronger partnerships with strategic customers and peers. Additionally, Ohr has overseen post sales customer support and service teams, as well as operations, managing a workforce of over 400 individuals. He holds multiple certifications such as CCNA from Cisco and MCSE from Microsoft and earned his Bachelor of Science in Education from the Ohio State University. Due to his contributions to the industry, he earned a spot in the Inner Circle in 2015 and 2018 from Qualcomm and Omnitracs. To learn more about NMFTA's future events and what they do, visit https://nmfta.org/.  

Cyber Security Weekly Podcast
Episode 424 - The focus of communicating cybersecurity to company directors

Cyber Security Weekly Podcast

Play Episode Listen Later Nov 28, 2024 6:08


We speak with Chirag Joshi, Founder and CISO at 7 Rules Cyber – an innovative cyber security advisory and thought leadership company. He is a multi-award winning, seasoned cyber security executive with extensive experience leading cyber security and risk management programs in multiple countries across various industries. These include financial services, government, energy, higher education, and consulting. Chirag is the author of the two-bestselling books – “7 Rules to Become Exceptional at Cyber Security” and “7 Rules to Influence Behaviour and Win at Cyber Security Awareness." Chirag is featured in the prestigious CSO30 list of top cyber security executives in Australia. He is a Board Director and Vice President at ISACA Sydney. He is a well-known keynote speaker and has presented at numerous leading international and regional conferences and forums. Chirag has led teams and multi-million-dollar cyber transformation initiatives. He has experience in both IT and OT environments and managing cyber security through mergers and acquisitions.Cyber Security Asia 2024 took place on 7 – 8 October 2024 at ParkRoyal Hotel, Kuala Lumpur – bringing together top experts and practitioners for in-depth talks, and exclusive networking opportunities. It is a platform for the development of partnerships and strategies and highlights the latest technologies that are ensuring the safety and security of government, industry and individual.#7rulecyber #mysecuritytv #CSA2024

HR & Payroll 2.0
Cybersecurity Awareness Month with Special Guest Alex Khusid

HR & Payroll 2.0

Play Episode Listen Later Nov 26, 2024 53:49


On this episode, Pete and Julie recognize Cybersecurity Awareness Month (October) by welcoming cybersecurity expert Alex Khusid to the show to talk about the growing cyber threats to HR and payroll and its highly critical data! The group talks about the rising threats to payroll and its continuity, how tech is playing a positive and threatening role, AI's role in cybersecurity, and how to keep your payroll and HR operations out of the headlines for the wrong reasons. Alex also shares tips and advice for creating a secure and resilient payroll operating model. Connect with Alex: LinkedIn: https://www.linkedin.com/in/alex-khusid-865886a/ Payroll Resolutions: https://payrollresolutions.com/ Connect with the show: LinkedIn: http://linkedin.com/company/hr-payroll-2-0 X: @HRPayroll2_0 @PeteTiliakos @JulieFer_HR

The Social-Engineer Podcast
Ep. 224 - The SE ETC Series - Tips for Having Difficult Conversations with Chris and Patrick REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Nov 25, 2024 44:25


REPLAY (Original Air Date Aug 28, 2023) Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [August 28, 2023]   00:00 - Intro 00:21 - Patrick Laverty Intro 00:55 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 07:20 - Intro Chat 09:11 - Todays Topic: Tips for Having Difficult Conversations 10:00 - Outline for Parents 12:10 - Map Your Terrain 16:22 - Define Your Goal 17:40 - Decide on Your Pretext 20:05 - Imagine Your Rapport Building 21:50 - Identify Potential Influence Building Techniques 28:47 - Run a Quick Manipulation Check 31:31 - Pump Up the Nonverbals 36:30 - Conduct an Authenticity Check 39:21 - Prepare for Likely Contingencies 40:48 - Solidify Gains 43:40 - Next Month: ??? 44:00 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy -          Patrick Laverty -          Twitter: @plaverty9 -          LinkedIn: linkedin.com/in/plaverty9

The Dental Hacks Podcast
Very Dental: So, You've Been Ransomewared with Reuben Kamp

The Dental Hacks Podcast

Play Episode Listen Later Nov 22, 2024 55:18


Alan welcomes Ruben Kamp, the founder and a ransomware expert at Darkhorse Tech.   Dental practices are very susceptible to ransomware. We all like to think that it won't happen to us, but between 7 and 9% of dental offices suffer ransomware attacks every year! Are you taking all the precautions that you can?   Reuben and Alan discuss the critical issues of ransomware attacks and cybersecurity in dental practices. They explore real-life incidents, including how ransomware infiltrates dental offices (spoiler: Reuben says it's about 91% through email)  They also talk about the severe implications such attacks can have, from damage to your reputation to legal liabilities. Ruben provides comprehensive advice on preventive measures, including the importance of firewalls, regular updates, team training, and cybersecurity insurance.   They emphasize that while ransomware threats are pervasive, proper security protocols can significantly mitigate risks. The session also touches on the intricacies of backups, cloud-based software, and the evolving nature of cyber threats with advancements in AI.   Some links from the show: Darkhorse Tech Show Index: 01:09 Understanding Ransomware in Dental Offices 03:08 Dark Horse Tech's Approach to IT and Security 07:26 How Ransomware Attacks Unfold 13:56 The Role of AI in Cybersecurity Threats 16:14 Negotiating with Cybercriminals 25:14 The Importance of Reliable Backups 29:39 Local vs. Offsite Backups 31:18 HIPAA Compliance and Data Breaches 33:49 Firewall and Antivirus Importance 41:40 Staff Training and Cybersecurity Awareness 45:25 Cloud-Based Practice Management Software 51:15 Cybersecurity Insurance Policies Join the Very Dental Facebook group using the password "Timmerman," Hornbrook" or "McWethy," "Papa Randy" or "Lipscomb!" The Very Dental Podcast network is and will remain free to download. If you'd like to support the shows you love at Very Dental then show a little love to the people that support us! -- Crazy Dental has everything you need from cotton rolls to equipment and everything in between and the best prices you'll find anywhere! If you head over to verydentalpodcast.com/crazy and use coupon code “VERYDENTAL10” you'll get another 10% off your order! Go save yourself some money and support the show all at the same time! -- The Wonderist Agency is basically a one stop shop for marketing your practice and your brand. From logo redesign to a full service marketing plan, the folks at Wonderist have you covered! Go check them out at verydentalpodcast.com/wonderist! -- Enova Illumination makes the very best in loupes and headlights, including their new ergonomic angled prism loupes! They also distribute loupe mounted cameras and even the amazing line of Zumax microscopes! If you want to help out the podcast while upping your magnification and headlight game, you need to head over to verydentalpodcast.com/enova to see their whole line of products! -- CAD-Ray offers the best service on a wide variety of digital scanners, printers, mills and even  their very own browser based design software, Clinux! CAD-Ray has been a huge supporter of the Very Dental Podcast Network and I can tell you that you'll get no better service on everything digital dentistry than the folks from CAD-Ray. Go check them out at verydentalpodcast.com/CADRay!      

The Social-Engineer Podcast
Ep. 247 - Security Awareness Series - A Day In The Life of a Dark Web Threat Advisor with Mary D'Angelo REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Nov 18, 2024 34:32


REPLAY (Original Air Date Feb 19, 2024) Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Mary D'Angelo. Mary helps clients understand the threats that exist on the dark web and how to use that intelligence to bolster their cybersecurity programs. With a solid foundation from the University of Washington, where she earned her Bachelor's degree, Mary has rapidly ascended as a global leader at SearchLight Cyber. Her expertise, honed over six years, delves deep into understanding the nuances of dark web threat actors and their intelligence. Mary's and her company's insights and analyses have been instrumental in shedding light on the shadowy aspects of cyber threats emanating from the dark web. Her work not only aids in neutralizing these threats but also contributes significantly to the broader understanding of cyber security dynamics. Additionally, Mary's passion is volunteering her talents into nonprofit organizations. She was a mentor for Big Brothers and Big Sisters. Recently, she has devoted her time to a nonprofit called, The Innocent Lives Foundation, which uses Dark Web Threat Intelligence to help law enforcement stop child traffickers. [Feb 19, 2024]   00:00 - Intro 00:41 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:56 - Mary D'Angelo Intro 04:12 - What is a Dark Web Threat Intelligence Advisor? 04:36 - One Giant Leap 07:04 - On the Front Lines 11:53 - Deep Web, Dark Web, Clear Web...Oh My! 13:43 - Shifting to the Deep 14:58 - Crime Pays 17:39 - 2024 Forecast 19:00 - Left of Boom 20:53 - All in this Together 21:53 - An Ugly Example 25:19 - Timely 26:30 - Relevant 28:02 - Actionable 29:58 - What's Next? 30:54 - Mentors -          Siblings -          Larry Littleton 32:05 - Book Recommendations -          The Practitioner's Guide to the Dark Web - Searchlight Cyber -          The Ride of a Lifetime - Robert Iger -          Never Split the Difference - Christopher Voss &Tahl Raz 33:33 - Find Mary D'Angelo Online -          LinkedIn: linkedin.com/in/dangelomary 33:55 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Independent Thinking Podcast
242: Bringing Cybersecurity Awareness Beyond a Single Month with NMG’s VP of Technology Bryan Aller

Independent Thinking Podcast

Play Episode Listen Later Nov 12, 2024 33:19


Cybersecurity is a topic that's incredibly worthy of discussion no matter what month the calendar says it is, and that's exactly why we sat down with NMG's VP of IT & Technology Bryan Aller outside of October to talk about it.

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Cybersecurity Awareness Month Is Over. Why We Need It All Year Round.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 11, 2024 5:55


On the last day of Cybersecurity Awareness Month (CAM), Oct. 31, Cybersecurity Ventures released "Hackerpocalypse: The Human Risk", on its Cybercrime Magazine YouTube channel. We'll be promoting the 13-minute video all year round in order to drive as much awareness as possible every month, and not just in October. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

Cyber Security Today
Cyber Security Today - The Weekend Panel Reviews Cyber Security Month: November 2, 2024

Cyber Security Today

Play Episode Listen Later Nov 2, 2024 55:12 Transcription Available


Welcome to the weekend edition of Cybersecurity Today! Join host Jim Love as he delves into the top cybersecurity stories of the month with industry experts David Shipley of Beauceron Security, Terry Cutler of Cyology Labs, and special guest Kim Schreader from TELUS. This episode covers a range of vital topics, including AI's impact on cybersecurity, the alarming rise in API vulnerabilities, and a shocking report on the Canadian Revenue Agency's fraud losses. The panel also discusses cybersecurity awareness, the overlooked importance of protecting our libraries, and innovative ways to educate the next generation on cybersecurity. Don't miss their insights, expert opinions, and the debut of the cyber stinky award! 00:00 Introduction and Panelist Welcome 00:39 Kim Schreader's Background and Cybersecurity Insights 01:44 Cybersecurity Awareness Month Highlights 02:11 Phishing Milestones and Challenges 03:34 Home Cybersecurity and Public Engagement 04:59 SecTor Event and Cyber Insurance Study 06:10 Sextortion Emails and Ransomware Threats 07:30 Revenue Canada Fraud Scandal 14:31 Legacy Systems and Cybersecurity Accountability 17:55 AI in Cybersecurity: Threats and Opportunities 26:43 Medical Imaging Vulnerabilities 27:35 IoT Device Security Concerns 29:25 API Vulnerabilities and Exploits 31:45 Importance of Pen Testing 39:41 AI and Prompt Injection Risks 46:58 Education and Cybersecurity Awareness 52:23 Library Cyber Attacks and Conclusion

The Get CyBUr Smart Podcast
November 1, 2024: The "end" of Cybersecurity Awareness Month - A Special Friday Op-Ed

The Get CyBUr Smart Podcast

Play Episode Listen Later Nov 1, 2024 10:46


Apologies on the audio quality on this episode as I did this one remotely.  Back to normal on Monday. This Op-Ed is a look at Cybersecurity Awareness Month, its conclusion, and the future. Give a listen, tell a friend. Feel free to email thoughts, comments, or questions to darren@thecyburguy.com

Code Story
The Haunted House of APIs - A Portal to the Beyond with Allison Averill

Code Story

Play Episode Listen Later Oct 30, 2024 24:39


The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.A Portal to the Beyond: Securing Gen AI and other Third-Party APIs in Your ApplicationsToday's episode is titled A Portal to the Beyond: Securing Gen AI and other Third-Party APIs in Your Applications, with Allison Averill. Developers are building exciting new features with Gen AI, often leveraging 3rd party APIs. Doing this isn't new, but are these integrations secure? These APIs open a portal to the beyond – and introduce supply chain risk to your applications. Allison is a Generative AI and product management expert at Traceable, and she will explore the risks lurking in generative AI and other 3rd party APIs, sharing best practices for securing these integrations, so you can ensure they don't become the stuff of security horror stories.How are application developers leveraging 3rd party APIs today, and how is the landscape changing?How do third-party APIs introduce risks to applications and what are some common mistakes organizations make when integrating with third party APIs?How are generative AI APIs different from other third party APIs? What unique risks do they introduce?Have you encountered any 'nightmare' scenarios where an insecure third-party API caused a security incident?What best practices should organizations follow to ensure secure integrations?How can organizations balance the need for innovation with the necessity of maintaining strict security controls when working with external partners?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/allisonaverill/ Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Ivanti Insights
Top 5 Tips for Cybersecurity Awareness

Ivanti Insights

Play Episode Listen Later Oct 30, 2024 26:28


Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a special episode for Cybersecurity Awareness Month, sourcing five tips from a range of Ivanti employees on how your organization and its users can stay secure. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

Code Story
The Haunted House of APIs - Phantom Threats with Adam Arellano

Code Story

Play Episode Listen Later Oct 29, 2024 17:43


The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.Phantom Threats: The Ghosts Haunting Your API SecurityToday's episode is titled Phantom Threats: The Ghosts Haunting Your API Security, with Adam Arellano. API security threats often go unnoticed, hiding like ghosts in your infrastructure. Bots, sophisticated fraud attempts, account takeovers and attackers disguising themselves within legit traffic… these all pose risk to your organization, and can bypass traditional security measures, wreaking havoc without detection – until it's too late. Adam is a tech advisor, Global CISO at Traceable, and will guide listeners through the world of phantom threats haunting API security.What are "phantom threats" in the context of API security, and how do they go undetected?Can you explain how advanced botnets and fraud attempts exploit APIs while blending into legitimate traffic?Do you have a real-world example of a phantom threat that caused significant damage to an organization?What makes detecting these phantom threats so challenging, and why do traditional security measures often fail?What are the best strategies or technologies organizations can adopt to detect and eliminate these hidden threats before they cause harm?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/adamrossarellano/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Perspective
Protect Your Vote, Cybersecurity Awareness Month, and Apple Audio Lab

Perspective

Play Episode Listen Later Oct 25, 2024 44:32


Noncitizen voter raids; Trump campaign ads; Abercrombie CEO arrests; ‘Varsity Blues' scandal mastermind; Cybersecurity; AI and whales; ADHD struggles for women to get diagnosed and treated; Apple Audio Lab breakthrough in technology. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Paul's Security Weekly TV
Cyber Security Awareness for Election and Poll Workers - Kirsten Davies - ESW #381

Paul's Security Weekly TV

Play Episode Listen Later Oct 25, 2024 48:02


The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll location and election workers. Kirsten Davies has a passion project that attempts to solve this, with some concise, accessible, and straightforward training material. It is made available through two PDFs on her new organization's website, instituteforcybercivics.org. Show Notes: https://securityweekly.com/esw-381

World News This Week
Protect Your Vote, Cybersecurity Awareness Month, and Apple Audio Lab

World News This Week

Play Episode Listen Later Oct 25, 2024 44:32


Noncitizen voter raids; Trump campaign ads; Abercrombie CEO arrests; ‘Varsity Blues' scandal mastermind; Cybersecurity; AI and whales; ADHD struggles for women to get diagnosed and treated; Apple Audio Lab breakthrough in technology. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Code Story
The Haunted House of APIs - The Haunted Web of APIs with Richard Bird

Code Story

Play Episode Listen Later Oct 24, 2024 20:26


The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.The Haunted Web: Navigating API Sprawl and Creepy CrawlersToday's episode is titled The Haunted Web: Navigating API Sprawl and Creepy Crawlers, with Traceable's Chief Security Officer, Richard Bird. As organizations scale and evolve, so does the complexity of their APIs. API sprawl, the uncontrolled expansion of APIs, creates a tangled web where vulnerabilities linger in the shadows. These unseen APIs become “creepy crawlers” of your digital infrastructure, creeping through your systems and posing security risks. Richard will discuss how unmanaged and undocumented APIs contribute to blind spots in security, the risks they create for organizations and the best strategies for securing a sprawling ecosystem.Discussion questions:Can you explain what we mean by "unknown APIs" and the different types, like shadow, rogue, zombie, and undocumented?Why do these APIs often go unnoticed, and how do they become security risks?What makes these APIs such an attractive target for attackers, and can you share an example of how one has been exploited?How can organizations begin to uncover these hidden APIs, and what tools or strategies are effective in doing so?In your experience, what are some common mistakes organizations make that lead to these unknown APIs being created or overlooked?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/rbird/https://richardbird.com/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Navigating the Gridâ„¢
Cybersecurity Awareness Month: Bridging the U.S. and Mexico in Energy Protection

Navigating the Gridâ„¢

Play Episode Listen Later Oct 24, 2024 15:14


Navigating the Grid is your go-to podcast for in-depth conversations on compliance, cybersecurity, and the ever-evolving renewable energy landscape. Hosted by industry expert Kellie Macpherson, this episode features Jait Castro, Operations Engineering Manager at Radian Generation. Together, they explore cybersecurity awareness and the critical similarities between the U.S. and Mexico. Tune in to learn how these two regions approach cybersecurity, what challenges they face, and how the renewable energy sector is navigating these threats across borders. Whether you're a compliance professional or simply interested in energy security, this episode is full of insights to keep you ahead of the curve.

Code Story
The Haunted House of APIs - The Dark Corners of APIs with Katie Paxton-Fear

Code Story

Play Episode Listen Later Oct 23, 2024 16:46


The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.The Dark Corners of APIs: Uncovering Unknown APIs Lurking in the ShadowsOur episode today is titled The Dark Corners of APIs: Uncovering Unknown API's lurking in the shadows, where we speak with Katie Paxton-Fear. APIs are the gateway to your digital infrastructure, but hidden deep in the recesses of your system are unknown APIs – shadow, rogue, zombie, and undocumented API's. Each of these present a unique threat to your organization and can be exploited by hackers. Katie is an API hacker and researcher, and today, she will take us on a journey through the API graveyards, where hidden APIs lurk, waiting to be exploited – sharing real life examples of how these API's have been attacked, and best practices for ensuring they don't become your companies next security nightmare.Discussion questions:Can you explain what we mean by "unknown APIs" and the different types, like shadow, rogue, zombie, and undocumented?Why do these APIs often go unnoticed, and how do they become security risks?What makes these APIs such an attractive target for attackers, and can you share an example of how one has been exploited?How can organizations begin to uncover these hidden APIs, and what tools or strategies are effective in doing so?In your experience, what are some common mistakes organizations make that lead to these unknown APIs being created or overlooked?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/katiepf/https://insiderphd.dev/Katie's YouTube ChannelSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Best of The Steve Harvey Morning Show
Norton Cyber Security Awareness

Best of The Steve Harvey Morning Show

Play Episode Listen Later Oct 23, 2024 1:50 Transcription Available


See omnystudio.com/listener for privacy information.

Learning Through Technology
Why Cybersecurity in Schools Requires a Complete Mindset Shift: Building Your Swiss Cheese Defense with Lane Young

Learning Through Technology

Play Episode Listen Later Oct 23, 2024 33:01


Technology has revolutionized nearly every aspect of our lives, and education is no exception. Integrating technology in classrooms has brought about significant changes, offering new opportunities and challenges for students and educators. In this episode of Learning Through Technology, hosts Alex and Bob round up Cyber Security Awareness month by sitting down with Lane Young, Director of Strategic Operations and Technology at Phillips Brooks School. They explore the unique cybersecurity challenges faced by K-12 schools, particularly the role of human error in vulnerabilities. Lane discusses his journey from teaching to EdTech leadership, highlighting the importance of staff training, proactive measures like multi-factor authentication, and the complexities of balancing teacher autonomy with security. The conversation also touches on the evolving role of artificial intelligence in cybersecurity and the growing need for specialized knowledge in education technology. Take advantage of this insightful conversation! Like what you're hearing on the podcasts and want to dive deeper? Follow us on LinkedIn here: https://www.linkedin.com/company/learning-through-technology-podcast/

Code Story
The Haunted House of APIs - The Witch's Brew with Jayesh Ahire

Code Story

Play Episode Listen Later Oct 22, 2024 20:54


The Haunted House of API'sThe Witch's Brew: Stirring Up OWASP Vulnerabilities and API TestingToday, we are kicking off an amazing series for Cybersecurity Awareness month, entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.In today's episode, we will be talking with Jayesh Ahire, an expert in API testing and OWASP, will guide us through the "brew" of common vulnerabilities that haunt API ecosystems, focusing on the OWASP Top 10 for APIs. He'll share how organizations can use API security testing to spot and neutralize these vulnerabilities before they become major exploits. By emphasizing proactive security measures, Jayesh will offer insights into creating a strong API testing framework that keeps malicious actors at bay.Discussion questions:What are some of the most common vulnerabilities in APIs that align with the OWASP Top 10, and why are they so dangerous?Why is API security testing crucial for detecting these vulnerabilities early, and how does it differ from traditional security testing?Can you share an example of how an overlooked API vulnerability led to a significant security breach?How can organizations create an effective API testing framework that addresses these vulnerabilities?What tools or methods do you recommend for continuously testing APIs and ensuring they remain secure as they evolve?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/jayesh-ahire/https://owasp.org/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

ITSPmagazine | Technology. Cybersecurity. Society
The Life-Altering Hacking Incident That Changed Everything | A Conversation with Gary Berman | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 15, 2024 15:35


Fail Faster
#486 - Cybersecurity awareness for the golden generation

Fail Faster

Play Episode Listen Later Oct 11, 2024 48:24


In this episode of Fail Faster, we welcome Darwin Larrison, Vice President and Chief Information Security Officer at Modern Woodmen of America. Darwin has been in the Information Security and Technology fields for over 20 years. He joined Modern Woodmen of America in December 2016.

HPE Tech Talk
Cybersecurity and mental health - the vulnerability between keyboard and chair

HPE Tech Talk

Play Episode Listen Later Oct 10, 2024 20:22


In this episode we revisiting last week's topic of cybersecurity and mental health – this time, looking at how our mental health state affects our ability to be able to make good cybersecurity decisions. To break down this important topic, we're joined once again by Catherine Knibbs, a Psychotherapist and specialist in online harms.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guest: https://www.childrenandtech.co.uk/ Sources and statistics cited in this episode: 90% of employees could make  data errors that open up cyber risk: https://www.tessian.com/research/the-psychology-of-human-error/ Cost of organizational cyberattacks: https://www.statista.com/statistics/1324063/cost-of-data-breaches-in-financial-industry-worldwide/New test of AI's ability to think like a human: https://www.safe.ai/blog/humanitys-last-examCatherine has a new book out in October 2024 – ‘Managing your social media and gaming habits'. Find out more: https://www.childrenandtech.co.uk/

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
Cybersecurity and mental health - the vulnerability between keyboard and chair

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Oct 10, 2024 20:22


In this episode we revisiting last week's topic of cybersecurity and mental health – this time, looking at how our mental health state affects our ability to be able to make good cybersecurity decisions. To break down this important topic, we're joined once again by Catherine Knibbs, a Psychotherapist and specialist in online harms.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guest: https://www.childrenandtech.co.uk/ Sources and statistics cited in this episode: 90% of employees could make  data errors that open up cyber risk: https://www.tessian.com/research/the-psychology-of-human-error/ Cost of organizational cyberattacks: https://www.statista.com/statistics/1324063/cost-of-data-breaches-in-financial-industry-worldwide/New test of AI's ability to think like a human: https://www.safe.ai/blog/humanitys-last-examCatherine has a new book out in October 2024 – ‘Managing your social media and gaming habits'. Find out more: https://www.childrenandtech.co.uk/

Finding Genius Podcast
Inside Quantum Technology: Diving Into Cybersecurity Awareness With Dustin Moody

Finding Genius Podcast

Play Episode Listen Later Oct 8, 2024 22:26


As technology advances, so do the threats to digital security. What steps are scientists taking to raise awareness of cybersecurity and the complexities of quantum-related risks? Dustin Moody, a mathematician in NIST's Computer Security Division, joins the podcast to share his expert insights. Dustin Moody, a leading figure in the field, heads the post-quantum cryptography project at NIST. With a Ph.D. from the University of Washington, his research focuses on elliptic curves and their applications in cryptography. He leverages this deep knowledge to develop new solutions that protect us from the future of quantum computing – instilling confidence in the security of our digital world… Hit play to discover: The mathematics that underpins the security of cryptosystems. What post-quantum cryptography is, and how researchers are working to enhance it.  Problems that quantum computers are susceptible to.  How long it takes for quantum computers to break through standard digital security walls.  Ready to dive deeper into the world of quantum-related cybersecurity? Click here to learn more about Dustin and his groundbreaking work at NIST!  Episode also available on Apple Podcasts: http://apple.co/30PvU9C

Cyber Security Today
New research provides insights into Cyber Security Awareness and Phishing: Cyber Security Today Weekend for October 5, 2024

Cyber Security Today

Play Episode Listen Later Oct 5, 2024 42:23 Transcription Available


Unveiling the Truth: Insights into Cyber Security Awareness and Phishing In a special crossover episode of Cyber Security Today and Hashtag Trending, host Jim Love discusses the biases and challenges in technology marketing research with guest David Shipley, head of Beauceron Security. The conversation examines the significance of security awareness, focusing on phishing simulations. Shipley shares insights from his research, emphasizing the optimal frequency of monthly phishing tests and the importance of reporting rates. The episode also covers the psychological aspects of cyber security, sustainability of gamification in training, and highlights the need for balancing training demands to avoid negative impacts of overtraining. Listeners are encouraged to reflect on the insights shared and respond with their thoughts on the program's format. 00:00 Introduction and Overview 00:15 The Problem with Technology Marketing Research 00:46 Bias in Research and Media 01:33 Importance of Objective Research 02:24 Introducing David Shipley and His Research 03:08 Understanding Human Behavior in Cybersecurity 05:38 Phishing Research and Findings 07:19 Effective Phishing Simulations 15:02 Insights from Phishing Data 22:14 The Importance of Reporting and Feedback 22:32 Multi-Channel Communication Strategies 23:53 Gamification and Personal Cyber Risk Scores 25:16 Behavioral Economics in Cybersecurity 27:07 The Impact of Intrinsic Motivation 29:22 The Role of Psychology in Cybersecurity 30:15 The Framing Effect and Security Perception 32:19 Optimism Bias and Security Awareness 35:00 The Dunning-Kruger Effect in Training 37:29 Anchoring Bias and Phishing Indicators 39:03 Key Takeaways and Final Thoughts

The Checklist by SecureMac
Checklist 394 - Cybersecurity Awareness Month 2024

The Checklist by SecureMac

Play Episode Listen Later Oct 4, 2024 18:23


It is Cybersecurity Awareness Month and we want to make you aware of it! Passwords, multi-factor authentication, software updates, and more. You may know about such things, but this is one to share with friends and family. Make them cybersecurity aware with Checklist No. 394, brought to to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

T-Minus Space Daily
Cybersecurity Awareness Month.

T-Minus Space Daily

Play Episode Listen Later Oct 3, 2024 10:10


It's October, and that means it's Cybersecurity Awareness Month. This feels like a good moment to review how to keep our personal and professional worlds secure, because it is not just one department's job, it's really up to each and every one of us to do our bit to keep our important stuff safe from cybercriminals.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Crew Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

HPE Tech Talk
Cybersecurity and mental health - why data matters

HPE Tech Talk

Play Episode Listen Later Oct 3, 2024 20:49


In this episode we are looking at a topic which we could spend a whole lot longer than one episode on, so we're going to make it a two-parter - cybersecurity and mental health. We'll be looking at two aspects in particular - why our health data is particularly vulnerable and of interest to criminals, and how our mental health state affects our ability to be able to make good cybersecurity decisions. In this episode, we'll be discussing the first part of the equation with Catherine Knibbs, a Psychotherapist and specialist in online harms.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guest, Catherine Knibbs: https://www.childrenandtech.co.uk/ Sources and statistics cited in this episode: Mental health data more valuable than credit card data on the dark web: https://kevincurran.org/security/patient-data-10-15-times-more-valuable-than-credit-card-data/Statistics on compromised health records: https://pubmed.ncbi.nlm.nih.gov/36580326/Cybersecurity: a critical priority for digital mental health, published in the journal Frontiers in Digital Health: https://www.frontiersin.org/journals/digital-health/articles/10.3389/fdgth.2023.1242264/full#B3 Neanderthal and human social mixing: https://www.nature.com/articles/s41598-024-70206-y 

ITSPmagazine | Technology. Cybersecurity. Society
Small Teams, Big Threats: Navigating Cybersecurity on a Budget | A Conversation with Lisa Plaggemier | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 1, 2024 12:52


Guest: Lisa Plaggemier, Executive Director, National Cybersecurity AllianceOn LinkedIn | https://www.linkedin.com/in/lisaplaggemierOn Twitter | https://twitter.com/lisaplaggemierHost: Dr. Rebecca WynnOn ITSPmagazine  

AI, Government, and the Future by Alan Pentz
Responsible AI Use in Government: A Conversation with Christophe Foulon

AI, Government, and the Future by Alan Pentz

Play Episode Listen Later Sep 11, 2024 33:30


In this episode of AI, Government, and the Future, host Marc Leh is joined by Christophe Foulon, a cybersecurity expert and fractional CISO, to discuss the integration of AI in government agencies, the challenges of SaaS sprawl, and strategies for responsible AI adoption. They explore the balance between innovation and security, the importance of awareness campaigns, and the future of AI regulation in the public sector.