POPULARITY
On the latest episode of Nerd Out, Dave and Alec welcome back Hunter Headapohl to deep dive into Cybersecurity Awareness Month and cyber threats.CSAM Key points and why this is important for organizations as well as tips to follow.Cyber threats they are keeping an eye out for.Top of mind concerns and tips.References from the discussion include:After the security nerd discussions, the trio turned to other nerd news with a little Halloween theme.Favorite candiesFavorite Halloween-themed movies or showsThe 3rd season of Star Wars VisionsNew movies they would recommend
On this week's Security Sprint, Dave and Andy covered the following topics:Warm Open• H2OSecCon 2026 Call for Presentations• Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC.• CISA's international, industry and academic partnerships slashed. The cuts “create a dangerous void,” said Errol Weiss, chief security officer for the Health Information Sharing and Analysis Center. “The health sector is one of the most targeted and vulnerable, and this is exactly the wrong time to be pulling back federal support.• Kristi Noem pledged to boost the nation's cybersecurity. She gutted it instead• Trump Administration Cuts Cyberdefense Even as Threats Grow• U.S. Cyberspace Solarium Commission Annual Assessment: America's Cyber Resiliency in 2025: Lessons from the Fifth CSC 2.0 Annual Assessment & US ‘slipping' on cybersecurity, annual Cyberspace Solarium Commission report concludes Main Topics:Ransomware recovery perils: 40% of paying victims still lose their data. Paying the ransom is no guarantee of a smooth or even successful recovery of data. But that isn't even the only issue security leaders will face under fire. Preparation is key.• UK Government: Supply chain resilience against ransomware • JLR hack is costliest cyber attack in UK history, say analystsMelissa becomes third Category 5 hurricane of the extraordinary 2025 season• NHC issuing advisories for the Atlantic on Hurricane Melissa• Key messages regarding Hurricane Melissa (en Español: Mensajes Claves)• Melissa leaps from tropical storm to Category 4 hurricane in 18 hours• Category 5 Hurricane Melissa's eye is nearing Jamaica and conditions are worseningQuick Hits:• Palo Alto Networks: Why Threat Actors Succeed• LA Metro digital signs taken over by hackers• Chatbots Are Pushing Sanctioned Russian Propaganda
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical AI Browser Agent Security Gap 1Password Now Available in Comet - the AI Browser by Perplexity This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more! Segment 2: Enterprise News In this week's enterprise security news, one big acquisition, two small fundings not all AI is bad deepfakes are getting crazy good make sure you log what your AI agents do Copilot prompt injection NordVPN tries to pull a jedi mind trick on us failure rate in AI adoption is a feature not a bug? using facial recognition to find Tinder profiles a predictable squirrel story All that and more, on this episode of Enterprise Security Weekly. Segment 3: Two interviews from Oktane 2025 Interview with Connor Mulherin of TechSoup The cybersecurity landscape in the nonprofit sector is evolving quickly, with organizations facing unique challenges due to limited resources, sensitive mission-driven work, and developing policies and training programs. Connor Mulherin, Director and GM of Validation Services at TechSoup, will discuss the industry's need for accessible and collaborative solutions to provide affordable technology leadership and security guidance. It will highlight how nonprofit organizations can build long-term digital resilience and combat these growing challenges. Segment Resources: www.techsoup.org Tech Impact Launch CTO Program For Small NPOs Virtual Chief Technology Officer Program for the Nonprofit Sector Interview with Mike Poole, Director of Cyber Security at Werner Enterprises In today's digital landscape, cybersecurity is not just a technical issue—it's a business imperative. Organizations that prioritize cybersecurity culture see fewer incidents and stronger resilience against evolving threats. But how do you foster a security-first mindset across an organization? This session will explore the critical components of building and maintaining a robust cybersecurity culture, starting with executive leadership buy-in—a fundamental step in securing resources and driving organizational change. We'll then dive into the power of monthly phishing exercises, which reinforce awareness and preparedness. Attendees will also learn how to develop effective training programs that engage employees at all levels and create lasting behavioral change. Finally, we'll discuss the role of cybersecurity-themed events, particularly during Cybersecurity Awareness Month, as a powerful tool to capture attention and reinforce key security principles. This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-430
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical AI Browser Agent Security Gap 1Password Now Available in Comet - the AI Browser by Perplexity This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more! Segment 2: Enterprise News In this week's enterprise security news, one big acquisition, two small fundings not all AI is bad deepfakes are getting crazy good make sure you log what your AI agents do Copilot prompt injection NordVPN tries to pull a jedi mind trick on us failure rate in AI adoption is a feature not a bug? using facial recognition to find Tinder profiles a predictable squirrel story All that and more, on this episode of Enterprise Security Weekly. Segment 3: Two interviews from Oktane 2025 Interview with Connor Mulherin of TechSoup The cybersecurity landscape in the nonprofit sector is evolving quickly, with organizations facing unique challenges due to limited resources, sensitive mission-driven work, and developing policies and training programs. Connor Mulherin, Director and GM of Validation Services at TechSoup, will discuss the industry's need for accessible and collaborative solutions to provide affordable technology leadership and security guidance. It will highlight how nonprofit organizations can build long-term digital resilience and combat these growing challenges. Segment Resources: www.techsoup.org Tech Impact Launch CTO Program For Small NPOs Virtual Chief Technology Officer Program for the Nonprofit Sector Interview with Mike Poole, Director of Cyber Security at Werner Enterprises In today's digital landscape, cybersecurity is not just a technical issue—it's a business imperative. Organizations that prioritize cybersecurity culture see fewer incidents and stronger resilience against evolving threats. But how do you foster a security-first mindset across an organization? This session will explore the critical components of building and maintaining a robust cybersecurity culture, starting with executive leadership buy-in—a fundamental step in securing resources and driving organizational change. We'll then dive into the power of monthly phishing exercises, which reinforce awareness and preparedness. Attendees will also learn how to develop effective training programs that engage employees at all levels and create lasting behavioral change. Finally, we'll discuss the role of cybersecurity-themed events, particularly during Cybersecurity Awareness Month, as a powerful tool to capture attention and reinforce key security principles. This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-430
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical AI Browser Agent Security Gap 1Password Now Available in Comet - the AI Browser by Perplexity This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more! Segment 2: Enterprise News In this week's enterprise security news, one big acquisition, two small fundings not all AI is bad deepfakes are getting crazy good make sure you log what your AI agents do Copilot prompt injection NordVPN tries to pull a jedi mind trick on us failure rate in AI adoption is a feature not a bug? using facial recognition to find Tinder profiles a predictable squirrel story All that and more, on this episode of Enterprise Security Weekly. Segment 3: Two interviews from Oktane 2025 Interview with Connor Mulherin of TechSoup The cybersecurity landscape in the nonprofit sector is evolving quickly, with organizations facing unique challenges due to limited resources, sensitive mission-driven work, and developing policies and training programs. Connor Mulherin, Director and GM of Validation Services at TechSoup, will discuss the industry's need for accessible and collaborative solutions to provide affordable technology leadership and security guidance. It will highlight how nonprofit organizations can build long-term digital resilience and combat these growing challenges. Segment Resources: www.techsoup.org Tech Impact Launch CTO Program For Small NPOs Virtual Chief Technology Officer Program for the Nonprofit Sector Interview with Mike Poole, Director of Cyber Security at Werner Enterprises In today's digital landscape, cybersecurity is not just a technical issue—it's a business imperative. Organizations that prioritize cybersecurity culture see fewer incidents and stronger resilience against evolving threats. But how do you foster a security-first mindset across an organization? This session will explore the critical components of building and maintaining a robust cybersecurity culture, starting with executive leadership buy-in—a fundamental step in securing resources and driving organizational change. We'll then dive into the power of monthly phishing exercises, which reinforce awareness and preparedness. Attendees will also learn how to develop effective training programs that engage employees at all levels and create lasting behavioral change. Finally, we'll discuss the role of cybersecurity-themed events, particularly during Cybersecurity Awareness Month, as a powerful tool to capture attention and reinforce key security principles. This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Show Notes: https://securityweekly.com/esw-430
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical AI Browser Agent Security Gap 1Password Now Available in Comet - the AI Browser by Perplexity This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more! Segment 2: Enterprise News In this week's enterprise security news, one big acquisition, two small fundings not all AI is bad deepfakes are getting crazy good make sure you log what your AI agents do Copilot prompt injection NordVPN tries to pull a jedi mind trick on us failure rate in AI adoption is a feature not a bug? using facial recognition to find Tinder profiles a predictable squirrel story All that and more, on this episode of Enterprise Security Weekly. Segment 3: Two interviews from Oktane 2025 Interview with Connor Mulherin of TechSoup The cybersecurity landscape in the nonprofit sector is evolving quickly, with organizations facing unique challenges due to limited resources, sensitive mission-driven work, and developing policies and training programs. Connor Mulherin, Director and GM of Validation Services at TechSoup, will discuss the industry's need for accessible and collaborative solutions to provide affordable technology leadership and security guidance. It will highlight how nonprofit organizations can build long-term digital resilience and combat these growing challenges. Segment Resources: www.techsoup.org Tech Impact Launch CTO Program For Small NPOs Virtual Chief Technology Officer Program for the Nonprofit Sector Interview with Mike Poole, Director of Cyber Security at Werner Enterprises In today's digital landscape, cybersecurity is not just a technical issue—it's a business imperative. Organizations that prioritize cybersecurity culture see fewer incidents and stronger resilience against evolving threats. But how do you foster a security-first mindset across an organization? This session will explore the critical components of building and maintaining a robust cybersecurity culture, starting with executive leadership buy-in—a fundamental step in securing resources and driving organizational change. We'll then dive into the power of monthly phishing exercises, which reinforce awareness and preparedness. Attendees will also learn how to develop effective training programs that engage employees at all levels and create lasting behavioral change. Finally, we'll discuss the role of cybersecurity-themed events, particularly during Cybersecurity Awareness Month, as a powerful tool to capture attention and reinforce key security principles. This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Show Notes: https://securityweekly.com/esw-430
Guest: Martin Potgieter | Regional Chief Technical Officer at Integrity360 Africa Melane speaks to Martin Potgieter of Integrity360 about South Africa’s growing cyber threats, why the country leads Africa in incidents, and how organisations can strengthen their digital defences. Early Breakfast with Africa Melane is 702’s and CapeTalk’s early morning talk show. Experienced broadcaster Africa Melane brings you the early morning news, sports, business, and interviews politicians and analysts to help make sense of the world. He also enjoys chatting to guests in the lifestyle sphere and the Arts. All the interviews are podcasted for you to catch-up and listen.Thank you for listening to this podcast from Early Breakfast with Africa Melane For more about the show click https://buff.ly/XHry7eQ and find all the catch-up podcasts here https://buff.ly/XJ10LBUListen live on weekdays between 04:00 and 06:00 (SA Time) to the Early Breakfast with Africa Melane broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3NSubscribe to the 702 and CapeTalk daily and weekly newsletters https://buff.ly/v5mfetcFollow us on social media:702 on Facebook: https://www.facebook.com/TalkRadio702702 on TikTok: https://www.tiktok.com/@talkradio702702 on Instagram: https://www.instagram.com/talkradio702/702 on X: https://x.com/Radio702702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalkCapeTalk on TikTok: https://www.tiktok.com/@capetalkCapeTalk on Instagram: https://www.instagram.com/CapeTalk on X: https://x.com/CapeTalkCapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.
Today we delve into pressing cybersecurity issues, recent developments in warehouse demand, and the need for more operational efficiency in the cold chain industry.. Welcome to The Buzz powered by AutoScheduler!Hosts Scott Luton and Tandreia Bellamy welcome special guest Ilya Preston, Co-Founder & CEO of PAXAFE, to discuss:The ongoing tariff challenges and how companies like Lovesac are navigating these through strategic supplier negotiations, production shifts, price adjustments, and cost-cutting measuresThe warehouse industry, where a resurgence in demand is noted, reflecting broader economic trendsThe pressing issues surrounding cybersecurity within the supply chain, particularly during Cybersecurity Awareness Month, highlighting the alarming trend of declining budgets despite increasing cyber threatsThe burgeoning cold chain industry and the necessity for orchestration in ensuring operational efficiencyJoin us as we unpack these pivotal topics and their implications for the future of global supply chains, offering actionable insights for industry professionals.Additional Links & Resources:With That Said: https://bit.ly/WTS19Oct2025AutoScheduler.AI: https://autoscheduler.aiSAP Supply Chain Orchestration: https://bit.ly/SAP4Nov2025 Lovesac sees ‘strong progress' from 4-step tariff plan: https://bit.ly/LovesacTariffsPrologis Raises Outlook as Warehouse Leasing Picks Up: https://on.wsj.com/4opnRaTCIOs, CEOs split on key tech decisions: https://bit.ly/CIOsCEOsAutoScheduler Warehouse Decision Agent: https://autoscheduler.ai/agent-gate/ The Real Cold Chain Problem Isn't Visibility — It's Your Approach: https://bit.ly/PAXAFEblogLearn more about Paxafe: https://www.paxafe.com/Connect with IIya Preston: https://www.linkedin.com/in/ilyapreston/ Learn more about Supply Chain Now: https://supplychainnow.comWatch and listen to more Supply Chain Now episodes here: https://supplychainnow.com/program/supply-chain-nowSubscribe to Supply Chain Now on your favorite platform: https://supplychainnow.com/joinWork with us! Download Supply Chain Now's NEW Media Kit: https://bit.ly/3XH6OVkWEBINAR- Optimizing End-to-End Logistics: Efficiency, Collaboration, and Innovation- https://bit.ly/4ml2TZhWEBINAR- Empowering Decision-Making in 2026 with Supply Chain Orchestration: https://bit.ly/3W7swlLThis episode is hosted by Scott Luton...
Cybersecurity Awareness Month with Lance Reid S1E14: On this episode host Tom Testa invites Lance Reid, CEO of Telcion to discuss cybersecurity in healthcare during Cybersecurity Awareness Month. Lance shares insights on how healthcare organizations, particularly community clinics, face unique cybersecurity challenges due to limited resources and staff wearing multiple hats, emphasizing that operational maturity rather than location is the key factor in managing risks. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
Stephen Grootes speaks to Brian Pinnock, cyber expert, about the alarming rise in cybercriminal activity in South Africa and the practical steps SMEs can take to protect themselves during Cybersecurity Awareness Month. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
10-21-2025 Karissa Breen Learn more about the interview and get additional links here: https://usabusinessradio.com/building-a-stronger-cyber-future-for-cyber-security-awareness-month/ Subscribe to the best of our content here: https://priceofbusiness.substack.com/ Subscribe to our YouTube channel here: https://www.youtube.com/channel/UCywgbHv7dpiBG2Qswr_ceEQ
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025] 00:00 - Intro 00:31 - Carter Zupancich Intro - Website: https://carterzupancich.com/ 01:30 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
October is Cyber Security Awareness Month, so we have an early Halloween treat for you! Expert Tim joins us to give practical tips on how you can keep yourself safe. This will be one you'll want to take notes on! When he's not keeping people safe online, Expert Tim hosts Frenemy Trivia. Check him out there!https://open.spotify.com/show/1MF4jtqMEtI5SeC8HCE0ge www.twentyfourhourexpert.com twentyfourhourexpert@gmail.com @twentyfourhourexpert
It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online' this year. It's an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve into the history and transformation of Cybersecurity Awareness Month to help boost your security awareness. Lisa Plaggemier, Executive Director, National Cybersecurity Alliance Cliff Steinhauer, Director, Information Security & Engagement National Cybersecurity Alliance Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC
On More Than Money, Leanna Wachniak and Dave Popowich talk with Hilary McMeekin from the Alberta Securities Commission about how retirees can spot scams and protect their finances during Cyber Security Awareness Month. Tony Chapman, Founder of Chatter That Matters, shares how to redefine yourself after retirement. Finally, Leanna and Dave ask: Should you give money to your adult children and how much is too much?See omnystudio.com/listener for privacy information.
Send us a textJoin us for an exciting episode of Digitaliseringspådden, starting with Mike Baker, Global CISO at DXC Technology and winner of the 2025 CapitalCISO ORBIE Awards Super Global Winner— a top honor recognizing leaders driving cybersecurity excellence in organizations with over $8.5 billion in revenue. With 23 years of experience in cyber leadership, risk management, and ethical hacking, Mike shares insights on how AI is used by hackers and as a defense tool. Mike Baker explains how a CISO in 2025 acts as a business enabler, driving innovation while setting guardrails for secure operations.Espen Olsen, Managing Director of DXC Norway, joins Mike, with a background in the Norwegian Air Force. He discusses Norway's specific risks as a NATO member, like drone threats impacting business and transport, and shares a story of a company ignoring security weaknesses due to high costs, highlighting the dangers of inaction in a world of advanced, state-backed cybercriminals.Hosted by Jens Christian Bang, this episode blends global expertise with a local lens, offering practical cybersecurity advice for both small and large businesses. Discover how to stay ahead of AI-driven attacks and learn how DXC helps organizations strengthen their cyber resilience. Whether you're a tech leader or just want to stay safe online, this episode, spotlighting Mike Baker's award-winning insights, is a must-listen for anyone navigating the intersection of AI and cybersecurity.Listen to the episode on Spotify (with video), Apple Podcasts, YouTube Podcasts, or wherever you enjoy your podcasts. Also, in celebration of Cybersecurity Awareness Month, we are also excited to share DXC's latest Cyber Trust ReportDigitaliseringspådden lages av Already On og CW.no. Besøk oss på digitaliseringspodden.alreadyon.com. Du finner Digitaliseringspådden på alle plattformer – lytt via Spotify, Apple Podcasts eller YouTube Podcasts.
President and CEO of the Better Business Bureau Steve Bernas joins Wendy Snyder (in for Bob Sirott) to talk about the increase of AI scams during the Medicare Open Enrollment period and what to be aware of during Cybersecurity Awareness Month. He also explains what “wrong number” scams are and how con artists stealing debit cards from mailboxes.
Illinois Farm Bureau Associate Director of Transportation and Infrastructure Rodney Knittel discusses low water levels on Mississippi River and harvest transportation safety reminders. Illinois Comptroller Susana Mendoza highlights Cyber Security Awareness Month. Talking fall agritourism with Rader Family Farms in Normal.
Just in time for Cybersecurity Awareness Month, Pete and Julie welcome cybersecurity experts, Serket-Tech Founder & CEO Dante Jackson and CTO/CISO Robert Igarashi, for a candid conversation on protecting HR and payroll operations from digital threats and bad actors! Drawing from their unique backgrounds in federal law enforcement and financial services, Dante and Robert share why cybersecurity shouldn't just be for enterprise organizations, how to make your company a "hard target," and why employees are both your greatest vulnerability and best defense against cyber-attacks. They talk threat detection, the challenges of BYOD policies, and why every HR leader needs a seat at the table for cybersecurity tabletop exercises. Plus, practical steps for building security-minded cultures and how to move from reactive to proactive security postures. Connect with Dante & Robert: Dante: https://www.linkedin.com/in/dante-jackson/ Robert: https://www.linkedin.com/in/robert-igarashi-mba-cissp-0b18967/ About Serket Tech Security: https://serkettech.com/ Serket Tech FB: https://www.facebook.com/serkettech?mibextid=LQQJ4d Digital Twins explained: https://www.nvidia.com/en-us/glossary/digital-twin/ Connect with the show: LinkedIn: http://linkedin.com/company/hr-payroll-2-0 X: @HRPayroll2_0 @PeteTiliakos @JulieFer_HR BlueSky: @hrpayroll2o.bsky.social YouTube: https://www.youtube.com/@HRPAYROLL2_0
In this episode of the Tyler Tech Podcast, Ryan Jacobson, manager of software engineering, and Sonya Newell, team lead in cybersecurity, join the show to discuss the changing nature of cybersecurity and the growing impact of artificial intelligence (AI).Ryan and Sonya share how threats like ransomware, zero-day vulnerabilities, and legacy technology continue to challenge public sector agencies, especially as more services move to the cloud. They also explain how AI has lowered the barrier for attackers to create sophisticated phishing and voice scams, while at the same time giving defenders new tools to monitor, detect, and respond.The conversation underscores why resilience is about more than just technology — it requires awareness, adaptability, and culture. By asking the right questions, starting small, and reinforcing strong internal processes, public sector leaders can take meaningful steps toward strengthening cybersecurity in an AI-driven world.This episode also highlights the advantages of cloud infrastructure and how it is transforming the public sector. From reducing technical debt and streamlining operations to creating the flexibility to adopt AI and other emerging tools, the cloud provides a smarter, more resilient foundation for modernization, security, and innovation. Explore our resources in the show notes to learn how governments can maximize long-term value and take the next step toward a future built to adapt.Explore More: Cloud Infrastructure for GovernmentAnd learn more about the topics discussed in this episode with these resources:Download: Digital Access and Accessibility in the Resident ExperienceTyler in the News: South Carolina AI, Cyber Initiatives Reshape ServicesBlog: The Power of Data: Building Resilient and Responsive SystemsBlog: Preparing for the Future of AI in GovernmentBlog: Boosting Resilience: Cloud Solutions for Modern GovernmentBlog: Cyber Defense: Local Governments Weigh InBlog: Partnering With Communities to Build ResilienceBlog: Resilient Communities Rely on Modern Public Safety SolutionsBlog: Increase Community Resilience With Modern Payment SystemsBlog: How Cloud-Based Solutions Expand Access to State ServicesBlog: Resilience at Scale: Technology for an Unpredictable FutureListen to other episodes of the podcast.Let us know what you think about the Tyler Tech Podcast in this survey
As digital threats continue to evolve, cybersecurity has never been more essential. In recognition of Cybersecurity Awareness Month, this episode highlights Augusta University's leadership in cyber education and innovation. We speak with Dr. Alex Schwarzmann, Dean of the School of Computer and Cyber Sciences, about how AU is preparing students to meet the challenges of an increasingly connected world. Then, alum Michael Banks shares his path from student to Amazon Web Services professional and offers practical advice on staying safe online.
In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Russia, China and North Korea are using ChatGPT to influence you — here's how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI's popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”• The Case for AI Loss of Control Response Planning and an Outline to Get Started• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week• Cyber attack contingency plans should be put on paper, firms told• Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF• Paying off cyber criminals no guarantee stolen data won't be published – studySevere Weather: Hurricane Season continues18 Oct: No Kings nationwide protestsQuick Hits:• Peace in Israel and Gaza?• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections• Yet another shutdown and its impact on cybersecurity professionals• Experts: Shutdown Strains Healthcare Cyber Defenses• Is the government shutdown impacting info sharing for healthcare cyber threats? • ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more! • Poland says cyberattacks on critical infrastructure rising, blames Russia• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense• Belgian PM reported to be among targets of ‘jihad-inspired' drone plot• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society. In this episode, Justin interviews Katherine Henry of Bradley, Arant, Boult, Cummings, and Harold (Hal) Weston of Georgia State University, Greenberg School of Risk Science, who are here to discuss their new professional report, “A 2025 Cybersecurity Legal Safe Harbor Overview.” Katherine and Hal take the discussion beyond the pages and delve into best cybersecurity practices, cyber insurance, and Safe Harbor laws offered by some states and possibly to be offered soon by others. They discuss frameworks and standards, and what compliance means for your organization, partly based on your state law. Listen for advice to help you be prepared against cybercrime. Key Takeaways: [:01] About RIMS and RIMScast. [:16] About this episode of RIMScast. We will be joined by the authors of the legislative review, “A 2025 Cybersecurity Legal Safe Harbor Overview”, Katherine Henry and Harold Weston. Katherine and Harold are also prominent members of the RIMS Public Policy Committee. [:48] Katherine and Harold are also here to talk about Cybersecurity Awareness Month and safe practices. But first… [:53] RIMS-CRMP Prep Workshops! The next RIMS-CRMP Prep Workshops will be held on October 29th and 30th and led by John Button. [1:05] The next RIMS-CRMP-FED Virtual Workshop will be held on November 11th and 12th and led by Joseph Mayo. Links to these courses can be found through the Certifications page of RIMS.org and through this episode's show notes. [1:23] RIMS Virtual Workshops! RIMS has launched a new course, “Intro to ERM for Senior Leaders.” It will be held again on November 4th and 5th and will be led by Elise Farnham. [1:37] On November 11th and 12th, Chris Hansen will lead “Fundamentals of Insurance”. It features everything you've always wanted to know about insurance but were afraid to ask. Fear not; ask Chris Hansen! RIMS members always enjoy deep discounts on the virtual workshops! [1:56] The full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's notes. [2:08] Several RIMS Webinars are being hosted this Fall. On October 16th, Zurich returns to deliver “Jury Dynamics: How Juries Shape Today's Legal Landscape”. On October 30th, Swiss Re will present “Parametric Insurance: Providing Financial Certainty in Uncertain Times”. [2:28] On November 6th, HUB will present “Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World”. Register at RIMS.org/Webinars. [2:40] Before we get on with the show, I wanted to let you know that this episode was recorded in the first week of October. That means we are amid a Federal Government shutdown. RIMS has produced a special report on “Key Considerations Regarding U.S. Government Shutdown.” [2:58] This is an apolitical problem. It is available in the Risk Knowledge section of RIMS.org, and a link is in this episode's show notes. Visit RIMS.org/Advocacy for more updates. [3:12] Remember to save March 18th and 19th on your calendars for the RIMS Legislative Summit 2026, which will be held in Washington, D.C. I will continue to keep you informed about that critical event. [3:24] On with the show! It's National Cybersecurity Awareness Month here in the U.S. and in many places around the world. Cyber continues to be a top risk among organizations of all sizes in the public and private sectors. [3:40] That is why I'm delighted that Katherine Henry and Harold (Hal) Weston are here to discuss their new professional report, “A 2025 Cybersecurity Legal Safe Harbor Overview”. [3:52] This report provides a general overview of expected cybersecurity measures that organizations must take to satisfy legal Safe Harbor requirements. [4:01] It summarizes state Safe Harbor laws that have been developed to ensure organizations are proactive about cybersecurity and that digital, financial, and intellectual assets are legally protected when that inevitable cyber attack occurs. [4:15] We are here to extend the dialogue. Let's get started! [4:21] Interview! Katherine Henry and Hal Weston, welcome to RIMScast! [4:41] Katherine was one of he first guests on RIMScast. Katherine is Chair of the Policyholder Insurance Coverage Practice at Bradley, Arant, Boult, Cummings. Her office is based in Washington, D.C. She works with risk managers all day on insurance issues. [5:05] Katherine has been a member of the RIMS Public Policy Committee for several years. She serves as an advisor to the Committee. [5:12] Justin thanks Katherine for her contributions to RIMS. [5:25] Hal is with Georgia State University. He has been with RIMS for a couple of decades. Hal says he and Katherine have served together on the RIMS Public Policy Committee for maybe 10 years. [5:48] Hal is a professor at Georgia State University, a Clinical Associate in the Robinson College of Business, Greenberg School of Risk Science, where he teaches risk management and insurance. Before his current role, Hal was an insurance lawyer, both regulatory and coverage. [6:05] Hal has a lot of students. He is grading exams this week. He has standards for his class. In the real world, so does a business. [6:46] Katherine and Hal met through the RIMS Public Policy Committee. They started together on some subcommittees. Now they see each other at the annual meeting and on monthly calls. [7:05] Katherine and Hal just released a legislative review during RIMS's 75th anniversary, “A 2025 Cybersecurity Legal Safe Harbor Overview”. It is available on the Risk Knowledge page of RIMS.org. [7:20] We're going to get a little bit of dialogue that extends beyond the pages. [7:31] Katherine explains Safe Harbor: When parties are potentially liable to third parties for claims, certain states have instilled Safe Harbor Laws that say, If you comply with these requirements, we'll provide you some liability protection. [7:45] Katherine recommends that you read the paper to see what the laws are in your state. The purpose of the paper is to describe some of those Safe Harbor laws, as well as all the risks. [8:04] October 14th, the date this episode is released, is World Standards Day. Hal calls that good news. Justin says the report has a correlation with the standards in the risk field. [8:43] Justin states that many states tie Safe Harbor eligibility to frameworks like NIST, the ISO/IEC 27000, and CIS Controls. [9:27] Hal says, There are several standards, and it would be up to the Chief Information Security Officer to guide a company on which framework might be most appropriate for them. There are the NIST, UL, and ISO, and they overlap quite a bit. [9:56] These are recognized standards. In some states, if a company has met this standard of cybersecurity, a lawsuit against the company for breach of its standard of care for maintaining its information systems would probably be defensible for having met a recognized standard. [10:23] Katherine adds that as risk managers, we can't make the decision about which of these external standards is the best. Many organizations have a Cybersecurity Officer responsible for this. [10:44] For smaller organizations, there are other options, including outsourcing to a vendor. Their insurance companies may have recommendations. So you're not on your own in making this decision. [11:14] Katherine says firms should definitely aim for one recognized standard. Katherine recommends you try to adhere to the highest standard. If you are global, you need to be conscious of standards in other countries. [11:46] Hal says California tends to have the highest standards for privacy and data protection. If you're a financial services company, you're subject to New York State's Department of Financial Services Cyber Regulation. [12:02] If you're operating in Europe, GDPR is going to be the guiding standard for what you should do. Hal agrees with Katherine: Any company that spans multiple states should pick the highest standard and stick to that, rather than try to implement five or 52 standards. [12:23] When you're overseas, you may not be able to just pick the highest standard; there are challenges in going from one country or region of Europe back to the U.S. If one is higher, it will probably be easier. [12:38] There are major differences between the U.S., which has little Federal protection, vs. state protection. [13:10] Katherine says if you don't have the internal infrastructure, and you can't afford that infrastructure, the best thing is to pivot to an outside vendor. There are many available, with a broad price range. Your cyber insurer may also have some vendors they already work with. [13:40] Hal would add, Don't just think about Safe Harbors. That's just a legal defense. Think about how you reduce the risk by adopting standards or hiring outside firms that will provide that kind of risk protection and IT management. [13:59] If they're doing it right, they may tell you the standards they use, and they may have additional protocols, whether or not they fall within those standards, that would also be desirable. A mid-sized firm is probably outsourcing it to begin with. [14:21] They have to be thinking about it as risk, rather than just Safe Harbor. You have to navigate to the Safe Harbor. You don't just get there. [14:31] Quick Break! RISKWORLD 2026 will be in Philadelphia, Pennsylvania, from May 3rd through the 6th. RIMS members can now lock in the 2025 rate for a full conference pass to RISKWORLD 2026 when you register by October 30th! [14:50] This also lets you enjoy earlier access to the RISKWORLD hotel block. Register by October 30th, and you will also be entered to win a $500 raffle! Do not miss out on this chance to plan and score some of these extra perks! [15:03] The members-only registration link is in this episode's show notes. If you are not yet a member, this is the time to join us! Visit RIMS.org/Membership and build your network with us here at RIMS! [15:16] The RIMS Legislative Summit 2026 is mentioned during today's episode. Be sure to mark your calendar for March 18th and 19th in Washington, D.C. Keep those dates open. [15:28] Join us in Washington, D.C., for two days of Congressional Meetings, networking, and advocating on behalf of the risk management community. Visit RIMS.org/Advocacy for more information and updates. [15:41] Let's return to our interview with Katherine Henry and Hal Weston! [15:54] We're talking about their new paper, “A 2025 Cybersecurity Legal Safe Harbor Overview”. Katherine mentions that some businesses are regulated. They have to comply with external regulatory standards. [16:38] Other small brick-and-mortar businesses may not have any standards they have to comply with. They look for what to do to protect themselves from cyber risk, and how to tell others they are doing that. [16:54] If you can meet the standards of Safe Harbor laws, a lot of which are preventative, before a breach, you can inform your customers, “These are the protections we have for your data.” You can tell your board, “These are the steps we're taking in place.” [17:13] You can look down the requirements of the Safe Harbor law in your state or a comparable state, and see steps you can take in advance so you can say, “We are doing these things and that makes our system safer for you and protects your data.” [17:34] Hal says you don't want to have a breach, and if you do, it would be embarrassing to admit you were late applying a patch, implementing multi-factor authentication, or another security measure. By following standards of better cyber protection, you avoid those exposures. [18:07] Hal says every company has either been hacked and knows it, or has been hacked and doesn't know it. If you're attacked by a nation-state that is non-preventable, you're in good shape. [18:26] If you're attacked because you've left some ports open on your system, or other things that are usually caught in cybersecurity analyses or assessments, that's the embarrassing part. You don't want to be in that position. [18:43] Katherine says it's not just your own systems, but if you rely on vendors, you want to ensure that the vendors have the proper security systems in place so that your data, to the extent that it's transmitted to them, is not at risk. [19:07] Also, make sure that your vendors have cyber insurance and that you're an additional insured on that vendor's policy if there's any potential exposure. [19:22] Hal says If you're using a cloud provider, do you understand what the cloud provider is doing? In most cases, they will provide better security than what you could do on your own, but there have been news stories that even some of those have not been perfect. [20:22] Hal talks about the importance of encryption. It's in the state statutes and regulations. There have been news stories of companies that didn't encrypt their data on their servers or in the cloud, and didn't understand encryption, when a data breach was revealed. [20:52] Hal places multi-factor authentication up with encryption in importance. There was a case brought against a company that did not have MFA, even though it said on its application on the cyber policy that the company used it. [21:13] Hal says these are standard, basic things that no company should be missing. If you don't know that your data is encrypted, get help fast to figure that out. [21:51] Hal has also seen news stories of major companies where the Chief Technology Officer has been sued individually, either by the SEC or others, for not doing it right. [22:07] Katherine mentions there are insurance implications. If you mistakenly state you're providing some sort of protection on your insurance application that you're not providing, the insurer can rescind your coverage, so you have no coverage in place at all. [22:23] Katherine says, These are technical safeguards, but we know the human factor is one of the greatest risks in cybersecurity. Having training for everyone who has access to your computer system, virtually everyone in your organization, is very important. [22:49] Have a test with questions like, Is this a spam email or a real email? There are some vendors who can do all this for you. Statistics show that the human element is one of the most significant problems in cybersecurity protection. [23:05] Justin says it's October, Cybersecurity Awareness Month in the U.S. Last week's guest, Gwenn Cujdik, the Incident Response and Cyber Services Lead for North America at AXA XL, said the number one cyber risk is human error, like clicking the phishing link. [23:45] Justin brings up that when he was recently on vacation, he got an email on his personal email account, “from his CEO,” asking him to handle something for them. Justin texted somebody else at RIMS, asking if they got the same email, and they hadn't. [24:14] Justin sent the suspect email to the IT director to handle. You have to be vigilant. Don't let your guard down for a second. [24:48] Katherine has received fake emails, as well. [24:51] Hal says it has happened to so many people. Messages about gift cards or the vendor having a new bank account. Call the vendor that you know and ask what this is. [25:12] Hall continues. It's important to train employees in cybersecurity, making sure that they are using a VPN when they are outside of the office, or even a VPN that's specific to your company. [25:32] Hal saw in the news recently that innocent-looking PDF files can harbor lots of malware. If you're not expecting a PDF file from somebody, don't click on that, even if you know them. Get verification. Start a new thread with the person who sent it and ask if it is a legitimate PDF. [26:08] Justin says of cybercriminals that they are smart and their tactics evolve faster than legislation. How can organizations anticipate the next generation of threats? [26:34] Katherine says, You need to have an infrastructure in your organization that does that, or you need to go to an outside vendor. You need some sort of protection, internally or externally. [27:11] Katherine says she works with CFOs all the time. If an organization isn't large enough to have a risk manager, it's a natural fit for the CFO, who handles finances, to handle insurance. When it comes to cybersecurity, a CFO needs help. [27:46] The CFO should check the cyber policy to see what support services are already there and see if there are any that are preventative, vs. after a breach. If there are not, Katherine suggests pivoting to an outside vendor. [28:07] Hal continues, This interview is for RIMS members who are risk managers and the global risk community. Risk managers don't claim to know all the risk control measures throughout a company. They rely upon the experts in the company and outside. [28:29] If the CFO is the risk manager, he or she has big gaps in expertise needed for risk management. It's the same for the General Counsel running risk management. Risk managers are known for having small staffs and working with everybody else to get the right answers. [28:55] If you're dealing with the CFO or General Counsel in those roles, they need to be even more mindful to work with the right experts for guidance. [29:09] One Final Break! As many of you know, the RIMS ERM Conference 2025 will be held on November 17th and 18th in Seattle, Washington. We recently had ERM Conference Keynote Speaker Dan Chuparkoff on the show. [29:26] He is back, just to deliver a quick message about what you can expect from his keynote on “AI and the Future of Risk.” Dan, welcome back to RIMScast! [29:37] Dan says, Greetings, RIMS members and the global risk community! I'm Dan Chuparkoff, AI expert and the CEO of Reinvention Labs. I'm delighted to be your opening keynote on November 17th at the RIMS ERM Conference 2025 in Seattle, Washington. [29:52] Artificial Intelligence is fueling the next era of work, productivity, and innovation. There are challenges in navigating anything new. This is especially true for risk management, as enterprises adapt to shifting global policies, economic swings, and a new generation of talent. [30:10] We'll have a realistic discussion about the challenges of preparing for the future of AI. To learn more about my keynote, “AI and the Future of Risk Management,” and how AI will impact Enterprise Risk Management for you, listen to my episode of RIMScast at RIMS.org/Dan. [30:29] Be sure to register for the RIMS ERM Conference 2025, in Seattle, Washington, on November 17th and 18th, by visiting the Events page on RIMS.org. I look forward to seeing you all there. [30:40] Justin thanks Dan and looks forward to seeing him again on November 17th and hearing all about the future of AI and risk management! [30:48] Let's Conclude Our Interview about Navigating Cyber and IT Practices to Legal Safe Harbors with Katherine Henry and Hal Weston! [31:17] Katherine tells about how Safe Harbor compliance influences cyber insurance. If your organization applies for cyber insurance and you can't meet some minimum threshold that will be identified on the application, the insurer will not even offer you cyber insurance. [31:34] You need to have some cyber protections in place. That's just to procure insurance. Cyber insurance availability is growing. Your broker can bring you more insurers to quote if you can show robust safeguards. [32:05] After the breach, your insurer is supposed to step in to help you. Your insurer will be mindful of whether or not your policy application is correct and that you have all these protections in place. [32:21] The more protections you have, the quicker you might be able to shut down the breach, and the resulting damage from the breach, and that will lower the resulting cost of the claim and have less of an impact on future premiums. [32:36] If the cyber insurer just had to pay out the limits because something wasn't in place, that quote next year is not going to look so pretty. Your protections have a direct impact on both the availability and cost of coverage. [32:50] Justin mentions that the paper highlights Connecticut, Tennessee, Iowa, Ohio, Utah, and Oregon as the states with Safe Harbor laws. The Federal requirements are also listed. Katherine expects that more states will offer Safe Harbor laws as cybercrime lawsuits increase. [33:42] Hal says Oregon, Ohio, and Utah were the leaders in creating Safe Harbors. Some of the other states have followed. Safe Harbor is a statutory protection against liability claims brought by the public. [34:06] In other states, you can't point to a statute that gives protection, but you can say you complied with the highest standards in the nation, and you probably have a pretty defensible case against a claim for not having kept up with your duty to protect against a cyber attack. [34:55] Hal adds that every company is going to be sued, and the claim is that you failed to do something. If you have protected yourself with all the known best practices, as they evolve, what more is a company supposed to do? [35:18] The adversaries are nation-states; they are professional criminals, sometimes operating under the protection of nation-states, and they're using artificial intelligence to craft even more devious ways to get in. [36:19] Katherine speaks from a historical perspective. A decade ago, cyber insurance was available, but there was no appetite for it. There wasn't an understanding of the risk. [36:32] As breaches began to happen and to multiply, in large amounts of exposure, with companies looking at millions of dollars in claims, interest grew. Katherine would be surprised today if any responsible board didn't take cyber risk extremely seriously. [36:55] The board's decision now is what limits to purchase and from whom, and not, “Should we have cyber insurance at all?” Katherine doesn't think it's an issue anymore in any medium-sized company. [37:17] The risk manager should present to the board, “We benchmark. Our broker benchmarks. Companies of our size have had this type of claim, with this type of exposure, and they've purchased this amount of limits. We need to be at least in that place.” Boards will be receptive. [37:43] If they are not receptive, put on a PowerPoint with all the data that's out there about how bad the situation is. The average cost of a breach is well over $2 million. The statistics are quite alarming. A wise decision-maker will understand that you need to procure this coverage. [38:10] Katherine says, from the cybersecurity side, you procure the coverage, you protect the company, and take advantage of the Safe Harbors. All of those things come together with the preventative measures we've been talking about. [38:24] You can show your decision-makers and stakeholders that if you do all those things, comply with these Safe Harbor provisions, you're going to minimize your exposure, increase the availability of insurance, and keep your premiums down. It's a win-win package. [38:41] Justin says, It has been such a pleasure to meet you, Hal, and thank you for joining us. Katherine, it is an annual pleasure to see you. We're going to see you, most likely, at the RIM Legislative Summit, March 18th and 19th, 2026, in Washington, D.C. [39:01] Details to come, at RIMS.org/Advocacy. Katherine, you'll be there to answer questions. Katherine looks forward to the Summit. She has gone there for years. It's a great opportunity for risk managers to speak directly to decision-makers about things that are important to them. [39:42] Special thanks again to Katherine Henry and Hal Weston for joining us here today on RIMScast! Remember to download the new RIMS Legislative Review, “A 2025 Cybersecurity Legal Safe Harbor Overview”. [39:58] We are past the 30-day mark now, so the review is publicly available through the Risk Knowledge Page of RIMS.org. You can also visit RIMS.org/Advocacy for more information. In this episode's notes, I've got links to Katherine's prior RIMScast appearances. [40:18] Plug Time! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in the show notes. [40:47] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [41:05] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [41:22] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more. [41:39] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [41:53] Justin Smulison is the Business Content Manager at RIMS. Please remember to subscribe to RIMScast on your favorite podcasting app. You can email us at Content@RIMS.org. [42:05] Practice good risk management, stay safe, and thank you again for your continuous support! Links: RIMS Professional Report: “A 2025 Cybersecurity Legal Safe Harbor Overview” RISK PAC | RIMS Advocacy | RIMS Legislative Summit SAVE THE DATE — March 18‒19, 2026 RIMS ERM Conference 2025 — Nov. 17‒18 RISKWORLD 2026 — Members-only early registration through Oct 30! RIMS-Certified Risk Management Professional (RIMS-CRMP) The Strategic and Enterprise Risk Center RIMS Diversity Equity Inclusion Council RIMS Risk Management magazine | Contribute RIMS Now Cybersecurity Awareness Month World Standards Day — Oct 14, 2025 Upcoming RIMS Webinars: RIMS.org/Webinars “Jury Dynamics: How Juries Shape Today's Legal Landscape” | Oct. 16, 2025 | Sponsored by Zurich “Parametric Insurance: Providing Financial Certainty in Uncertain Times” | Oct. 30, 2025 | Sponsored by Swiss Re “Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World” | Nov. 6 | Sponsored by Hub Upcoming RIMS-CRMP Prep Virtual Workshops: RIMS-CRMP Virtual Exam Prep — Oct. 29‒30, 2025 RIMS-CRMP-FED Exam Prep Virtual Workshop — November 11‒12 Full RIMS-CRMP Prep Course Schedule “Risk Appetite Management” | Oct 22‒23 | Instructor: Ken Baker “Intro to ERM for Senior Leaders” | Nov. 4‒5 | Instructor: Elise Farnham “Fundamentals of Insurance” | Nov. 11‒12 | Instructor: Chris Hansen “Leveraging Data and Analytics for Continuous Risk Management (Part I)” | Dec 4. See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops Related RIMScast Episodes about Cyber and with Katherine Henry: “National Cybersecurity Awareness Month 2025 with Gwenn Cujdik” “AI Risks and Compliance with Chris Maguire” “Data Privacy and Protection with CISA Chief Privacy Officer James Burd” “Cyberrisk Trends in 2025 with Tod Eberle of Shadowserver” “Legal and Risk Trends with Kathrine Henry (2023)” Sponsored RIMScast Episodes: “The New Reality of Risk Engineering: From Code Compliance to Resilience” | Sponsored by AXA XL (New!) “Change Management: AI's Role in Loss Control and Property Insurance” | Sponsored by Global Risk Consultants, a TÜV SÜD Company Demystifying Multinational Fronting Insurance Programs | Sponsored by Zurich “Understanding Third-Party Litigation Funding” | Sponsored by Zurich “What Risk Managers Can Learn From School Shootings” | Sponsored by Merrill Herzog “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance” | Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS President Kristen Peed! RIMS Events, Education, and Services: RIMS Risk Maturity Model® Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information. Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts. Have a question or suggestion? Email: Content@rims.org. Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn. About our guests: Katherine Henry, Partner and Chair of the Policyholder Coverage Practice, Bradley, Arant, Boult, and Cummings Harold Weston, Clinical Associate Professor and WSIA Distinguished Chair in Risk Management and Insurance, Georgia State University College of Law Production and engineering provided by Podfly.
October is Cybersecurity Awareness Month. We get some basic safety tips from cybersecurity expert Alex Hamerstone.
* The Archdiocese's bankruptcy settlement could be in jeopardy. * October is Cybersecurity Awareness Month. We'll get some basic safety tips.
Dein Backup kannst du vergessen! Oder wie war das nochmal? Während dem Cybersecurity Awareness Month nimmt Milena diverse Mythen unter die Lupe und ordnet sie für dich ein. Sende dein Cybersecurity Awareness Fail an cyberheroes@infinigate.ch. Dies ist ein Podcast der Infinigate (Schweiz) AG.
Lisa Plaggemier is the executive director of the National Cybersecurity Alliance. In this episode, she joins Cybercrime Magazine to highlight this year's Cybersecurity Awareness Month, which aims to teach people simple ways to protect themselves online every October. To learn more about the National Cybersecurity Alliance and Cybersecurity Awareness Month, visit https://staysafeonline.org. • For more on cybersecurity, visit us at https://cybersecurityventures.com/
Chris and Hector kick off Cybersecurity Awareness Month with stories of phishing gone wrong, data privacy disasters, and a new wave of AI-powered attacks. From “comment jacking” and vanishing government backups to China's one-hour breach rule and a Florida kid flagged by ChatGPT, the guys break down what's real, what's ridiculous, and what it means for your security. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
This week on KentNow, the team dives into everything from farm animal traffic jams to cybersecurity smishing scams. We're talking about: The massive 58 million pounds of corn dogs have been recalled (yes, you read that right
Send us a textDigital safety expert Kristin Lewis shares some great advice on staying safe online during Cybersecurity Awareness Month.Kristin Lewis is Chief Product Officer at Aura, where she oversees the company's suite of products that keep families safe online—from parental controls and child digital wellness tools to identity protection, data removal from brokers, and online security features. She leads the development of technology that empowers consumers to take control of their digital privacy and protect themselves from fraud and data misuse.
In this episode, Cybercrime Magazine Editor-in-Chief Steve Morgan shares a real-life scam incident he encountered, telling listeners exactly how it happened so they can protect themselves during Cybersecurity Awareness Month. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com
Chapters (00:00:00) - Morning Tea and Allegations(00:02:13) - Teen Allegations(00:05:52) - Federal Workers Sue the Education Department Over Partisan Shutdown Emails(00:08:46) - Why Latinos in Action is Being Shut Down(00:10:48) - Headlines: Federal Communications Commission to End Wi-Fi Mobile Hots(00:13:31) - Hillsborough County Public Schools to Investigate Teachers for Social Media(00:14:56) - Ian Roberts scandal: Lies that built a career(00:20:11) - Whistleblower on Yinka Alege's Background Checks(00:25:45) - Teacher Uses AI to Make Child Pornography in Florida(00:30:00) - White House on Deepfakes(00:39:16) - October is Cybersecurity Awareness Month(00:41:24) - Cybersecurity Month, Week 1(00:44:02) - Should You Migrate Emails to Yahoo?
Chapters(00:00) - AI-Driven CEO Impersonator Scams (00:38) - WNBA Commissioner Controversy (07:04) - Standardizing Tech Stacks in Accounting Firms (13:06) - AI's Role in Accounting and Client Management (18:27) - IRS Shutdown and Economic Implications (25:49) - Fraud Stories and AI-Generated Scams (33:31) - Alternative CPA Pathways in California and New Jersey (34:32) - California's New CPA Pathways (35:45) - US News & World Report Rankings (37:38) - Tech Fundraising and Innovations (37:56) - Bill's Cybersecurity Awareness Month (40:33) - Dual Entry's $90 Million Series A (43:35) - AI and ERP Systems (50:58) - Avalara's AI Tax Compliance Agents (53:01) - Ignition's AI-Powered Pricing Tool (01:01:20) - Paycom's Layoffs and AI Automation (01:05:00) - Conclusion and Upcoming Events Show NotesComing soon!Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastWant to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page
On this week's episode of the Security Sprint, Andy is joined by the Cybersecurity Evangelist herself, Jennifer Walker as well as Sadie Anne Jones! Together they covered the following topics:Warm Open:• Tribal-ISAC Unveils Cybersecurity Report & Tribal-ISAC cybersecurity report delivers data, insights into risks• (TLP:CLEAR) WaterISAC Physical Security Advisory Committee: Insider Threat Management – Fact Sheet.• Colin Wood on Bluesky: “October isn't only cyber awareness month. It's also National Popcorn Poppin' Month, National Adopt a Shelter Dog Month and Eczema Awareness Month. There's something for everyone, really” It's also National Pizza Month!Main Topics:CISA: Cybersecurity Awareness Month - Building a Cyber Strong America. October is Cybersecurity Awareness Month! This year's theme is Building a Cyber Strong America, highlighting the need to strengthen the country's infrastructure against cyber threats, ensuring resilience and security. • Cybersecurity Awareness Month Toolkit• DHS and CISA Announce Cybersecurity Awareness Month 2025• Article: DHS, CISA kick off Cybersecurity Awareness Month 2025 to protect critical services, boost national resilienceCybersecurity Information Sharing Act of 2015 (CISA 2015): • CISA 2015 sunsets: Cyber Threat sharing without a net? • CISA Liability Protections Terminate - What Legal & InfoSec Need to Know Before Sharing Cyber Threat Information• Cyber Threat Information Sharing at Risk: What Companies Should Consider if the Cybersecurity Information Sharing Act of 2015 Is Not Renewed• Cyber defenders on edge amid shutdown furloughs, expired authorities• Information sharing under CISA 2015 in limbo after government shuts downQuick Hits:• Judge temporarily blocks use of National Guard in Portland• USNORTHCOM statement regarding protection of federal property and personnel in the Portland Area• Trump says US is in ‘armed conflict' with drug cartels after ordering strikes in the Caribbean• Venezuela says it detected 5 US ‘combat planes' flying 75km from its coast, calls it a ‘provocation'• Clop extortion emails claim theft of Oracle E-Business Suite data• Active exploitation of vulnerability affecting Oracle E-Business Suite• Oracle Security Alert Advisory - CVE-2025-61882• CISA and UK NCSC Release Joint Guidance for Securing OT Systems• Shutdown guts U.S. cybersecurity agency at perilous time• CISA to furlough 65% of staff if government shuts down this week• UK NPSA - Manchester Incident • Security boost for Irish Jews after Manchester synagogue attack• Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns
Passwörter und Authentifizierung: Während dem Cybersecurity Awareness Month nimmt Milena diverse Mythen unter die Lupe und ordnet sie für dich ein. Sende dein Cybersecurity Awareness Fail an cyberheroes@infinigate.ch. Dies ist ein Podcast der Infinigate (Schweiz) AG.
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate.Resources$61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a ScamPassGAN: A Deep Learning Approach for Password GuessingHistoric UK KNP transport firm collapses after ransomware attackHacker leaks account data of 12 million Zacks Investment usersResearchers Instantly Crack Simple Passwords With AILost $45k to Wire Fraud Scam on E*TRADE – Even with MFA Enabled.Send us a textSupport the showJoin our Patreon to listen ad-free!
On this episode, Alex Hamerstone, TrustedSec's Advisory Solutions Director, joins the show for Cybersecurity Awareness Month! We go over recent trends in cybersecurity and the importance of ongoing training for employees. We also take a look at different ways to safely authenticate and authorize your users, the risks with IoT devices in your home, and the rapidly growing number of scams utilizing AI. About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.
It's been a muted start to Cyber Security Awareness Month. Many government cyber staff are furloughed under the ongoing shutdown, and key cyber information sharing authorities have lapsed, leaving cyber experts on edge for more Federal News Network's Justin Doubleday is here. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
What's new in AI models? In episode 75 of Mixture of Experts, host Tim Hwang is joined by Kaoutar El Maghraoui, Kate Soule and Kush Varshney to debrief a frenzy of model drops this week. IBM debuts Granite 4.0 hyper-efficient hybrid models, Claude Sonnet 4.5 delivers longer run times and sharper reasoning and Sora 2 takes vibe coding to the next level with vibe video production. Then, we dig into OpenAI's new feature, Buy in ChatGPT. Finally, it's Cybersecurity Awareness Month, and we are joined by special guest, Matt Kosinski, host of the Security Intelligence podcast—can you trust your AI? Tune in to Mixture of Experts to find out. 00:00 – Intro 1:17 – Meta Ads assistant, DoorDash Dot, Microsoft vibe working and Tilly AI Actor 2:23 – Granite 4.0 10:21 – Claude 4.5 17:57 – Sora 2 29:15 – Buy in ChatGPT 37: 00 – Introducing Security Intelligence The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Subscribe for AI updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 Learn more about artificial intelligence → https://www.ibm.com/think/artificial-intelligence Visit Mixture of Experts podcast page to get more AI content → https://www.ibm.com/think/podcasts/mixture-of-experts Watch the latest episode of the Security Intelligence podcast → https://www.youtube.com/watch?v=mDpUZD1ogEE&list=PLOspHqNVtKABGIbaWP1xYQHbwuXjZwqpH&index=1&t=225s
The Netflix documentary, Unknown Number: The High School Catfish, has exposed the ease with which people can anonymously target, harass, and threaten individuals online. October is Cybersecurity Awareness Month, an important time to understand the ways in which seemingly common technology can be weaponized against us. Head of Faculty at SANS Institute, Heather Barnhart, provides her expertise on digital forensics and later details her own experience with digital harassment as well. Follow Emily on Instagram: @realemilycompagno If you have a story or topic we should feature on the FOX True Crime Podcast, send us an email at: truecrimepodcast@fox.com Learn more about your ad choices. Visit podcastchoices.com/adchoices
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a celebration of Cybersecurity Awareness Month. Joe's story is on how the North Wales Police are warning cryptocurrency holders after a victim lost £2.1 million in Bitcoin to a highly targeted scam, where criminals posing as police used a fake security breach story to trick them into entering their password on a fraudulent site. Dave has two stories this week, the first one from a Reddit user being targeted by the classic "White Van Scam," where scammers tried to sell cheap projectors as high-end equipment using a fake story and forged receipt. In his second story, the FBI is warning that cybercriminals are spoofing its official IC3 website to steal personal information and scam victims, urging users to type the URL directly and avoid suspicious links or fake social media pages. Maria has the story on two U.S. senators pressing Tinder parent company Match Group to step up efforts against romance scams, demanding details on how it detects fraud and protects users from criminals exploiting trust on its platforms. Our catch of the day comes from Reddit where a user was targeted by a scammer, but cleverly was able to get them to retreat. Resources and links to stories: Police issue warning after £2.1m Bitcoin 'scam' FBI Says Threat Actors Are Spoofing its IC3 Site Someone hit me with the "White Van Scam" - in this day and age! Two US senators urge Tinder parent to act against dating scams on its apps Sister died Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Chris and Hector kick off Cybersecurity Awareness Month with big news—Hector announces the launch of his new company, SafeHill. The guys dig into continuous threat exposure management, the dangers of malicious Chrome extensions, why ransomware claims are dropping, and how free tools from CISA can strengthen defenses. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
And I Quote: Building Relationships with Insurance Agents and Small Business Owners
It's Cybersecurity Awareness Month and we invite insurance agents to listen to this episode to get their small business clients prepared.In this episode, Ashleigh Burden and Eder Ribeiro discuss the critical importance of cybersecurity and cyber insurance for small businesses. They explore common misconceptions about small business security, the impact of cyber incidents, and the necessity of having adequate cyber insurance coverage. Eder shares insights from his extensive experience in incident response and emphasizes the need for small businesses to take cybersecurity seriously. The conversation also touches on the evolving regulatory landscape and the partnership between Coterie and TransUnion to make cyber insurance more accessible for small businesses.Learn more about TransUnion: https://www.transunion.com/lp/cyberscout-explainerlinkedin.com/company/transunionLearn more about Coterie Insurance:https://coterieinsurance.com/insurance/cyber-insurance-for-small-businesses/https://coterieinsurance.com/blog/5-reasons-your-clients-need-cyber-insurance/Timeline: 00:00 - 01:54: Introductions01:54 - 04:42: The Myth of Small Business Security04:42 - 06:36: Common Cyber Attack Vectors for Small Businesses06:36 - 09:59: Impact of Cyber Incidents on Small Businesses09:59 - 12:06: Trends for Agents and Brokers in Cyber Insurance12:06 - 13:53: Regulatory Landscape for Small Businesses13:53 - 16:49: Making Cyber Insurance Accessible16:49 - 18:59: Understanding Cyber Insurance Coverage18:59 - 23:03: Key Takeaways for Cybersecurity Awareness Monthcybersecurity, cyber insurance, small business, cyber attacks, incident response, insurance agents, regulatory compliance, risk management, TransUnion, Coterie
Every October, Cybersecurity Awareness Month brings a wave of tips: update your software, enable MFA, use strong passwords. But what good is any of that if the people behind the defenses are feeling burned out?In this episode of Talos Takes, Hazel sits down with Joe Marshall for a candid, vulnerable conversation about the human cost of cybersecurity. Joe opens up about his experience during the VPNFilter campaign — months of secrecy, long hours, immense pressure, and the trauma it left behind. Hazel shares her own journey with burnout, and together they talk about how to recognise the warning signs.They close with practical steps: building a personal “incident response playbook” that includes boundaries, peer support, and self-care. Because at the end of the day, you can't patch a system if you're burned out.
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has never been greater. Our experts break down Cisco's latest initiatives, including the consolidation of certifications under the CCNA umbrella, free training and labs through Cisco U and Networking Academy, and a new video series—Security Unlocked—hosted by Kyle Winters. Plus, discover October-exclusive perks like free courses, tutorials, and a 25% discount on select premium content. Whether you're just starting your cybersecurity journey or looking to sharpen your expertise, this episode highlights the tools, training, and best practices to help you stay ahead. Resources Cybersecurity Training and Certification Giveaway: https://mkto.cisco.com/cybersecurity-giveaway-oct-2025.html?utm_campaign=csg25&utm_source=web&utm_medium=champions Upcoming Cisco Learning Network Store Sale: https://learningnetworkstore.cisco.com/specials/?src=cybrsec25_chmp Learn with Cisco Cybersecurity Awareness page: https://www.cisco.com/site/us/en/learn/training-certifications/cybersecurity-awareness.html?utm_campaign=csm25&utm_source=web&utm_medium=champions Rev Up to Recert: Security Solutions: https://u.cisco.com/paths/enhancing-cisco-security-solutions-with-data-analytics-10327?utm_campaign=revup_ss&utm_source=web&utm_medium=champions Cisco guest Kyle Winters, Technical Consulting Engineer, Cisco Cisco Champion hosts Liam Keegan, Advisor Jonathan Mahady, Principal Network Engineer, BHP David Penaloza, Assoc. Director - LAN Network Architecture, Novartis Moderator Danielle Carter, Customer Voices and Cisco Champion Program
VP of Public and Board Relations of the BBB Tom Johnson joins Bob Sirott to talk about common moving scams, being cautious when shopping online, and what to know for October’s Cybersecurity Awareness Month. He also shares details about a scam that involves calling someone back, fake recovery emails associated with your Gmail account, and […]
In this episode of Our Tech for Business podcast, we dive into the buzzword of deepfakes during Cybersecurity Awareness Month. Joined by Todd, our COO and CISO, and Nate, our Director of Cybersecurity, we explore what deepfakes are, their evolution from voice cloning to sophisticated video manipulation, and their dangerous uses, including impersonation and cyber attacks. We also discuss the impact of deepfakes on business security, ethical uses in marketing, and the importance of maintaining a human touch in an increasingly AI-driven world. Learn how to spot deepfakes, safeguard your business, and ethically incorporate AI into your operations.00:00 Introduction to Cybersecurity Awareness Month00:18 Understanding Deep Fakes: An Overview01:25 The Evolution of Deep Fake Technology02:02 Deep Fakes in the Real World: Risks and Examples02:58 Business Implications of Deep Fakes08:40 Spotting Deep Fakes: Tips and Techniques21:37 Ethical Use of AI and Deep Fakes in Business26:19 The Future of AI and Human Interaction30:10 Conclusion and Final ThoughtsReferences: https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-ushttps://www.cnbc.com/2025/07/11/how-deepfake-ai-job-applicants-are-stealing-remote-work.html
Benny Carreon, Dennis, and Bob Quandt discuss the critical importance of cybersecurity for businesses of all sizes, especially during Cybersecurity Awareness Month. They emphasize the need for strong security practices, including the use of multi-factor authentication, password managers, and awareness of scams. The discussion also covers the evolving landscape of cybersecurity threats, including the rise of AI in phishing attacks and the importance of keeping software updated to protect against vulnerabilities.Bob Quandt is an experienced security leader with over 20 years' experience. Prior to starting Bullseye Compliance in 2017, Bob was the Vice President of Information Security and Information Security Officer at Sharecare (formerly Healthways) where he led the information security function and helped build a solid security program. Prior to this role, Bob led an IT audit function and worked in security, application development, and internal audit at a Fortune 100 healthcare provider. Bob is a Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), and a member of the Middle Tennessee ISACA and ISSA organizations. Bob received his bachelors' degree from Middle Tennessee State University and served in the United States Marine Corps.Contact information:Bob Quandt- contact@bullseyecompliance.com https://www.bullseyecompliance.com/contact-us/Hosted by Benny Carreon and Dennis JacksonBenny Carreon- Velocity Technology Group- benny@velocitytechnology.group;https://velocitytechnology.group/Dennis Jackson-WorX Solution- dennisj@worxsolution.com ; www.worxsolution.com
Benny Carreon, Dennis, and Bob Quandt discuss the critical importance of cybersecurity for businesses of all sizes, especially during Cybersecurity Awareness Month. They emphasize the need for strong security practices, including the use of multi-factor authentication, password managers, and awareness of scams. The discussion also covers the evolving landscape of cybersecurity threats, including the rise of AI in phishing attacks and the importance of keeping software updated to protect against vulnerabilities.Bob Quandt is an experienced security leader with over 20 years' experience. Prior to starting Bullseye Compliance in 2017, Bob was the Vice President of Information Security and Information Security Officer at Sharecare (formerly Healthways) where he led the information security function and helped build a solid security program. Prior to this role, Bob led an IT audit function and worked in security, application development, and internal audit at a Fortune 100 healthcare provider. Bob is a Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), and a member of the Middle Tennessee ISACA and ISSA organizations. Bob received his bachelors' degree from Middle Tennessee State University and served in the United States Marine Corps.Contact information:Bob Quandt- contact@bullseyecompliance.com https://www.bullseyecompliance.com/contact-us/Hosted by Benny Carreon and Dennis JacksonBenny Carreon- Velocity Technology Group- benny@velocitytechnology.group;https://velocitytechnology.group/Dennis Jackson-WorX Solution- dennisj@worxsolution.com ; www.worxsolution.com
