POPULARITY
summaryIn this episode of No Password Required, host Jack Clabby and guest Trevor Hillegas discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.takeawaysTrevor emphasizes the importance of metaphors in understanding cybersecurity.The public often fears sophisticated threats while ignoring more common dangers.Leadership in cybersecurity should focus on empowering teams rather than micromanaging.A proactive approach in cybersecurity can prevent victimization before it occurs.Technical leaders should understand core concepts to effectively guide their teams.Misconceptions about cyber criminals often stem from Hollywood portrayals.The military experience can significantly shape leadership styles in tech.Daily life in cybersecurity involves constant learning and adaptation.Sophistication in cyber threats does not always correlate with success.Cybersecurity is about both fighting threats and fortifying defenses. Memorable interactions can lead to impactful collaborations in cybersecurity.Sharing knowledge can help mitigate cyber threats effectively.Personal preferences can reveal a lot about an individual's character.Walk-up songs can reflect one's personality and professional identity.Breakfast choices can be a blend of cultural influences and personal tastes.Building a team for an escape room requires diverse skills and personalities.Nerd culture can foster connections and shared interests among individuals.Prank calls can be a humorous way to engage with public figures.Culinary competitions highlight the absurdity of turning survival into entertainment.Networking in cybersecurity can lead to unexpected opportunities.titlesCybersecurity Connections: Memorable MomentsThe Lifestyle Polygraph: Fun and InsightsWalk-Up Songs: A Reflection of IdentityBreakfast Favorites: A Culinary JourneySound Bites"Tell them what needs to get done.""Empower your people to fail.""We can stop that identity theft.""I was in Europe giving a talk.""I sent him everything that we had.""I would get Jack Sparrow.""I love Star Wars.""I would call Gordon Ramsey."Chapters00:00 Introduction to Cybersecurity Insights02:54 Career Path and Unexpected Experiences05:55 Transitioning from Military to Cybersecurity09:07 Daily Life at Spy Cloud12:12 Leadership Philosophy and Management Style14:53 The Nature of Cyber Threats17:50 Technical Skills in Leadership20:52 Misconceptions About Cyber Criminals25:32 Memorable Cybersecurity Interactions28:12 Lifestyle Polygraph Introduction28:35 Walk-Up Songs and Personal Preferences32:07 Breakfast Favorites and Culinary Influences34:40 Building the Ultimate Escape Room Team37:36 Nerd Culture and Personal Interests39:02 Prank Calls and Culinary Competitions41:20 Closing Thoughts and Contact Information
Overview: In this episode of the SMB Community Podcast, hosts James and Amy are back to discuss a range of topics relevant to IT professionals. They start with a question about leadership for entry-level tech employees, emphasizing that leadership can be demonstrated at any level. The conversation then shifts to cybersecurity, highlighting an insurance industry report that identifies firewalls, VPNs, and RDP as common entry points for ransomware attacks. Amy suggests moving away from traditional perimeter security in favor of cloud solutions. The hosts also touch on the significance of AI tools in marketing, legacy planning, and training. They discuss the looming impact of AI on data centers and speculate that current high-power usage may be short-lived due to technological advancements. The episode wraps up with light-hearted personal anecdotes, including plans for launching their boats for the season. --- Chapter Markers: 00:00 Introduction and Welcome 01:40 MSP Question of the Week: Leadership as a Level One Tech 07:04 Ransomware and Cybersecurity Insights 11:26 23andMe Bankruptcy and Data Privacy Concerns 15:27 AI Innovations and Industry Trends 22:18 Upcoming Events and Personal Updates 23:54 Conclusion and Farewell --- New Book Release: I'm proud to announce the release of my new book, The Anthology of Cybersecurity Experts! This collection brings together 15 of the nation's top minds in cybersecurity, sharing real-world solutions to combat today's most pressing threats. Whether you're an MSP, IT leader, or simply passionate about protecting your data, this book is packed with expert advice to help you stay secure and ahead of the curve. Available now on Amazon! https://a.co/d/f2NKASI --- Sponsor Memo: Since 2006, Kernan Consulting has been through over 30 transactions in mergers & acquisitions - and just this past year, we have been involved in six (6). If you are interested in either buying, selling, or valuation information, please reach out. There is alot of activity and you can be a part of it. For more information, reach out at kernanconsulting.com
Send us a textIn this high-energy conversation, Joey Pinz chats with Joshua Liberman, a cybersecurity expert, adventurer, and polyglot with a fascinating life story. From hitchhiking across Africa and Asia to mastering martial arts and leading in cybersecurity, Joshua shares how resilience, adaptability, and quick decision-making have shaped his success.
Send us a textIn this dynamic conversation, Joey Pinz sits down with Corey Kirkendoll, a seasoned MSP leader, entrepreneur, and community builder. From his love of BBQ and coaching to leading a thriving MSP, Corey shares how passion, perseverance, and preparation are key to success.
Send us a textIn this action-packed episode, Joey Pinz sits down with Dan Gribble, an expert in MSP sales and cybersecurity, to explore how businesses can accelerate growth and stay ahead of cyber threats. Dan shares his experience in coaching basketball and how discipline, strategy, and execution apply both on the court and in business.
In this episode, host Steve Plumb speaks with Howard Grimes, CEO of CyManII, about the critical importance of cybersecurity in the manufacturing sector. They discuss the evolving landscape of cyber threats, the innovative approaches CyManII is taking to address these challenges, and the importance of workforce development in enhancing cybersecurity measures.
keywordscybersecurity, zero trust, public speaking, ThreatLocker, AI threats, layered security, Rob Allen, cybersecurity insights, personal growth, industry challenges, technology, wearables, Buc-ee's, sports, DIY, tech addiction, Vision Pro, personal achievements, American culture, cybersecuritysummaryIn this episode of the No Password Required podcast, host Jack Klabby engages with cybersecurity experts Kaylee Melton and Rob Allen, discussing Rob's journey to ThreatLocker, the importance of overcoming public speaking fears, and the principles of Zero Trust security. They explore common mistakes organizations make when implementing Zero Trust, the future of cybersecurity in relation to AI threats, and the public's perception of cybersecurity incidents. The conversation also touches on the significance of layered security approaches and personal experiences in the industry, culminating in a fun lifestyle polygraph segment. In this engaging conversation, the speakers delve into their personal tech addictions, particularly focusing on extravagant purchases like the Vision Pro. They explore the future of wearable technology and its integration into daily life. The discussion shifts to the uniquely American experience of visiting Buc-ee's, a gas station that offers much more than fuel. They also debate the joy derived from sports victories versus personal achievements like hitting a hole in one. Finally, the conversation wraps up with a humorous take on the challenges of mastering DIY skills.takeawaysRob Allen's journey from engineer to Chief Product Officer at ThreatLocker showcases career growth in cybersecurity.Public speaking can be daunting, but practice and experience help overcome fears.Zero Trust is a mindset focused on security, not just a product to buy.Organizations often hesitate to adopt Zero Trust due to misconceptions about efficiency.Inertia is a major obstacle for companies considering Zero Trust implementation.AI can be a double-edged sword in cybersecurity, used for both protection and attacks.Many smaller cybersecurity incidents go unreported compared to major breaches.Layered security should involve diverse approaches, not just similar detection tools.Stress in the workplace can be managed by adopting a laid-back mindset.Mentorship plays a crucial role in personal and professional development. Some people have good addictions and some have bad ones.The Vision Pro is an expensive but amazing piece of tech.Wearable technology is becoming increasingly common.Buc-ee's is a unique and quintessentially American experience.Experiencing a sports win can be as joyful as personal achievements.DIY skills can be both challenging and rewarding.Tech purchases often lead to guilt and reflection.The future of wearables may include more practical and stylish designs.Personal experiences shape our views on technology and culture.Mastering DIY can lead to greater independence and satisfaction.titlesTech Addictions: The Price of InnovationThe Future of Wearables: Are We Ready?Buc-ee's: A Journey into American CultureSports Wins vs. Personal Achievements: What Brings More Joy?Sound Bites"It's a process, you know, start somewhere.""Deny by default, permit by exception.""Zero Trust is not a product. It's a mindset.""The beauty of Zero Trust is it's not reactive.""AI is just as likely to be used against you.""I am never going to be that guy.""Buc-ee's is the most American thing ever.""I would very much like to have a hole in one.""I would like to be good at DIY."Chapters00:00 Introduction to Cybersecurity Insights03:05 Rob Allen's Journey to ThreatLocker05:49 Overcoming Public Speaking Fears08:55 Understanding Zero Trust Security12:12 Common Mistakes in Zero Trust Implementation15:02 The Future of Zero Trust and AI Threats18:05 Public Perception of Cybersecurity21:08 Layered Security Approaches24:02 Personal Experiences and Lessons Learned26:58 Lifestyle Polygraph and Fun Questions27:11 Tech Addictions and Unnecessary Purchases32:05 The Future of Wearable Technology34:08 Experiencing Buc-ee's: The Most American Gas Station36:44 Joyful Moments: Sports Wins vs. Personal Achievements39:03 Mastering DIY Skills: A Personal Journey
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity. He introduces his new platform, Just Hacking Training, aimed at providing affordable, high-quality training. John also discusses current trends in cybercrime, the role […] The post Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher appeared first on Shared Security Podcast.
The Deep Wealth Podcast - Extracting Your Business And Personal Deep Wealth
Send us a textUnlock Proven Strategies for a Lucrative Business Exit—Subscribe to The Deep Wealth Podcast Today
Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton's global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their insights on using big data to enhance security, the role of AI in addressing threats, and practical tips for staying ahead of the ever-changing tech landscape in 2025. We'll cover: The surprising risks behind popular browser extensions like Honey Lessons from Proton's global outage and the importance of preparation How cybercriminals use voice phishing to exploit tech giants Practical steps to improve organizational security and educate users Balancing security and accessibility in modern systems From practical advice to thought-provoking insights, this episode delivers actionable takeaways for anyone navigating today's tech landscape. #Cybersecurity #TechNews #DataPrivacy #RiskManagement #DigitalSafety
For the first episode of 2025, co-hosts Ted Stank and Tom Goldsby spoke with UT Knoxville experts Huseyn Abdulla and Seongkyoon Jeong about their research in the areas of returns management and supply chain cybersecurity. Assistant professors and esteemed scholars in their disciplines, Abdulla and Jeong's insights are a deep dive into the challenges and innovations shaping supply chain management. Among other points, Abdulla explains how retailers balance the growing demand for customer-friendly return policies with environmental and financial sustainability, while Jeong discusses the rising risk of cyberattacks in an increasingly data-driven world. Listen in as our hosts also delve into consumer sentiment, holiday spending, the trade implications of the new Trump administration, collaborations between Hyundai and Amazon, and much more. The episode was recorded virtually on January 17, 2025. Related links: U.S. shoppers set record for holiday spending in 2024 Logistics industry growth slowed in December, per Logistics Managers Index report Trump orders trade review ahead of potential tariffs on Canada, Mexico, and China Hyundai begins selling vehicles on Amazon Autos U.S. consumers ‘resilient and strong' in face of high prices and interest rates Read Huseyn Abdulla's article in The Conversation about consumer backlash when retailers change their return policies, and his study published in the Journal of Operations Management Read Seongkyoon Jeong's blogs on cybersecurity risks and three types of cyberattacks affecting supply chains Register for SCM Academies in Leadership, Finance, and Planning Read our latest white paper, “Unlocking the Potential of the Gen XYZ Labor Force” Register for the Supply Chain Forum, April 8–10 in Knoxville Subscribe to GSCI's monthly newsletter Read the latest news and insights from GSCIText the Tennessee on Supply Chain Management team!
How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role. In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025's fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential. Impactful Moments: 00:00 - Introduction 02:14 - Speed vs. safety: AI system challenges 05:30 - Why experience matters more than information 07:45 - Legal stakes for deepfakes and AI 18:36 - Marco's creative journey in cybersecurity 28:00 - Jailbreaks: Risks and surprising AI findings 37:13 - 2025 predictions: The rise of agents 41:00 - Closing thoughts and the power of community Links: Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/ Chuck Brooks' 2025 Cybersecurity Predictions article: https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/ Focus Areas for the FaccT Conference News: https://facctconference.org/2025/focusareas “Unreasonable Hospitality” by Will Guidara Book Link: https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573 Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
In this episode of Tech & Main Presents, we sit down with Vinicius Perallis, a trailblazer in the world of cybersecurity and the CEO of Hacker Rangers. Vinicius has pioneered the use of gamification to instill robust cybersecurity practices within businesses, having trained over 500 companies across Brazil and worldwide. His unique approach combines innovation, passion, and extensive experience from his time at IBM and other leading tech firms. Join us as Vinicius shares: His journey: From his early days in technology to founding Hacker Rangers. The excitement of daily work: What fuels his passion and keeps him inspired. Cybersecurity awareness for business leaders: Practical advice for fostering a security-first mindset within organizations. Career guidance for aspiring cybersecurity professionals: Tips for young people looking to break into the field. Personal insights: Fun answers about his favorite musician, hobby, vacation spot, and the teacher who shaped his path. Life lessons: The advice he'd give his 18-year-old self. If you're interested in the intersection of cybersecurity, education, and gamification—or simply want to hear from a visionary in the field—this episode is a must-listen. Connect with Vinicius Perallis: LinkedIn: https://www.linkedin.com/in/vperallis Website: https://hackerrangers.com
Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 120: ResetCon and the Future of Cybersecurity: Insights from Jay WarrenPub date: 2024-12-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Warren, co-founder of ResetCon, to discuss the intersection of cybersecurity research, critical infrastructure, and collaborative defense strategies. Recorded live at Hack the Capitol 7.0, this conversation highlights the pressing need to close gaps between academia, offensive researchers, and critical industries.Jay delves into the mission of ResetCon, an inaugural conference designed to connect academic researchers, defense experts, and key players from the civilian and commercial sectors. Together, they aim to anticipate emerging threats, mitigate risks, and reduce recovery times for critical systems. The discussion also explores the challenges of integrating IT and OT security teams, the importance of "cyber-informed engineering," and the need for secure-by-design principles.Listeners will gain insights into the future of cybersecurity, including lessons learned from DARPA research, the importance of bridging silos, and how to build more resilient systems. Don't miss this episode if you're passionate about protecting critical infrastructure and fostering innovation.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
In this episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Warren, co-founder of ResetCon, to discuss the intersection of cybersecurity research, critical infrastructure, and collaborative defense strategies. Recorded live at Hack the Capitol 7.0, this conversation highlights the pressing need to close gaps between academia, offensive researchers, and critical industries.Jay delves into the mission of ResetCon, an inaugural conference designed to connect academic researchers, defense experts, and key players from the civilian and commercial sectors. Together, they aim to anticipate emerging threats, mitigate risks, and reduce recovery times for critical systems. The discussion also explores the challenges of integrating IT and OT security teams, the importance of "cyber-informed engineering," and the need for secure-by-design principles.Listeners will gain insights into the future of cybersecurity, including lessons learned from DARPA research, the importance of bridging silos, and how to build more resilient systems. Don't miss this episode if you're passionate about protecting critical infrastructure and fostering innovation.
Dave Sobel engages in a thought-provoking conversation with Jon Murchison, CEO of BlackPoint Cyber, about the current state of cybersecurity policies and practices. They discuss the initiatives surrounding "secure by design" and "secure by default," emphasizing the challenges faced by managed IT service providers in implementing these ideals. Jon expresses skepticism about the immediate impact of these policies on the ground level, noting that while they are well-intentioned, they often fall short of practical application in real-world scenarios.The discussion shifts to the dynamics of responsibility and liability within the cybersecurity landscape. Jon highlights the disparity between software vendors and service providers regarding accountability when security breaches occur. He argues that while security providers should be held liable for secure code design and regular penetration testing, the complexities of cybersecurity make it difficult to assign blame definitively. This nuanced perspective underscores the need for a balanced approach to liability that encourages innovation without stifling progress.As the conversation progresses, Jon shares his insights on the Cybersecurity Maturity Model Certification (CMMC) and its potential as a broader standard. He acknowledges the foundational value of existing frameworks like NIST and ISO but critiques their lack of practical guidance for organizations. Jon advocates for a more prescriptive approach that focuses on actionable steps for hardening security measures, rather than vague compliance requirements that can lead to checkbox exercises.Finally, Jon emphasizes the critical importance of identity management in cybersecurity. He explains how threat actors have evolved their tactics, often exploiting legitimate credentials to navigate networks undetected. The episode concludes with Jon discussing the future of posture management and the need for improved security measures around automation, highlighting the ongoing challenges and opportunities in the ever-evolving cybersecurity landscape. Supported by: https://www.coreview.com/msp/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Podcast: Industrial Cybersecurity InsiderEpisode: OT Cybersecurity Insights with Lauren Blocker, Rockwell AutomationPub date: 2024-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this week's episode, Lauren Blocker of Rockwell Automation, shares insights on the evolving landscape of industrial cybersecurity. From overcoming the challenges of legacy systems to building standards-based security frameworks, Lauren highlights strategies to elevate cybersecurity in manufacturing and beyond. She emphasizes the importance of aligning IT and OT perspectives, addressing obsolescence risks, and fostering proactive approaches to safeguard critical infrastructure. Tune in to learn how to bridge the gap between compliance and holistic security while navigating the complexities of the industrial cybersecurity journey.Chapters:00:00:00 - The Role of Cybersecurity Insurance in Industrial Cybersecurity00:00:54 - Introducing Lauren Blocker: Insights from a Leader in OT Security00:01:20 - Connecting Industries: Early Career and Digital Transformation Evolution00:02:59 - Transitioning to Cybersecurity: Lessons Learned and Industry Shifts00:05:48 - Cybersecurity in Industrial Automation: Tackling Legacy Systems and Emerging Risks00:08:28 - Overcoming OT Cybersecurity Challenges with Proactive Strategies00:12:02 - What It Means to Build Cyber-Ready Machines and Systems00:14:27 - Crafting Standards-Based Security Frameworks for Long-Term Success00:28:08 - Rockwell Automation's Approach to Cybersecurity and Industry Leadership00:30:07 - Final Insights: Aligning IT and OT for Holistic SecurityLinks And Resources:Lauren Blocker on LinkedInDino Busalachi on LinkedInJim Cook on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Velta Technology, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Join us as we explore the major cybersecurity and IAM trends to keep an eye on in 2025. We’ll discuss the emergence of non-human identities, the hurdles of quantum-safe encryption, and the practical applications of AI and decentralized identity. Get ready to learn how these trends will influence the industry and how you can stay ahead of the curve.
Send us a textIn this eye-opening episode, Joey Pinz and cybersecurity expert Martin Zugec delve deep into the ransomware ecosystem, exploring the cultural and economic factors driving cybercrime. Martin shares his unique insights on how motivations vary globally, with financial gain and resentment fueling much of the activity in Eastern Europe and Russia.
Send us a textIn this episode, Joey Pinz talks with Ben Hathaway, who shares insights on the launch of Shield, an innovative email security solution employing a Zero Trust framework. Ben emphasizes the critical role of email as a primary attack vector, with about 90% of cyberattacks originating through this channel. Shield aims to secure email communications proactively, preventing threats at the frontline and reducing the need for excessive post-attack measures. Ben likens Shield to “noise-canceling headphones” for email, balancing security without disrupting communication.
Welcome to the weekend edition of Cybersecurity Today! Join host Jim Love as he delves into the top cybersecurity stories of the month with industry experts David Shipley of Beauceron Security, Terry Cutler of Cyology Labs, and special guest Kim Schreader from TELUS. This episode covers a range of vital topics, including AI's impact on cybersecurity, the alarming rise in API vulnerabilities, and a shocking report on the Canadian Revenue Agency's fraud losses. The panel also discusses cybersecurity awareness, the overlooked importance of protecting our libraries, and innovative ways to educate the next generation on cybersecurity. Don't miss their insights, expert opinions, and the debut of the cyber stinky award! 00:00 Introduction and Panelist Welcome 00:39 Kim Schreader's Background and Cybersecurity Insights 01:44 Cybersecurity Awareness Month Highlights 02:11 Phishing Milestones and Challenges 03:34 Home Cybersecurity and Public Engagement 04:59 SecTor Event and Cyber Insurance Study 06:10 Sextortion Emails and Ransomware Threats 07:30 Revenue Canada Fraud Scandal 14:31 Legacy Systems and Cybersecurity Accountability 17:55 AI in Cybersecurity: Threats and Opportunities 26:43 Medical Imaging Vulnerabilities 27:35 IoT Device Security Concerns 29:25 API Vulnerabilities and Exploits 31:45 Importance of Pen Testing 39:41 AI and Prompt Injection Risks 46:58 Education and Cybersecurity Awareness 52:23 Library Cyber Attacks and Conclusion
AI fortifies cybersecurity but it also strengthens cyberthreats. How can your company tackle this double-edged dilemma? We're asking our guest, Rob Lee, Chief of Research at the SANS Institute, the go-to leader in cybersecurity training.With more than 20 years of experience in digital forensics and incident response, Rob is dubbed “The Godfather of DFIR.” He's also the co-author of the must-read book, Know Your Enemy.Get ready to learn about …
Guest: Ian Thorton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesOn LinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine
Description: In this episode of FreightWaves Now Community Spotlight, Kaylee Nix chats with Grace Sharkey about the growing threat of cybersecurity attacks in the supply chain industry. Key takeaways: Cyber threats are on the rise and affecting a wide range of businesses, including logistics firms Phishing attacks remain a major concern, with over 35% of email threats coming through this method Investing in cybersecurity measures is crucial, including training employees and implementing strong security systems Collaboration and reporting of incidents are essential for addressing the issue Want to learn more? Subscribe to the The Stockout newsletter for the latest updates on supply chain news and trends https://www.freightwaves.com/thestockout
Explore critical findings from CPA Australia's 2024 small business survey, focusing on cyber security challenges and best practices. Join our expert cybersecurity guest, who provides insights on common mistakes, the impact of AI on security, balancing cyber security with technology initiatives, strategies for resource-constrained SMEs and emerging threats. Learn actionable takeaways and practical advice that you can implement right away. Whether you're a small business owner or an IT professional, this episode aims to empower you with the knowledge and tools to safeguard your business against cyber threats. Host: Gavan Ord, Business investment and international lead, CPA Australia Guest: Tyler Wise, director of Cyberwise, a forensic accounting and digital forensics specialist For more information, head to CPA Australia's Centre of Excellence Digital Transformation page. CPA Australia has tools and resources on cybersecurity as well as tips on the My Firm My Future page. Click these links for Tyler's company Cyberwise and for the Essential Eight mitigation strategies organisations are recommended to implement. And you can find a CPA at our custom portal on the CPA Australia website. Would you like to listen to more With Interest episodes? Head to CPA Australia's YouTube channel. CPA Australia publishes four podcasts, providing commentary and thought leadership across business, finance, and accounting: With Interest INTHEBLACK INTHEBLACK Out Loud Excel Tips Search for them in your podcast platform. You can email the podcast team at podcasts@cpaaustralia.com.au
Guest: Donna Kidwell, CISO of Arizona State UniversityOn LinkedIn | https://www.linkedin.com/in/dkidwellHost: Matthew RosenquistOn ITSPmagazine
Tell us what you think!Ever wondered what it's like to grow up in a small town nestled near Yellowstone Park and then transition into the high-tech realm of Portland, Oregon? Join us as we share a delightful episode with our guest from Cody, Wyoming, who kicks off his appearance with tales of childhood mischief, animal encounters, and the enduring spirit of small-town life. Listen to heartwarming stories of hunting, fishing, and the unforgettable scent of a skunk, all while savoring the thought of freshly baked chocolate Nutella sourdough bread. These anecdotes bring to life the essence of freedom and adventure that defined his early years.Shifting gears, our conversation takes us into the wild frontier of business ventures and career transformations. From psychology to business studies, and climbing the corporate ladder at Intel, our guest provides insights into the relentless grind of building a nationwide business from scratch. We explore the evolution of video communication technologies, the rise and fall of industry giants, and the burgeoning field of cybersecurity. This episode offers a candid look at the highs and lows of entrepreneurial life, punctuated by personal growth through adversity, financial struggles, and the resilience required to bounce back from bankruptcy.As we navigate the complex world of cryptocurrency and cybersecurity, our guest's stories emphasize the importance of perseverance and adaptability. From the anxieties of the digital age to the unique challenges of introducing children to technology, every narrative underscores the essence of strong family relationships and critical thinking. Whether you're intrigued by the uncertainties of the future, or inspired by the extraordinary stories of everyday people, this episode promises a rich tapestry of insights and experiences that will leave you pondering the incredible resilience of the human spirit.Follow Wild Chaos on Social Media: Instagram: https://www.instagram.com/wildchaosshowYoutube: https://youtube.com/@wildchaos2308?si=8aj6bb-GgcsMhJw7TikTok: https://www.tiktok.com/@wildchaospodX (Twitter): https://twitter.com/thewildchaosMeta (Facebook): https://www.facebook.com/wildchaos/LinkedIn: http://linkedin.com/wildchaos
In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Romain Basset dive into the top spear phishing methods used in both the enterprise space and across all businesses, based on internal research conducted by Hornetsecurity. The conversation covers spear phishing techniques, including initial contact, tax/W2, C-suite/CEO, lawyer, banking, and gift card fraud. They analyze the differences in the prevalence of these methods between enterprises and smaller businesses and provide insights on how organizations can combat these threats through training and robust processes. Do you want to join the conversation? Join us in our Security Lab LinkedIn Group! Key Takeaways: Spear phishing attacks have evolved from obvious wire transfer requests to more subtle techniques like initial contact fraud, where threat actors establish a relationship to build credibility. Tax fraud and W-2 phishing remain prevalent, especially around tax season, as attackers try to obtain personal information like Social Security numbers. C-suite fraud, where attackers impersonate executives, continues to be a major threat, highlighting the importance of robust processes to verify requests. Lawyer fraud, targeting enterprises more than smaller businesses, leverages the credibility of legal communications to extort money or gather information. Gift card fraud has emerged as the top spear phishing attack across enterprises and smaller businesses, as it is less likely to raise red flags than larger financial transactions. Adaptability and creativity of threat actors are key factors, as they continuously evolve their techniques to bypass security measures and user awareness. Timestamps: (03:26) Discussion on initial contact fraud (07:12) Exploration of tax fraud and W-2 phishing (13:35) Examination of C-suite fraud and the importance of processes (19:25) Lawyer Fraud and Enterprise vs. SMB Differences (23:47) Banking Fraud and Processes (26:39) Gift Card Fraud Episode Resources: Security Lab LinkedIn Group What is a Spear Phishing attack? The Top 5 Spear Phishing Examples and Their Psychological Triggers -- Hornetsecurity's Phishing Simulation, as part of its Security Awareness Service, is invaluable for organizations looking to protect themselves from the evolving spear phishing threats discussed in this episode. This solution provides realistic phishing simulations and comprehensive security awareness training, enabling employees to recognize and respond effectively to spear phishing attempts. By fostering a culture of security awareness, SAS is crucial for businesses aiming to strengthen their overall security posture and mitigate the risk of successful phishing attacks.
Guest: Lisa Forte, Partner at Red Goat Security, Cybersecurity Crisis TrainerOn LinkedIn | https://www.linkedin.com/in/lisa-forte/Host: Matthew RosenquistOn ITSPmagazine
Matt Hince brings over 20 years of leadership experience from his time in the Air Force, specializing in cyber mission teams. As a training supervisor, he has played a pivotal role in developing the next generation of cyber professionals. Recognized for his expertise in leading red team drills and conducting tabletop exercises, Matt has provided crucial real-world simulations to enhance cybersecurity readiness. He holds a Bachelor's degree in Russian and French from Texas A&M University, as well as a Master's degree in Military Operational Art & Science from Air University. To get in touch with Matt, reach out to him on this website: https://www.psyoptik.com/ Keeping it Real Estate is brought to you by Granite Towers Equity Group, helping investors create passive income through multifamily real estate. To get in touch with the founders of Granite Towers, Mike Roeder and Dan Brisse, visit https://www.granitetowersequitygroup.com/contact
Guest: Justin Daniels, M&A and Tech Transactions Attorney, Baker DonelsonOn LinkedIn | https://www.linkedin.com/in/justinsdaniels/Host: Matthew RosenquistOn ITSPmagazine
In this episode of the Identity at the Center podcast, host Jim McDonald welcomes Deneen DeFiore, Chief Information Security Officer at United Airlines. The episode delves into Deneen's career path in identity, her extensive experience at General Electric, and the evolution of identity and access management practices. The conversation transitions to her current role at United Airlines, highlighting her approach to integrating customer identity with enhanced trust and personalized experiences. The discussion also touches on building high-performing teams, the importance of professional development through conferences and certifications, and the balance between business and technical leadership. They conclude with some lighter notes on Cincinnati landmarks and local traditions. 00:00 Introduction and Housekeeping 01:16 Guest Introduction: Deneen DeFiori 01:37 Deneen's Identity Origin Story 04:11 Innovative Projects at GE 07:50 United Airlines and Customer Identity 12:35 Building a Winning Team 16:27 Professional Development and Certifications 19:58 Balancing Business and Technology 37:20 Future of Identity and Biometrics 40:01 Cincinnati Hallmarks and Farewell Connect with Deneen: https://www.linkedin.com/in/deneendefiore/ Attending Identity Week in America or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: http://terrapinn.com/IDWUS/Part-IDAC Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ Hybrid Identity Protection Conference (HIP Conf) - Use code IDACpod for 20% off: https://register.hipconf.com/W7eVML Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
Guest: Cassie Crossley, VP of Supply Chain Security at Schneider Electric and AuthorOn LinkedIn | https://www.linkedin.com/in/cassiecrossley/Host: Matthew RosenquistOn ITSPmagazine
Guest: Malcolm Harkins, Chief Security and Trust officer at HiddenLayer, former CISO at Intel, and fellow at the Institute for Critical Infrastructure Technology (ICIT)On LinkedIn | https://www.linkedin.com/in/malcolmharkins/Host: Matthew RosenquistOn ITSPmagazine
What's it like being at the helm of a security operation that safeguards thousands of businesses worldwide, with new cyber threats emerging every single day? In this episode, host Heather Haskin meets with Raja Patel, Chief Product Officer at Sophos, to uncover the strategies that keep one of the world's leading cybersecurity companies ahead in an ever-evolving digital landscape. As cyber threats become more sophisticated and relentless, Patel shares his unique approach to building resilient security solutions that not only anticipate future challenges but also empower teams to think creatively and collaboratively. Discover how Sophos is pushing the boundaries of cybersecurity by blending innovation, strategic foresight, and a people-first mindset to protect organizations worldwide. Featuring: Raja Patel, Chief Product Officer, Sophos The Catalyst by Softchoice is the podcast dedicated to exploring the intersection of humans and technology.
Guest: Christine Bejerasco, CISO of WithSecureOn LinkedIn | https://www.linkedin.com/in/christinebejerasco/Host: Matthew RosenquistOn ITSPmagazine
In this episode of CISO Tradecraft, host G Mark Hardy is joined by special guest Snehal Antani, co-founder of Horizon3.AI, to discuss the crucial interplay between offensive and defensive cybersecurity tactics. They explore the technical aspects of how observing attacker behavior can enhance defensive strategies, why traditional point-in-time pen testing may be insufficient, and how autonomous pen testing can offer continuous, scalable solutions. The conversation delves into Snehal's extensive experience, the importance of readiness over compliance, and the future of cybersecurity tools designed with humans out of the loop. Tune in to learn how to elevate your cybersecurity posture in a rapidly evolving threat landscape. Horizon3 - https://www.horizon3.ai Snehal Antani - https://www.linkedin.com/in/snehalantani/ Transcripts: https://docs.google.com/document/d/1IFSQ8Uoca3I7TLqNHMkvm2X-RHk8SWpo Chapters: 00:00 Introduction and Guest Welcome 01:43 Background and Experience of Snehal Antani 03:09 Challenges and Limitations of Traditional Pen Testing 14:47 The Future of Pen Testing: Autonomous Systems 23:10 Leveraging Data for Cybersecurity Insights 24:02 Expanding the Attack Surface: Cloud and Supply Chain 24:46 Third-Party Risk Management Evolution 44:37 Future of Cyber Warfare: Algorithms vs. Humans
Financial Freedom for Physicians with Dr. Christopher H. Loo, MD-PhD
Description: In this episode, we dive deep into the intersection of AI and cybersecurity with Benjamin Bohman, Chief Technology Officer of Stratishield AI. Benjamin shares his 25+ years of experience in the tech sector, exploring how AI is transforming cybersecurity through behavioral analytics and the challenges small to medium-sized enterprises face when integrating AI into their operations. We discuss the importance of AI readiness, the potential of blockchain in healthcare, and the evolving landscape of AI technology. Tune in to learn practical strategies for safeguarding your business in an increasingly AI-driven world. Disclaimer: Not advice. Educational purposes only. Not an endorsement for or against. Results not vetted. Views of the guests do not represent those of the host or show. Do your due diligence. Click here to join PodMatch (the "AirBNB" of Podcasting): https://www.joinpodmatch.com/drchrisloomdphd We couldn't do it without the support of our listeners. To help support the show: CashApp- https://cash.app/$drchrisloomdphd Venmo- https://account.venmo.com/u/Chris-Loo-4 Spotify- https://podcasters.spotify.com/pod/show/christopher-loo/support Buy Me a Coffee- https://www.buymeacoffee.com/chrisJx Click here to schedule a 1-on-1 private coaching call: https://www.drchrisloomdphd.com/book-online Click here to purchase my books on Amazon: https://amzn.to/2PaQn4p Follow our YouTube channel: https://www.youtube.com/chL1357 Follow us on Twitter: https://www.twitter.com/drchrisloomdphd Follow us on Instagram: https://www.instagram.com/thereal_drchrisloo Follow us on Threads: https://www.threads.net/@thereal_drchrisloo Follow us on TikTok: https://www.tiktok.com/@drchrisloomddphd Follow our Blog: https://www.drchrisloomdphd.com/blog Follow the podcast on Spotify: https://open.spotify.com/show/3NkM6US7cjsiAYTBjWGdx6?si=1da9d0a17be14d18 Subscribe to our Substack newsletter: https://substack.com/@drchrisloomdphd1 Subscribe to our Medium newsletter: https://medium.com/@drchrisloomdphd Subscribe to our email newsletter: https://financial-freedom-for-physicians.ck.page/b4622e816d Subscribe to our LinkedIn newsletter: https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=6992935013231071233 Thank you to our advertisers on Spotify. Financial Freedom for Physicians, Copyright 2024 --- Support this podcast: https://podcasters.spotify.com/pod/show/christopher-loo/support
Guest: Ian Thornton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesLinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine
Send us a Text Message.Podcast Episode with Nick Scozzaro: Securing the Future of MSPs
Send us a Text Message.Join Joey Pinz as he sits down with cybersecurity expert Matt Lee to dive deep into the world of cybersecurity and managed service providers (MSPs). In this insightful conversation, Matt shares his mission-driven approach, lessons learned from significant cyber incidents, and practical advice for MSPs. Discover how security and operations are intertwined and why basic cybersecurity hygiene is crucial for every organization. Top 3 Highlights:Mission-Focused Approach: Matt emphasizes the importance of understanding your highest and best use (HABU) and how training others can multiply your impact.Lessons from Ransomware: Hear the compelling story of how a ransomware attack on an acquired MSP reshaped Matt's perspective on security and operations.Practical Security Tips: Learn actionable tips for MSPs to enhance their cybersecurity posture, from implementing MFA to following established security frameworks.
Summary In this episode of Chattinn Cyber, Mark Schein chats with John Morrissey, Cryptocurrency Operating Compliance Director for Arete, focusing on various aspects of the cryptocurrency industry and the challenges associated with ransomware attacks. John explains how he ended up in his current role, combining his cybersecurity background with his passion for trading and investing. He discusses the volatility of the cryptocurrency market and the impact it has on ransom demands. He also highlights the increasing scrutiny and compliance requirements imposed by organizations like OFAC when it comes to making ransom payments. John emphasizes the importance of taking cybersecurity seriously and investing in the right tools and processes to protect organizations from cyber threats. John shares his journey of how he becomes the Cryptocurrency Operating Compliance Director for Arete. He mentions that he met Joe Mann, the founder of Arete, while working in the Virginia DC area. John became Arete's first client when he ran a DFIR (Digital Forensics and Incident Response) services organization. With his background in cybersecurity and his passion for trading and investing, John found a perfect fit in his current role, where he manages crypto relationships and helps clients navigate the complexities of the market. The conversation then shifts to the concept of crypto puzzles and the volatility of the cryptocurrency market. John explains that crypto is the most volatile asset in the world, and its value can fluctuate significantly in response to market conditions. He gives an example of how Bitcoin's value dropped from $69,000 to $16,000 during a market crash. John highlights the challenges of working with a new industry that lacks regulation and dealing with assets that are highly volatile. He emphasizes the need to understand how all these factors fit together. The discussion then turns to ransomware attacks and the changing demands of adversaries. John mentions that during previous market crashes, ransom demands were often made in Bitcoin. However, after the crash, there has been a shift towards demanding cash instead of Bitcoin. He notes that the ransoms are increasing year over year, with some groups demanding even higher amounts. John also mentions the increasing scrutiny and compliance requirements imposed by organizations like OFAC (Office of Foreign Assets Control) when it comes to making ransom payments. He explains the steps Arete takes to ensure compliance, including analyzing threat actor wallets, conducting blockchain analysis, and verifying the absence of sanctions. Mark asks John how Arete can help in situations involving ransomware attacks. John explains that Arete is a full-service organization specializing in digital forensics and incident response (DFIR). They offer assistance from the moment a hack is discovered, providing a 24/7 phone number and email for immediate response. Arete's team helps clients through the entire process, from triage to recovery, and even offers guidance on planning and prevention. If necessary, Arete can also assist with the process of making ransom payments. In conclusion, the conversation between Mark Schein and John covers various aspects of the cryptocurrency industry and the challenges associated with ransomware attacks. John shares his background and how he ended up in his current role. He discusses the volatility of the cryptocurrency market and the impact it has on ransom demands. He also highlights the increasing scrutiny and compliance requirements imposed by organizations like OFAC. John emphasizes the importance of taking cybersecurity seriously and investing in the right tools and processes to protect organizations from cyber threats. Arete's role in assisting clients with ransomware attacks is also discussed, highlighting their full-service approach and expertise in digital forensics and incident response. Key Takeaways
In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange insights about their history at Veracode and explore Dan's journey in cybersecurity. Dan shares his experience in penetration testing, the origins of PlexTrac, and the need to streamline reporting processes. The conversation also covers the state of the cybersecurity […] The post Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac appeared first on Shared Security Podcast.
Recorded at the 2024 Phoenix Live Podcast Tour at GMI on April 1st to 3rd.Featuring:Ryan Murray, Deputy Director and Chief Information Security Officer, State of ArizonaSee Ryan's past episodes here: https://podcast.techtables.com/guests/ryan-murray/Ralph Johnson, Chief Information Security Officer, State of WashingtonOwen Zorge, Chief Information Security Officer, City of ChandlerCátia Pereira, Manager - Sales Engineering at KiteworksIn this episode you'll learn:Building Statewide Cybersecurity Programs: How the State of Arizona has implemented its Cyber Readiness Program to support local governments with advanced cybersecurity tools, improving overall security posture and resource allocation.Fostering Collaboration in Cybersecurity: Insights into how the State of Washington is overcoming mistrust between state and local entities through collaborative initiatives and grant programs to enhance cybersecurity measures across jurisdictions.Effective Cybersecurity Partnerships: Real-world examples from the City of Chandler on the benefits of collaborative purchasing and support systems, and how working with state programs can lead to significant improvements in local cybersecurity defenses.Public-Private Sector Partnerships: The role of companies like Kiteworks in facilitating secure communication and data sharing within public sector organizations, highlighting successful implementations and scalable solutions.Addressing Workforce Challenges: Creative strategies from Arizona and Washington on how to tackle the cybersecurity talent gap, including eliminating degree requirements, providing on-the-job training, and engaging with educational institutions to build a future-ready workforce.Harnessing Emerging Technologies: Practical applications of AI and machine learning in cybersecurity for anomaly detection and autonomous vulnerability management, and the importance of balancing innovative tech adoption with fundamental security practices.Leadership and Strategic Insights: Perspectives from top CISOs on managing cybersecurity in state and local governments, the importance of trust and collaboration, and strategies for continuous improvement in an evolving threat landscape.Full transcript and show notesRyan's LinkedInRalph's LinkedInOwen's LinkedInCátia's LinkedIn***RECOMMENDED EPISODES→ #173: Doug Ducey, 23rd Governor of Arizona→ #174: Jack McCain & Tim Roemer - National Security from State to Local Governments→ #175: Ralph Johnson, Allen Ohanian, Martha Goodwin, and Dr. Muriel Reid – The Human Firewall: Cybersecurity's Next Frontier→ #176: Lester Godsey, Christian Taillon, Tina Carkhuff, and Gary Depreta - Weaving the Cybersecurity Tapestry: The Art of Public Private Collaboration***WHEN YOU'RE READY
Introducing Forrester's list of the top 10 emerging technologies for 2024. These technologies include generative AI, IoT security, and quantum security, emphasizing the need to align security strategies with business challenges for collaboration and recognition of the value of Chief Information Security Officers (CISOs) at the highest levels.The episode also delves into the challenges faced by CISOs, with 92% experiencing tensions with their CEO and other executives. Despite 59% of CISOs considering themselves as business enablers, there is a disconnect in recognizing the CISO's role in driving innovation. The discussion underscores the importance of integrating security considerations into early business planning and innovation processes to ensure successful outcomes and economic efficiency.Furthermore, the episode explores the significance of Single Sign-On (SSO) for small businesses in enhancing security and streamlining login processes. Recommendations from the Cybersecurity and Infrastructure Security Agency (CISA) include providing flexible seat thresholds, tailored solutions, and improved support materials to facilitate SSO implementation. The episode also touches on the impact of cyber insurance on improving defenses and the growing importance of cloud security measures.Lastly, the episode delves into the evolving role of AI in various industries, such as property management and copywriting. While AI chatbots offer efficiency gains, concerns about job displacement, bias, and the quality of interactions arise. The discussion emphasizes the need for strategic approaches that balance automation with human oversight to leverage the benefits of AI while addressing its limitations. Overall, the episode provides insights on the evolving landscape of technology, security, and AI integration in businesses. Three things to know today 00:00 Forrester and Netskope Highlight the Importance of Security in Business Innovation 03:08 SSO and Cybersecurity: Insights from CISA and Sophos on SMB Security05:41 AI's Role in Business: Leveraging Efficiency with Human Oversight for Positive Outcomes Supported by: https://timezest.com/mspradio/https://www.coreview.com/msp All our Sponsors: https://businessof.tech/sponsors/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
Exploring AI in Cybersecurity: Insights from an Expert - CISO Tradecraft with Tom Bendien In this episode of CISO Tradecraft, host G Mark Hardy sits down with AI expert Tom Bendien to delve into the impact of artificial intelligence on cybersecurity. They discuss the basics of AI, large language models, and the differences between public and private AI models. Tom shares his journey from New Zealand to the U.S. and how he became involved in AI consulting. They also cover the importance of education in AI, from executive coaching to training programs for young people. Tune in to learn about AI governance, responsible use, and how to prepare for the future of AI in cybersecurity. Transcripts: https://docs.google.com/document/d/1x0UTLiQY7hWWUdfPE6sIx7l7B0ip7CZo Chapters 00:00 Introduction and Guest Welcome 00:59 Tom Bendien's Background and Journey 02:30 Diving into AI and ChatGPT 04:29 Understanding AI Models and Neural Networks 07:11 The Role of Agents in AI 10:10 Challenges and Ethical Considerations in AI 13:47 Open Source AI and Security Concerns 18:32 Apple's AI Integration and Compliance Issues 24:01 Navigating AI in Cybersecurity 25:09 Ethical Dilemmas in AI Usage 27:59 AI Coaching and Its Importance 32:20 AI in Education and Youth Engagement 35:55 Career Coaching in the Age of AI 39:20 The Future of AI and Its Saturation Point 42:07 Final Thoughts and Contact Information
In this episode, Joey Pinz engages with cybersecurity expert Jeremy Riemer, who leads the cybersecurity efforts at an MSP in Wisconsin. Jeremy shares his passion for security, highlighting how he brings clarity to clients' security concerns and alleviates their burdens. The discussion delves into Jeremy's experience at IT Nation Secure, emphasizing the importance of selective vendor reliance and the ideal MSP-vendor partnership. Jeremy recounts a memorable pitching session at the event, showcasing his humorous and impactful presentation style. The conversation also covers the significance of cybersecurity awareness training and the need for engaging storytelling in training programs. Key takeaways include Jeremy's approach to simplifying security for SMBs, the value of networking, and practical steps for enhancing cybersecurity awareness.Highlights:Jeremy's approach to simplifying cybersecurity for SMBs.Key insights from IT Nation Secure and the importance of vendor partnerships.The role of storytelling in effective cybersecurity awareness training.Hashtags: #Cybersecurity #MSP #ITNationSecure #VendorPartnerships #AwarenessTraining Meta Information:Meta Title: Inside the Mind of a Cybersecurity Pro
Join us for a riveting discussion with Jay Hunter Anson, as he delves into his fascinating cybersecurity journey—from his early encounters with the Stuxnet malware incident during his military tenure to his pivotal roles in major cybersecurity operations at the NSA and US Southern Command. In this insightful conversation, we explore the evolution of cybersecurity practices, the critical role of policy and resource allocation in fortifying security, and the complex challenges and invaluable lessons learned from deploying security measures in intricate environments. And that's just the beginning! Tune in now for an unforgettable exploration into the world of cybersecurity with a true expert in the field. Don't miss out!