POPULARITY
In this week's episode of The Conference Room, host Simon Lader sits down with Marc Holden, an expert in customer relationship management, direct sales, sales leadership, and market development. Marc shares his journey from being a commercial fisherman in Alaska to becoming the VP of Sales for North America at Cyber SixGill. He discusses the valuable lessons learned from his diverse experiences, the importance of mentorship, and the differences between working in large and small companies. 00:00 Simon introduces the podcast and this week's guest, Marc Holden 01:51 Marc recounts his unique path to sales, starting as a commercial fisherman in Alaska. 04:04 Insights fishing experience influenced his sales career, including risk-taking 07:03 Transition from fishing to sales and the importance of storytelling 08:59 How Marc incorporates mentorship in his leadership 12:21 Differences between working in large corporations and startups 18:07 The qualities that drive success in both large and small organizations. 19:02 Marc shares a success story of a transition from a large company to a startup, 21:02 The importance of believing in potential and providing opportunities for growth. 21:50 Overcoming career hurdles and seizing opportunities to prove oneself. 22:29 Transforming challenges into opportunities and sparking creativity in new hires. 23:23 Building a successful sales territory by understanding your market 24:49 Leveraging industry knowledge and networking to enhance sales strategies. 27:13 The power of storytelling in sales and its impact on building relationships. 30:59 Traits Marc looks for when hiring sales team members, including passion 33:01 The innovative approaches of Cyber Cisco in the threat intelligence space. 36:00 Utilizing AI and machine learning to revolutionize threat intelligence data analysis. 37:29 knowing your product, understanding the market, and leveraging technology. To learn more about Marc Holden please visit his Linkedin Profile To learn more about Cybersixgill please visit their website YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation consultancy Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people create consistent revenue through consistent lead generation. Get to know more about Simon at: Website: https://simonlader.com/ Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader/ The Conference Room is available on Spotify Apple podcasts Amazon Music IHeartRadio
Hacker insight and vulnerability updates are great, but that's only half the battle.An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more companies will adopt Threat Exposure Management, a holistic, proactive approach to cybersecurity where cyber threat intelligence is a foundational component.To discuss this perspective, and more, we sat down with Gabi Reish, Global Head of Product Development at Cybersixgill , a leading provider of industrial cybersecurity solutions. Listen as we discuss:How data breaches have grown to average $4.7M per attack in manufacturing - which is $300K more than other industries.Why the biggest benefit of threat intelligence might be gaining a better understanding of how to position cyber assets.The latest SEC regs and how disclosing incidents makes the industry better.The potential impact of virtual patching.Why some OT specialists are being asked to "predict the weather without any forecasting tools."How and why ransomware attacks are getting more complicated."Human nature is a problem."How AI is allowing hackers to "seem more human" and why that's a huge problem.We need more technology that works like a guardrail.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer's latest attempt. Links to stories: Protect against AiTM/ MFA phishing attacks using Microsoft technology How to avoid the most common WhatsApp Scams 2022 WhatsApp Scams in 2022: What to Look out for Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
In the dynamic realm of cybersecurity, safeguarding against threats and adhering to regulations pose paramount challenges for organizations. In this first segment of our two-part podcast episode, we're joined by Chris Strand, Chief Risk and Compliance Officer at Cybersixgill. Leveraging his extensive background as a former security auditor, Chris imparts invaluable insights into the intersection between Governance Risk and Compliance (GRC) and Cyber Threat Intelligence (CTI).Drawing a parallel to dental check-ups, Chris emphasizes GRC's significance in maintaining comprehensive cyber hygiene. No one jumps for joy at the prospect of an audit, much like visiting the dentist's office, but it's a crucial task that organizations must undertake. The key, according to Chris, is to make the audit process as smooth and painless as possible, akin to a quick dental check-up rather than a time-consuming root canal.Chris delves into practical best practices that organizations can implement to streamline the audit process. He emphasizes the pivotal role of attack surface management and threat intelligence, particularly vulnerability exploit intelligence. These practices not only ensure compliance with cybersecurity mandates but also help organizations identify areas that need protection and bridge security gaps. Furthermore, they enable effective vulnerability analyses and prioritization, justifying decision-making while providing an intelligence audit trail for stakeholders and auditors.Reflecting on the evolution of the cybersecurity landscape, Chris and Delilah discuss the shifting dynamic between risk management and threat intelligence functions within organizations. While they used to operate in separate silos, recent years have witnessed a significant increase in cooperation between these functions. This collaboration not only enhances an organization's overall security posture but also facilitates a more efficient audit process.Tune in to the first part of this engaging podcast interview as Chris Strand brings his wealth of knowledge to the forefront. Gain insights into the strategic integration of GRC and CTI, discover practical approaches to navigating audits, and learn how organizations can foster a proactive cybersecurity culture while meeting regulatory demands.Stay tuned for Part 2 of this illuminating conversation, where Chris dives deeper into the nexus of GRC, CTI, and the world of Generative AI.
In this second part of our podcast episode, join us as we delve deep into the realm of Generative AI and its intricate relationship with cybersecurity and Governance Risk and Compliance (GRC). Our guest, Chris Strand, Chief Risk and Compliance Officer at Cybersixgill, brings his wealth of expertise to illuminate the promises and potential pitfalls of Generative AI in this domain.Exploring the convergence of cutting-edge technology and security protocols, Chris and Delilah engage in a candid discussion about the profound impact of Generative AI on the cyber landscape. Unveil how Generative AI holds the potential to revolutionize cybersecurity and compliance processes, offering enhanced streamlining and optimization capabilities that empower organizations to easily navigate the audit process and bolster overall cyber resilience.Yet, with innovation comes responsibility. Tune in as Chris and Delilah dissect the challenges and vulnerabilities associated with Generative AI. Understand the intricate dance between the advancements it offers and the potential threats it poses to cybersecurity, and delve deep into how Generative AI can potentially disrupt the availability, integrity, and privacy of critical data.As the conversation unfolds, Chris and Delilah shine a spotlight on the regulatory intricacies surrounding the use of Generative AI. The dialogue traverses the complexities organizations may encounter as they navigate compliance within this rapidly evolving landscape.Cybercriminals, ever vigilant, are not far behind. Chris and Delilah share critical insights into how threat actors can exploit and manipulate Generative AI solutions, not only as a tool to optimize and accelerate their malicious operations, but as a target for the attack itself.Lastly, gain insight into the global efforts to regulate the deployment and utilization of Generative AI, and an exploration of the strategic endeavors aimed at striking a balance between innovation and security.Don't miss out on this enlightening conversation as Chris Strand and Delilah Schwartz provide a comprehensive guide to navigating the intricate landscape of Generative AI within the realms of cybersecurity and GRC. Tune in for insights, revelations, and a deeper understanding of the dynamic forces at play.
Barracuda Networks urges replacement of their gear. Fractureiser infects Minecraft mods. ChatGPT sees a court date over hallucinations and defamation. Asylum Ambuscade engages in both crime and espionage. The US delivers Ukraine Starlink connectivity. DDoS attacks hit the Swiss parliament's website. My conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA. Our guest is Delilah Schwartz from Cybersixgill discussing how the Dark Web is evolving with new technologies like ChatGPT. And BEC crooks see their day in court. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/111 Selected reading. Barracuda Email Security Gateway Appliance (ESG) Vulnerability (Barracuda) CVE-2023-2868 (MITRE) ACT government falls victim to Barracuda's ESG vulnerability (CSO Online) CVE-2023-2868: Total Compromise of Physical Barracuda ESG Appliances (Rapid7) CVE-2023-2868 Detail (National Institute of Standards and Technology) Infected Minecraft Mods Lead to Multi-Stage, Multi-Platform Infostealer Malware (Bitdefender) New Fractureiser malware used CurseForge Minecraft mods to infect Windows, Linux (BleepingComputer) IN THE SUPERIOR COURT OF FULTON COUNTY (Superior Court of Fulton County) OpenAI Hit With First Defamation Suit Over ChatGPT Hallucination (Bloomberg Law)
Dov Lerner, Security Research Lead at Cybersixgill, discusses how things that would have been considered off-limits are now routine. He specifically get into new research showing several instances of personal information exposed of the five conservative U.S. Supreme Court Justices in the wake of Roe V. Wade being overturned. Ben talks through a proposed expansion of video surveillance in San Francisco. Dave's story is on an insurance company calling foul on a client's lack of multi-factor authentication. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Breed and New DA Jenkins Pushing Hard to Expand Police Access to Private Security Cameras All Over Town Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you.
We've seen drug marketplaces and extremists use the Dark Web. Will generative AI tools like ChatGPT make things crazier by lowering the barrier to entry? Delilah Schwartz, from Cybersixgill, brings her extensive background with online extremism to The Hacker Mind to talk about how she's seeing a lot of chatter in the dark web.about AI online. She discusses what is and what is not likely to happen next.
Brad Liggett, CTI Intel Engineer Manager at Cybersixgill, puts on his improv hat and joins the pod ready for anything. After COVID pressed pause on daily life, Brad kept himself sane and gained some new skills by returning to his improv roots (a hobby he had in the ‘90s) and taking up Dungeons & Dragons. In this episode, Brad covers the importance of improv skills in the professional world, the opportunities to add elements of gaming into cyber, and advice for practitioners looking to be more agile. Timecoded Guide: [00:00] Introducing the unique combination of improv & cybersecurity [05:57] Being a life-long learner in cybersecurity & in improv groups [13:20] Practicing improvisational skills for cybersecurity customer conversations [18:17] Bringing in games & elements of play into cybersecurity environments [24:38] Advice for a more agile, improvisational tomorrow Sponsor Links: Thank you to our sponsors Axonius and NetSPI for bringing this episode to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more. Is there a skill that you called upon during an interaction with a customer where you really leaned on your improv muscle? Improv often involves one phrase that Brad believes other industries should incorporate, too: “Yes, and.” In cybersecurity, Brad leans heavily on the “Yes, and,” phrase because it encourages conversations to move forward authentically. Meetings aren't successful when customers and clients feel uncomfortable and unengaged. Being able to think on his feet and prepare for changes makes Brad a stronger, more agile practitioner and communicator. “The whole concept of moving the meeting forward and making sure that there's no uncomfortable silences. Be prepared, have an idea of what you want to talk about, but inevitably, the client you're talking to, everyone's going to be unique.” What do you think is the glue that holds your interests in cyber and improv together? Being a life-long learner is something extremely important and valuable for Brad. For improv, research on the latest media, memes, and movies influences his work and motivates him to stay up-to-date and involved in some fun research. Cybersecurity is the same way. Brad believes to be the best practitioner and leader for his team, he needs to be knowledgeable about vendors, threats, products, and all things new in the industry. “You always have to be reading, you always have to be aware of what's going on in the environment out there in the world, so that as those things come up, at least you can somewhat talk to them and start to put those pieces together.” What has been your experience with bringing an element of play into cyber? Cybersecurity can't be all work and no play. Instead, Brad believes that cybersecurity teams should continue to prioritize the gamification of training processes, as well as just letting their teams have a little fun. Sometimes, to build a strong, trusting team, there needs to be an outside outlet for problem solving, puzzling, and creativity. Brad even brought his team at Cybersixgill to a Meow Wolf exhibition this year for that same team building reason. “We work hard, but we also should make sure that we play, and not only just do that individually, but even as teams, especially now. It's not always going to be about the training aspect, you also have to take that time to bring that team together.” What is a piece of wisdom that people could take with them into work tomorrow to make them more agile and improvisational? When it comes to agility and improvisational skills, you have to have a strong foundation to build off of. For Brad, taking time for himself and understanding when and how he learns best has been vital to his success. Listening to podcasts at the gym, reading something new at hotels, and getting a good night's sleep are all little things that help Brad consistently become more agile and improvisational at work. “For me, it's always having some sacred time at the end of the day. There's no TV in my bedroom, and my phone is telling me around 8:30, ‘Hey, it's wind down time,' and that's when I'm getting in the mode for sleep, and then making sure I've got a good night's sleep.” --------------- Links: Keep up with our guest Brad Liggett on LinkedIn and Twitter Learn more about Cybersixgill on LinkedIn and the Cybersixgill website Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord Check out Hacker Valley Media and Hacker Valley Studio
Given the current climate in the world, cybersecurity is more important than ever. Learning about security threats and being able to remediate them is critical for all organizations. Needless to say, the sooner you know about security threats, the better. That's Cybersixgill is changing the game for organizations throughout the private and public sectors. Cybersixgill has technology that collects real-time data related to security threats and turns it into actionable intelligence that can help security professionals remediate threats sooner. Cybersixgill CEO Sharon Wagner has already led one startup that was sold to Microsoft and he has Cybersixgill heading in a similar direction. Sharon joined the Midstage Startup Momentum Podcast this week to talk to startup coach Roland Siebelink about what Cybersixgill does and the startup's journey thus far. He shared insight about what has worked for Cybersixgill and what other startup leaders can do to find similar success. What it's been like for Cybersixgill to address both the private and public sectors. How to fine-tune the lead generation process. The importance of diversifying lead sources. How Cybersixgill has been able to use sales channels, digital marketing, and references at the same time. The key to aligning direct sales and indirect sales with one another. Defining product-market-fit and why it isn't just about your company's product.
Dani Woolf, Director of Demand Generation at Cybersixgill and Host of the Audience First podcast, brings her marketing expertise to Hacker Valley to talk about what's broken in the marketer-buyer relationship. Dani's tried and true methods of cybersecurity marketing involve clear messaging, authentic communication, and building trust in an industry where not trusting anyone is the norm. How can cyber marketers break through the negative stereotypes and show cybersecurity buyers that they're authentic? Timecoded Guide: [00:00] Fixing the broken relationship between cyber marketers, sellers, & buyers [04:58] Unrealistic marketing goals vs incorrect marketer perspectives [10:23] Better conversations between marketers & practitioners with Audience First [15:12] Connecting with curious cyber practitioners instead of dismissing them [23:37] Advice for cyber marketers looking to start fresh with content Sponsor Links: Thank you to our sponsors Axonius and Uptycs for bringing this episode to life! The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com What messages are practitioners receiving (or not receiving) from cybersecurity marketers? One of the domains Dani actively uses is hilariously titled, “WTF Did I Just Read?” This project, inspired by the contextless and confusing messaging cyber practitioners receive everyday, aims to show marketers how to adopt better tactics and more authentic communication with potential buyers. Truth be told, Dani has seen the worst of cyber marketing, and she understands why many marketing teams get a bad rap in the industry. “Frankly, [marketers] are just sending messages that have absolutely no context or need to the buyer, which is just lazy. You have to identify the problem, do a little bit of legwork to see what the buyer is interested in. Who are they really? What are they trying to solve?” Where do you think we all went wrong, from a cyber marketing perspective? Two factors have contributed to incorrect and inauthentic marketing tactics in cybersecurity, according to Dani. The first is pressure to achieve stressful goals and unrealistic KPIs on marketing teams that should be focusing on quality of communication over quantity of calls or outreach methods. The second is marketers coming into the cyber industry with the false mindset that cyber marketing is just like any other marketing, when in reality, the methods of communication and the relationship with buyers is completely different. “A lot of professionals coming into cybersecurity think that what they've done in other verticals works in cybersecurity, when in fact it doesn't. I know for a fact it doesn't, because that's how I made mistakes in the security space and that's how [my podcast] Audience First was born.” Is there a lot of conversation and communication happening between marketers and cybersecurity practitioners? Marketers and practitioners are not communicating in a trustworthy and authentic way, in Dani's opinion. Many marketers fall into the mindset trap of letting the “smart people” in the room talk during meetings and calls, instead of engaging in the conversation. Dani explains that when cyber marketers shut themselves out, they don't learn anything about cybersecurity or about their clients. Not knowing creates a lack of trust and confidence for both sides. “If we continue to just click on buttons and look at numbers, we're not going to do our jobs any better. I urge anybody listening to foster that bidirectional relationship, to be open to marketers speaking to you, and to be open to speaking to practitioners and asking for feedback.” How would you compare the average cybersecurity buyer to, for example, other buyers in the technology space? Despite the stereotypes of cybersecurity buyers being tough or unapproachable, Dani admits that many of her cybersecurity clients are kinder and more empathetic than in other tech industries. However, this kindness and empathy has to be earned, and security professionals aren't always the easiest people to gain the trust of. Dani explains that credibility and authenticity reign supreme in messaging to cyber buyers, because that is the only way to break through the caution many practitioners are trained to have. “Why would I scratch your back? Or, why would you scratch mine if I don't even know who you are? Like, the whole point of security is not to trust everything that you see. So, trust and credibility is a huge part of that, and establishing authentic relationships is a huge part, too.” --------------- Links: Keep up with our guest Dani Woolf on LinkedIn and Twitter Listen to Dani's podcast, Audience First, and learn more about “WTF Did I Just Read?” Check out the Cybersixgill website Learn more about Dani's work on her other Hacker Valley podcast appearances: Breaking Through in Cybersecurity Marketing, Breaking Into Cyber Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord Check out Hacker Valley Media and Hacker Valley Studio
Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer's latest attempt. Links to stories: Protect against AiTM/ MFA phishing attacks using Microsoft technology How to avoid the most common WhatsApp Scams 2022 WhatsApp Scams in 2022: What to Look out for Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Dov Lerner, Security Research Lead at Cybersixgill, discusses how things that would have been considered off-limits are now routine. He specifically get into new research showing several instances of personal information exposed of the five conservative U.S. Supreme Court Justices in the wake of Roe V. Wade being overturned. Ben talks through a proposed expansion of video surveillance in San Francisco. Dave's story is on an insurance company calling foul on a client's lack of multi-factor authentication. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Breed and New DA Jenkins Pushing Hard to Expand Police Access to Private Security Cameras All Over Town Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use
Dani Woolf is the Director of Demand Gen at Cybersixgill, a cybersecurity software company with 120 employees, Series B. Dani is the host of "Audience 1st" show. Dani dons B2B buyers' flip flops to share buying preferences for Marketing + Sales: ✅aware of vendors via peers/referrals/WOM/influencers via content/social/communities, ads (tks to Marketing + Marketing's influence on peers) ✅learn about/try/buy vendors via peers and on website (tks to Marketing) with option for Sales ❌Turn off + tune out: telemarketing, email spam, LinkedIn spam, bribery (Sales Development), jargon, booth babes at events
Account-based marketing is one of the most effective ways for B2B companies to reach decision-makers of right-fit accounts. In our live ABM Panel Discussion, marketing and sales leaders explained why account-based marketing is so beneficial for B2B. On this episode, we continue the conversation and dive into ABM execution. Katie St. Peter answers questions about resources, technology, tools, marketing channels, measurement, and more. Follow along for tips on how to kickstart your ABM strategy. About Katie St. Peter: Katie St. Peter is a marketing professional with specialties in account-based marketing, digital transformation, demand generation, sales enablement, SEO/SEM, experiential marketing, content writing, website design, and PPC. She's currently the Digital Campaigns Manager at the threat intelligence company, Cybersixgill. Previous employers include Rockwell Automation, where Katie gained her passion for account-based marketing. Plus, Nordson Corporation, where Katie introduced account-based marketing programs to drive revenue.
It's been almost three months since Russia's invasion of Ukraine, and the world is still shaken by these disastrous events. And while most countries have imposed sanctions on Russia, China is one of the few leading countries that hasn't imposed any sanctions. But what's happening between Russia and China in the cyber underground?In this episode of the Dr. Dark Web podcast, our host Chris Roberts welcomes Naomi Yusupov, a Chinese Threat Intelligence Analyst, and Delilah Schwartz, a Product Marketing Manager at Cybersixgill. They dive deep into Naomi's and Delilah's recent eye-opening report, called The Bear and the Dragon, which analyzes Russian and Chinese cybercriminal communities.
Naomi Yusupov, a Chinese Intelligence Analyst at the threat intelligence firm CyberSixGill talks to host Paul Roberts about that company's new report: The Bear and the Dragon: Analyzing the Russian and Chinese Cybercriminal Communities. The post Episode 239: Power shifts from Russia to China in the Cyber Underground appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesFeel Good Ukraine Tractor Story Highlights Ag Cyber RiskEpisode 240: As Stakes Of Attacks Grow, Can Cyber Policy “Shift Right”?Episode 238: Robots Are The Next Frontier In Healthcare Cyber Risk
Even though cyber attacks are constantly targeting private and official organizations, companies still don't concentrate on cybersecurity as much as they should. Therefore, companies such as Cybersixgill create reports to help their customers learn about potential cyber risks and act proactively so as to prevent severe attacks. Ilana Touboul, the Cyber Threat Intelligence Analyst at Cybersixgill, joins Chris and Dani to discuss Beyond the Headline Reports in this episode of Dr. Dark Web. She explains the tactics and criteria for collecting information for reports and the purpose of these documents.
What do you get if you cross a leading risk evangelist and a drummer? Security compliance guru Chris Strand! A super polite and humble Canadian… he's been beating the drum (!) for a positive approach to Board-level risk management ever since founding Carbon Black's successful Risk & Compliance division.
The number and scope of ransomware gangs' activities grow daily. But not many organizations are aware of the risks these activities carry. Also, the ongoing war in Europe shows that battlefields exist in the digital world and can cause damage that can devastate entire economies and social orders.Therefore, organizations must ensure constant education of their personnel regarding the importance of cybersecurity. In this episode of Dr. Dark Web, Ilana Touboul joins our host Chris Roberts. Ilana is a Cyber Threat Intelligence Analyst at Cybersixgill and has experience in technical documentation and user guide building for military and civilian end users.Ilana and Chris discuss ransomware gangs, how they choose their victims, their motives for attacking, and how companies and governments can protect against them.
Cybersecurity involves various processes, and it takes the joint work of different intel specialists to thwart the plans of threat actors within the dark web. However, things become even more complex when dealing with hackers from isolated countries such as China. Therefore, it is critical for anyone interested in understanding how to approach Chinese threat actors or their working methods to learn more about the overall Chinese system, including the government and its policies. In this episode of Dr. Dark Web, our host Chris Roberts welcomes Naomi Yusupov. She is the Chinese Intelligence Analyst at Cybersixgill and, as Chris describes her, a wizard in her field.The two discuss the difference between the Chinese digital space and the majority of the world, and demystify how the Great Firewall of China functions. They also touch upon the differences separating Chinese threat actors and other hackers and the importance of slang in their operations, whether on the clear or dark web.
Welcome to Season 11! Eight more episodes are here for you. Check em out and listen in whatever order you choose. We did curate them for you to serve up the best flow possible if you did decide to binge, but no worries if you'd prefer to skip around. Listen your way! On this first episode of season 11 is Dani Woolf. Dani chimed in all the way from Israel and she and Kerry dig in to what it really means to know your audience. Not just know them, but understand them —what challenges they face, what their priorities are, and if what we're doing as marketers is really working for them or not. Dani breaks it down on she has gotten to know her buyer and why we all need to pick up the damn phone and do the same. Dani is the VP of Demand Gen at Cybersixgill. She's a swimmer turned marketer and she still has the same appetite to win. She's been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. And while still get the same adrenaline rush looking at the scoreboard instead of beating personal records ⏱, she prefer racking up net new opps and revenue
Most people don't know how the dark web and the organizations within it work. But, the truth is, they operate in almost the same manner as any other legitimate organization or company you know. Therefore, it is critical to familiarize ourselves with their modus operandi and mitigate the risks and the danger coming from the digital underground. In this episode of Dr. Dark Web, our host Chris Roberts chats with Edan Cohen, the Cyber Threat Intelligence Specialist at Cybersixgill. The two discuss an underground e-commerce market, the business strategies used, and motives that drive threat actors.
Gianna is joined by the Director of Demand Generation at Cybersixgill, Dani Woolf, to discuss her core marketing values: empathy, trust and loyalty. Dani shares her philosophy on creating meaningful, customer-centric experiences, how to identify customer challenges and buying motivations, and how asking the right questions can help transform your marketing efforts. Lastly, Dani shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner. Follow Dani's newsletter and her podcast launch at the Audience 1st Substack! Get the book Buyer Personas: How to Gain Insight into your Customer's Expectations, Align your Marketing Strategies, and Win More Business by Adele Revella at Amazon or the bookstore of your choice! Guest Bio: Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing with a focus on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization and marketing automation. Dani currently serves as the Director of Demand Generation at Cybersixgill. LInks: Stay in touch with Dani Woolf on LinkedIn and Twitter Connect with Gianna on LinkedIn Connect with Maria on LinkedIn Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website Check out Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast
NO ONE IS WALKING THE #AML BEAT IN VIDEO GAMES, and the bad guys know it. Elsewhere...in cryptocurrencyland, the media, law enforcement, Capitol HIll, OK...everyone is talking about the newest, shiny ball. Regulation and enforcement will soon kick into overdrive as mainstream market adoption of crypto assets explodes. Just check out the Twitter feeds of Michael Saylor (MicroStrategy) and Gary Gensler (U.S. Securities and Exchange Commission Chair). Don't even get us started about Bloomberg LP (news not the man). Not so in Decentraland, Fortnite, or Counter Strike: Global Offensive, or on Twitch or Steam where millions are being laundered and an untold number, defrauded. Welcome to the #TradeableEconomy, and be they skins, emotions (emotes), virtual weapons, in-game currencies or keys, this lesser known, secondary market has been running unchecked for more than a decade. These digital assets are flying under the radar, and we better wake up. In this episode, "Ready Player NONE: This is Not a Game", Jean-Loup Richet, Associate Professor, IAE Paris - Sorbonne Business School and Advisory Member to the European Cybercrime Centre (EC3) at Europol and Benjamin (Benji) Preminger, cyber threat intelligence special and product manager at Cybersixgill discuss the money laundering techniques and recent crimes that should make law enforcement and Capitol Hill sit up, pay attention and devote more of their energy to this active and effective crime channel. Thanks for listening. Zila Acosta-Grimes & Paul Caulfield Time: 46 minutes