Podcasts about cyberthreat

  • 381PODCASTS
  • 727EPISODES
  • 31mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyberthreat

Show all podcasts related to cyberthreat

Latest podcast episodes about cyberthreat

Pandemic Quotables
The Iran Cyber Threat Is Real

Pandemic Quotables

Play Episode Listen Later Jul 13, 2025 4:49


Talking Pools Podcast

Text us a pool question!In this episode of the Talking Pools podcast, hosts Steve and Wayne discuss various topics related to pool maintenance, including the importance of reliable staffing, the impact of ransomware attacks on the industry, and the significance of effective water testing. They emphasize the need for strong cybersecurity measures, especially in light of recent attacks, and the importance of clear communication with clients regarding pool maintenance expectations. The conversation also touches on the challenges posed by weather conditions and the necessity of understanding pool chemistry for effective maintenance.takeawaysSteve shares his recent wedding experience in Turks and Caicos.Reliable staffing is crucial for business continuity during personal events.Ransomware attacks can affect any business with technology.Cybersecurity is essential for protecting business operations.Weather significantly impacts pool maintenance and water quality.Proper water testing is vital for pool health and safety.Communication with clients about pool conditions is key.The cost of maintaining pools can vary significantly.Understanding pool chemistry is essential for effective maintenance.Evaluating client relationships is important for business sustainability.Sound Bites"Congratulations, Steve and Janet.""Ransomware affects anyone with tech going on.""Is it worth it for me to send a guy out there?"Chapters00:00Celebrating New Beginnings02:38The Importance of Reliable Staffing04:58Navigating Ransomware Attacks10:41The Significance of Proper Pool Maintenance23:52Understanding Water Chemistry30:47The Dangers of Cheap Testing Kits36:34Client Communication and Expectations42:15Evaluating Client Relationships Support the showThank you so much for listening! You can find us on social media: Facebook Instagram Tik Tok Email us: talkingpools@gmail.com

To The Point - Cybersecurity
Anticipation and Preparation The Science Behind Cyber Threat Intelligence with Dmitry Bestuzhev (Rerun)

To The Point - Cybersecurity

Play Episode Listen Later Jul 8, 2025 23:28


Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns our attention to the risks posed by public charging stations - a ploy dubbed “Juice Jacking.”   Dmitry Bestuzhev, Senior Director CTI at BlackBerry Dmitry Bestuzhev is Senior Director, CTI (Cyber Threat Intelligence) at BlackBerry. Prior to BlackBerry, Dmitry was Head of Kaspersky's Global Research and Analysis Team for Latin America, where he oversaw the company's experts' anti-malware development work in the region. Dmitry has more than 20 years of experience in IT security across a wide variety of roles. His field of expertise covers everything from traditional online fraud to targeted high-profile attacks on financial and governmental institutions. His main focus in research is on producing Threat Intelligence reports on financially motivated targeted attacks. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e340

ITSPmagazine | Technology. Cybersecurity. Society
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 2, 2025 6:39


Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chief Technology Officer at RedSeal; Chip Witt, Principal Security Analyst at Radware; and Jason Kaplan, Chief Executive Officer at SixMap, each bring their perspective on why threat intelligence must become a leadership signal that shapes decisions far beyond the security team.From Risk Reduction to OpportunityRyan Patrick explains how organizations are shifting from compliance checkboxes to meaningful, risk-informed decisions that influence structure, operations, and investments. This point is reinforced by John Salomon, who describes CTI as a clear, relatable area of security that motivates chief information security officers to exchange threat information with peers — cooperation that multiplies each organization's resources and builds a stronger industry front against emerging threats.Real Business ContextTod Beardsley outlines how CTI can directly support business and investment moves, especially when organizations evaluate mergers and acquisitions. Wayne Lloyd highlights the importance of network context, showing how enriched intelligence helps teams move from reactive cleanups to proactive management that ties directly to operational resilience and insurance negotiations.Chip Witt pushes the conversation further by describing CTI as a business signal that aligns threat trends with organizational priorities. Jason Kaplan brings home the reality that for Fortune 500 security teams, threat intelligence is a race — whoever finds the gap first, the defender or the attacker, determines who stays ahead.More Than DefenseThe discussion makes clear that the real value of CTI is not the data alone but the way it helps organizations make decisions that protect, adapt, and grow. This episode challenges listeners to see CTI as more than a defensive feed — it is a strategic advantage when used to strengthen deals, influence product direction, and build trust where it matters most.Tune in to hear how these leaders see the role of threat intelligence changing and why treating it as a leadership signal can shape competitive edge.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.

Redefining CyberSecurity
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

Redefining CyberSecurity

Play Episode Listen Later Jul 2, 2025 6:39


Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chief Technology Officer at RedSeal; Chip Witt, Principal Security Analyst at Radware; and Jason Kaplan, Chief Executive Officer at SixMap, each bring their perspective on why threat intelligence must become a leadership signal that shapes decisions far beyond the security team.From Risk Reduction to OpportunityRyan Patrick explains how organizations are shifting from compliance checkboxes to meaningful, risk-informed decisions that influence structure, operations, and investments. This point is reinforced by John Salomon, who describes CTI as a clear, relatable area of security that motivates chief information security officers to exchange threat information with peers — cooperation that multiplies each organization's resources and builds a stronger industry front against emerging threats.Real Business ContextTod Beardsley outlines how CTI can directly support business and investment moves, especially when organizations evaluate mergers and acquisitions. Wayne Lloyd highlights the importance of network context, showing how enriched intelligence helps teams move from reactive cleanups to proactive management that ties directly to operational resilience and insurance negotiations.Chip Witt pushes the conversation further by describing CTI as a business signal that aligns threat trends with organizational priorities. Jason Kaplan brings home the reality that for Fortune 500 security teams, threat intelligence is a race — whoever finds the gap first, the defender or the attacker, determines who stays ahead.More Than DefenseThe discussion makes clear that the real value of CTI is not the data alone but the way it helps organizations make decisions that protect, adapt, and grow. This episode challenges listeners to see CTI as more than a defensive feed — it is a strategic advantage when used to strengthen deals, influence product direction, and build trust where it matters most.Tune in to hear how these leaders see the role of threat intelligence changing and why treating it as a leadership signal can shape competitive edge.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.

AWS for Software Companies Podcast
Ep113: AI Frameworks to Stay Ahead: Intelligent Cyber Threat Response with Trellix

AWS for Software Companies Podcast

Play Episode Listen Later Jun 30, 2025 41:03


Wilson Patton, Solutions Architect for Trellix, demonstrates how their four-pillar Gen-AI framework transforms incident alerts into actionable intelligence.Topics Include:Wilson Patton: Trellix Solutions Architect, 20 years government experienceWitnessed evolution from basic firewalls to zero trust architecturesTrellix combines McAfee and FireEye heritage and capabilitiesAI integration isn't new - machine learning embedded for yearsPartnership with AWS Bedrock accelerates Gen-AI development capabilities2014: Developed Impossible Travel Analytic for anomaly detection2016: Launched Guided Investigations framework for SOC analysts2023: Introduced AI Guided Investigations with contextual understanding64% of public sector exploring AI adoption activelyOnly 21% have requisite data ready for trainingGen-AI won't magically clean up messy, siloed data74% of executives doubt AI information accuracy currentlyMonday morning alert queue: 76 high, 318 medium alertsAdversaries steal credentials 90 days before major incidentsCritical breadcrumbs hidden in low-priority informational alerts1000+ data-driven investigative questions developed over eight yearsSkilled analysts take too long reading all answersAutomate analysis, distill thousands down to ten critical alertsFour foundational pillars for effective, trustworthy Gen-AI implementationCybersecurity expertise essential - Gen-AI is just a toolFrameworks ensure reliability and consistent prompting for productionMultiple LLM models tested through AWS Bedrock platformQuality diverse datasets required for accurate question answeringGood prompts combine evidence, context, and comprehensive informationTesting shows order of magnitude price differences between modelsNova Micro provides cost-effective results for many scenariosPrompt engineering superior to fine-tuning for avoiding biasAgentic AI performs multi-step investigations with live dataStrategic model choice based on specific requirements and costsTransparent audit trails mandatory for government compliance requirements Participants:Wilson Patton – Solutions Architect, TrellixFurther Links:Website: https://www.trellix.comTrellix in the AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

Cracking Cyber Security Podcast from TEISS
teissTalk: Surviving a critical CVE - a high-impact playbook

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Jun 26, 2025 47:42


Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/York von Eichel-Streiber, Product Marketing Manager, NinjaOnehttps://www.linkedin.com/in/york-von-eichel-streiber-50552b9b

Closing Bell
Closing Bell Overtime: Fed Chair Powell On The Hill; CrowdStrike CEO On Rising Cyber Threat From Iran 6/24/25

Closing Bell

Play Episode Listen Later Jun 24, 2025 44:07


As Chair Powell testifies on Capitol Hill, BNY's Vince Reinhart offers insight into what it means for the Fed path and investor expectations. Victoria Greene of G Squared breaks down the market positioning. FedEx and AeroVironment earnings. Former Pentagon official Roger Zakheim weighs in on the state of ceasefire efforts in the Middle East while Crowdstrike CEO George Kurtz joins to talk the rising cyber threats coming from Iran. More on the wild moves in the energy market with Again Capital's John Kilduff. 

Hacker Public Radio
HPR4406: SVG Files: Cyber Threat Hidden in Images

Hacker Public Radio

Play Episode Listen Later Jun 23, 2025


This show has been flagged as Clean by the host. Out of nowhere, my Firefox browser on my Mac mini started automatically adding every page I visited to my bookmarks. At first, I thought it was a bug after recent update —maybe a misconfigured setting or similar. But when I searched for a fix, Google suggested something alarming: Scan for malware. And guess what? The source of my trouble turned out to be an 4 SVG files hiding malicious code. That's right—those innocent-looking vector graphics files we use every day for logos, icons, and web design? They can secretly carry malware. In my case those were the files, a logos of reputable delivery companies like deliveroo and JustEat which I have downloaded while I was updating a website for my client. Today, we're breaking down how SVG files are being weaponized, why they're so effective, and how to protect yourself. example of svg file Provide feedback on this episode.

Rich Valdés America At Night
Judge Orders Khalil's Release, Iran's Cyber Threat Rises, and One Marine's Fight Against PTSD

Rich Valdés America At Night

Play Episode Listen Later Jun 21, 2025 122:38


Rich is joined by Alex Swoyer—attorney and legal affairs reporter for The Washington Times—to discuss the controversial federal court decision ordering the release of Mahmoud Khalil, a figure tied to terror-related concerns. With the Trump administration considering deportation action, the case raises serious questions about national security and judicial oversight. Marine veteran and founder of Post Traumatic Winning, Michael McNamara, shares his battle-tested approach to dealing with post-traumatic stress—offering raw, practical insight not just for veterans, but for anyone dealing with deep emotional trauma. Then, former CIA cybersecurity expert and Secure Anchor CEO Eric Cole breaks down the growing risk of Iranian cyberattacks targeting U.S. infrastructure and private industry. He explains why digital warfare may be Iran's next move—and how America can stay ahead. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Rav Akiva Zweig's Podcast
Operation Rising Lion: An Emergency Briefing

Rav Akiva Zweig's Podcast

Play Episode Listen Later Jun 18, 2025 83:46


Due to the escalating situation in Israel, we held an emergency panel to explore: - What is happening on the ground - What we can expect in the coming days - The situation here in America - The changing dynamics of modern warfare On our panel, we had: Rosh Yeshiva of Talmudic University of Florida, Rabbi Akiva Zweig. Former Chief Scientist of the US Army Research Laboratory, Dr. Alexander Kott. Chief Science Officer and Cofounder of the Network Contagion Research Institute, Dr. Joel Finkelstein. Board-certified adult and geriatric psychiatrist, Dr. Marc Agronin. Cyber Threat & Open-Source Intelligence Analyst, Travis Hawley.  

The Cyberman Show
Beyond Vulnerabilities: Your Guide to Cyber Threat Exposure Management (CEM) & The Power of AI| EP 97

The Cyberman Show

Play Episode Listen Later Jun 16, 2025 21:38 Transcription Available


Send us a textToday's episode offers a comprehensive overview of Cyber Threat Exposure Management (CTEM), defining it as a proactive framework for continuously evaluating digital and physical asset accessibility, exposure, and exploitability. It clarifies foundational cybersecurity concepts such as vulnerabilities, attack surface, threats, and impact, explaining how their interplay creates exposure. The speaker categorizes various types of exposure, from internet-facing systems to data leakage and phishing susceptibility, emphasizing the expanding attack surface due to interconnected IT infrastructure. Furthermore, the discussion elaborates on exposure management processes and related technologies, including vulnerability scanning, patch management, penetration testing, breach and attack simulation, and external attack surface management, alongside an explanation of how these tools are evolving to support a more unified CTEM approach. Finally, the transcript explores how Artificial Intelligence (AI) is enhancing CTEM through automated discovery, smarter prioritization, intelligent remediation, and enhanced automation.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Showdown: TikTok Malware, Exploit Scoring Wars & Real-World Attacks

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jun 3, 2025 50:03


Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>  

Digital Government podcast
Cyber threat intelligence as public defence, privately informed

Digital Government podcast

Play Episode Listen Later May 21, 2025 31:59


Cybersecurity is a shared responsibility that requires strong partnerships between governments and businesses. Governments, therefore, face the challenge of adapting to a world where – in the cyber domain – the state is not the sole provider of intelligence or security, and private sector emerges as a cyber intelligence actor. In this Podcast episode, eGA's Head of Cybersecurity Merle Maigre speaks with Jack McCurley, a senior intelligence consultant at Recorded Future, about what it takes to build national resilience when the threats are global and decentralised. “Threat actors are networked. If defenders aren't, we're already behind,” he says. A first look, here, into the tools and public-private cooperation in cyber threat intelligence sharing reshaping cybersecurity from the inside out. All in anticipation of the e-Governance Conference 2025 session on public-private partnerships on the matter, where today's speakers will be joined by Liga Raita Rozentale and Nerses Yeritsyan to discuss how shared responsibility can be turned into shared defence. 

Policing Matters
Bonus Episode: Combatting the cyber threat with the Public Safety Threat Alliance

Policing Matters

Play Episode Listen Later May 19, 2025 12:18


Cyber attacks against public safety agencies are rising, with 324 confirmed globally in 2024, including 25 complete system shutdowns. The Public Safety Threat Alliance, established by Motorola Solutions, is a cyber threat Information Sharing and Analysis Organization (ISAO) recognized by CISA that provides actionable intelligence to public safety agencies across the globe to improve their resilience and defense capabilities. Membership in the PSTA is open to all public safety agencies, and there is no cost to join for public sector organizations. In this episode of the Policing Matters podcast, part of a special report from Motorola Solutions Summit 2025, host Jim Dudley speaks with William DeCoste, STARS Program Manager and Telecommunications Engineer Manager with the Virginia State Police Communications Division and Jay Kaine, the Director of Threat Intelligence at Motorola Solutions. They tackle the direct effect cyber attacks can have on public safety agencies and the collaborative efforts underway to combat them. About our sponsor This episode of the Policing Matters podcast is sponsored by Motorola Solutions.

Early Edition with Kate Hawkesby
Michael Jagusch: National Cyber Security Centre Director of Mission Enablement on the number of cyber threats in NZ

Early Edition with Kate Hawkesby

Play Episode Listen Later May 13, 2025 3:43 Transcription Available


Cyber threats are estimated to have cost New Zealanders $1.6 billion last year. New data from the National Cyber Security Centre has revealed half the country has been the target of online scam in the last six months. Up to 830,000 experienced some financial loss. Director of Mission Enablement Michael Jagusch says good cyber security practises can reduce harm. He says it includes using two-factor authentication and having long, unique passwords on main accounts. LISTEN ABOVE See omnystudio.com/listener for privacy information.

Voices In Health Law
Know Your Enemy: Rising Cyberthreat Trends and Safeguards in Healthcare

Voices In Health Law

Play Episode Listen Later May 13, 2025 25:00


In this episode, host Stephanie Dorvil speaks with Betsy Hodge a partner in the Healthcare practice at Akerman LLP, about her insights and analysis on methods that healthcare providers can use to protect customer data, and best practices for compliance with evolving state and federal laws.

Security Conversations
JAGS keynote: The intricacies of wartime cyber threat intelligence

Security Conversations

Play Episode Listen Later May 9, 2025 31:07


Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it. Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Cybersecurity Where You Are
Episode 134: How GenAI Lowers Bar for Cyber Threat Actors

Cybersecurity Where You Are

Play Episode Listen Later May 7, 2025 39:48


In episode 134 of Cybersecurity Where You Are, Sean Atkinson is joined by Randy Rose, VP of Security Operations & Intelligence at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss how generative artificial intelligence (GenAI) lowers the barrier of entry for cyber threat actors (CTAs). Here are some highlights from our episode:01:37. CTAs' use of GenAI to improve their existing campaigns03:38. The need for CTI teams to look beyond language in analyzing GenAI-enabled threats07:22. The evolving impact of GenAI on phishing campaigns, malware development, deepfakes, and malicious Artificial Intelligence as a Service (AIaaS) offerings12:28. How GenAI increases the the speed at which CTAs can scale their efforts17:29. Technical barriers and other limitations that shape CTAs' use of GenAI22:46. A historical perspective of AI-enabled cybersecurity and how GenAI can support cybersecurity awareness training26:50. The cybersecurity benefits of AI and machine learning (ML) capabilities for clustering data29:05. What the future might hold for GenAI from an offensive and defensive perspectiveResourcesThe Evolving Role of Generative Artificial Intelligence in the Cyber Threat LandscapeEpisode 89: How Threat Actors Are Using GenAI as an EnablerEpisode 95: AI Augmentation and Its Impact on Cyber Defense12 CIS Experts' Cybersecurity Predictions for 2025CIS Critical Security Controls®Multi-State Information Sharing and Analysis Center®If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

The John Batchelor Show
1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show

Play Episode Listen Later May 6, 2025 11:38


1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. OCTOBER 1931

The John Batchelor Show
Good evening: The show begins in Kashmir along the Line of Control... 1947 PARTITION

The John Batchelor Show

Play Episode Listen Later May 6, 2025 8:16


GOOD EVENING: The show begins in kashmir along the line of control...Good evening: The show begins in Kashmir along the Line of Control... 1947 PARTITION CBS EYE ON THE WORLD WITH JOHN BATCHELOR FIRST HOUR 9:00-9:15 1/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:15-9:30 2/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:30-9:45 #UKRAINE: WHAT IS NEEDED. JOHN HARDIE, BILL ROGGIO, FDD 9:45-10:00 #UKRAINE: PUTIN FOOT-DRAGGING. JOHN HARDIE, BILL ROGGIO, FDD SECOND HOUR 10:00-10:15 #ISRAEL: MARCH OF THE LIVING 2025. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:15-10:30 #ANTISEMITISM: HARVARD 300 PAGE REPORT INADEQUATE. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:30-10:45 1/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION 10:45-11:00 2/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION THIRD HOUR 11:00-11:15 #PRC: DID THE US AND EU BANKS SEE THE BUBBLE? ANNE STEVENSON-YANG, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:15-11:30 #USS IOWA: REMEMBERING THE GUN TURRET TRAGEDY. JAMES HOLMES, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:30-11:45 #PRC: WASHING CHINA EXPORTS TO THE US. CHARLES ORTEL, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:45-12:00 #CIA: INEXPLICABLE HOLLYWOOD MELODRAMA RECRUITING. GRANT NEWSHAM, "WHEN CHINA ATTACKS." FOURTH HOUR 12:00-12:15 #NEWWORLDREPORT: BOMB PLOT RIO. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:15-12:30 #NEWWORLDREPORT: EBBING PINK TIDE. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:30-12:45 1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 12:45-1:00 AM 2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show
2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show

Play Episode Listen Later May 6, 2025 8:02


2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 1930

CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
VikingCloud's 2025 Cyber Threat Landscape Report

CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)

Play Episode Listen Later May 6, 2025 2:44


In this episode of VikingCloud's CyberIntel, Brian Odian discusses the findings of the 2025 Cyber Threat Landscape Report.

This Week in Machine Learning & Artificial Intelligence (AI) Podcast
CTIBench: Evaluating LLMs in Cyber Threat Intelligence with Nidhi Rastogi - #729

This Week in Machine Learning & Artificial Intelligence (AI) Podcast

Play Episode Listen Later Apr 30, 2025 56:18


Today, we're joined by Nidhi Rastogi, assistant professor at Rochester Institute of Technology to discuss Cyber Threat Intelligence (CTI), focusing on her recent project CTIBench—a benchmark for evaluating LLMs on real-world CTI tasks. Nidhi explains the evolution of AI in cybersecurity, from rule-based systems to LLMs that accelerate analysis by providing critical context for threat detection and defense. We dig into the advantages and challenges of using LLMs in CTI, how techniques like Retrieval-Augmented Generation (RAG) are essential for keeping LLMs up-to-date with emerging threats, and how CTIBench measures LLMs' ability to perform a set of real-world tasks of the cybersecurity analyst. We unpack the process of building the benchmark, the tasks it covers, and key findings from benchmarking various LLMs. Finally, Nidhi shares the importance of benchmarks in exposing model limitations and blind spots, the challenges of large-scale benchmarking, and the future directions of her AI4Sec Research Lab, including developing reliable mitigation techniques, monitoring "concept drift" in threat detection models, improving explainability in cybersecurity, and more. The complete show notes for this episode can be found at https://twimlai.com/go/729.

Cybercrime Magazine Podcast
Cybercrime News For Apr. 18, 2025. Maine Temporarily Halts E-ZPass Over Cyber Threat.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 18, 2025 2:36


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Cyber Security Headlines
Cyberthreat sharing law renewal, APTs love ClickFix, GoDaddy mutes Zoom

Cyber Security Headlines

Play Episode Listen Later Apr 18, 2025 8:54


Bipartisan push for renewal of cyberthreat information sharing law ClickFix becoming a favorite amongst state-sponsored hackers GoDaddy puts Zoom on mute for about 90 minutes Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, And helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com  

CEO on the Go
How Cyber Threat Intelligence Can Protect Your Organization with Mary D'Angelo

CEO on the Go

Play Episode Listen Later Apr 17, 2025 25:21


Cybersecurity threats are evolving rapidly, and organizations of all sizes are vulnerable. While leaders are already navigating countless uncertainties, cyber threats represent a unique challenge that can bring business operations to a halt, causing significant financial damage and operational chaos.Find the full show notes at: https://workmatters.com/How-Cyber-Threat-Intelligence-Can-Protect-Your-Organization-with-Mary-DAngelo

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Horizon: InfosecSherpa Interview, Ukraine Drone Malware, & VulnCon Recap

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 15, 2025 65:37


Forecast = Scattered exploits, Mirai storms brewing, and rogue drones dropping malware over Russia. Keep your firewalls up—a vulnerability front is rolling in fast! ‍ On this episode of Storm⚡️Watch, we're bringing you a packed episode that covers the latest in cyber threat intelligence, industry news, and a few stories you won't want to miss. We kick things off with our usual round of introductions and a quick look at the cyber weather, setting the stage for what's happening across the threat landscape. In our first segment, Tod shares his wrap-up from VulnCon 2025, highlighting the key takeaways and emerging trends from this year's conference. From new vulnerability research to the latest in exploit techniques, Tod breaks down what security professionals need to know and what's likely to shape the industry in the coming months. Next up, we sit down with Tracy Z. Maleeff, better known as InfosecSherpa, for an interview that traces her journey from librarian to cybersecurity professional. Tracy shares insights on career pivots, the importance of information literacy in security, and her ongoing work to make the field more accessible. Her story is a must-listen for anyone considering a move into cyber or looking for inspiration from someone who's successfully navigated the transition. We then turn our attention to a headline-grabbing story out of Ukraine, where reports indicate that drones sent into Russian territory are not just for surveillance or kinetic impact—they're also carrying malware designed to infect military systems if captured. This blend of physical and cyber warfare is a stark reminder of how modern conflicts are increasingly fought on multiple fronts, with digital payloads now as critical as traditional munitions. If we need to fill a little extra time, we'll explore some of the more bizarre aspects of hybrid warfare, including reports of weaponized consumer goods—think exploding sex toys and cosmetics—being used as part of psychological and disruption campaigns targeting the West. It's a strange new world where almost anything can be turned into a tool of conflict. We also spotlight recent research from Censys on the Salt Typhoon attacks, which underscore the need for advanced defenses as attackers continue to exploit edge devices and cloud infrastructure. Their findings highlight the importance of proactive monitoring and rapid response to emerging threats. On the GreyNoise front, we've observed a threefold surge in exploitation attempts targeting TVT DVRs, likely linked to Mirai botnet activity. This uptick is a clear signal that attackers are constantly scanning for vulnerable devices to conscript into their botnets, and it's a reminder for defenders to stay vigilant and patch exposed systems. As always, we wrap up with a round of goodbyes and a reminder to subscribe for more insights, interviews, and real-time threat intelligence. Thanks for tuning in to Storm⚡️Watch—where we keep you ahead of the cyber storms. Storm Watch Homepage >> Learn more about GreyNoise >>  

World XP Podcast
Episode 213 - Mary D'Angelo (Cyber Threat Intelligence Solutions Lead)

World XP Podcast

Play Episode Listen Later Apr 14, 2025 53:19


If you're enjoying the content, please like, subscribe, and comment! Please consider supporting the show! https://creators.spotify.com/pod/show/worldxppodcast/supportJoin our Women in CTI Slack channel here: https://filigran-community.slack.com/archives/C07T52JK3Q9Mary D'Angelo is a Cyber Threat Intelligence Solutions Lead at Filigran, where she helps organizations operationalize threat intelligence and bridge the gap between CTI teams and executive decision-makers. She's also a recognized thought leader and mentor in the InfoSec community, dedicated to democratizing intelligence and guiding the next generation of cybersecurity professionals.Mary is an active contributor to global cybersecurity initiatives, including the Dagstuhl Seminar and the Tortora Bradya Institute, and frequently speaks at industry events to advance collaboration and innovation in the field.______________________Follow us!@worldxppodcast Instagram - https://bit.ly/3eoBwyr@worldxppodcast Twitter - https://bit.ly/2Oa7BzmSpotify - http://spoti.fi/3sZAUTGYouTube - http://bit.ly/3rxDvUL#cybersecurity #cybercrime #cyberthreats #scam #darkweb #internet #safety #password #protection #explore #explorepage #podcastshow #longformpodcast #longformpodcast #podcasts #podcaster #newpodcast #podcastshow #podcasting #newshow #worldxppodcast

Pipeliners Podcast
Episode 383: What Every Pipeliner Should Know about Cybersecurity (Re-run of Episode 237)

Pipeliners Podcast

Play Episode Listen Later Apr 8, 2025 34:43


This week's Pipeliners Podcast episode is a rebroadcast of Episode 237 featuring host Russel Treat walking through how each individual pipeliner should think about pipeline cyber security as it relates to supporting their operation. The episode centers on three key areas of threats, understanding, and mitigation. Russel goes into deep detail about cybersecurity threats, the importance of understanding what the nature of the environment is, and how to have healthy cyber hygiene. In this episode, you will learn the language of cybersecurity professionals, as well as how to reduce your chances of being cyber attacked by controlling your personal risk and personal mitigations by identifying phishing, using VPNs, and having proper password management.

Cybercrime Magazine Podcast
ByBit Hacked. The North Korean Cyber Threat. Geoff White, Author & Investigative Journalist.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 8, 2025 15:37


Geoff White is an author, speaker, and investigative journalist. In this episode, he joins host Melissa O'Leary to discuss the ByBit hack and the broader North Korean cyber threat, including how the country's hackers developed their skills, the IT-worker issue that corporate America is facing, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The International Risk Podcast
Episode 219: The Evolving Cyber Threat Landscape: State-Sponsored Attacks and Global Security with John Bruce

The International Risk Podcast

Play Episode Listen Later Mar 30, 2025 39:45


This week on The International Risk Podcast, Dominic Bowen sits down with John Bruce, an expert in cybersecurity law and policy, to explore the evolution of state-sponsored cyber activity, and what these developments mean for businesses and governments worldwide.Cyber operations have changed significantly over the last few decades. Once highly targeted and discreet, state-sponsored cyber activities are now more opportunistic, widespread, and increasingly damaging. In this episode, John breaks down how governments attribute cyberattacks, the blurring lines between cybercrime and intelligence operations, and what this shift means for cyber defense strategies in both the public and private sectors.John Bruce is the former General Counsel for Field Effect Software Inc., a cybersecurity firm based in Ottawa. Before this role, he spent 22 years with the Department of Justice Canada, providing legal counsel and strategic policy advice on cybersecurity programs and operations. He currently teaches cybersecurity and cyber operations law and policy as an adjunct professor at Carleton University's Norman Paterson School of International Relations and a visiting professor at the University of Ottawa. He is also an Associate Fellow in the Cyber Security Program at the International Institute for Strategic Studies and a Senior Fellow at the Centre for International Governance Innovation, focusing on international cybersecurity law and governance. John holds an LL.B. and an LL.M. in law and technology.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors. This weekly podcast dives deep into international relations, emerging risks, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, the podcast brings together global experts to share insights and actionable strategies.Dominic's 20+ years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them.The International Risk Podcast – Reducing risk by increasing knowledge. Follow us on LinkedIn for all our great updates.Tell us what you liked!

The Cybertraps Podcast
The Cyber Threat Environment with Chris Sadlowski #inch360'24

The Cybertraps Podcast

Play Episode Listen Later Mar 10, 2025 48:02


In this episode, Chris Sadlowski speaks live at the Inch360 event in Spokane, Washington. Chris, with over 20 years of experience in the FBI, discusses the evolving landscape of cyber threats, common and emerging methods of cyberattack, and the significant risks posed by state-sponsored actors, criminal networks, and the personal impacts of cybercrime on individuals. He also touches on the importance of preparedness and effective communication in the cybersecurity realm, emphasizing the collective role in safeguarding against these threats. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

The Shared Security Show
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

The Shared Security Show

Play Episode Listen Later Mar 10, 2025 20:21


In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.

Access Utah
'Billy Barnes and the Cyber Threat' with Kathy Christiansen on Access Utah

Access Utah

Play Episode Listen Later Feb 20, 2025 50:20


We spoke with Kathy Christiansen about her new book "Billy Barnes and the Cyber Threat," about two boys who embark on a dangerous quest to find Billy's grandpa.

Breaking Into Cybersecurity
Breaking into Cybersecurity - Transitioning from Sales to Cyber Threat Intelligence with Mary D'Angelo

Breaking Into Cybersecurity

Play Episode Listen Later Feb 10, 2025 21:20


Transitioning from Sales to Cyber ThreatIntelligence with Mary D'Angelohttps://www.linkedin.com/in/dangelomary/ In this episode of 'Breaking into Cybersecurity,' we sit down with Mary D'Angelo, a Solutions Lead at Filigran, to discuss her journey from a sales and marketing background into the technical field of cyber threat intelligence. Mary shares insights on her professional path, the importance of continuous education, understanding threat actors and their TTPs, and the benefits of leveraging AI in threat intelligence. She alsooffers practical advice for those looking to transition into cybersecurity and emphasizes the value of networking and community. Join us for an in-depth discussion that aims to inspire and inform aspiring cyber professionals. 00:00 Introduction and Guest Welcome00:59 Mary's Background and Career Journey01:38 Transition from Sales to Cybersecurity04:07 Understanding the Dark Web05:42 Explaining TTPs and Training06:18 Recommendations for AspiringCybersecurity Professionals09:05 Continuous Learning and Automation11:45 Final Tips and NetworkingSponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.Check out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roleshttps://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Hacker Inc.: Mindset For Your Careerhttps://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/

The Next Byte
209. Tom Zaubermann & The Cyber Threat(s) To Your Car

The Next Byte

Play Episode Listen Later Feb 4, 2025 55:56


(00:00) - Introduction to Automotive Cybersecurity(06:18) - Tom Zaubermann's Journey in Cybersecurity(12:22) - The Intersection of Cybersecurity and Automotive(16:06) - Challenges in Automotive Cybersecurity Development(21:23) - The Role of Over-the-Air Updates(25:20) - Consumer Awareness and Best Practices in Cybersecurity(29:54) - Navigating Cybersecurity Vulnerabilities in Automotive(32:35) - The Role of Regulations in Automotive Cybersecurity(34:22) - Understanding Automotive Vulnerabilities(36:34) - Complexities of Car Hacking(40:07) - Consumer Awareness of Cybersecurity Risks(42:51) - Choosing Safe Vehicles in a Digital Age(48:56) - Engaging with SAE International for Cybersecurity EducationThis episode is part of a series brought to you by SAE International to explore the leading edge of mobility with the support of experts from industry & academia. Other episodes in this series include Episode 202, where we talked about the cyber threats to vehicles.You can learn more about the automotive cybersecurity courses Tom will be teaching in May HERE. Enjoyed listening to Tom? Want to hear more from him? Check out his links below:Tom's LinkedIn Become a founding reader of our newsletter: http://read.thenextbyte.com/ As always, you can find these and other interesting & impactful engineering articles on Wevolver.com.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Chatter that Matters
Harrison Haynes - Breaking the Silence

Chatter that Matters

Play Episode Listen Later Jan 16, 2025 34:51 Transcription Available


"It's so easy to become vulnerable online.  Your face and name aren't involved; you can hide behind a user name, an avatar." I begin this powerful and profoundly moving episode of Chatter That Matters by sharing a personal story of narrowly escaping a predator during my youth, setting the stage for a meaningful conversation about online safety. I then invite my guest, Harrison Haynes, a brave young advocate who recounts his harrowing experience of being manipulated by an online predator as a teenager. He reveals the emotional toll, the subtle manipulative tactics used, and how this experience impacted his family and personal growth. Harrison's story is a testament to resilience. He shares his journey to forgiveness, the importance of disconnecting from technology, and his mission to help others navigate the dangers of the digital world. He emphasizes the need for open conversations about mental health, self-worth and community in the face of the challenges posed by social media and online predators. Later in the episode, Margot Denomme, a former Crown Attorney with twenty-five years of front-line experience and the author of The Family Smartphone Guide, joins the show. Margot offers practical advice for parents on navigating the digital landscape safely, emphasizing the importance of boundaries, digital literacy, and the concept of a “family smartphone contract.”   Key Takeaways: 1. The Reality of Online Predators: Harrison sheds light on the manipulative tactics predators use to lure vulnerable youth and the devastating consequences. 2. The Power of Community: Despite his painful journey, Harrison found healing through forgiveness and introspection, advocating for a life less tethered to technology. 3. Creating Safe Digital Spaces: Margot Denomme provides parents with actionable tips to protect their children from online dangers, including delaying smartphone access and fostering self-esteem. 4. A Call to Awareness: Harrison and Margot stress the need for open dialogue between parents and children about digital safety, mental health, and the risks of an unfiltered online world. To connect with Harrison Haynes,  info@wiredhuman.org   To purchase Margot Denomme's book,  https://www.amazon.ca/Family-Smartphone-Guide-Navigate-Smartphones/dp/0992034043      

Tech Disruptors
Zscaler Sees Cyberthreat Environment Growing

Tech Disruptors

Play Episode Listen Later Jan 9, 2025 36:39


The cyberthreat environment keeps worsening because more business is being conducted online and nation states are looking to steal secrets and intellectual property, and get into other countries' infrastructure, according to Zscaler Chairman and CEO Jay Chaudhry. He sits down with Mandeep Singh, senior technology analyst at Bloomberg Intelligence, to talk about the relevance of gen AI to cybersecurity and how the deployment of zero trust is likely to grow with more AI workloads. Chaudhry also discusses the risk of data leakage with enterprise data and his expectations around consolidation for the security space in 2025. The US Treasury cyberattack took place in late December, a week after we recorded this episode.

WSJ Tech News Briefing
How China's Cyber Threat Looms Over America

WSJ Tech News Briefing

Play Episode Listen Later Jan 8, 2025 13:40


Chinese hackers have vastly increased their efforts in recent years, burrowing into systems at ports, pipelines, water facilities and elsewhere. WSJ reporter Dustin Volz joins host James Rundle to talk about what this means for national security, and how companies such as major telecom providers were hacked in the first place. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices

Big Take DC
The ‘Everything, Everywhere, All at Once' Cyber Threat

Big Take DC

Play Episode Listen Later Jan 8, 2025 13:34 Transcription Available


US intelligence officials say that a hacking campaign known as “Volt Typhoon” has the potential to disrupt critical infrastructure systems in Guam — a significant hub for the US military that holds particular importance in US-China relations. On today’s Big Take DC podcast, Bloomberg national security reporter Katrina Manson shares what she’s learned about the threat and how it could limit America’s ability to push back if China were to invade Taiwan. Read more: The US’s Worst Fears of Chinese Hacking Are on Display in GuamSee omnystudio.com/listener for privacy information.

Cybercrime Magazine Podcast
What Is Malvertising? Cyber Threat Spreading Malware Fast. Confidence Staveley, CyberSafe Foundation

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 11, 2024 5:22


Malvertising is short for malicious advertising, and attacks and compromises systems by spreading advertisements injected with malicious code. Confidence Staveley, Africa's most celebrated female cybersecurity leader, is the founder of the Cybersafe Foundation, a Non-Governmental Organization on a mission to facilitate pockets of changes that ensure a safer internet for everyone with digital access in Africa. In this episode, Confidence joins host Amanda Glassner to discuss. To learn more about Confidence, visit her website at https://confidencestaveley.com, and for more on the CyberSafe Foundation, visit https://cybersafefoundation.org.

Coffee w/#The Freight Coach
1068. #TFCP - Understanding Cybersecurity!

Coffee w/#The Freight Coach

Play Episode Listen Later Nov 8, 2024 42:33 Transcription Available


We're back for another interaction with the industry experts recorded from the NMFTA Cybersecurity Conference!  In this episode, we've got two amazing guests, Steve Hankel and Ben Gardiner!  Steve and Ben shared critical cybersecurity threats affecting businesses of all sizes, proactive prevention measures against cyber attacks, and the NMFTA's stand on ensuring the effective implementation of practices protecting transportation professionals!   About Steve Hankel Steve Hankel is the Vice President of Information Technology at JTS (Johanson Transportation Service). He joined JTS in 2010 and during his tenure, he developed a SaaS TMS (Transportation Management System), moved the company's infrastructure to the Cloud, built up their software engineering program, and rolled out their Disaster Recovery and Cyber Security initiatives. Prior to joining JTS, Steve made a name for himself as Director of IT Operations at Webvan, managing the support of cutting-edge technology during the .com boom. He then worked as Tools Team Lead at Wamu, developing a state-of-the-art BC (Business Continuity) and DR (Disaster Recovery) web application. Later he became Co-Founder and Principle at Continuity Source, a company developing BC/DR SaaS Solutions.   About Ben Gardiner Ben is a Senior Cybersecurity Research Engineer contractor at the National Motor Freight Traffic Association, Inc. (NMFTA)™ specializing in hardware and low-level software security. With more than ten years of professional experience in embedded systems design and a lifetime of hacking experience, Ben has a deep knowledge of the low-level functions of operating systems and the hardware with which they interface. He has held security assurance and reversing roles at a global corporation, as well as worked in embedded software and systems engineering roles at several organizations. Ben has conducted workshops and presentations at numerous cybersecurity events globally, including the CyberTruck Challenge, GENIVI security sessions, Hack in Paris, and HackFest. In 2022, he was honored with invitations to speak at escar USA and serve as a main stage speaker at DEF CON. In addition to speaking on the main stage at DEF CON, Ben is a volunteer at the DEF CON Hardware Hacking Village (DC HHV) and Car Hacking Village (CHV). He is GIAC GPEN certified and a GIAC advisory board member, serves as the chair of the SAE TEVEES18A1 Cybersecurity Assurance Testing TF (drafting J3322), a contributor to several American Trucking Associations (ATA) Technology & Maintenance Council (TMC) task forces, ISO WG11 committees, and a voting member of the SAE Vehicle Electronic Systems Security Committee. Ben holds a M.Sc. Eng. in Applied Math & Stats from Queen's University.  

Timeless with Julie Hartman
China's Cyber Threat: Trump Hacked/Election Disinformation/War in Ukraine/Israel

Timeless with Julie Hartman

Play Episode Listen Later Oct 29, 2024 54:56


Julie talks with Brandon Weichert, author of Biohacked - China's Race to Control Life, foreign policy expert who manages The Weichert Report - World News Done Right.  His entire life's work has been predicated on challenging conventional wisdom and assumptions on a variety of matters, notably in national security. His books: https://rb.gy/39gtz Join Julie live Monday, Tuesday, and Wednesday at 1p PT, call in number: 844-861-5537Check out other Julie Hartman videos: https://www.youtube.com/@juliehartman Follow Julie Hartman on social media: Website: https://juliehartmanshow.com/Instagram: https://www.instagram.com/julierhartman/X: https://twitter.com/JulieRHartmanSee omnystudio.com/listener for privacy information.