Podcasts about digital safety

  • 145PODCASTS
  • 305EPISODES
  • 34mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 8, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about digital safety

Latest podcast episodes about digital safety

DrZeroTrust
"Holistic Cybersecurity: A Comprehensive Approach to Digital Safety"

DrZeroTrust

Play Episode Listen Later Sep 8, 2025 24:15


In this episode, Mike Elkins maps a whole‑of‑business blueprint for digital safety that actually reduces risk you can measure. We break down what “holistic” really means in practice: identity as the control plane, data‑centric design, continuous verification, least privilege, segmentation that shrinks blast radius, and automation that removes human bottlenecks. From cloud and SaaS to OT/IoT and third‑party risk, Chase shows how to connect policy, architecture, and operations so security becomes a repeatable system—not a pile of tools.TakeawaysWhy piecemeal controls create “debt‑in‑depth”How to center Zero Trust on identities, not networksPragmatic micro‑segmentation and just‑in‑time accessA simple metric stack for the board (exposure, blast radius, dwell time)How to align GRC with day‑to‑day enforcementNo FUD. No silver bullets. Just the playbook to make “holistic” real.

@BEERISAC: CPS/ICS Security Podcast Playlist
FBI Alerts, OT Vulnerabilities, and What Comes Next

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 6, 2025 24:05


Podcast: Industrial Cybersecurity InsiderEpisode: FBI Alerts, OT Vulnerabilities, and What Comes NextPub date: 2025-09-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino break down the FBI's latest cybersecurity advisory and what it means for industrial organizations. From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. They discuss why manufacturing has become ransomware's “cash register,” the importance of continuous monitoring and asset visibility, and why every organization must have an incident response plan in place before a crisis. This episode is packed with real-world insights and actionable strategies. It's a must-listen for CISOs, CIOs, OT engineers, and plant leaders safeguarding manufacturing and critical infrastructure.Chapters:00:00:52 - Welcome to Industrial Cybersecurity Insider Podcast00:01:21 - A New FBI Advisory on Nation-State OT Threats00:02:37 - Cisco Hardware on the Plant Floor Targeted in Advisory00:03:18 - The IT/OT Disconnect: OT Assets are Often Invisible to InfoSec Teams00:04:19 - The Awareness Gap: Critical Security Alerts Fail to Reach OT Operations00:04:54 - The OT Cybersecurity Skills Gap and Cultural Divide00:07:32 - Why All Manufacturing is Critical, Citing the JBS Breach00:08:37 - The Staggering Economic Cost of OT Breaches00:09:33 - The "Cash Register" Concept: Why Attackers Target Manufacturing00:10:29 - OT as the New Frontier for Attacks on Unpatched Systems00:11:28 - The "Disinterested Third Party": When OEMs See Security as the Client's Problem00:12:31 - The Foundational First Step: Gaining Asset Visibility & Continuous Monitoring00:13:53 - The Impracticality of Patching in OT Due to Downtime and Safety Risks00:15:25 - Academic vs. Practitioner: Why High-Level Advice Fails on the Plant Floor00:18:25 - The Minimum Requirement: A Practiced, OT-Inclusive Incident Response Plan00:18:58 - Why CISOs Must Build Relationships with Key OT Partners00:22:46 - Practice, Partner, and Protect NowLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
AI, Phishing, and the Future of Industrial Cyber Defense

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 28, 2025 29:27


Podcast: Industrial Cybersecurity InsiderEpisode: AI, Phishing, and the Future of Industrial Cyber DefensePub date: 2025-08-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. Whether you're dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.Chapters:00:00:00 - Pandemic's Impact on Critical Infrastructure00:01:08 - Introduction to Gary Neelan and Claroty00:01:41 - Gary's Role in OT Cybersecurity00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems00:09:46 - Addressing Complex Challenges in OT Cybersecurity00:11:56 - OT Cybersecurity Talent Shortage and Managed Services00:13:01 - Future of OT Cybersecurity: Adapting to New Threats00:14:36 - Modernizing Manufacturing Systems for Enhanced Security00:15:52 - Global Cybersecurity Trends in Critical Infrastructure00:18:01 - Regional OT Cybersecurity Challenges and Responses00:25:01 - The Role of AI in Defending OT Environments00:28:19 - Final Thoughts on OT Cybersecurity's FutureLinks And Resources:Links And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityGary Kneeland on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Siemens Process Automation Digitalization Tech Talks
Episode 56: Implementing Digital Safety Systems for Smarter, Safer Operations

Siemens Process Automation Digitalization Tech Talks

Play Episode Listen Later Aug 28, 2025 21:56


In part two of our safety series on the Digitalization Tech Talks podcast, Jonas Norinder and Don Mack welcome Chase Davis from EOSYS to explore how digital safety systems are transforming machine operations. Building on last month's episode with Al Prosowski from Dow on process safety, this conversation dives into implementation strategies, risk assessments, and the role of technologies like fail-safe PLCs and Profisafe.Learn how digital safety reduces downtime, simplifies upgrades, and supports flexible manufacturing while keeping safety at the core. Whether you're modernizing legacy equipment or starting fresh, this episode offers practical insights for safer, smarter operations.

The Secure Dad Podcast
Overcoming Bullying with Nate Webb

The Secure Dad Podcast

Play Episode Listen Later Aug 27, 2025 29:06 Transcription Available


Tackling Bullying and Digital Safety with Nate Webb   In this episode of The Secure Family Podcast, Andy speaks with school counselor and national speaker Nate Webb about the modern challenges of bullying in 2025 and effective communication with kids. Nate shares insights from his own experiences with bullying and how he uses them to educate others.    The discussion covers topics like the sneaky nature of contemporary bullying, the importance of developing a child's sense of identity, and the crucial role of parents in digital safety. Additionally, the episode provides practical steps for parents to better support their children in both preventing and addressing bullying.   For more from Nate Webb: https://natewebbspeaker.com/   Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD.  OmniWatch is a scam and identity protection service that monitors your data, alerts you to threats, and backs you with up with insurance. Try it for only $1 for 7 days. Connect

@BEERISAC: CPS/ICS Security Podcast Playlist
Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 21, 2025 30:47


Podcast: Industrial Cybersecurity InsiderEpisode: Partnership in Action: When Legacy Systems Meet Modern Cybersecurity ThreatsPub date: 2025-08-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure. From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.What makes this episode essential listening:Real financial impact: Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hourPractical solutions that work: Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bankPolitical warfare decoded: Understand the often-toxic dynamics between IT and OT teams that sabotage security initiativesImplementation roadmaps: Get actionable strategies for deploying zero-trust architectures on the plant floorWhether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.Chapters:00:00:00 - Cyber insurance denied over incomplete MFA 00:03:21 - What clients face as they begin the OT security journey00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime) 00:07:36 - Too many IT tools forced into OT00:08:47 - Investment hurdles and budgeting misalignment00:11:05 - Collaboration between OT asset owners and the CISO00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions00:18:22 - Who embraces TXOne first—IT or OT?00:20:58 - CISOs on OT priorities and piloting top sites00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs00:27:03 - AI useful in SOC/baselining; humans still required on OT side00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps00:29:47 - Why deployments stall—overwhelm and fatigue after tech selectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Debbie Lay, TXOne Networks on LinkedInPatrick Gillespie, GuidePoint Security on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Standards Show
Audiobook | Report - Supporting digital safety for adolescents

The Standards Show

Play Episode Listen Later Aug 18, 2025 11:02


BSI Reports and Whitepapers provide expert insights, guidance, and analysis on various topics related to standards, compliance, and best practices. They are designed to inform and educate organizations, industries, and policymakers about emerging trends, challenges, and opportunities in areas where standards play a critical role.This episode is an audio-abridged version of the BSI Report - Supporting a safe and secure digital world for adolescents. Published in May 2025, the report reveals that nearly half (47%) of young people aged 16 to 21 would prefer to grow up without the internet - a stark reflection of concerns about its impact on their wellbeing. Drawing on a survey of 1,293 UK adolescents, it shows that time spent online has increased since COVID-19, with many spending hours each day on social media and gaming. Despite this, 42% admit to hiding their online activity from parents, and risky behaviours, such as creating fake profiles are common. The findings highlight the urgent need for stronger privacy and safety measures by tech companies and policymakers to protect young users' mental health and online safety.Series | AudiobooksFind out more about the issues raised in this episodeBSI Digital TrustCPINISO COPOLCOGet involved with standardsGet in touch with The Standards Showeducation@bsigroup.comsend a voice messageFind and follow on social mediaX @StandardsShowInstagram @thestandardsshowLinkedIn | The Standards Show

@BEERISAC: CPS/ICS Security Podcast Playlist
From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 16, 2025 28:14


Podcast: Industrial Cybersecurity InsiderEpisode: From Shelfware to Security: Operationalizing OT Industrial Cybersecurity ToolsPub date: 2025-08-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMany manufacturing leaders believe they're seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT security. They explore why million-dollar cybersecurity tool investments aren't fully utilized, and expose the costly disconnect between corporate IT, plant-floor teams, and third-party vendors. From debunking the air gap myth to stressing the need to trust but verify every connection, they show how to turn underutilized tools into proactive defenses that improve both security and operational efficiency. If you think your ICS is fully protected, this conversation might change your mind.Chapters:00:00:00 - Introduction: When Inefficiency Becomes Expensive00:00:59 - The Hidden Danger of Feeling Secure in Manufacturing00:03:58 - Why True Visibility and Accurate Data Change Everything00:07:18 - Real-World Roadblocks: Missteps and Mixed Messages00:10:24 - Who Holds the Power vs. Who Bears the Blame in Cybersecurity00:21:47 - Charting a Smarter Path to Stronger Cyber Defenses00:25:27 - Conclusion: Actionable Moves to Level Up Your SecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
When the Plant Can't Stop: Securing Systems That Never Sleep

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 7, 2025 33:18


Podcast: Industrial Cybersecurity InsiderEpisode: When the Plant Can't Stop: Securing Systems That Never SleepPub date: 2025-08-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the foundational questions every organization must answer:What do you need to protect? Where are your holes? Can you see what's happening and respond if something goes wrong? From AI-enabled attackers to real-time asset visibility, he shares actionable insights on risk management, OT monitoring, and why leaders must begin treating cybersecurity like safety, not just an IT function. Whether you're managing a water treatment plant, a power plant, or smart transportation infrastructure, this conversation delivers clarity in complexity - and guidance for what to do next.Chapters:00:00:00 - Uncovering Hidden Dangers in Remote Access00:00:59 - Meet Ian Bramson: Defending the World's Most Critical Systems00:02:58 - Why Critical Infrastructure Is Everyone's Business00:03:30 - Power and Water: The Frontlines of Cyber Defense00:09:07 - Decoding NERC CIP: What You Really Need to Know00:10:38 - Walking the Tightrope Between Compliance and True Security00:17:01 - Proven Cybersecurity Tactics That Actually Work00:22:50 - AI in Cybersecurity: Game-Changer or New Threat?00:24:47 - How Public and Private Sectors Tackle Cyber Risk Differently00:29:31 - Ian Bramson's Final Playbook for Today's CISOsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Breakfast with Refilwe Moloto
Toll-free and data free support in a fight against phishing

Breakfast with Refilwe Moloto

Play Episode Listen Later Aug 4, 2025 8:55 Transcription Available


Phishing scams targeting bank clients are on the rise, with fraudsters using emails and texts that look almost identical to real bank communication. In response, Capitec has introduced in-app calling that lets clients speak directly to the bank from inside the app, without needing airtime or data. It’s a move that improves security, reduces fraud risk and makes support more accessible to clients who might otherwise be left out. Andrew Baker, Chief Technology Officer at Capitec, speaks to Lester Kiewit about how a security-driven idea became a broader shift toward inclusive, purpose-led banking support. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live on Primedia+ weekdays between 06:00 and 09:00 (SA Time) to Good Morning CapeTalk with Lester Kiewit broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/xGkqLbT or find all the catch-up podcasts here https://buff.ly/f9Eeb7i Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Lawyer's View: Strategic Lessons in Cybersecurity and Incident Response

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 1, 2025 32:14


Podcast: Industrial Cybersecurity InsiderEpisode: The Lawyer's View: Strategic Lessons in Cybersecurity and Incident ResponsePub date: 2025-07-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today's hyper-connected, AI-augmented threat landscape. Josh shares hard-earned insights from decades of incident response leadership, emphasizing why building your cyber playbook before the attack is critical. From legal implications and executive missteps to the psychological attributes needed in your incident command post, this conversation is a masterclass in cyber resilience and proactive protection by design.Chapters:00:00:00 – Kicking Off with Chaos: Why Incident Response Matters00:01:02 – Enter Josh Cook: Legal Strategist Turned Cyber Commander00:01:18 – War Stories and Wisdom: Josh's Journey to Left of Boom00:02:38 – Planning Beats Panic: Mastering the Art of Pre-Incident Prep00:04:17 – Assembling the A-Team: Who Belongs in Your Cyber War Room00:09:07 – AI at the Front Lines: Friend, Foe, or Something in Between?00:12:42 – Industrial Chaos: What's Really Holding Cybersecurity Back00:16:07 – Boardroom to Shop Floor: Why the C-Suite Can't Stay Silent00:25:18 – No Secrets Here: Transparency and the Power of Telling the Truth00:29:08 – Parting Shots: Josh's Battle-Tested Advice for ResilienceLinks And Resources:Josh Cook on LinkedInWebsiteWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Dad Edge Podcast (formerly The Good Dad Project Podcast)
The Social Media Body Image Trap - Rich Dorment

The Dad Edge Podcast (formerly The Good Dad Project Podcast)

Play Episode Listen Later Jul 28, 2025 55:26


Have you ever asked yourself: Am I really aware of how much social media and online content is influencing my kids? Have I noticed my kids becoming overly focused on their physical appearance or diet? How do I handle conversations about nutrition and fitness at home? If you've noticed your son obsessing over his physique or protein intake, or your daughter silently struggling with self-worth because of what she sees online, this episode is for you. Larry and Rich dive deep into how today's digital landscape is distorting kids' perceptions of themselves, driving issues like body dysmorphia, disordered eating, and unhealthy relationships with food and fitness—affecting boys and girls earlier than ever before. You'll hear real talk on what warning signs to watch out for, how to foster healthy conversations about food and body image, and the steps you can take to protect your kids from the relentless pressures of curated perfection online. Plus, learn practical strategies for monitoring your child's digital world and discover why it's crucial to model resilience, open dialogue, and authentic self-worth in your home. Whether you're a dad, coach, or mentor, this episode is your wake-up call and toolbox—because the world is changing, and as fathers, we need to step up, disrupt the status quo, and help our kids build unshakeable confidence in themselves. Become the best husband you can: https://bit.ly/deamarriageyoutube In this vital conversation, we dig into: Why Social Media Is A Game-Changer: Unlike the occasional magazine we grew up with, today's kids are constantly exposed to unrealistic body standards, curated feeds, and supplement ads designed to make them feel “less than.” The result? Kids (especially boys ages 12-14!) are reporting anxiety, body dysmorphia, compulsive exercising, and disordered eating at skyrocketing rates. Spot the Warning Signs: It's not just about undereating—obsession with protein grams, excessive workouts, and constant flexing in the mirror can all point to an unhealthy relationship with food and body image. Smart Conversations, Not Confrontations: The episode shares actionable tips to open up dialogue with your kids. Watch "Generation Flex" together, use it as a springboard for honest conversation, and focus on how food and fitness make us feel—not just how we look. Model Healthy Habits: As dads, it's not about being perfect—it's about showing our kids that food isn't “good” or “bad,” and that balance is key (yes, you can have that burger and a salad). Digital Safety for Peace of Mind: Larry also highlights tools like Bark, which alert you to concerning activity on your kids' devices—so you're not left in the dark about what they're seeing online. If you care about raising healthy, resilient sons and daughters in an always-connected world—and want to know the practical steps you can take at home—this episode is for you Here's what research and observation highlight about Studies show that hospitalizations for pediatric eating disorders rose by 139% from 2002 to 2018, with the largest relative increase seen in males aged 12 to 14 Boys and men now represent a third of all eating disorder diagnoses today Nearly 100% of kids with internet access are exposed to carefully curated or unrealistic fitness/body images daily. thedadedge.com/bark  thedadedge.com/alliance  https://menshealth.com @menshealthmag @richdorment Read more about Men's Health's documentary "Generation Flex": https://www.menshealth.com/generationflex Watch Generation Flex on Apple TV+:https://tv.apple.com/us/clip/generation-flex Watch Generation Flex on Amazon Prime Video: https://www.amazon.com/gp/video/detail/B0DJCND11R  

The Covenant Eyes Podcast
Protecting Our Children: A Global Call to Action with Hannah from Quit Porn (UK)

The Covenant Eyes Podcast

Play Episode Listen Later Jul 23, 2025 29:44


In this eye-opening episode of The Covenant Eyes Podcast, host Karen Potter sits down with Hannah, founder of Quit Porn, in the UK, for a vital conversation about the pervasive impact of pornography in today's digital age. Hannah, a seasoned therapist, shares her unique perspective on how pornography affects individuals, marriages, and families, emphasizing that the problem begins long before it becomes a full-blown addiction.Discover the alarming realities of the "raunch culture" in the UK, where explicit content is increasingly normalized in everyday advertising and media. Hannah reveals shocking statistics, including the rapid growth of indecent images of children as a crime in the UK, and discusses the dark world of organized crime profiting from child sexual abuse material.This interview dives into the critical need for parental education and protection in an era where children are constantly exposed to harmful content. Hannah offers practical advice for parents on setting boundaries with technology and fostering open conversations with their children. The discussion also addresses the church's role in confronting this issue, highlighting the challenges and the urgent need for greater awareness and support for those struggling, including the often-overlooked impact on women.Learn why accountability is crucial for freedom from pornography and how tools like Covenant Eyes can play a vital role. Hannah challenges traditional recovery narratives, advocating for a focus on redemption and ongoing vigilance. Join Karen and Hannah as they issue a global call to prayer for an awakening within the church and a collective commitment to protecting the next generation from the dangers of online pornography.Get More Information from Hannah at:  https://quit-porn.com______________________________________Learn More About Covenant Eyes:https://cvnteyes.co/4gb6xme______________________________________CHAPTERS:00:06 - Introduction to Hannah and Quit Porn00:58 - Hannah's Background and Expertise in Pornography Issues02:54 - The Subtle Start of Pornography Problems03:41 - Tools and Resources to Help Those Struggling04:53 - Pornography Culture in the UK07:28 - Protecting and Educating Children in the Digital Age08:54 - Equipping Parents and Caregivers11:26 - The Fastest Growing Crime: Indecent Images of Children13:16 - The Impact of Sextortion and AI Deepfakes14:54 - The Church's Role and Challenges in the UK18:40 - Support for Spouses and Women Struggling with Pornography20:03 - Advice for Christians Seeking Freedom from Pornography25:18 - Prayers for the UK and a Global Awakening26:42 - Final Advice for Parents28:28 - Closing Remarks and Call to Action#PornographyAwareness #QuitPorn #CovenantEyes #ChildProtection #DigitalSafety #OnlinePornography #RaunchCulture #UKCrime #ParentingTips #ChristianLiving #InternetSafety #PornAddiction #FamilyProtection #Accountability #ChurchAndPornography #SexualIntegrity #BetrayalTrauma #HannahQuitPorn #KarenPotter #PodcastInterviewSend us your feedback!Try Covenant Eyes for FREE today!Use Promo Code: FreePodcast © 2024 Covenant Eyes, All Rights Reserved

@BEERISAC: CPS/ICS Security Podcast Playlist
Plant-Level Cyber Risk: Who's Actually Responsible?

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 23, 2025 30:45


Podcast: Industrial Cybersecurity InsiderEpisode: Plant-Level Cyber Risk: Who's Actually Responsible?Pub date: 2025-07-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control systems. They emphasize the need for improved governance, enhanced vendor accountability, and clear ownership of cyber risk. Whether you're a CISO, CIO, or VP of Engineering, this episode offers actionable insight into bridging the IT/OT divide, securing plant floors, and building a cybersecurity strategy that works at the edge of your business.Chapters:00:00:00 - Kicking Off: Why Transparency in Cyber Matters00:00:43 - Who's Talking? Meet Craig & Dino00:01:05 - The Big Question: What's IT's Role in Industrial Security?00:01:35 - When Too Many Vendors = Chaos00:02:37 - How to Actually Secure OT Environments00:03:46 - Choosing the Right Partners (and Asking the Right Questions)00:12:37 - Why Cyber Teams Need Plant Floor Time00:14:24 - Getting Smarter: Use External Experts & Vendor Summits00:18:22 - IT Meets OT: Closing the Culture Gap00:30:03 - What Now? Practical Next Steps for CISOsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Freedom Challenge Online
Human Trafficking in USA: Lived Experience Expert with i5 Freedom Network (Part 2)

Freedom Challenge Online

Play Episode Listen Later Jul 18, 2025 46:27


In this powerful follow-up episode, Freedom Challenge Director, Tracy Daugherty, continues the conversation with Stacey Enmeier and Whisper James of the I-5 Freedom Network. Together, they dive deeper into the realities of human trafficking in the United States—how it often hides in plain sight, how technology and family dynamics play a role, and what we can do to protect and empower the vulnerable.Whisper, a lived experience expert, shares her personal journey of turning pain into purpose, while Stacey offers practical insights from her work with law enforcement and survivors. This episode is a call to action for parents, mentors, and community members to be present over protective, to build safe spaces, and to recognize that freedom begins with awareness.---Watch the interview: https://youtu.be/XK34THi3n-wRead the blog: https://www.thefreedomchallenge.com/2025/7/10/trafficking-in-usa---Want to learn more? The Freedom Challenge US: thefreedomchallenge.comOperation Mobilization USA: omusa.orgInstagram: @freedomchallengeusa / Facebook: @thefcusaSupport the show

Podcast Notes Playlist: Latest Episodes
#967 - Jeffrey Katzenberg & Hari Ravichandran - Hollywood Trouble, Big Tech & The Crisis With Kids

Podcast Notes Playlist: Latest Episodes

Play Episode Listen Later Jul 18, 2025


Modern Wisdom: Read the notes at at podcastnotes.org. Don't forget to subscribe for free to our newsletter, the top 10 ideas of the week, every Monday --------- Jeffrey Katzenberg is a media mogul, film producer, and co-founder of DreamWorks. Hari Ravichandran is a serial entrepreneur, founder, and CEO of Aura. From bringing joy to millions of childhoods through beloved Disney films to now addressing the digital challenges facing today's youth, Jeffrey Katzenberg has partnered with Hari Ravichandran to lead a new revolution focused on safeguarding the mental health and online safety of the next generation. At the heart of it all is this vital question: how do we keep children safe online? Expect to learn what Jeffery Katzenberg is up to and the current state of modern media and film, how to reinvent yourself at pivotal moments, how to get better at dealing with change and disappointment, what the data says about kids, online safety & how parents can better protect their kids online, the big problems with mental health of the younger generation & how to best address their growing issues, and much more… Sponsors: See discounts for all the products I use and recommend: https://chriswillx.com/deals Get a Free Sample Pack of LMNT's most popular Flavours with your first purchase at https://drinklmnt.com/modernwisdom Get 35% off your first subscription on the best supplements from Momentous at https://livemomentous.com/modernwisdom Get a 20% discount on Nomatic's amazing luggage at https://nomatic.com/modernwisdom Get the best bloodwork analysis in America at https://functionhealth.com/modernwisdom Timestamps: (00:00) What Jeffrey Does & What Makes a Good Story? (10:51) What Drives Jeffrey & Hari? (16:40) What's The State Of Modern Cinema? (23:04) Jeffrey & Hari on the Star Wars Universe, Gaming, & Dealing With Change (38:05) What Technology Is Doing To Younger Kids? (46:45) The Data Behind Keeping Kids Safe Online (1:00:01) Should We Ban Social Media For Anyone Under 16? (1:07:24) Why Parents Are the Key to Digital Safety (1:14:09) The Impact Of Wearable Devices & Celebrity Endorsements On Aura (1:23:24) How Early Screen Habits Affect Lifelong Patterns (1:32:51) The Hidden Costs Of Fame & How To Learn From Your Failures (1:41:32) The Trends Associated With Bullying & What Parents Can Do About It (1:51:38) Chris' Thoughts On Adolescence (1:58:50) Learn More About Jeffrey, Hari, & Aura.com Extra Stuff: Get my free reading list of 100 books to read before you die: https://chriswillx.com/books Try my productivity energy drink Neutonic: https://neutonic.com/modernwisdom Episodes You Might Enjoy: #577 - David Goggins - This Is How To Master Your Life: https://tinyurl.com/43hv6y59 #712 - Dr Jordan Peterson - How To Destroy Your Negative Beliefs: https://tinyurl.com/2rtz7avf #700 - Dr Andrew Huberman - The Secret Tools To Hack Your Brain: https://tinyurl.com/3ccn5vkp - Get In Touch: Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/modernwisdompodcast Email: https://chriswillx.com/contact - Learn more about your ad choices. Visit megaphone.fm/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
The C-Suite's Role in Industrial Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 18, 2025 25:11


Podcast: Industrial Cybersecurity InsiderEpisode: The C-Suite's Role in Industrial CybersecurityPub date: 2025-07-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cybersecurity strategies. With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency. They emphasize the need for leadership to understand and lead the charge to ensure security for industrial control systems. This episode serves as a wake-up call for executives to embrace their role in protecting their companies from potential adverse events. This episode highlights the fact that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.Chapters:00:00:00 - Meet Dino and Craig00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing SectorLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Voice of Islam
Breakfast Show Podcast 15-07-2025 - Click with Caution: Hacking, Surveillance, and the New Fight for Digital Safety | When Every Nation Kneels: Reflections from Surah Al-Jathiyah

Voice of Islam

Play Episode Listen Later Jul 15, 2025 108:02


News: Latest News/Headlines | Traffic | Weather| Sports Topic I: Click with Caution: Hacking, Surveillance, and the New Fight for Digital Safety Topic II: When Every Nation Kneels: Reflections from Surah Al-Jathiyah Presenter(s): Ahmad Ahmad Guest(s): Dr Nalin Arachchilage Professor Kevin Curran Imam Musawer Ahmed Imam Farukh Tahir Researcher(s): Arriba Chowdary, Hania Ijaz, Azka Tabassam, Komal Nawaz, Nabeela Shinwari Producer(s): Sitara Akbar & Dania Nasir

Modern Wisdom
#967 - Jeffrey Katzenberg & Hari Ravichandran - Hollywood Trouble, Big Tech & The Crisis With Kids

Modern Wisdom

Play Episode Listen Later Jul 14, 2025 119:36


Jeffrey Katzenberg is a media mogul, film producer, and co-founder of DreamWorks. Hari Ravichandran is a serial entrepreneur, founder, and CEO of Aura. From bringing joy to millions of childhoods through beloved Disney films to now addressing the digital challenges facing today's youth, Jeffrey Katzenberg has partnered with Hari Ravichandran to lead a new revolution focused on safeguarding the mental health and online safety of the next generation. At the heart of it all is this vital question: how do we keep children safe online? Expect to learn what Jeffery Katzenberg is up to and the current state of modern media and film, how to reinvent yourself at pivotal moments, how to get better at dealing with change and disappointment, what the data says about kids, online safety & how parents can better protect their kids online, the big problems with mental health of the younger generation & how to best address their growing issues, and much more… Sponsors: See discounts for all the products I use and recommend: https://chriswillx.com/deals Get a Free Sample Pack of LMNT's most popular Flavours with your first purchase at https://drinklmnt.com/modernwisdom Get 35% off your first subscription on the best supplements from Momentous at https://livemomentous.com/modernwisdom Get a 20% discount on Nomatic's amazing luggage at https://nomatic.com/modernwisdom Get the best bloodwork analysis in America at https://functionhealth.com/modernwisdom Timestamps: (00:00) What Jeffrey Does & What Makes a Good Story? (10:51) What Drives Jeffrey & Hari? (16:40) What's The State Of Modern Cinema? (23:04) Jeffrey & Hari on the Star Wars Universe, Gaming, & Dealing With Change (38:05) What Technology Is Doing To Younger Kids? (46:45) The Data Behind Keeping Kids Safe Online (1:00:01) Should We Ban Social Media For Anyone Under 16? (1:07:24) Why Parents Are the Key to Digital Safety (1:14:09) The Impact Of Wearable Devices & Celebrity Endorsements On Aura (1:23:24) How Early Screen Habits Affect Lifelong Patterns (1:32:51) The Hidden Costs Of Fame & How To Learn From Your Failures (1:41:32) The Trends Associated With Bullying & What Parents Can Do About It (1:51:38) Chris' Thoughts On Adolescence (1:58:50) Learn More About Jeffrey, Hari, & Aura.com Extra Stuff: Get my free reading list of 100 books to read before you die: https://chriswillx.com/books Try my productivity energy drink Neutonic: https://neutonic.com/modernwisdom Episodes You Might Enjoy: #577 - David Goggins - This Is How To Master Your Life: https://tinyurl.com/43hv6y59 #712 - Dr Jordan Peterson - How To Destroy Your Negative Beliefs: https://tinyurl.com/2rtz7avf #700 - Dr Andrew Huberman - The Secret Tools To Hack Your Brain: https://tinyurl.com/3ccn5vkp - Get In Touch: Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/modernwisdompodcast Email: https://chriswillx.com/contact - Learn more about your ad choices. Visit megaphone.fm/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 9, 2025 24:25


Podcast: Industrial Cybersecurity InsiderEpisode: Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant FloorPub date: 2025-07-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The System Integrator's Role in Supporting OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 4, 2025 32:38


Podcast: Industrial Cybersecurity InsiderEpisode: The System Integrator's Role in Supporting OT SecurityPub date: 2025-07-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity.Key Issues Identified:Organizations typically work with multiple specialized integrators across different facilities and systemsSome SIs lack cybersecurity expertise, focusing primarily on equipment functionalityEquipment can remain connected to networks for decades, with ownership and oversight changing hands over timeSystem integrators must exercise proper IT coordination to implement remote access solutions effectivelyRecommendations:IT and OT teams should collaborate more closely with system integrators on cybersecurity planningOrganizations need to evaluate their SIs' cybersecurity capabilities and partnershipsConsider standardizing on integrators with demonstrated cybersecurity practices and vendor certificationsApply the same due diligence used for IT vendor selection to OT system integratorsBottom Line: System integrators are essential partners in executing industrial cybersecurity strategies and protection. Organizations must actively engage them in security conversations and ensure they have the necessary skills and partnerships to implement secure solutions for their plant environments from the start.Chapters:00:00:00 - Real-World Ransomware Hits the Plant Floor00:00:52 - Meet the System Integrators Shaping Your OT Plant Floor Security00:01:17 - What System Integrators Really Do (and Don't)00:04:13 - Remote Access: The Hidden Backdoor Nobody Sees00:08:34 - Why Ongoing Monitoring Is Non-Negotiable00:13:30 - How to Pick the Right System Integrator For Your Operations00:26:17 - Building Strong Partnerships with Your IntegratorsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
When IT Cyber Events Bring Down the Plant Floor

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 27, 2025 29:47


Podcast: Industrial Cybersecurity InsiderEpisode: When IT Cyber Events Bring Down the Plant FloorPub date: 2025-06-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino break down how cyberattacks that start in traditional IT systems can shut down entire manufacturing production lines, leading to massive financial losses. Using real-world examples like UNFI's $500 million drop in market value in 60 hours, they explain how overlooked connections between IT and the OT plant floor are often the weakest links. You'll hear why simply installing firewalls isn't enough, how organizational silos between IT and operations cause major blind spots, and what it really takes to secure industrial equipment. Whether you're in leadership, technology, or operations, this episode will change how you think about cyber risk and business continuity in connected environments.Chapters:00:00:00 - Introduction: Where Responsibility Ends and Authority Doesn't Begin00:01:08 - Meet Your Guides: Dino & Craig On the Frontlines00:01:14 - When Cyber Hits the Plant Floor00:01:28 - Real-World Wake-Up: The Unify IT Incident00:02:36 - The Gaps No One's Watching in OT Security00:03:18 - How Org Structure Can Make or Break Cyber Defense00:04:03 - Plugging in OT Visibility: IDS in Action00:04:43 - Who's Really Calling the Shots—Corporate or the Plant?00:07:02 - IT-OT Convergence: What Leaders Must Understand00:13:14 - Building Cyber Defense That Actually Works00:15:25 - Recovery Starts Before the Breach00:17:37 - Why IT Alone Can't Fix OT Problems00:24:55 - Just Getting Started? Here's What to Do First00:28:33 - Final Word: You Can't Secure OT AloneLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Our Future STRONG
Raising Future-Ready Kids: Top Social-Emotional Skills & Digital Safety Hacks Every Parent Must Know

Our Future STRONG

Play Episode Listen Later Jun 24, 2025 13:26


For more podcasts and videos on motivation and unstoppable momentum, visit: http://futurestrong.org/podcastshttp://futurestrong.org/videosTo build a whole child: https://futurestrong.org/2022/05/06/essential-real-life-skills-to-start-teaching-your-child-at-any-age-video/Learn more about our Digital Lives And Detox HERE: https://futurestrong.org/project/truth-about-tech/For content copyright and disclaimer, please visit: https://futurestrong.org/copyright/** Content Disclaimer ** This podcast has been created with the help of AI, using content from the FutureSTRONG Academy blog library. We're grateful for the insights shared and hope they bring value to your day! #FutureSTRONGAcademy #RNS #OurFutureSTRONG

@BEERISAC: CPS/ICS Security Podcast Playlist
When CISOs Inherit the Plant Floor: What Happens Next?

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 19, 2025 28:50


Podcast: Industrial Cybersecurity InsiderEpisode: When CISOs Inherit the Plant Floor: What Happens Next?Pub date: 2025-06-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when the CISO inherits responsibility for the security of the plant floor?Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility.A perpetuating trend exists where cybersecurity leaders are expected to protect factories and industrial assets without the authority, tools, or support to do so effectively.In this conversation, Dino and Craig explain why traditional IT security approaches don't work in these environments, and how things like outdated equipment, disconnected systems, and outside vendors make the challenge even harder. From weak remote access tools to the confusion around who actually manages plant security, this episode shines a light on the hidden risks most companies overlook.Whether you're in IT, operations, or a leadership role, you'll walk away with a better understanding of how to approach cybersecurity in complex industrial settings.You'll also gain insights into the steps you can take to protect your people, your technology, and your bottom line.Chapters:00:00:00 - Kicking Off: Smart Tool Choices Start Here00:01:02 - When CISOs Inherit the Factory Floor00:02:17 - Making Friends with OEMs and Integrators00:04:47 - Why OT Security Is a Whole Different Beast00:08:50 - Cyber Budgets: Where's the Money Really Coming From?00:13:10 - How to Actually Roll Out Security in the Plant00:18:35 - VPNs Aren't Enough: Fixing Remote Access00:24:42 - What OT Incident Response Really Looks Like00:27:17 - Wrapping It Up: Strategy, Buy-In, and What's NextLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Best of Azania Mosaka Show
Tech Feature: AI books introduce kids to the basics of Al

The Best of Azania Mosaka Show

Play Episode Listen Later Jun 17, 2025 22:08


Relebogile Mabotja speaks to Zanele Ngwamba and Mpho Mokoena the Co-authors of Digital Safety for Kids discussing how Mpho and Zanele created two beautifully crafted, child-friendly books. One introduces the basics of AI by breaking down how children already engage with it daily from smart assistants to YouTube recommendations. The other empowers kids with the fundamentals of digital safety: how to protect their privacy, spot red flags online, and build safe habits from the start. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into the worlds of entertainment and leisure. Thank you for listening to a 702 Afternoons with Relebogile Mabotja podcast. Listen live on Primedia+ weekdays from 13:00 to 15:00 (SA Time) to Afternoons with Relebogile Mabotja broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/2qKsEfu or find all the catch-up podcasts here https://buff.ly/DTykncj Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.

The Social-Engineer Podcast
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 16, 2025 36:52


REPLAY (Original Air Date Oct 21, 2024)   Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-platform screen production, culminated in the founding of Lively, which we will hear all about on this podcast. Since 2002, Stacey has been designing and delivering enterprise-wide cyber safety upskilling programs. In 2023, embodying her mission to make knowledge accessible, Stacey launched 'Dodgy or Not?' – a social enterprise offering an engaging approach to digital safety education.   She continues to bridge the gap between emerging technologies and practical education, driving innovation in AI ethics and digital literacy - she is also known for deepfaking herself. [Oct 21, 2024]   00:00 - Intro 00:19 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:00 - Stacey Edmonds Intro 04:18 - Teaching, Trains & Turkeys 08:43 - Toilets vs Videos 11:16 - Dodgy or Not? 15:15 - Social Engineering for Good! 17:46 - Pause for the Cause 20:17 - Training in Real Time 24:11 - Real Time Threat Detection 27:49 - Culture is Everything 30:33 - Find Stacey Edmonds online -          LinkedIn: in/staceyedmonds/ 31:28 – Mentors -          Carolyn Breeze -          Chris Hadnagy -          Janine Thompson -          Steve Rowe -          Shane Bell 33:58 - Book Recommendations -          Feel The Fear and Do It Anyway - Susan Jeffers -          The Hitchhiker's Guide to the Galaxy - Douglas Adams -          1984 - George Orwell -          Man-Made – Tracey Spicer 35:51 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Scrolling 2 Death
Digital safety: What every parent should know (with Lavanya Gupta)

Scrolling 2 Death

Play Episode Listen Later Jun 16, 2025 27:15


Lavanya Gupta, CEO and Founder of Silana Learning and a former Meta employee, is raising awareness about the hidden dangers of tech. With insight into the inner workings of Big Tech, she made the deliberate choice to keep her young daughters offline. But when the pandemic hit and remote learning became a necessity, she realized the inescapable - and often harmful - role that digital platforms can play, even in the classroom.Many parents assume that school-approved apps are safe, but Lavanya warns otherwise. Her top concern? Data privacy. “Schools are consenting on behalf of parents without considering long-term consequences,” she says. Invited by her children's school to help shape tech policies, she found her mission: empowering parents to protect their kids online.Lavanya shares practical strategies for digital safety, rates apps based on the strength of their parental controls, and offers guidance on age-appropriate media use - all backed by research and real-world insights.Don't miss this conversation with Nicki from Scrolling 2 Death and Lavanya Gupta - packed with tips, best practices, and must-know advice to keep your kids safe online.Hindenburg Research Report

@BEERISAC: CPS/ICS Security Podcast Playlist
Reflections from the Front Lines of Industrial Cyber Failures

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 16, 2025 21:58


Podcast: Industrial Cybersecurity InsiderEpisode: Reflections from the Front Lines of Industrial Cyber FailuresPub date: 2025-06-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud's role on the plant floor. The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor.Chapters:00:00:00 - Cyber threats are moving faster than your patch cycle00:00:47 - Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks00:07:48 - The #1 Myth Putting Your Industrial OT Assets at Risk00:15:01 - Patch Management and Software Updates: IT versus OTLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
What Every CISO Gets Wrong About OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 6, 2025 20:51


Podcast: Industrial Cybersecurity InsiderEpisode: What Every CISO Gets Wrong About OT SecurityPub date: 2025-06-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. But is it truly convergence or more of a collision? Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence. From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.Chapters:00:00:00 - Opening Shot: Who's Really in Charge—CIOs or the Plant Floor?00:00:57 - Collision Course: IT and OT Can't Keep Dodging Each Other00:01:52 - Two Worlds, One Mission: Why OT Isn't Just “IT in a Hard Hat”00:04:07 - When Convergence Fails: What's Missing in the Middle00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor00:10:46 - OT's Tipping Point: Will the Next Move Come from IT, or the Shop Floor?00:17:32 - Your Move: What Leaders Must Do Next (Before It's Too Late)Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 29, 2025 29:45


Podcast: Industrial Cybersecurity InsiderEpisode: OT Security in Hindsight: Visibility, Authority, and the Executive DisconnectPub date: 2025-05-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special rewind edition of Industrial Cybersecurity Insider, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into a compact, high-impact listen. Whether you're navigating remote access risks, managing hybrid architectures, or striving to align plant managers with corporate cybersecurity goals, these reflections are a roadmap for driving resilience and maturity in your OT security strategy.Chapters:00:00:00 - Rewind Kickoff: From Blind Spots to Bold Predictions00:00:46 - The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort00:10:57 - Gartner, DOGE, and the Future of OT Cybersecurity Policy00:21:38 - Uncovering Blind Spots in OT CybersecurityLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging the IT-OT Divide with AI-Powered Insight

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 23, 2025 17:00


Podcast: Industrial Cybersecurity InsiderEpisode: Bridging the IT-OT Divide with AI-Powered InsightPub date: 2025-05-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig tackle one of the most misunderstood challenges in cybersecurity for industrial environments. The persistent disconnect between IT-led cybersecurity tools and operational technology realities.They explore the concept of "shadow OT," as well as the limits of traditional IDS deployments.They discuss why visibility is key to protecting critical systems. Vulnerability scanning alone isn't enough.Real world case studies reveal how failing to engage OT teams derails cybersecurity strategies. One case involved rogue servers causing daily production failures. Another featured misconfigured modules choking brewery operations. These examples show that even the most advanced strategies fail without OT team involvement.For leaders in manufacturing, utilities, and critical infrastructure, this is a must-listen conversation. It's about redefining risk management through OT-first thinking.Chapters:00:00:00 - When Machines Stop, Money Bleeds: The Downtime Dilemma00:00:47 - Shadow IT or Ingenious OT? Rethinking Rogue Tech00:02:29 - Cybersecurity Isn't Enough: The OT Risk You're Missing00:04:37 - Server Ghosts & Brewery Blunders: Fixing What IT Can't See00:06:41 - Visibility is Power: Using the Tools You Already Own00:09:50 - IT vs. OT: Breaking Silos, Building Alliances00:13:28 - Final Thoughts: Who Really Owns OT Security?Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Capitol Pressroom
Promoting digital safety for kids in New York

The Capitol Pressroom

Play Episode Listen Later May 15, 2025 27:58


May 15, 2025 - Common Sense Media Senior Counsel for Tech Policy Holly Grosshans and Counsel for Tech Policy Brenna Leasor discuss a package of bills designed to keep New Yorkers, especially kids, safe as they navigate social media and utilize artificial intelligence companions.

@BEERISAC: CPS/ICS Security Podcast Playlist
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 15, 2025 35:09


Podcast: Industrial Cybersecurity InsiderEpisode: Visibility Revisited: Trends Shaping the Future of OT CybersecurityPub date: 2025-05-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity.Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated OT cybersecurity roles.We address the critical need for alignment between capital and operational expenditures, and the importance of selecting technologies that provide actionable visibility across diverse plant environments. Listeners will gain strategic guidance on integrating cybersecurity into capital planning, addressing asset variability across sites, and implementing scalable, non-disruptive security frameworks. From OT-specific IDS deployment to balancing remote access with zero-trust principles, this episode offers practical, forward-looking advice.Whether you're a practitioner or a decision-maker, focused on securing extended IIoT environments while maintaining operational resilience, this episode covers practical and relatable challenges and solutions.Chapters:00:00:00 – A Strategic Rewind: Exploring the Emerging Roles, Budget Realities, and Lessons Learned in OT Cybersecurity00:00:41 - Gartner, DOGE, and the Future of OT Cybersecurity Policy00:12:12 - The Future Looks Bright : Building a Career in OT Cybersecurity00:22:44 - AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with ClarotyLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Stuxnet to Colonial Pipeline What Have We Learned & What's on the Horizon?

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 7, 2025 32:55


Podcast: Industrial Cybersecurity InsiderEpisode: Stuxnet to Colonial Pipeline What Have We Learned & What's on the Horizon?Pub date: 2025-05-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. From his early fascination with hacking culture to leading OT security for one of the world's largest engineering firms, Mike shares personal insights and lessons learned. The conversation covers the delayed cybersecurity maturity in OT environments and the lasting impact of the Colonial Pipeline breach.They address the crucial role of visibility, engineering partnerships, and cultural buy-in when building secure industrial systems. Whether you're managing pipelines, power grids, or manufacturing floors, this episode delivers actionable insights and strategic foresight for leaders protecting our most vital infrastructure.Chapters:00:00:00 - Why OT Security Still Falls Behind00:01:03 - Mike Holcomb's Unlikely Path to Cybersecurity00:01:23 - Hacking Curiosity and a Love for Breaking Things00:02:16 - From Network Admin to OT Defender00:03:08 - Stuxnet, Colonial, and the Wake-Up Calls We Ignored00:06:18 - When OT and IT Don't Speak the Same Language00:12:14 - Threats Are Getting Smarter — Are We Keeping Up?00:26:29 - Evolving the Culture of Cyber Hygiene00:32:14 - Final Takeaways for Security LeadersLinks And Resources:Mike Holcomb on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 1, 2025 31:51


Podcast: Industrial Cybersecurity InsiderEpisode: Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, CyoloPub date: 2025-04-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized security tools - or "shelfware." From real-world examples involving breweries, milk production, and energy plants, the conversation uncovers how lack of visibility, broken remote access practices, and aging systems create critical vulnerabilities. Most importantly, Kevin offers actionable advice for CISOs, CTOs, and plant managers on building resilient cybersecurity frameworks without disrupting operations. Don't miss this episode full of practical advice from industry experts.Chapters:00:00:00 - Kicking Off: Why OT Cybersecurity Can't Wait00:01:18 - Meet Kevin Kumpf: From Bank Vaults to Industrial Battlegrounds00:02:56 - Hard Truths About Securing Operational Technology00:06:42 - Shelfware Syndrome: Why Tools Fail Without Strategy00:12:09 - Plant Managers, Vendors, and the Battle for Cyber Resilience00:23:56 - Remote Access Exposed: The Hidden Risks Inside Your Plant00:30:58 - Closing Thoughts: Building Stronger, Smarter Industrial DefensesLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Cyber Threats, China, and the Global Wake-Up Call

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 25, 2025 27:04


Podcast: Industrial Cybersecurity InsiderEpisode: Cyber Threats, China, and the Global Wake-Up CallPub date: 2025-04-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have never been higher. From end-of-life PLCs still running core operations, to the disconnect between IT and OT leadership, this conversation identifies the systemic gaps leaving industrial operations exposed. They outline the pressing need for visibility, actionable incident response plans, and a cultural shift toward collaboration across the stack, from plant floor to the boardroom. Whether you're a CISO or an operations lead, this episode offers real-world insights, battle-tested perspectives, and one clear takeaway: in cybersecurity, doing nothing is no longer an option.Chapters:00:00:00 - Kicking Off: Why IT-OT Unity Isn't Optional Anymore00:01:17 - Cyber Threats, China, and the Global Wake-Up Call00:02:16 - CISA's New Role: From Background Player to OT Ally00:05:32 - Still Separate, Still Vulnerable: Why IT & OT Must Sync Up00:09:48 - Blind Spots Kill: Why Visibility Is the Real MVP00:10:43 - Remote Access Realities and the Myth of the Air Gap00:20:29 - Crisis Mode: Are You Ready for the Worst?00:23:50 - Dino & Craig's Parting Shot: Do Something - NowLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Future of Security Operations
Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

The Future of Security Operations

Play Episode Listen Later Apr 22, 2025 42:05


In this week's episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark's experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys. In this episode: [02:06] His early career journey - from a mathematics background to building early online banking systems [03:32] What's kept Mark excited about security for over two decades [04:40] The compound benefits of growing within a company over time [07:20] Mark's leadership style - defined by transparency, directness, and genuine care for his teammates [12:45] Communicating the business trade-off between risk and return [16:45] Reflecting on the team's response to major incidents at Riot Games [21:00] The unique challenges of securing gaming platforms [26:30] How Mark approaches strategy and planning in the fintech space [28:08] The case for building strong, partnership-driven vendor relationships [31:13] Creating space for creativity - without spreading the team too thin [34:35] Empowering his team to speak openly - even if it means calling him out [36:35] The inspiration behind Mark's books Digital Safety for Parents and The Security Path [40:20] Connect with Mark Where to find Mark: LinkedIn Brex Where to find Thomas Kinsella: LinkedIn Tines Resources mentioned: The Security Path - click here to redeem a free copy for podcast listeners (first come, first serve) Digital Safety for Parents - click here to redeem a free copy for podcast listeners (first come, first serve) Mark's talk during his time at Riot Games in 2016

Homeschooling Families by Teach Them Diligently
Digital Safety for Kids: Practical Steps to Protect Your Children Online | 343

Homeschooling Families by Teach Them Diligently

Play Episode Listen Later Apr 17, 2025 43:40


Are you concerned about your child's safety in the digital age? In this important Teach Them Diligently podcast episode, Leslie Nunnery and Kevin Cronister offer practical, actionable advice for parents. Learn how to establish open communication, set boundaries for online friendships, and monitor your child's activities while respecting their privacy. Kevin shares crucial insights on recognizing grooming tactics and provides a step-by-step guide on what to do if your child is victimized online, including preserving evidence, reporting procedures, and the vital need for emotional support. This episode is a must-listen for any parent navigating the complexities of raising children in today's digital world. Meet the Guest: Kevin Cronister is a 15-year law enforcement veteran. He currently serves as a Detective with the Internet Crimes Against Children (ICAC) Task Force in the Kansas City Metro Area. He's a Squad Leader, as well as a Ballistic Shield Operator and Firearms Instructor for SWAT. Kevin earned his master's degree in forensic psychology and holds numerous certifications, such as Advanced Interview & Interrogation through the Federal Bureau of Investigation (FBI), Crisis Intervention Team (CIT) certified for responding to issues with those in mental health crises, and Advanced Digital Forensic Analysis for the iOS and Android operating system. He is a certified Force Science Analyst and currently serves on the Use of Force Review Board for his agency. Kevin is currently enrolled in the McAfee Institute's Certified Expert in Cyber Crime Investigation (CECI) program. He trains mixed martial arts and obtained his brown belt in Brazilian Jiu-Jitsu from UFC veteran Trey Ogden at Marathon MMA in Overland Park, Kansas. Kevin is the Chief Operating Officer (CEO) of Guardian Training Solutions, LLC., a law enforcement education and training company teaching tactical and investigative courses both in-person and online.  Key Takeaways: Understand Online Dangers & Grooming: Parents must be aware of the specific threats children face online, including the manipulative tactics of grooming.Foster Open Communication: Creating a safe space for children to talk about their online experiences is crucial for early intervention and support.Establish Clear Online Rules & Boundaries: Setting guidelines for online friendships, interactions, and screen time is essential for safety.Monitor Responsibly & Respect Privacy: Parents should oversee online activity while fostering trust and respecting their child's appropriate boundaries.Respond Calmly & Preserve Evidence: If victimization occurs, a calm parental response and proper preservation of digital evidence are vital first steps.Prioritize Reporting & Seek Support: Timely reporting to law enforcement and providing emotional support are essential for the child's well-being and accountability.https://youtu.be/ESkT6N1j1aQ Podcast Sponsor: For years, Action Bible resources have helped homeschool kids better understand the Bible and grow their faith in Jesus. Bestselling Action Bible illustrated books, Bibles, and games can be purchased wherever books are sold. Click HERE to purchase your copies today. Additional Resources: Find out more about Kids Digital Health HEREFind out more about Guardian Training Solutions HERE 

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Afternoon Drive with John Maytham
The rise of “influencer gangsters”

Afternoon Drive with John Maytham

Play Episode Listen Later Mar 20, 2025 9:55


Dan Corder is joined by renowned investigative journalist and author Caryn Dolley to discuss the growing intersection of social media and crime, highlighting cases where criminals flaunt illegal activities online. They explore how platforms like TikTok and Instagram are used for recruitment, deception, and misinformation.See omnystudio.com/listener for privacy information.

Risky Women Radio
Risk & Compliance Against Technology-Facilitated Domestic Violence

Risky Women Radio

Play Episode Listen Later Mar 19, 2025 39:36 Transcription Available


Kim Chandler McDonald, co-founder and CEO of 3 Steps Data and Global VP of CyAN, discusses her diverse career journey from theater to tech, emphasizing her advocacy for democratizing technology and combating technology-facilitated domestic violence. She highlights the importance of end-to-end encryption for data security and privacy. Kim shares her experiences, including interviewing global leaders and becoming an emergency forest firefighter. She advocates for proactive compliance and robust risk strategies to protect vulnerable users. SHOW NOTES 00:23 Career Journey 06:59 Advocacy and End-to-End Encryption 12:58 Technology-Facilitated Domestic Violence 26:11 CyAN's Role in Cybersecurity 28:48 Future Innovations and Recommendations

Ignite Ur Wellness
282. How Wellness Entrepreneurs Can Build a Digital Safety Net & Create Business Resilience

Ignite Ur Wellness

Play Episode Listen Later Mar 4, 2025 32:43


Ready to discover how you as a wellness entrepreneur and hands-on practitioner can safeguard your businesses against unexpected events? In this episode, we dig into building a digital safety net with a strong online presence, offering practical steps to maintain revenue amidst life's surprises. I'll teach you how you can create an engaged online audience, leverage Instagram for growth, and the significance of documenting client successes. Get ready to learn how to effectively transition services online, ensuring business continuity while staying relevant in the wellness marketplace. Don't miss these essential strategies to future-proof your practice and widen your client reach.Key Takeaways:Building a proactive digital presence is essential for wellness practitioners to de-risk their business and prepare for unforeseen events like injuries or health issues.Creating a savings fund of three to six months of business revenue provides a financial cushion during unexpected downturns.Curating engagement through an online audience and developing a content library can open new revenue avenues and offer flexibility in client servicing.Virtual services provide resilience to businesses during crises, offering practitioners a way to maintain revenue and client support.Regularly updating and optimizing social media and marketing efforts can differentiate a practitioner's services and expand their reach beyond local communities.Instagram Message Makeover Clinic →  Doors are open. Get in here: https://alison-mclean.mykajabi.com/messaging-makeover-clinicFollow me on Instagram →  igniteyourwellnessbusinessReady to work with me? Book a coaching call on my website!→ https://igniteurwellness.com/business-coach-for-health-coaches/

ITSPmagazine | Technology. Cybersecurity. Society
Breaking the Spell: How to Avoid the Grand Delusion in Zero Trust | A Conversation with Dr. Chase Cunningham at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 25, 2025 9:34


At ThreatLocker Zero Trust World 2025 in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled The Grand Delusion. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.Challenging the Status QuoCunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn't be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.Zero Trust as a Strategy, Not Just a TermThe session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.Actionable Steps for Small BusinessesCunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.The Future of Zero TrustLooking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today's digital world.Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.Guest

HealthCare UnTold
Aaron Painter CEO at Nametag: Protecting Our Digital Identities

HealthCare UnTold

Play Episode Listen Later Feb 14, 2025 25:15


Our guest today is Aaron Painter, the CEO of Nametag. Aaron shares his journey from a 14-year career at Microsoft, where he held various leadership roles across multiple countries, to founding Nametag. Driven by his personal experiences with online fraud and identity theft, Aaron has created cutting-edge technology that offers unprecedented protection from digital manipulation and impersonation fraud.Aaron discusses the evolution of fraud, from simple check scams to sophisticated digital impersonation using deepfakes, and highlights the surge in remote work-related security threats, especially in health care. He explains how Nametag's DeepFake Defense technology verifies authentic identities. Aaron also provides some practical ways to help protect your digital identity.HealthCare UnTold recognizes Aaron Painter and Name Tag for their dedication to identity safety.#DigitalSafety#ProtectYourData#SecureYourInformation#ThinkBeforeYouClick#ProtectYourDigitalIdentity

Feminist Buzzkills Live: The Podcast
Should I Be Scared? We'll Let You Know. With Bitch & Amy Merrill

Feminist Buzzkills Live: The Podcast

Play Episode Listen Later Feb 14, 2025 59:16


Full episode transcript HERE. Roses are red, violets are blue, we're ready to fuck some shit up – how about you? Nothing says “love” like living through the current soul scorchings and still showing up every day to make a difference! On this week's pod, your Feminist Buzzkills are diving deep into Indiana gutting HIPAA for abortion patients, redefining and coming after birth control, and how some badass Indiana doctors are fighting back! What does that mean for the rest of us not living there? A whole hell of a lot! PLUS, remember that New York doctor who prescribed a pregnant person in Dallas abortion pills? Well, Louisiana and Texas are in full-on hater mode, and we've got some big updates on the case. AND WE'VE GOT GUESTS! Who are our V-Day partners in crime this week? Everyone's fav witchy Valentine, Bitch is in the house! The legendary musician, writer, and performance artist sits down with your Buzzkills to yap about her new show, “B*TCHCRAFT,” moving forward in Trump's hellscape, and healing and resisting through art and community! Valentine #2, Amy Merrill, is here too! We break down the recent flurry of assaults on medication abortion with the Co-Founder and Co-Director of Plan C. Amy helps us navigate the case of the NY doctor being sued for sending abortion pills through the mail, and how abobo patients can better protect themselves – especially as we are heading into the abortion upside down. Times are heavy, but knowledge is power, y'all. We gotchu.  OPERATION SAVE ABORTION: You can still join the 10,000+ womb warriors fighting the patriarchy by listening to our five-part OpSave pod series and Mifepristone Panel by clicking HERE for episodes, your toolkit, marching orders, and more. HOSTS:Lizz Winstead IG: @LizzWinstead Bluesky: @LizzWinstead.bsky.socialMoji Alawode-El IG: @Mojilocks Bluesky: @Mojilocks.bsky.social SPECIAL GUESTS:Bitch IG: @BitchMusic TikTok: @Bitch_Music Amy Merrill  IG: @AmyJMerrill / @PlanCPills TW/TikTok: @PlanCPills BlueSky: @PlanCPills.bsky.social GUEST LINKS:Plan C Pills WebsiteDONATE: Plan CYou Always Have Options WebsiteJulie Care WebsiteMiscarriage + Abortion HotlineIf/When/How: Lawyers for Reproductive CareBitch Music WebsiteBitch's LinktreeTICKETS: B*tchcraft Tour NEWS DUMP:SAVE Act Would Undermine Voter Registration for All AmericansTrump State Department Official Has Repeatedly Called for Mass Sterilization of ‘Low-IQ Trash'Pine Needles Shown to Cause Abortions in CowsIndiana Abortion Providers Sue to Keep State Records PrivateCondoms, IUDs Removed From Indiana Bill Seeking to Expand Birth Control AccessTexas Judge Fines New York Doctor for Prescribing Abortion Pills to a Woman Near DallasShield Laws for Reproductive and Gender-Affirming Health Care: A State Law GuideWhat to Know About Stocking up on the Abortion Pill EPISODE LINKS:Adopt-A-Clinic: Women's Health Center of Maryland Amazon WishlistBuy a Michael Shannon & Jason Narducy Tour Poster to Benefit AAF!ACTION: Mutual Aid LASTREAM: No One Asked You on JoltEMAIL your abobo questions to The Feminist BuzzkillsOperation Save AbortionSIGN: Repeal the Comstock ActAAF's Abortion-Themed Rage Playlist FOLLOW US:Listen to us ~ FBK Podcast Instagram ~ @AbortionFrontBluesky ~ @AbortionFrontTikTok ~ @AbortionFrontFacebook ~ @AbortionFrontYouTube ~ @AbortionAccessFront TALK TO THE CHARLEY BOT FOR ABOBO OPTIONS & RESOURCES HERE!PATREON HERE! Support our work, get exclusive merch and more! DONATE TO AAF HERE!ACTIVIST CALENDAR HERE!VOLUNTEER WITH US HERE!ADOPT-A-CLINIC HERE!EXPOSE FAKE CLINICS HERE!GET ABOBO PILLS FROM PLAN C PILLS HERE!When BS is poppin', we pop off!

HIListically Speaking with Hilary Russo
Ep175 - Ending Child Trafficking and Exploitation with Erin Williamson

HIListically Speaking with Hilary Russo

Play Episode Listen Later Jan 8, 2025 41:29 Transcription Available


Over 50 million individuals are trapped in human trafficking globally, with 25% being children. How can you ensure your child is safe? Erin Williamson of Love146, an organization devoted to ending human trafficking and labor exploitation, shares her personal journey from Kenya to the United States, debunking myths that trafficking only affects women and girls, and emphasizes the need for inclusive education to protect all children. From holistic support and survivor care for victims and their families to the importance of community vigilance and digital safety, host Hilary Russo asks Erin the tough questions to keep your family safe and aware. ⁣ ⁣ HUMAN TRAFFICKING HOTLINE⁣ 888-373-7888⁣⁣ CONNECT WITH ERIN WILLIAMSON AND LOVE146⁣ https://love146.org/caregivers/https://www.instagram.com/love146⁣ https://www.facebook.com/love146.org/⁣https://www.linkedin.com/in/erin-williamson-5b88b58b⁣ ⁣ EXPLORE HAVENING TECHNIQUES TRAININGS & WORKSHOPS⁣ https://www.hilaryrusso.com/training⁣ ⁣ GET BRAIN CANDY DELIVERED TO YOUR INBOX⁣ ⁣ https://www.hilaryrusso.com/braincandy⁣ ⁣ WORK WITH HILARY ⁣ https://www.hilaryrusso.com/havening⁣ ⁣ CONNECT WITH HILARY⁣ https://www.hilaryrusso.com⁣https://www.linkedin.com/in/hilaryrusso⁣https://www.instagram.com/hilaryrusso⁣https://www.youtube.com/hilaryrusso⁣https://www.hilaryrusso.com/podcast⁣ ⁣ MUSIC by Lipbone Redding⁣ https://www.lipbone.com/⁣

ITSPmagazine | Technology. Cybersecurity. Society
The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 10, 2024 26:02


Guest: Ravi Nayyar, PhD Scholar, The University Of SydneyOn LinkedIn | https://www.linkedin.com/in/stillromancingwithlife/At AISA AU Cyber Con | https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.The Cyber Zoo: Ravi Nayyar's Research FocusRavi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.The Role of Humans in CybersecurityAt the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.The Case for Stronger Cyber LawsRavi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.Global Cooperation and the Fight Against Regulatory ArbitrageThe discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.Incentivizing Secure PracticesDelving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.Closing Thoughts: Collaboration for a Safer Digital WorldSean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesThe theory of saving the world: Intervention requests and critical infrastructure: https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNriflLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Stranger Danger, Phishing, Instinct, and Technology: How AI and Awareness Are Shaping Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Benji Zorella and Rebecca Caldwell | On Location Coverage

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 4, 2024 30:08


Guests: Benji Zorella, eLearning Instructional Designer, CyberCXOn LinkedIn | https://www.linkedin.com/in/benjiz/Rebecca Caldwell, Phishing Content Specialist, Phriendly PhishingOn LinkedIn | https://www.linkedin.com/in/bec-j-caldwell/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesKicking off the episode, Sean Martin and Marco Ciappelli highlight the uniquely local flavor of the conference. With Benji and Bec calling Melbourne home, the guests reflect on the value of attending such a prominent event in their backyard while drawing on their experiences as hosts of their own cybersecurity podcast.Unmasking Phishing in the Digital AgePhishing takes center stage as Benji and Bec share stories and insights about the dangers lurking behind cleverly crafted scams. Sean Martin draws a clever comparison between traditional fishing methods and the digital phishing tactics cybercriminals use today—hooking victims by exploiting their trust and curiosity.Benji drives the conversation deeper, explaining how a person's digital footprint—especially in an age of AI-driven tools like deepfakes—can be weaponized for deception. The guests underscore the importance of remaining vigilant and minimizing the personal information we leave online, turning our digital habits into our best line of defense.Cybersecurity Education: The First Line of DefenseShifting gears, the group emphasizes the need to move beyond relying solely on tech-driven safeguards and focus on building a culture of cybersecurity awareness within organizations. Bec Caldwell shares actionable strategies, likening cybersecurity education to learning how to drive—starting small and gradually building confidence in spotting risks. Empowering employees to question suspicious contexts fosters not just better security, but a collaborative culture of accountability.AI: Friend or Foe?The role of AI emerges as a hot topic, sparking a discussion about its dual impact on cybersecurity. While AI enables sophisticated phishing attacks, it also holds the potential to strengthen defenses. The panel imagines AI tools evolving to provide real-time security nudges, similar to how cars alert drivers to potential hazards. It's a balancing act, as AI must be wielded thoughtfully to enhance—not replace—human vigilance.The Human Factor in CybersecurityThroughout the conversation, one message resonates: the enduring power of human intuition. Benji recounts a gripping story of a CEO who thwarted a highly advanced phishing attempt with a simple, old-school phone verification. This moment reinforces the idea that while tech can improve security measures, the human touch remains irreplaceable.Future-Proofing CybersecurityAs the episode winds down, the group reflects on thought-provoking audience questions from the conference. From AI's impact on CISO responsibilities to how generational shifts in digital communication shape cybersecurity strategies, the guests underscore the need for adaptability as both technology and society evolve.A Final Call to ActionMarco Ciappelli and Sean Martin wrap up with a clear takeaway for their listeners: stay curious, ask questions, and embrace skepticism online. The key to navigating today's cyber landscape is a mix of awareness, education, and the occasional gut check—because even in a tech-driven world, the human element is our greatest asset.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesBytes with Bec and Benji podcast: https://www.phriendlyphishing.com/resources/podcastsLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Australian Cyber Conference 2024 in Melbourne Conversation with Leanne Ngo | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 29, 2024 25:58


Guest: Leanne Ngo, Associate Professor, La Trobe UniversityOn LinkedIn | https://www.linkedin.com/in/leanne-ngo-86979042/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring AISA Cyber Con 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Dr. Leanne Ngo to discuss cyber resilience, community impact, and the role of culture in cybersecurity. Their conversation explored the intersection of technology, education, and human connection in the pursuit of a safer and more secure society.Dr. Ngo shared her perspective on resilience, highlighting its evolving definition. While digital tools increase opportunities for connection, she emphasized that face-to-face interaction remains vital, especially for vulnerable communities. Her work in promoting cybersecurity awareness involves building trust and understanding among diverse groups, tailoring approaches to their unique needs and cultural contexts.The discussion turned to the importance of culture in cybersecurity, with Dr. Ngo describing it as a gradual process of change driven by action and integration into everyday life. She stressed that cyber awareness—often focused on knowledge—must evolve into behavioral transformation, where secure practices become second nature both at work and in personal lives. This requires understanding the subcultures within organizations and communities and adapting strategies to resonate with their specific dynamics.Sean also brought up the concept of belief as a cornerstone for driving cultural change. Dr. Ngo agreed, emphasizing that confidence and a growth mindset are essential in fostering resilience. Drawing on her experience as a mentor and educator, she described how instilling belief in individuals' capacity to contribute to a secure society empowers them to take ownership of their role in cybersecurity.The conversation explored practical ways to bridge the gap between technical solutions and human-centered approaches. Dr. Ngo highlighted her work with the Australian government's "Stay Safe, Act Now" campaign, which focuses on localizing cybersecurity education. By adapting materials to the values and practices of various communities—such as the South Sudanese and Cambodian populations—her initiatives create relatable and impactful messaging that goes beyond surface-level translations.Education and workforce development also emerged as key themes. Dr. Ngo underscored the importance of short, targeted training programs, like micro-credentials, in addressing the growing skills gap in cybersecurity. Such programs offer accessible pathways for individuals from all backgrounds to contribute meaningfully to the industry, supporting Australia's ambition to be the most cyber-resilient country by 2030.Closing the discussion, Dr. Ngo reinforced that cybersecurity is fundamentally about people. By fostering empathy, understanding, and a collaborative spirit, society can build resilience not just through technology but through the collective effort of individuals who care deeply about protecting one another. This belief in human potential left an enduring impression, inspiring attendees to think beyond traditional approaches and embrace the human element at the core of cybersecurity.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Java with Jen
217 | Understanding Human Trafficking: Awareness, Prevention, and Faith-Based Support w/Expert Jenifer Ortiz (trafficking, kid safety, digital safety, parenting, solo traveler)

Java with Jen

Play Episode Listen Later Oct 31, 2024 58:12


ABOUT TODAY'S EPISODE: In this episode, we're diving deep into the realities of sex trafficking, the impact on our communities, and practical steps we can all take to stay safe and vigilant. Some of the highlights we'll cover: How God connected us and why friendship in faith is so important. Understanding the shocking truths of sex trafficking and how it affects even safe-seeming places. Signs of grooming in relationships and how traffickers gain control. Safety tips for parents and solo travelers: Apps, boundaries, and what to look out for. Jenifer's first-hand experiences and powerful work with at-risk youth and international missions. Creating open conversations with children about safety, boundaries, and “tricky people.” As we share stories from our lives and work, I hope this episode not only opens your eyes but also inspires you to take action in protecting yourself and those around you. This conversation is close to our hearts, and we're grateful to be in it together! ABOUT GUEST: A  Licenced  Social Worker/ Counselor, Kingdom Life Coach, Mentor, International Speaker, Airbnb Expert and Revivalist. Jenifer is a bilingual Spanish, highly-rated speaker with 8+ years of experience as a trauma-informed counselor.  As a Kingdom Life Coach, Jenifer has a passion to serve women to help unlock to their fullest God given potential, to release their voice and share their story. Jenifer works with individuals, groups, and organizations to amplify their authenticity and empower them to live a Kingdom lifestyle. SHe has worked in the Anti-Human Trafficking for the past four years and has joined international mission trips to support this cause. Jenifer is a five-star Airbnb Host, provides awareness about Human Trafficking in the hospitality business. She  coaches single christian women to thrive in their singlehood, break toxic relationship cycles and prepare for their kingdom husband.  She loves to spread her wings travel around the world, visit coffee shops and make special unforgettable memories with friends and family. CONNECT with GUEST: IG: Jeniferortiz_414FB: Jenifer OrtizFrance Documentary of the Olympics Mission: ⁠https://www.youtube.com/watch?v=Np6efn26gPA⁠Free FB group for Single Christian Women, join to be part of the Lioness Tribe: ⁠https://www.facebook.com/share/Ba8Y6eUYUzuSyxuc/⁠ —————————————————— • Supercharge your mind and energy while calming your system with Magic Mind for 20% off with this link: ⁠https://www.magicmind.com/JAVAWITHJEN20⁠ • Get this 7-Essential Steps to Podcast Creation Checklist for free : subscribepage.io/StartYourPodcastChecklist • LEAVE JEN A RATING ⭐️ & REVIEW: ⁠⁠https://podcasts.apple.com/us/podcast/java-with-jen-hearing-gods-voice-for-everyday-life/id1257356393?mt=2⁠⁠ CONNECT WITH JEN: Thank you for rating, reviewing and sharing the show on social media, this makes such an enormous difference on the reach of this podcast!   Follow and tag me on Instagram @javawithjen or Facebook @javawithjenpodcast , and Share when you're listening to a show!   I love seeing your posts