Podcasts about digital safety

  • 132PODCASTS
  • 259EPISODES
  • 34mAVG DURATION
  • 1WEEKLY EPISODE
  • May 15, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about digital safety

Latest podcast episodes about digital safety

@BEERISAC: CPS/ICS Security Podcast Playlist
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 15, 2025 35:09


Podcast: Industrial Cybersecurity InsiderEpisode: Visibility Revisited: Trends Shaping the Future of OT CybersecurityPub date: 2025-05-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity.Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated OT cybersecurity roles.We address the critical need for alignment between capital and operational expenditures, and the importance of selecting technologies that provide actionable visibility across diverse plant environments. Listeners will gain strategic guidance on integrating cybersecurity into capital planning, addressing asset variability across sites, and implementing scalable, non-disruptive security frameworks. From OT-specific IDS deployment to balancing remote access with zero-trust principles, this episode offers practical, forward-looking advice.Whether you're a practitioner or a decision-maker, focused on securing extended IIoT environments while maintaining operational resilience, this episode covers practical and relatable challenges and solutions.Chapters:00:00:00 – A Strategic Rewind: Exploring the Emerging Roles, Budget Realities, and Lessons Learned in OT Cybersecurity00:00:41 - Gartner, DOGE, and the Future of OT Cybersecurity Policy00:12:12 - The Future Looks Bright : Building a Career in OT Cybersecurity00:22:44 - AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with ClarotyLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Stuxnet to Colonial Pipeline What Have We Learned & What's on the Horizon?

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 7, 2025 32:55


Podcast: Industrial Cybersecurity InsiderEpisode: Stuxnet to Colonial Pipeline What Have We Learned & What's on the Horizon?Pub date: 2025-05-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. From his early fascination with hacking culture to leading OT security for one of the world's largest engineering firms, Mike shares personal insights and lessons learned. The conversation covers the delayed cybersecurity maturity in OT environments and the lasting impact of the Colonial Pipeline breach.They address the crucial role of visibility, engineering partnerships, and cultural buy-in when building secure industrial systems. Whether you're managing pipelines, power grids, or manufacturing floors, this episode delivers actionable insights and strategic foresight for leaders protecting our most vital infrastructure.Chapters:00:00:00 - Why OT Security Still Falls Behind00:01:03 - Mike Holcomb's Unlikely Path to Cybersecurity00:01:23 - Hacking Curiosity and a Love for Breaking Things00:02:16 - From Network Admin to OT Defender00:03:08 - Stuxnet, Colonial, and the Wake-Up Calls We Ignored00:06:18 - When OT and IT Don't Speak the Same Language00:12:14 - Threats Are Getting Smarter — Are We Keeping Up?00:26:29 - Evolving the Culture of Cyber Hygiene00:32:14 - Final Takeaways for Security LeadersLinks And Resources:Mike Holcomb on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 1, 2025 31:51


Podcast: Industrial Cybersecurity InsiderEpisode: Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, CyoloPub date: 2025-04-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized security tools - or "shelfware." From real-world examples involving breweries, milk production, and energy plants, the conversation uncovers how lack of visibility, broken remote access practices, and aging systems create critical vulnerabilities. Most importantly, Kevin offers actionable advice for CISOs, CTOs, and plant managers on building resilient cybersecurity frameworks without disrupting operations. Don't miss this episode full of practical advice from industry experts.Chapters:00:00:00 - Kicking Off: Why OT Cybersecurity Can't Wait00:01:18 - Meet Kevin Kumpf: From Bank Vaults to Industrial Battlegrounds00:02:56 - Hard Truths About Securing Operational Technology00:06:42 - Shelfware Syndrome: Why Tools Fail Without Strategy00:12:09 - Plant Managers, Vendors, and the Battle for Cyber Resilience00:23:56 - Remote Access Exposed: The Hidden Risks Inside Your Plant00:30:58 - Closing Thoughts: Building Stronger, Smarter Industrial DefensesLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Cyber Threats, China, and the Global Wake-Up Call

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 25, 2025 27:04


Podcast: Industrial Cybersecurity InsiderEpisode: Cyber Threats, China, and the Global Wake-Up CallPub date: 2025-04-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have never been higher. From end-of-life PLCs still running core operations, to the disconnect between IT and OT leadership, this conversation identifies the systemic gaps leaving industrial operations exposed. They outline the pressing need for visibility, actionable incident response plans, and a cultural shift toward collaboration across the stack, from plant floor to the boardroom. Whether you're a CISO or an operations lead, this episode offers real-world insights, battle-tested perspectives, and one clear takeaway: in cybersecurity, doing nothing is no longer an option.Chapters:00:00:00 - Kicking Off: Why IT-OT Unity Isn't Optional Anymore00:01:17 - Cyber Threats, China, and the Global Wake-Up Call00:02:16 - CISA's New Role: From Background Player to OT Ally00:05:32 - Still Separate, Still Vulnerable: Why IT & OT Must Sync Up00:09:48 - Blind Spots Kill: Why Visibility Is the Real MVP00:10:43 - Remote Access Realities and the Myth of the Air Gap00:20:29 - Crisis Mode: Are You Ready for the Worst?00:23:50 - Dino & Craig's Parting Shot: Do Something - NowLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Future of Security Operations
Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

The Future of Security Operations

Play Episode Listen Later Apr 22, 2025 42:05


In this week's episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark's experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys. In this episode: [02:06] His early career journey - from a mathematics background to building early online banking systems [03:32] What's kept Mark excited about security for over two decades [04:40] The compound benefits of growing within a company over time [07:20] Mark's leadership style - defined by transparency, directness, and genuine care for his teammates [12:45] Communicating the business trade-off between risk and return [16:45] Reflecting on the team's response to major incidents at Riot Games [21:00] The unique challenges of securing gaming platforms [26:30] How Mark approaches strategy and planning in the fintech space [28:08] The case for building strong, partnership-driven vendor relationships [31:13] Creating space for creativity - without spreading the team too thin [34:35] Empowering his team to speak openly - even if it means calling him out [36:35] The inspiration behind Mark's books Digital Safety for Parents and The Security Path [40:20] Connect with Mark Where to find Mark: LinkedIn Brex Where to find Thomas Kinsella: LinkedIn Tines Resources mentioned: The Security Path - click here to redeem a free copy for podcast listeners (first come, first serve) Digital Safety for Parents - click here to redeem a free copy for podcast listeners (first come, first serve) Mark's talk during his time at Riot Games in 2016

Breakfast with Refilwe Moloto
What the Hack! Samsung's mobile security move, Oppo's new Reno13, beware ATM scams while travelling

Breakfast with Refilwe Moloto

Play Episode Listen Later Apr 22, 2025 10:27


In this week’s What the Hack, Arthur Goldstuck speaks to Lester Kiewit about Samsung’s launch of the Galaxy A Series in Braamfontein and its surprising inclusion of a 12-month Aura mobile security subscription—bringing armed response to a more affordable market. He also reviews the new Oppo Reno13, highlights what’s expected at the Shanghai Motor Show, and shares practical advice on avoiding ATM swap and clone scams while travelling over the long weekends. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live – Good Morning CapeTalk with Lester Kiewit is broadcast weekdays between 06:00 and 09:00 (SA Time) https://www.primediaplus.com/station/capetalk Find all the catch-up podcasts here https://www.primediaplus.com/capetalk/good-morning-cape-town-with-lester-kiewit/audio-podcasts/good-morning-cape-town-with-lester-kiewit/ Subscribe to the CapeTalk daily and weekly newsletters https://www.primediaplus.com/competitions/newsletter-subscription/ Follow us on social media: CapeTalk on Facebook: www.facebook.com/CapeTalk   CapeTalk on TikTok: www.tiktok.com/@capetalk   CapeTalk on Instagram: www.instagram.com/capetalkza  CapeTalk on X: www.x.com/CapeTalk  CapeTalk on YouTube: www.youtube.com/@CapeTalk567  See omnystudio.com/listener for privacy information.

Homeschooling Families by Teach Them Diligently
Digital Safety for Kids: Practical Steps to Protect Your Children Online | 343

Homeschooling Families by Teach Them Diligently

Play Episode Listen Later Apr 17, 2025 43:40


Are you concerned about your child's safety in the digital age? In this important Teach Them Diligently podcast episode, Leslie Nunnery and Kevin Cronister offer practical, actionable advice for parents. Learn how to establish open communication, set boundaries for online friendships, and monitor your child's activities while respecting their privacy. Kevin shares crucial insights on recognizing grooming tactics and provides a step-by-step guide on what to do if your child is victimized online, including preserving evidence, reporting procedures, and the vital need for emotional support. This episode is a must-listen for any parent navigating the complexities of raising children in today's digital world. Meet the Guest: Kevin Cronister is a 15-year law enforcement veteran. He currently serves as a Detective with the Internet Crimes Against Children (ICAC) Task Force in the Kansas City Metro Area. He's a Squad Leader, as well as a Ballistic Shield Operator and Firearms Instructor for SWAT. Kevin earned his master's degree in forensic psychology and holds numerous certifications, such as Advanced Interview & Interrogation through the Federal Bureau of Investigation (FBI), Crisis Intervention Team (CIT) certified for responding to issues with those in mental health crises, and Advanced Digital Forensic Analysis for the iOS and Android operating system. He is a certified Force Science Analyst and currently serves on the Use of Force Review Board for his agency. Kevin is currently enrolled in the McAfee Institute's Certified Expert in Cyber Crime Investigation (CECI) program. He trains mixed martial arts and obtained his brown belt in Brazilian Jiu-Jitsu from UFC veteran Trey Ogden at Marathon MMA in Overland Park, Kansas. Kevin is the Chief Operating Officer (CEO) of Guardian Training Solutions, LLC., a law enforcement education and training company teaching tactical and investigative courses both in-person and online.  Key Takeaways: Understand Online Dangers & Grooming: Parents must be aware of the specific threats children face online, including the manipulative tactics of grooming.Foster Open Communication: Creating a safe space for children to talk about their online experiences is crucial for early intervention and support.Establish Clear Online Rules & Boundaries: Setting guidelines for online friendships, interactions, and screen time is essential for safety.Monitor Responsibly & Respect Privacy: Parents should oversee online activity while fostering trust and respecting their child's appropriate boundaries.Respond Calmly & Preserve Evidence: If victimization occurs, a calm parental response and proper preservation of digital evidence are vital first steps.Prioritize Reporting & Seek Support: Timely reporting to law enforcement and providing emotional support are essential for the child's well-being and accountability.https://youtu.be/ESkT6N1j1aQ Podcast Sponsor: For years, Action Bible resources have helped homeschool kids better understand the Bible and grow their faith in Jesus. Bestselling Action Bible illustrated books, Bibles, and games can be purchased wherever books are sold. Click HERE to purchase your copies today. Additional Resources: Find out more about Kids Digital Health HEREFind out more about Guardian Training Solutions HERE 

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Afternoon Drive with John Maytham
The rise of “influencer gangsters”

Afternoon Drive with John Maytham

Play Episode Listen Later Mar 20, 2025 9:55


Dan Corder is joined by renowned investigative journalist and author Caryn Dolley to discuss the growing intersection of social media and crime, highlighting cases where criminals flaunt illegal activities online. They explore how platforms like TikTok and Instagram are used for recruitment, deception, and misinformation.See omnystudio.com/listener for privacy information.

Risky Women Radio
Risk & Compliance Against Technology-Facilitated Domestic Violence

Risky Women Radio

Play Episode Listen Later Mar 19, 2025 39:36 Transcription Available


Kim Chandler McDonald, co-founder and CEO of 3 Steps Data and Global VP of CyAN, discusses her diverse career journey from theater to tech, emphasizing her advocacy for democratizing technology and combating technology-facilitated domestic violence. She highlights the importance of end-to-end encryption for data security and privacy. Kim shares her experiences, including interviewing global leaders and becoming an emergency forest firefighter. She advocates for proactive compliance and robust risk strategies to protect vulnerable users. SHOW NOTES 00:23 Career Journey 06:59 Advocacy and End-to-End Encryption 12:58 Technology-Facilitated Domestic Violence 26:11 CyAN's Role in Cybersecurity 28:48 Future Innovations and Recommendations

Ignite Ur Wellness
282. How Wellness Entrepreneurs Can Build a Digital Safety Net & Create Business Resilience

Ignite Ur Wellness

Play Episode Listen Later Mar 4, 2025 32:43


Ready to discover how you as a wellness entrepreneur and hands-on practitioner can safeguard your businesses against unexpected events? In this episode, we dig into building a digital safety net with a strong online presence, offering practical steps to maintain revenue amidst life's surprises. I'll teach you how you can create an engaged online audience, leverage Instagram for growth, and the significance of documenting client successes. Get ready to learn how to effectively transition services online, ensuring business continuity while staying relevant in the wellness marketplace. Don't miss these essential strategies to future-proof your practice and widen your client reach.Key Takeaways:Building a proactive digital presence is essential for wellness practitioners to de-risk their business and prepare for unforeseen events like injuries or health issues.Creating a savings fund of three to six months of business revenue provides a financial cushion during unexpected downturns.Curating engagement through an online audience and developing a content library can open new revenue avenues and offer flexibility in client servicing.Virtual services provide resilience to businesses during crises, offering practitioners a way to maintain revenue and client support.Regularly updating and optimizing social media and marketing efforts can differentiate a practitioner's services and expand their reach beyond local communities.Instagram Message Makeover Clinic →  Doors are open. Get in here: https://alison-mclean.mykajabi.com/messaging-makeover-clinicFollow me on Instagram →  igniteyourwellnessbusinessReady to work with me? Book a coaching call on my website!→ https://igniteurwellness.com/business-coach-for-health-coaches/

ITSPmagazine | Technology. Cybersecurity. Society
Breaking the Spell: How to Avoid the Grand Delusion in Zero Trust | A Conversation with Dr. Chase Cunningham at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 25, 2025 9:34


At ThreatLocker Zero Trust World 2025 in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled The Grand Delusion. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.Challenging the Status QuoCunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn't be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.Zero Trust as a Strategy, Not Just a TermThe session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.Actionable Steps for Small BusinessesCunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.The Future of Zero TrustLooking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today's digital world.Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.Guest

HealthCare UnTold
Aaron Painter CEO at Nametag: Protecting Our Digital Identities

HealthCare UnTold

Play Episode Listen Later Feb 14, 2025 25:15


Our guest today is Aaron Painter, the CEO of Nametag. Aaron shares his journey from a 14-year career at Microsoft, where he held various leadership roles across multiple countries, to founding Nametag. Driven by his personal experiences with online fraud and identity theft, Aaron has created cutting-edge technology that offers unprecedented protection from digital manipulation and impersonation fraud.Aaron discusses the evolution of fraud, from simple check scams to sophisticated digital impersonation using deepfakes, and highlights the surge in remote work-related security threats, especially in health care. He explains how Nametag's DeepFake Defense technology verifies authentic identities. Aaron also provides some practical ways to help protect your digital identity.HealthCare UnTold recognizes Aaron Painter and Name Tag for their dedication to identity safety.#DigitalSafety#ProtectYourData#SecureYourInformation#ThinkBeforeYouClick#ProtectYourDigitalIdentity

Feminist Buzzkills Live: The Podcast
Should I Be Scared? We'll Let You Know. With Bitch & Amy Merrill

Feminist Buzzkills Live: The Podcast

Play Episode Listen Later Feb 14, 2025 59:16


Full episode transcript HERE. Roses are red, violets are blue, we're ready to fuck some shit up – how about you? Nothing says “love” like living through the current soul scorchings and still showing up every day to make a difference! On this week's pod, your Feminist Buzzkills are diving deep into Indiana gutting HIPAA for abortion patients, redefining and coming after birth control, and how some badass Indiana doctors are fighting back! What does that mean for the rest of us not living there? A whole hell of a lot! PLUS, remember that New York doctor who prescribed a pregnant person in Dallas abortion pills? Well, Louisiana and Texas are in full-on hater mode, and we've got some big updates on the case. AND WE'VE GOT GUESTS! Who are our V-Day partners in crime this week? Everyone's fav witchy Valentine, Bitch is in the house! The legendary musician, writer, and performance artist sits down with your Buzzkills to yap about her new show, “B*TCHCRAFT,” moving forward in Trump's hellscape, and healing and resisting through art and community! Valentine #2, Amy Merrill, is here too! We break down the recent flurry of assaults on medication abortion with the Co-Founder and Co-Director of Plan C. Amy helps us navigate the case of the NY doctor being sued for sending abortion pills through the mail, and how abobo patients can better protect themselves – especially as we are heading into the abortion upside down. Times are heavy, but knowledge is power, y'all. We gotchu.  OPERATION SAVE ABORTION: You can still join the 10,000+ womb warriors fighting the patriarchy by listening to our five-part OpSave pod series and Mifepristone Panel by clicking HERE for episodes, your toolkit, marching orders, and more. HOSTS:Lizz Winstead IG: @LizzWinstead Bluesky: @LizzWinstead.bsky.socialMoji Alawode-El IG: @Mojilocks Bluesky: @Mojilocks.bsky.social SPECIAL GUESTS:Bitch IG: @BitchMusic TikTok: @Bitch_Music Amy Merrill  IG: @AmyJMerrill / @PlanCPills TW/TikTok: @PlanCPills BlueSky: @PlanCPills.bsky.social GUEST LINKS:Plan C Pills WebsiteDONATE: Plan CYou Always Have Options WebsiteJulie Care WebsiteMiscarriage + Abortion HotlineIf/When/How: Lawyers for Reproductive CareBitch Music WebsiteBitch's LinktreeTICKETS: B*tchcraft Tour NEWS DUMP:SAVE Act Would Undermine Voter Registration for All AmericansTrump State Department Official Has Repeatedly Called for Mass Sterilization of ‘Low-IQ Trash'Pine Needles Shown to Cause Abortions in CowsIndiana Abortion Providers Sue to Keep State Records PrivateCondoms, IUDs Removed From Indiana Bill Seeking to Expand Birth Control AccessTexas Judge Fines New York Doctor for Prescribing Abortion Pills to a Woman Near DallasShield Laws for Reproductive and Gender-Affirming Health Care: A State Law GuideWhat to Know About Stocking up on the Abortion Pill EPISODE LINKS:Adopt-A-Clinic: Women's Health Center of Maryland Amazon WishlistBuy a Michael Shannon & Jason Narducy Tour Poster to Benefit AAF!ACTION: Mutual Aid LASTREAM: No One Asked You on JoltEMAIL your abobo questions to The Feminist BuzzkillsOperation Save AbortionSIGN: Repeal the Comstock ActAAF's Abortion-Themed Rage Playlist FOLLOW US:Listen to us ~ FBK Podcast Instagram ~ @AbortionFrontBluesky ~ @AbortionFrontTikTok ~ @AbortionFrontFacebook ~ @AbortionFrontYouTube ~ @AbortionAccessFront TALK TO THE CHARLEY BOT FOR ABOBO OPTIONS & RESOURCES HERE!PATREON HERE! Support our work, get exclusive merch and more! DONATE TO AAF HERE!ACTIVIST CALENDAR HERE!VOLUNTEER WITH US HERE!ADOPT-A-CLINIC HERE!EXPOSE FAKE CLINICS HERE!GET ABOBO PILLS FROM PLAN C PILLS HERE!When BS is poppin', we pop off!

The Construction Life
#693 - 15 - Safety Corner: The Digital Safety Trap tradespeople are creating for themselves

The Construction Life

Play Episode Listen Later Jan 17, 2025 69:44


In this eye-opening episode of Safety Corner, brought to you by MYS1 TCL, hosts Phill and Manny dive into a critical issue facing the construction and trades industries today: social media oversharing. While those behind-the-scenes videos and impressive project shots may rack up likes and followers online, they could also attract an entirely different kind of attention—from the Ministry of Labour and OSHA.Phill and Manny explore how even the smallest safety infractions caught on camera can lead to fines, summons, or worse, as government safety departments increasingly monitor online platforms for violations. He breaks down real-world examples of posts that seem harmless but highlight glaring safety issues, turning your social clout into legal trouble.Learn the do's and don'ts of posting online, how to spot potential hazards before you hit "upload," and why maintaining a professional and compliant image online is just as important as on the job site."That viral post could cost more than just your reputation."Catch the latest episode of Safety Corner, and remember—Big Brother is scrolling.You're listening to Safety Corner powered by TCL and S1 for workers by workersOnline and In Person Health and SafetyPrograms and TrainingAvailable in 10 plus languagesEnglish French Portuguese Italian Russian Tagalog Turkish Arabic and ChineseReach out to www.mys1s.ca and DM then @my_s1 for more information

HIListically Speaking with Hilary Russo
Ep175 - Ending Child Trafficking and Exploitation with Erin Williamson

HIListically Speaking with Hilary Russo

Play Episode Listen Later Jan 8, 2025 41:29 Transcription Available


Over 50 million individuals are trapped in human trafficking globally, with 25% being children. How can you ensure your child is safe? Erin Williamson of Love146, an organization devoted to ending human trafficking and labor exploitation, shares her personal journey from Kenya to the United States, debunking myths that trafficking only affects women and girls, and emphasizes the need for inclusive education to protect all children. From holistic support and survivor care for victims and their families to the importance of community vigilance and digital safety, host Hilary Russo asks Erin the tough questions to keep your family safe and aware. ⁣ ⁣ HUMAN TRAFFICKING HOTLINE⁣ 888-373-7888⁣⁣ CONNECT WITH ERIN WILLIAMSON AND LOVE146⁣ https://love146.org/caregivers/https://www.instagram.com/love146⁣ https://www.facebook.com/love146.org/⁣https://www.linkedin.com/in/erin-williamson-5b88b58b⁣ ⁣ EXPLORE HAVENING TECHNIQUES TRAININGS & WORKSHOPS⁣ https://www.hilaryrusso.com/training⁣ ⁣ GET BRAIN CANDY DELIVERED TO YOUR INBOX⁣ ⁣ https://www.hilaryrusso.com/braincandy⁣ ⁣ WORK WITH HILARY ⁣ https://www.hilaryrusso.com/havening⁣ ⁣ CONNECT WITH HILARY⁣ https://www.hilaryrusso.com⁣https://www.linkedin.com/in/hilaryrusso⁣https://www.instagram.com/hilaryrusso⁣https://www.youtube.com/hilaryrusso⁣https://www.hilaryrusso.com/podcast⁣ ⁣ MUSIC by Lipbone Redding⁣ https://www.lipbone.com/⁣

ITSPmagazine | Technology. Cybersecurity. Society
The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 10, 2024 26:02


Guest: Ravi Nayyar, PhD Scholar, The University Of SydneyOn LinkedIn | https://www.linkedin.com/in/stillromancingwithlife/At AISA AU Cyber Con | https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.The Cyber Zoo: Ravi Nayyar's Research FocusRavi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.The Role of Humans in CybersecurityAt the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.The Case for Stronger Cyber LawsRavi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.Global Cooperation and the Fight Against Regulatory ArbitrageThe discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.Incentivizing Secure PracticesDelving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.Closing Thoughts: Collaboration for a Safer Digital WorldSean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesThe theory of saving the world: Intervention requests and critical infrastructure: https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNriflLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Redefining CyberSecurity
The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Dec 10, 2024 26:02


Guest: Ravi Nayyar, PhD Scholar, The University Of SydneyOn LinkedIn | https://www.linkedin.com/in/stillromancingwithlife/At AISA AU Cyber Con | https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.The Cyber Zoo: Ravi Nayyar's Research FocusRavi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.The Role of Humans in CybersecurityAt the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.The Case for Stronger Cyber LawsRavi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.Global Cooperation and the Fight Against Regulatory ArbitrageThe discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.Incentivizing Secure PracticesDelving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.Closing Thoughts: Collaboration for a Safer Digital WorldSean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesThe theory of saving the world: Intervention requests and critical infrastructure: https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNriflLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Stranger Danger, Phishing, Instinct, and Technology: How AI and Awareness Are Shaping Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Benji Zorella and Rebecca Caldwell | On Location Coverage

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 4, 2024 30:08


Guests: Benji Zorella, eLearning Instructional Designer, CyberCXOn LinkedIn | https://www.linkedin.com/in/benjiz/Rebecca Caldwell, Phishing Content Specialist, Phriendly PhishingOn LinkedIn | https://www.linkedin.com/in/bec-j-caldwell/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesKicking off the episode, Sean Martin and Marco Ciappelli highlight the uniquely local flavor of the conference. With Benji and Bec calling Melbourne home, the guests reflect on the value of attending such a prominent event in their backyard while drawing on their experiences as hosts of their own cybersecurity podcast.Unmasking Phishing in the Digital AgePhishing takes center stage as Benji and Bec share stories and insights about the dangers lurking behind cleverly crafted scams. Sean Martin draws a clever comparison between traditional fishing methods and the digital phishing tactics cybercriminals use today—hooking victims by exploiting their trust and curiosity.Benji drives the conversation deeper, explaining how a person's digital footprint—especially in an age of AI-driven tools like deepfakes—can be weaponized for deception. The guests underscore the importance of remaining vigilant and minimizing the personal information we leave online, turning our digital habits into our best line of defense.Cybersecurity Education: The First Line of DefenseShifting gears, the group emphasizes the need to move beyond relying solely on tech-driven safeguards and focus on building a culture of cybersecurity awareness within organizations. Bec Caldwell shares actionable strategies, likening cybersecurity education to learning how to drive—starting small and gradually building confidence in spotting risks. Empowering employees to question suspicious contexts fosters not just better security, but a collaborative culture of accountability.AI: Friend or Foe?The role of AI emerges as a hot topic, sparking a discussion about its dual impact on cybersecurity. While AI enables sophisticated phishing attacks, it also holds the potential to strengthen defenses. The panel imagines AI tools evolving to provide real-time security nudges, similar to how cars alert drivers to potential hazards. It's a balancing act, as AI must be wielded thoughtfully to enhance—not replace—human vigilance.The Human Factor in CybersecurityThroughout the conversation, one message resonates: the enduring power of human intuition. Benji recounts a gripping story of a CEO who thwarted a highly advanced phishing attempt with a simple, old-school phone verification. This moment reinforces the idea that while tech can improve security measures, the human touch remains irreplaceable.Future-Proofing CybersecurityAs the episode winds down, the group reflects on thought-provoking audience questions from the conference. From AI's impact on CISO responsibilities to how generational shifts in digital communication shape cybersecurity strategies, the guests underscore the need for adaptability as both technology and society evolve.A Final Call to ActionMarco Ciappelli and Sean Martin wrap up with a clear takeaway for their listeners: stay curious, ask questions, and embrace skepticism online. The key to navigating today's cyber landscape is a mix of awareness, education, and the occasional gut check—because even in a tech-driven world, the human element is our greatest asset.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesBytes with Bec and Benji podcast: https://www.phriendlyphishing.com/resources/podcastsLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Redefining CyberSecurity
Stranger Danger, Phishing, Instinct, and Technology: How AI and Awareness Are Shaping Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Benji Zorella and Rebecca Caldwell | On Location Coverage

Redefining CyberSecurity

Play Episode Listen Later Dec 4, 2024 30:08


Guests: Benji Zorella, eLearning Instructional Designer, CyberCXOn LinkedIn | https://www.linkedin.com/in/benjiz/Rebecca Caldwell, Phishing Content Specialist, Phriendly PhishingOn LinkedIn | https://www.linkedin.com/in/bec-j-caldwell/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesKicking off the episode, Sean Martin and Marco Ciappelli highlight the uniquely local flavor of the conference. With Benji and Bec calling Melbourne home, the guests reflect on the value of attending such a prominent event in their backyard while drawing on their experiences as hosts of their own cybersecurity podcast.Unmasking Phishing in the Digital AgePhishing takes center stage as Benji and Bec share stories and insights about the dangers lurking behind cleverly crafted scams. Sean Martin draws a clever comparison between traditional fishing methods and the digital phishing tactics cybercriminals use today—hooking victims by exploiting their trust and curiosity.Benji drives the conversation deeper, explaining how a person's digital footprint—especially in an age of AI-driven tools like deepfakes—can be weaponized for deception. The guests underscore the importance of remaining vigilant and minimizing the personal information we leave online, turning our digital habits into our best line of defense.Cybersecurity Education: The First Line of DefenseShifting gears, the group emphasizes the need to move beyond relying solely on tech-driven safeguards and focus on building a culture of cybersecurity awareness within organizations. Bec Caldwell shares actionable strategies, likening cybersecurity education to learning how to drive—starting small and gradually building confidence in spotting risks. Empowering employees to question suspicious contexts fosters not just better security, but a collaborative culture of accountability.AI: Friend or Foe?The role of AI emerges as a hot topic, sparking a discussion about its dual impact on cybersecurity. While AI enables sophisticated phishing attacks, it also holds the potential to strengthen defenses. The panel imagines AI tools evolving to provide real-time security nudges, similar to how cars alert drivers to potential hazards. It's a balancing act, as AI must be wielded thoughtfully to enhance—not replace—human vigilance.The Human Factor in CybersecurityThroughout the conversation, one message resonates: the enduring power of human intuition. Benji recounts a gripping story of a CEO who thwarted a highly advanced phishing attempt with a simple, old-school phone verification. This moment reinforces the idea that while tech can improve security measures, the human touch remains irreplaceable.Future-Proofing CybersecurityAs the episode winds down, the group reflects on thought-provoking audience questions from the conference. From AI's impact on CISO responsibilities to how generational shifts in digital communication shape cybersecurity strategies, the guests underscore the need for adaptability as both technology and society evolve.A Final Call to ActionMarco Ciappelli and Sean Martin wrap up with a clear takeaway for their listeners: stay curious, ask questions, and embrace skepticism online. The key to navigating today's cyber landscape is a mix of awareness, education, and the occasional gut check—because even in a tech-driven world, the human element is our greatest asset.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesBytes with Bec and Benji podcast: https://www.phriendlyphishing.com/resources/podcastsLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Australian Cyber Conference 2024 in Melbourne Conversation with Leanne Ngo | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 29, 2024 25:58


Guest: Leanne Ngo, Associate Professor, La Trobe UniversityOn LinkedIn | https://www.linkedin.com/in/leanne-ngo-86979042/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring AISA Cyber Con 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Dr. Leanne Ngo to discuss cyber resilience, community impact, and the role of culture in cybersecurity. Their conversation explored the intersection of technology, education, and human connection in the pursuit of a safer and more secure society.Dr. Ngo shared her perspective on resilience, highlighting its evolving definition. While digital tools increase opportunities for connection, she emphasized that face-to-face interaction remains vital, especially for vulnerable communities. Her work in promoting cybersecurity awareness involves building trust and understanding among diverse groups, tailoring approaches to their unique needs and cultural contexts.The discussion turned to the importance of culture in cybersecurity, with Dr. Ngo describing it as a gradual process of change driven by action and integration into everyday life. She stressed that cyber awareness—often focused on knowledge—must evolve into behavioral transformation, where secure practices become second nature both at work and in personal lives. This requires understanding the subcultures within organizations and communities and adapting strategies to resonate with their specific dynamics.Sean also brought up the concept of belief as a cornerstone for driving cultural change. Dr. Ngo agreed, emphasizing that confidence and a growth mindset are essential in fostering resilience. Drawing on her experience as a mentor and educator, she described how instilling belief in individuals' capacity to contribute to a secure society empowers them to take ownership of their role in cybersecurity.The conversation explored practical ways to bridge the gap between technical solutions and human-centered approaches. Dr. Ngo highlighted her work with the Australian government's "Stay Safe, Act Now" campaign, which focuses on localizing cybersecurity education. By adapting materials to the values and practices of various communities—such as the South Sudanese and Cambodian populations—her initiatives create relatable and impactful messaging that goes beyond surface-level translations.Education and workforce development also emerged as key themes. Dr. Ngo underscored the importance of short, targeted training programs, like micro-credentials, in addressing the growing skills gap in cybersecurity. Such programs offer accessible pathways for individuals from all backgrounds to contribute meaningfully to the industry, supporting Australia's ambition to be the most cyber-resilient country by 2030.Closing the discussion, Dr. Ngo reinforced that cybersecurity is fundamentally about people. By fostering empathy, understanding, and a collaborative spirit, society can build resilience not just through technology but through the collective effort of individuals who care deeply about protecting one another. This belief in human potential left an enduring impression, inspiring attendees to think beyond traditional approaches and embrace the human element at the core of cybersecurity.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Redefining CyberSecurity
Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Australian Cyber Conference 2024 in Melbourne Conversation with Leanne Ngo | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Nov 29, 2024 25:58


Guest: Leanne Ngo, Associate Professor, La Trobe UniversityOn LinkedIn | https://www.linkedin.com/in/leanne-ngo-86979042/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring AISA Cyber Con 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Dr. Leanne Ngo to discuss cyber resilience, community impact, and the role of culture in cybersecurity. Their conversation explored the intersection of technology, education, and human connection in the pursuit of a safer and more secure society.Dr. Ngo shared her perspective on resilience, highlighting its evolving definition. While digital tools increase opportunities for connection, she emphasized that face-to-face interaction remains vital, especially for vulnerable communities. Her work in promoting cybersecurity awareness involves building trust and understanding among diverse groups, tailoring approaches to their unique needs and cultural contexts.The discussion turned to the importance of culture in cybersecurity, with Dr. Ngo describing it as a gradual process of change driven by action and integration into everyday life. She stressed that cyber awareness—often focused on knowledge—must evolve into behavioral transformation, where secure practices become second nature both at work and in personal lives. This requires understanding the subcultures within organizations and communities and adapting strategies to resonate with their specific dynamics.Sean also brought up the concept of belief as a cornerstone for driving cultural change. Dr. Ngo agreed, emphasizing that confidence and a growth mindset are essential in fostering resilience. Drawing on her experience as a mentor and educator, she described how instilling belief in individuals' capacity to contribute to a secure society empowers them to take ownership of their role in cybersecurity.The conversation explored practical ways to bridge the gap between technical solutions and human-centered approaches. Dr. Ngo highlighted her work with the Australian government's "Stay Safe, Act Now" campaign, which focuses on localizing cybersecurity education. By adapting materials to the values and practices of various communities—such as the South Sudanese and Cambodian populations—her initiatives create relatable and impactful messaging that goes beyond surface-level translations.Education and workforce development also emerged as key themes. Dr. Ngo underscored the importance of short, targeted training programs, like micro-credentials, in addressing the growing skills gap in cybersecurity. Such programs offer accessible pathways for individuals from all backgrounds to contribute meaningfully to the industry, supporting Australia's ambition to be the most cyber-resilient country by 2030.Closing the discussion, Dr. Ngo reinforced that cybersecurity is fundamentally about people. By fostering empathy, understanding, and a collaborative spirit, society can build resilience not just through technology but through the collective effort of individuals who care deeply about protecting one another. This belief in human potential left an enduring impression, inspiring attendees to think beyond traditional approaches and embrace the human element at the core of cybersecurity.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
The present and future of Human-Centered Cybersecurity: Managing Risks and Fostering Digital Safety | An Australian Cyber Conference 2024 in Melbourne Conversation with Jinan Budge | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 27, 2024 39:44


Guest: Jinan Budge, Vice President, Principal Analyst serving Security & Risk professionals, ForresterOn LinkedIn | https://www.linkedin.com/in/jinan-budge-2898132/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Australian Cyber Conference Melbourne 2024 is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry's most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a  conversation with Jinan Budge, Vice President at Forrester Research, focusing on the vital role of human-centered security in today's evolving landscape.Building a Human-Centered Cybersecurity CultureOne of the central themes of the discussion was the shift from traditional security awareness programs to human risk management. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward human-centered cybersecurity is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.Collaboration Between Enterprises and VendorsThe podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace adaptive security solutions tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.Understanding the Human Element in Data BreachesBudge introduced a framework she calls the “wheel of human element breaches,” which categorizes risks such as social engineering, human error, and insider threats. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.Education and Continuous LearningMarco Ciappelli and Jinan Budge underscored the importance of integrating cybersecurity education into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.ConclusionThe discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry's growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Redefining CyberSecurity
The present and future of Human-Centered Cybersecurity: Managing Risks and Fostering Digital Safety | An Australian Cyber Conference 2024 in Melbourne Conversation with Jinan Budge | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Nov 27, 2024 39:44


Guest: Jinan Budge, Vice President, Principal Analyst serving Security & Risk professionals, ForresterOn LinkedIn | https://www.linkedin.com/in/jinan-budge-2898132/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Australian Cyber Conference Melbourne 2024 is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry's most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a  conversation with Jinan Budge, Vice President at Forrester Research, focusing on the vital role of human-centered security in today's evolving landscape.Building a Human-Centered Cybersecurity CultureOne of the central themes of the discussion was the shift from traditional security awareness programs to human risk management. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward human-centered cybersecurity is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.Collaboration Between Enterprises and VendorsThe podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace adaptive security solutions tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.Understanding the Human Element in Data BreachesBudge introduced a framework she calls the “wheel of human element breaches,” which categorizes risks such as social engineering, human error, and insider threats. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.Education and Continuous LearningMarco Ciappelli and Jinan Budge underscored the importance of integrating cybersecurity education into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.ConclusionThe discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry's growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Bob Sirott
Tips for digital safety during the holidays

Bob Sirott

Play Episode Listen Later Nov 26, 2024


Social media strategist Scott Kleinberg joins Bob Sirott to talk about digital safety around the holidays, like when you should change passwords and being cautious about fake emails and texts from retailers. He also shares tips for making online purchases, donating to charities, and answers this week’s genius bar question.

Java with Jen
217 | Understanding Human Trafficking: Awareness, Prevention, and Faith-Based Support w/Expert Jenifer Ortiz (trafficking, kid safety, digital safety, parenting, solo traveler)

Java with Jen

Play Episode Listen Later Oct 31, 2024 58:12


ABOUT TODAY'S EPISODE: In this episode, we're diving deep into the realities of sex trafficking, the impact on our communities, and practical steps we can all take to stay safe and vigilant. Some of the highlights we'll cover: How God connected us and why friendship in faith is so important. Understanding the shocking truths of sex trafficking and how it affects even safe-seeming places. Signs of grooming in relationships and how traffickers gain control. Safety tips for parents and solo travelers: Apps, boundaries, and what to look out for. Jenifer's first-hand experiences and powerful work with at-risk youth and international missions. Creating open conversations with children about safety, boundaries, and “tricky people.” As we share stories from our lives and work, I hope this episode not only opens your eyes but also inspires you to take action in protecting yourself and those around you. This conversation is close to our hearts, and we're grateful to be in it together! ABOUT GUEST: A  Licenced  Social Worker/ Counselor, Kingdom Life Coach, Mentor, International Speaker, Airbnb Expert and Revivalist. Jenifer is a bilingual Spanish, highly-rated speaker with 8+ years of experience as a trauma-informed counselor.  As a Kingdom Life Coach, Jenifer has a passion to serve women to help unlock to their fullest God given potential, to release their voice and share their story. Jenifer works with individuals, groups, and organizations to amplify their authenticity and empower them to live a Kingdom lifestyle. SHe has worked in the Anti-Human Trafficking for the past four years and has joined international mission trips to support this cause. Jenifer is a five-star Airbnb Host, provides awareness about Human Trafficking in the hospitality business. She  coaches single christian women to thrive in their singlehood, break toxic relationship cycles and prepare for their kingdom husband.  She loves to spread her wings travel around the world, visit coffee shops and make special unforgettable memories with friends and family. CONNECT with GUEST: IG: Jeniferortiz_414FB: Jenifer OrtizFrance Documentary of the Olympics Mission: ⁠https://www.youtube.com/watch?v=Np6efn26gPA⁠Free FB group for Single Christian Women, join to be part of the Lioness Tribe: ⁠https://www.facebook.com/share/Ba8Y6eUYUzuSyxuc/⁠ —————————————————— • Supercharge your mind and energy while calming your system with Magic Mind for 20% off with this link: ⁠https://www.magicmind.com/JAVAWITHJEN20⁠ • Get this 7-Essential Steps to Podcast Creation Checklist for free : subscribepage.io/StartYourPodcastChecklist • LEAVE JEN A RATING ⭐️ & REVIEW: ⁠⁠https://podcasts.apple.com/us/podcast/java-with-jen-hearing-gods-voice-for-everyday-life/id1257356393?mt=2⁠⁠ CONNECT WITH JEN: Thank you for rating, reviewing and sharing the show on social media, this makes such an enormous difference on the reach of this podcast!   Follow and tag me on Instagram @javawithjen or Facebook @javawithjenpodcast , and Share when you're listening to a show!   I love seeing your posts

MacVoices Audio
MacVoices #24262: Glenn Fleishman Takes Control of Securing Your Apple Devices, AirTags, and More (3)

MacVoices Audio

Play Episode Listen Later Oct 30, 2024 28:35


Our multi-part conversation with Take Control author Glenn Fleishman concludes with discussions of Take Control of Securing Your Apple Devices, Take Control of Find My and AirTags, and Take Control of FaceTime and Messages. Glenn points out some lesser-known features such as Lockdown Mode and Private Wi-Fi Address, talks about using GateKeeper effectively, and explains some new features in FaceTime and Messages that improve the user experience. (Part 3)  This MacVoices is supported by Notion, the single AI tool that does it all. Try Notion AI for free at notion.com/macvoices. Show Notes: Chapters: 00:11 Introduction to Securing Apple Devices 02:19 Merging Security and Privacy Features 11:37 Understanding Find My Network and AirTags 15:37 Google's Approach to Tracking Devices 17:22 Updates on Messaging and FaceTime Features 19:47 Enhancements in Phone Call Functionality 25:30 Exploring Undiscovered Features 27:16 Conclusion and Final Thoughts Links: Take Control of Securing Your Apple Devices Take Control of Find My and AirTags Take Control of FaceTime and Messages.  Guests: Glenn Fleishman is a Seattle-based technology journalist and two-time winner on Jeopardy. He writes largely about where technology crosses with people's lives, as well as exhaustive technology explanations. At Macworld, he authors the Mac 911 user-help column. He has contributed to the Economist since 2005, including nearly 400 online blog posts and articles, as well as Fast Company, MIT Technology Review, Boing Boing, TidBITS, Six Colors, and others. You can find him on Twitter as @glennf, and check out everything else at his blog. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Healthy Screen Habits Podcast
Digital Safety //Dr. Scott Kollins//Aura

Healthy Screen Habits Podcast

Play Episode Listen Later Oct 23, 2024 32:36


With a mission to create a safer internet for everyone and huge celebrity endorsements in Hollywood, Aura has taken the digital safety sphere by storm.  Dr. Scott Kollins joined Aura @aura_protects as its Chief Medical Officer. Wielding a robust background in clinical psychology and digital health, his career includes significant contributions to the development of digital therapeutics and mental health solutions.  Kollins role at Aura is critical in shaping the company's approach and parent understanding of youth safety and mental wellness in the digital era. Listen today to see what you think - will you be interested in trying out Aura?    

The Social-Engineer Podcast
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds

The Social-Engineer Podcast

Play Episode Listen Later Oct 21, 2024 36:52


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge.  Stacey's expertise, encompassing social science, education, EdTech, and multi-platform screen production, culminated in the founding of Lively, which we will hear all about on this podcast.  Since 2002, Stacey has been designing and delivering enterprise-wide cyber safety upskilling programs.  In 2023, embodying her mission to make knowledge accessible, Stacey launched 'Dodgy or Not?' – a social enterprise offering an engaging approach to digital safety education.    She continues to bridge the gap between emerging technologies and practical education, driving innovation in AI ethics and digital literacy - she is also known for deepfaking herself.  [Oct 21, 2024]     00:00 - Intro  00:19 - Intro Links:  Social-Engineer.com - http://www.social-engineer.com/  Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/  Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/  Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/  Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb  CLUTCH - http://www.pro-rock.com/  innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/   03:00 - Stacey Edmonds Intro  04:18 - Teaching, Trains & Turkeys  08:43 - Toilets vs Videos  11:16 - Dodgy or Not?  15:15 - Social Engineering for Good!  17:46 - Pause for the Cause  20:17 - Training in Real Time  24:11 - Real Time Threat Detection  27:49 - Culture is Everything  30:33 - Find Stacey Edmonds online  LinkedIn: in/staceyedmonds/  31:28 – Mentors  Carolyn Breeze  Chris Hadnagy  Janine Thompson  Steve Rowe  Shane Bell  33:58 - Book Recommendations  Feel The Fear and Do It Anyway - Susan Jeffers  The Hitchhiker's Guide to the Galaxy - Douglas Adams  1984 - George Orwell  Man-Made – Tracey Spicer  35:51 - Wrap Up & Outro  www.social-engineer.com  www.innocentlivesfoundation.org 

The Echo Chamber Podcast
The Digital Safety Act – It’s Unworkable

The Echo Chamber Podcast

Play Episode Listen Later Oct 11, 2024


Please join us at patreon.com/tortoiseshack In his latest Gist:https://www.thegist.ie/the-gist-a-free-speech/ solicitor and Digital Rights Expert, Simon McGarr revealed his concerns about the new Online Safety Code and how it has by accident or design, created two seperate legal requirements to introduce age verification by designated platforms, and they don't both meet the tests set down for being compliant with EU law. If that all sounds a bit highbrow, don't worry. Simon explains it all here and we think it is something that needs fixing ASAP. Support Dignity for Palestine:https://www.patreon.com/posts/112598735

1000 Hours Outsides podcast
1KHO 341: Building a Fortress of Digital Safety: Practical Steps Every Parent Needs to Know | Chris McKenna, Protect Young Eyes

1000 Hours Outsides podcast

Play Episode Listen Later Sep 2, 2024 71:28


In this insightful episode of The 1000 Hours Outside Podcast, Ginny Yurich sits down with Chris McKenna, founder of Protect Young Eyes, to discuss the crucial steps parents need to take to safeguard their children in today's digital age. As kids head back to school, the conversation centers around the growing concerns of technology use in schools, homes, and beyond. Chris shares his journey from a finance professional to becoming a leading voice in digital safety, emphasizing the importance of relational connection, layered protection strategies, and the risks associated with unfiltered devices. The episode delves into the concept of second-order thinking, the alarming rise of AI-generated content, and the vital role parents play in protecting their children from the hidden dangers of the internet. Chris offers practical advice on setting up a tech-ready home, managing screen time, and fostering a healthy digital environment for kids. This episode is a must-listen for any parent looking to stay informed and proactive in the ever-evolving digital landscape. ** Learn more about Protect Young Eyes here ** Download your free 1000 Hours Outside tracker here >> https://www.1000hoursoutside.com/trackers Find everything you need to kick off your 1000 Hours Outside Journey here >> https://www.1000hoursoutside.com/blog/allthethings Order of copy of Ginny's newest book, Until the Streetlights Come On here >> https://amzn.to/3RXjBlN Learn more about your ad choices. Visit megaphone.fm/adchoices

College Matters. Alma Matters.
10X International Student Research Stories: Digital Safety, Detecting Credit Card Fraud With AI, and AI Transformers.

College Matters. Alma Matters.

Play Episode Listen Later Aug 29, 2024 22:02


Subscribe to Receive Venkat's Weekly Newsletter 10X International School uniquely offers  Experiential Programs to High Schoolers, To do research, build products, and in the process get a really good idea of what college program or career they want to pursue. On this Episode we feature 3 Grade 12 Student Researchers on a range of topics from Digital Safety in marginalized communities, Detecting CC fraud using AI, and Transformers in AI. The students are Pranav Morisetty, Pratosh Tiwari, and Saachee Moholkar. We are also joined by Aparna Chandrasekharan, Head of Placements at 10X. Topics discussed in this episode: Introductions [] Student Research projects [] Impact of Research [] How 10X nurtures research [] Close [] Our Guests: The students from 10X International School, Bengaluru India. Pranav Morisetty, Pratosh Tiwari, and Saachee Moholkar.  Aparna Chandrasekharan, Head of Placements, 10X International. Memorable Quote: “When I first heard about even doing research, it was extremely terrifying for me. Because, you know, I always had this mindset that research was, you know, extremely high level work, and I didn't think I was capable of doing that honestly.” Saachee Moholkar, 10X International. Episode Transcript: Please visit Episode Transcript. Calls-to-action: Follow us on Instagram. To Ask the Guest a question, or to comment on this episode, email podcast@almamatters.io. Subscribe or Follow our podcasts at any of these locations: Apple Podcasts, Spotify and others.

Dem Bois Podcast
Human Rights and Nonbinary Compromise with Wegner Wilma

Dem Bois Podcast

Play Episode Listen Later Jul 24, 2024 67:59


Send us a Text Message.Am I enough? This is a question that many people struggle with, but the answer is always the same. Yes! You are enough! You are exactly who you're supposed to be, even if the world tells you differently. That is the message in this episode of Dem Bois Podcast. Today I sit down with Human Rights defender, Wegner Wilma, and we discuss the constant struggle between being who you are, losing the acceptance of loved ones, and finding others to replace those lost loved ones. Wegner is also a writer and he is our second guest from Uganda.We talk:How Wegner's name was chosen - 4:31Struggling with the question: am I enough? - 19:44The Antihomosexuality Act in Uganda - 35:06Safety for trans and queer folks in Uganda - 53:59Wegner's message to listeners - 1:00:02Episode References:Ep. #47 HIV Activism and Trans Advocacy in Uganda with Ruthra LubegaRead more about Wegner in his bio below:Wegner is my name. I am a Trans Non binary Ugandan citizen. My pronouns are they/them and a dedicated Human Rights defender, great writer and a champion for the rights of queer individuals living in Uganda. I have actively participated in a number of Digital Safety and Security initiatives under Queer Women Leaders Uganda where I am currently working as a Finance Officer. Considering the Anti-Homosexuality Act 2023 passing in Uganda, queer advocacy is safest online and I commend QWLU's commitment in fostering secure online spaces for the queer community.https://www.twitter.com/Closeted_AfricaAre you enjoying the Dem Bois Podcast? Donate today to help support the cost of production and the honorarium we pay our guests for their time. All donations are tax-deductible. Click here! Donate to support our 2023 Gender Affirming Surgery Grant Fund here!

Crisis. Conflict. Emergency Management
Integrating Digital Safety in the Food Industry with Kristin Demoranville

Crisis. Conflict. Emergency Management

Play Episode Listen Later Jul 14, 2024 59:08


In this episode of the Crisis Lab Podcast, host Kyle King interviews Kristin Demoranville, an expert in security risk resilience for the food sector, and the Founder and CEO of AnzenSage. Kyle and Kristin delve into the practical aspects of ensuring resilient food systems. They focus on community-level implementations, providing actionable steps for local stakeholders, and highlight the crucial role of cybersecurity in food security. Kristin Demoranville is a passionate, customer-centric leader with over 20 years of experience in IT and cybersecurity. As the Founder & CEO of AnzenSage and Co-Founder & CEO of AnzenOT, she specializes in security risk resilience for the food sector, helping businesses protect their data, people, and processes from cyber threats while aligning with strategic objectives and regulatory requirements. Tune in as they navigate the intersection of community action, agricultural technology, and cybersecurity to safeguard your food supply against any threat. Show Highlights [03:15] The overlooked importance of food and water in critical Infrastructure [04:00] The role of technology in modern agriculture [06:01] Cybersecurity threats in the food industry [07:38] The complex challenges of the food supply chain [20:14] How community actions build resilience in cybersecurity [21:39] Personal and community responsibility in food security [28:06] The role of technology in urban farming [28:54] The value of community cohesion in crisis situations [30:36] Government's role in food security [32:28] Challenges in food Industry collaboration [33:09] Cybersecurity and law enforcement [34:37] Importance of simulated exercises [39:53] Community involvement and incentives [41:54] Future of food security and technology [45:24] Consumer awareness and education [52:17] Practical cybersecurity tips Connect with Kristin Demoranville -Linkedin -Website

The Daily Decrypt - Cyber News and Discussions
100th Episode: Digital Safety and Security Panel (feat. Bill and Trae)

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jul 12, 2024


In today's episode of The Daily Decrypt, we celebrate our 100th episode with a special panel discussion on personal privacy and security. Hosts Trae, Colin, and Bill dive into real-life scenarios of phishing attacks, SIM swapping, and data breaches involving brands like PayPal, Navy Federal, Ticketmaster, and Neiman Marcus. The panel also shares actionable tips on password management, using canary tokens, and enhancing cybersecurity awareness to protect against evolving threats. Video Episode: https://youtu.be/0pNmZ3QfUWk 00:00 - Intro / Thanks for Listening 01:51 - Trae just ignores his emails 05:10 - Trae hangs up on scammers (and legit people too) 15:54 - Bill uses aliased emails 20:01 - Trae keeps up with data breaches 24:49 - Bill uses a password manager 27:20 - Trae changes his SIM pin 31:45 - Colin uses deception to detect intruders Tags: cybersecurity, phishing, SIM swapping, data breaches, PayPal, Navy Federal, Ticketmaster, Neiman Marcus, password management, canary tokens Search Phrases: How to protect against phishing attacks Best practices for password management in 2024 How to secure your SIM card from swapping attacks Latest data breaches: PayPal, Ticketmaster, Neiman Marcus Cybersecurity tips from The Daily Decrypt podcast How to use canary tokens for cybersecurity Real-life examples of phishing scams How to enhance personal privacy and security Strategies for cybersecurity awareness training

Security Unfiltered
The Future of Encryption and Digital Safety With Ameesh Divatia

Security Unfiltered

Play Episode Listen Later Jun 17, 2024 43:57 Transcription Available


Send us a Text Message.What if you could unlock the secrets of a thriving tech career and learn how to safeguard sensitive data in the digital age? Join us for an insightful episode featuring our special guest, Ameesh Divatia, who shares his captivating journey into IT, sparked by reading tech articles in Time magazine and National Geographic. From his early fascination with electronics to pursuing electrical engineering and navigating the evolution of technology, Ameesh offers a unique perspective shaped by experiences in tech hubs like the San Francisco Bay Area.Ever wondered how stepping out of your comfort zone could propel your career in tech? We explore this theme with personal anecdotes about embracing discomfort for continuous growth, inspired by my father's philosophy. Discover how Amazon, particularly AWS, has revolutionized modern life and shopping habits. Learn about the dynamic culture of Silicon Valley, where rotating between major tech companies brings fresh perspectives. The episode also features an intriguing story about hiring practices and the essential lessons drawn from past cybersecurity breaches.Finally, we tackle the critical challenge of securing sensitive data in today's interconnected world. Dive into advanced topics such as cryptography, privacy-enhanced computation, and the looming threat of quantum computing. Understand the pivotal role of human factors in cybersecurity and how changing attitudes can enhance protection measures. This episode wraps up with insights on mastering encryption concepts and the importance of collaboration and simplification in the learning process, providing you with the knowledge to navigate the increasingly complex digital security landscape.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

Reimagining the Internet
101. Reframing Digital Safety with Diana Freed: For Survivors and Youth, The Biggest Threats Come From Everyday Tech

Reimagining the Internet

Play Episode Listen Later May 29, 2024 37:21


CW/TW: Intimate partner violence, child exploitation Diana Freed has spent the past several years radically reframing the threat model in cybersecurity with groundbreaking research into how domestic abusers utilize everyday technology like smart phones and tracking apps. Diana sits down with us to talk about digital safety for survivors of intimate partner violence and youth, […]

Life of Love a Joyful Guide to Self and Sensuality
Secrets to Parenting with Grace

Life of Love a Joyful Guide to Self and Sensuality

Play Episode Listen Later May 23, 2024 36:55 Transcription Available


Send us a Text Message.When Cathlene Miner confronted her inner demons and emerged as a pillar of strength, she didn't just reshape her body; she reshaped her life. In a candid conversation, she walks us through her remarkable transformation from struggling single mother to fitness professional, unravelling the complexities of self-perception and its rippling effects on our existence. Her story isn't just about overcoming adversity; it's a blueprint for parenting with purpose, for nurturing a spirit of resilience, and for infusing daily routines with joy and abundance.Peel back the layers of personal growth and you'll find self-perception at its core. Cathlene and I tackle the weighty topics of honesty within and the influence of our social circles on our life's trajectory. We share the wisdom of listening to our internal cues, approaching life with a poised confidence, and aligning our actions with deeply held values. The journey isn't about racing to the finish line—it's about cherishing each step, especially when guiding our children through the complexities of literacy, technology, and setting healthy boundaries.The digital world is a labyrinth of content, and as parents, it's our duty to shield our children from the perils that lurk within. Cathlene introduces us to her visionary platform, designed to let kids express their creativity safely and learn the ropes of digital entrepreneurship. We discuss the urgent need for vigilance in online spaces and the broader implications of digital safety for future generations. True love, as we uncover, often means setting firm limits and preparing our offspring to navigate a world of instant access and endless distractions.Support the Show.Link to Support this Channel: https://www.buzzsprout.com/2153284/supporters/newJulie's Book: https://amzn.to/3K2ZS05Julie's Website for more information, comments or requests: https://lifeofloveandjoy.comI receive a small commission when you purchase from these links. Thank you for your support! Promo Code for Free Audio Book on Audible: https://amzn.to/45YUMdH

ITSPmagazine | Technology. Cybersecurity. Society
Aligning Safety with Business Strategy to Enable Operational Reliability | 7 Minutes on ITSPmagazine with Rock Lambros | A Short Brand Innovation Story By Rock Cyber

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 1, 2024 7:00


Sometimes organizations know they need to do something to improve their cybersecurity posture … or, in some cases, something more, something different. They know there is a disconnect between cybersecurity and the business — they just don't know how to get started or transition to get the best results, given their unique environments and operating processes. What's truly innovative about RockCyber's cybersecurity assessments is how they intertwine cybersecurity strategies directly with business alignment and outcomes. This is not just about securing IT assets; it's about shaping cybersecurity as a strategic advantage that supports overall business goals. The service is tailored for organizations that need a cybersecurity approach that is not only robust but also aligned with their business objectives, enhancing both security and business performance.This approach solves the key problem of the disconnect between cybersecurity practices and business objectives, which many companies struggle with. The RockCyber vCISO and cybersecurity assessment services are particularly valuable for organizations where security must be a driver of cyber resiliency and growth, not just a protective measure.Let's talk about how this changes the future for our customers. Traditionally, cybersecurity has often been a siloed IT function, reactive and disconnected from core business functions. RockCyber's assessments transform this by integrating cybersecurity with business strategy, making it a cornerstone of business planning and execution.Imagine a before scenario where a company's cybersecurity efforts are technically adequate but not aligned with the strategic business initiatives, leading to inefficiencies and missed opportunities. After a RockCyber assessment, this company strengthens its security and aligns its cybersecurity strategy with business objectives, ensuring that every security investment directly supports business growth and resilience.With the assessment in place, RockCyber clients typically lean in on the virtual CISO services where the RockCyber team can take the knowledge we have in the field — both figuratively and literally — to establish a strategy that will begin the process of maturity and lead the organization down a path of cyber sustainability.For example, with one recent oil and gas client, the cybersecurity program the RockCyber created not only reduces cyber risk and improves the ability of the organization to handle and manage a potential cyber incident, but it aligns directly with the organization's key objectives:Maintain operating reliabilityDrive positive impact on revenue and profitEnsure digital and physical safetyTo achieve this, the team at RockCyber kept the big business picture in mind while focusing on breaking down the problem into smaller projects that be accomplished successfully, building on the past to continue to improve the future.The RockCyber cybersecurity assessment and vCISO services provide the following benefits:Establish a business-aligned strategic vision while bringing the skills, experience, and technology needed to execute tactically.Helping the organization to identify key challenges in security operations, staffing, training, execution, and communication and to help them overcome these challenges with confidence, giving them peace of mind to know we are there by their side every step of the way.Rock invites you all to connect with him via LinkedIn where you can find some of his musings on this topic and so many more. If you have questions about getting started and/or transforming your program in a meaningful way, you can reach out to Rock and the team directly at info@rockcyber.com.Learn more about RockCyber: https://itspm.ag/rockcyber-3gq7Note: This story contains promotional content. Learn more.Guest: Rock LambrosCEO and founder of RockCyber [@RockCyberLLC]On LinkedIn | https://www.linkedin.com/in/rocklambros/On Twitter | https://twitter.com/rocklambrosResourcesLearn more and catch more stories from RockCyber: https://www.itspmagazine.com/directory/rockcyberLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Daily Decrypt - Cyber News and Discussions
Smart Lock Flaws Expose 50,000 Homes, SOAP API Security Vulnerability, Ransomware Payment Bans and Cybersecurity Strategies

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Apr 16, 2024


Today, we discuss the recent Chirp Systems smart lock vulnerability, Delinea's rapid response to a critical API flaw, and the ongoing debate over ransomware payment policies. Explore the implications of these security breaches and the strategies to enhance digital safety without compromising on the details. Keywords: Cybersecurity, Chirp Systems, Delinea, Ransomware Payment Ban, Smart Locks, API Vulnerability, U.S. Cybersecurity & Infrastructure Security Agency Sources: Chirp Systems Smart Lock Issue: krebsonsecurity.com/2024/04/crickets-from-chirp-systems-in-smart-lock-key-leak Delinea Secret Server SOAP API Vulnerability: helpnetsecurity.com/2024/04/15/delinea-secret-server-vulnerability Ransomware Payment Ban Debate: cybersecuritydive.com/news/ransom-payment-ban-pushback/713206 Feel free to let me know if there are any tweaks you'd like to make! Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for the Episode: Cybersecurity, Chirp Systems, Delinea, Ransomware, Smart Lock Security, API Vulnerability, Digital Safety, Cyber Attack, Security Breach, Tech News Search Phrases: Chirp Systems smart lock security issues Delinea SOAP API vulnerability fix Ransomware payment policy debate Cybersecurity latest news Smart lock vulnerabilities and solutions How to secure digital locks from hackers API security breaches and responses Impact of ransomware payment bans Expert analysis on Chirp Systems breach Preventing unauthorized access in smart devices Transcript: Apr16 Welcome back to the Daily Decrypt. Chirp system's smart locks are compromised With hard coded credentials, potentially unlocking 50, 000 U. S. homes remotely, warns the U. S. Cybersecurity Infrastructure Security Agency, highlighting severe oversight in digital security protocols. What can be done to secure these smart locks and prevent unauthorized remote access? Delinea acted swiftly to patch a critical vulnerability in their secret server SOAP API, which could have allowed attackers to gain administrative access and seize sensitive data. And finally, ransomware victims in the US shelled out 1. 5 billion between May 2022 and June of 2023 amidst heated debates over the effectiveness of ransomware payment bans, as highlighted by the Institute for Security and Technology. What strategies are cybersecurity experts recommending to reduce ransom payments without implementing a ban? In a recent warning issued by the U. S. Cybersecurity and Infrastructure Security Agency, or CISA, an estimated 50, 000 smart locks across the country are vulnerable to breaches due to hard coded credentials that allow remote access. These locks, developed by Chirp Systems, have been criticized for storing sensitive access information within their source code, making them susceptible to unauthorized entries with a CVSS severity rating of 9. 1 out of 10. Despite these concerns, Chirp Systems has yet to respond or collaborate with CISA to address these vulnerabilities. The issue first came to light when Matt Brown, a senior systems development engineer at Amazon Web Services, detected the flaw. Brown, while installing the Chirp app to his Access His Apartment, opted to scrutinize the app's security. He discovered that the app stored passwords and private keystrings in a decodable format, leaving residence doors wide open to potential hackers. In response to his findings, Brown approached his leasing office, which provided him with a 50 NFC key fob as a workaround. However, Brown pointed out that the FOB still transmitted the credentials in plain text, vulnerable to cloning via NFC enabled devices. The parent company of Chirp Systems, RealPage, Inc., is currently facing legal challenges including a massive lawsuit supported by the U. S. Department of Justice and multiple state attorneys general. The suits accuse RealPage of using its software to artificially inflate rents through collusion with landlords, employing algorithms that limit negotiation and push maximum possible rents on tenants. In a swift response to a security breach, Delinea, a leading provider of privileged access management solutions, recently addressed a critical vulnerability in their secret server SOAP API. The company first became aware of the issue late last week and took immediate action by blocking SOAP endpoints for its cloud customers. This precaution was necessary to mitigate any potential unauthorized access. while the cloud service was patched on the same day. By Saturday, Delenia confirmed their awareness of the vulnerability and assured that their engineering and security teams had conducted thorough investigations, revealing no evidence of compromised customer data or attempts to exploit the flaw. By Sunday, the company had released an update for Secret Server on premises, version 11. 7. 000001. Effectively fixing the vulnerability and announcing forthcoming patches for earlier versions upon completion of testing. Moreover, Delinea has provided a guide for customers using on premise versions to help determine if their systems were compromised. This includes instructions to generate custom reports to trace potentially unauthorized access, particularly from unfamiliar IP addresses which could indicate malicious activity. Kevin Beaumont, a security researcher, noted that the temporary unavailability of Delinia's secret server cloud last Friday stemmed from a published blog post by security engineer Johnny Yu, who discovered the vulnerability. Yu's post, which included a proof of concept for creating a golden token allowing admin access, was crucial in prompting the company's rapid response. Delinia has also established a continuous monitoring process updates on their service status to ensure ongoing security for their users. They urge all users to review any unusual audit records and verify the authenticity of the secret server mobile application access as part of their comprehensive security measures. In a report issued this past Wednesday, the Institute for Security and Technology's Ransomware Task Force has decided against the need for a ransomware payment ban. The report highlights several reasons, including concerns that a ban might discourage victims from reporting ransom payments, potentially pushing these transactions underground, and the complexity of any Exempting critical infrastructure. Instead of implementing a ban, the task force recommends focusing on 16 milestones they believe will effectively reduce ransom payments. And there's a quote from the RTF co chairs from an email that says, while a ban may be an easier policy lift than activities designing to drive preparedness, it will almost certainly create the wrong kind of impact. They noted a decline in organizations making payments, suggesting that current strategies may already be making an impact. Despite the resistance to a payment ban, the task force revealed that more than half of their proposed measures are already in progress or completed. These include significant policy changes like the requirement for publicly traded companies to report substantial cyber incidents, and the upcoming rule from CISA mandating that US critical infrastructure entities quickly report cyber attacks and ransom payments. The discussion on how best to tackle ransomware continues to evolve. While the Biden administration previously steered clear of a complete ban on ransomware payments, there are renewed calls for reconsidering this policy. Brett Callow, a threat analyst at Emsisoft, is an outspoken supporter of a ban, suggesting that even if attackers may not be aware of state level bans, a national policy might have a significant deterrent effect. The Ransomware Task Force, by figures like Kemba Walden, the former acting National Cyber Director, advocates for bolstering existing efforts rather than imposing new bans, indicating a strategic commitment to enhance cybersecurity resilience amidst ongoing debates. That's all I got for you today. Thanks for tuning in to this quick, news focused episode. Be sure to tune in later this week for a discussion on HackspaceCon, which just took place last weekend in Florida at Kennedy Space Center. Still working on editing that episode, but dogespan and I discussed our key takeaways and we wanted to share them with you. So stick around for that.

SSPX Podcast
Daily Devotional: April 5, 2024

SSPX Podcast

Play Episode Listen Later Apr 5, 2024 4:19


Today is Friday, April 5th, 2024, the Friday in the Octave of Easter, a First Class Feast, with the liturgical color of white or gold. In this episode: The Meditation The Lord is risen, Indeed, A preview of Today's Podcast: Practical Steps for Digital Safety, And a Quote from Archbishop LefebvreThe email version of this Devotional is a perfect companion! Subscribe to Daily DevotionalSubscribe to Podcast to receive this and all our audio episodes: https://sspx-podcast.captivate.fm/listenSupport the SSPX Podcast with 1-time or Monthly Donation >>Subscribe to the SSPX YouTube channel here >>SSPX News Website: https://fsspx.news/enVisit the US District website: https://sspx.org/en What is the SSPX Podcast?The SSPX Podcast is produced by Angelus Press, which has as its mission the fortification of traditional Catholics so that they can defend the Faith, and reaching out to those who have not yet found Tradition. What is the SSPX?The main goal of the Society of Saint Pius X is to preserve the Catholic Faith in its fullness and purity, to teach its truths, and to diffuse its virtues, especially through the Roman Catholic priesthood.Authentic spiritual life, the sacraments, and the traditional liturgy are its primary means of bringing this life of grace to souls.Although the traditional Latin Mass is the most visible and public expression of the work of the Society, we are committed to defending Catholic Tradition in its entirety: all of Catholic doctrine and morals as the Church has always defended them. What people need is the Catholic Faith, without compromise, with all the truth and beauty which accompanies it.https://sspx.org

SSPX Podcast
Practical Steps for Digital Safety: Digital Dangers #8

SSPX Podcast

Play Episode Listen Later Apr 5, 2024 60:11


As we have already touched on in earlier episodes, screens and the content they deliver adversely affect the mental and emotional maturation of young people, with some content–such as pornography–inflicting lifelong damage. These dangers are considered in more detail today, with special attention paid to the responsibilities that all parents must shoulder to ensure their children grow up mentally, emotionally, and above all, spiritually healthy.Included in this discussion are lessons for how adults, too, can take steps to protect themselves in our omnipresent digital age.View on YouTube: https://youtu.be/t91waIvSTFg Support the SSPX Podcast with 1-time or Monthly Donation >>Digital Dangers Full Series: https://sspxpodcast.com/digital-dangers/View all our episodes, including the Crisis in the Church Series >>Subscribe to the SSPX YouTube channel here >>SSPX News Website: https://fsspx.news/enVisit the US District website: https://sspx.org/en What is the SSPX Podcast?The SSPX Podcast is produced by Angelus Press, which has as its mission the fortification of traditional Catholics so that they can defend the Faith, and reaching out to those who have not yet found Tradition. What is the SSPX?The main goal of the Society of Saint Pius X is to preserve the Catholic Faith in its fullness and purity, to teach its truths, and to diffuse its virtues, especially through the Roman Catholic priesthood.Authentic spiritual life, the sacraments, and the traditional liturgy are its primary means of bringing this life of grace to souls.Although the traditional Latin Mass is the most visible and public expression of the work of the Society, we are committed to defending Catholic Tradition in its entirety: all of Catholic doctrine and morals as the Church has always defended them. What people need is the Catholic Faith, without compromise, with all the truth and beauty which accompanies it.https://sspx.org

ResearchPod
Increasing Security Awareness in German Small and Medium-Sized Businesses with “Awareness Lab SME (ALARM) Information Security”

ResearchPod

Play Episode Listen Later Apr 2, 2024 15:33 Transcription Available


Recent cybersecurity reports show that the security of firms' online presences is under ever-greater threat from cyberattack. Small and medium-sized enterprises (SMEs) are attacked disproportionately often. There is also a link between people's level of knowledge and the number of attacks.Professor Margit Scholl and her team at TH Wildau have developed the Awareness Lab SME (ALARM) Information Security program. Their goal is to raise security awareness and increase safety education within SMEs. Read the original research: http://dx.doi.org/10.13140/RG.2.2.13519.29600 

Zone 7 with Sheryl McCollum
Friday CRU (Crime Round-Up) with Nancy Grace: Federal Raid, Polygraph Proposals, Jury Pool Controversy

Zone 7 with Sheryl McCollum

Play Episode Listen Later Mar 29, 2024 29:16 Transcription Available


In the first ever episode of a new Zone 7 series, CRU sees a dream team of Nancy Grace joining our Host Sheryl McCollum to rehash the most relevant crime topics from the previous weeks news. Nancy Grace is a renowned legal commentator, television journalist, and former prosecutor known for her unwavering dedication to victims' rights and the pursuit of justice. Today Nancy and Sheryl discuss these topics in today's crime round-up: P Diddy Federal Raid: Is it a message to a witness? Sebastian Rogers Missing: Nancy offered to set up a polygraph for the stepfather to take Byan Koberger Venue Change: Calling potential jurors with a survey: Tainting a jury pool before selection even happens! Show Notes: [0:00] Welcome! Nancy and Sheryl introduce this week's crime roundup    [0:30] The Case Against Sean "P Diddy" Combs  [14:00] The mysterious disappearance of Sebastian Rogers [21:30] Byan Koberger: Jury tampering and legal strategies [27:00] Closing Thoughts and Story from Nancy and Sheryl's Past   Sheryl “Mac” McCollum is an Emmy Award winning CSI, a writer for CrimeOnLine, Forensic and Crime Scene Expert for Crime Stories with Nancy Grace, and a CSI for a metro Atlanta Police Department. She is the co-author of the textbook., Cold Case: Pathways to Justice. Sheryl is also the founder and director of the Cold Case Investigative Research Institute, a collaboration between universities and colleges that brings researchers, practitioners, students and the criminal justice community together to advance techniques in solving cold cases and assist families and law enforcement with solvability factors for unsolved homicides, missing persons, and kidnapping cases.   You can connect and learn more about Sheryl's work by visiting the CCIRI website https://coldcasecrimes.org Social Links: Email: coldcase2004@gmail.com Twitter: @ColdCaseTips Facebook: @sheryl.mccollum See omnystudio.com/listener for privacy information.

Podcast on Crimes Against Women
Uncovering the Dark Side of Vehicle Tracking: Tech-Enabled Abuse and the Fight for Digital Safety

Podcast on Crimes Against Women

Play Episode Listen Later Feb 19, 2024 57:29 Transcription Available


As Detective Kelly Downey unravels the haunting narrative of "Christine," a woman ensnared by her spouse through her car's GPS, we confront the sobering reality of tech-enabled abuse. Our discussion with digital safety expert Adam Dodge ventures beyond physical violence to expose the psychological and technological warfare waged in abusive relationships. This episode strips bare the complexities of car stalking and the severe implications for victims' safety, questioning the accountability of car companies and the effectiveness of current legislation in protecting those at risk.Peeling back the layers of vehicle tracking apps, we reveal the unsettling truth about modern stalking tactics, where abusers exploit the very tools meant to provide convenience and security. Our conversation takes a critical look at the automotive industry's privacy practices, or lack thereof, and the obstacles law enforcement face when seeking cooperation from tech giants. We spotlight the bold steps necessary to safeguard personal privacy in an era where technology can be both an ally and an adversary.In response to the pervasive threat of digital harassment, we share innovative strategies and resources that offer victims a lifeline. Encrypted messaging and vigilant digital hygiene become shields against abusers, while legislative strides in phone number portability present a beacon of hope. 

How To Talk To Kids About Anything
How to Talk to Kids about Digital Safety and Pornography Exposure with Kristen A. Jenson

How To Talk To Kids About Anything

Play Episode Listen Later Feb 13, 2024


The post How to Talk to Kids about Digital Safety and Pornography Exposure with Kristen A. Jenson appeared first on Dr Robyn Silverman.

kids talk exposure pornography digital safety kristen a jenson robyn silverman
Home Gadget Geeks (Audio MP3)
Titania Jordan from Bark Technologies with Digital Safety and Advanced Content Monitoring for All – HGG596

Home Gadget Geeks (Audio MP3)

Play Episode Listen Later Jan 6, 2024 62:26


In the latest Home Gadget Geeks episode, I had the pleasure of hosting Titania Jordan the CPO (Chief Parent Officer) from Bark.us —a leading digital safety company. Titania delved into Bark’s cutting-edge solutions, discussing AI-driven content monitoring and advanced threat detection. This episode unveils the synergy of technology and security, offering a glimpse into digital safety’s future. Tune in for a tech-savvy discussion that matters! Thanks for listening! Full show notes, transcriptions (available on request), audio and video at http://theAverageGuy.tv/hgg596 Join Jim Collison / @jcollison for show #596 of Home Gadget Geeks, brought to you by the Average Guy Network.

No-Problem Parenting™ How to Become the Confident Leader Your Kids Crave You to Be, More Respect, Better Relationship, Get
EP 216 Tech & Teaching Tuesdays Digital Safety for all ages: Tips, and Tools for Confident Parenting

No-Problem Parenting™ How to Become the Confident Leader Your Kids Crave You to Be, More Respect, Better Relationship, Get

Play Episode Listen Later Jan 2, 2024 16:14


Welcome to Tech and Teaching Tuesdays! In this episode, we tackle the crucial question: How can you ensure your child's online safety? Join me as I share technology tips tailored for toddlers to teens.   We kick things off by acknowledging the expansive digital landscape our kids are growing up in, moving beyond mere screen time management to establish early childhood boundaries. In middle childhood, the focus shifts to fostering critical thinking and online etiquette, utilizing the "Three W's" - Who, What, and Why - as a powerful tool for guiding your child's online behavior. Consider taping these questions as a friendly reminder inside the cover of their tablet or in their playroom.   Venturing into adolescence, a time of heightened emotions and rapid changes, we emphasize the significance of open communication and privacy awareness. Creating a digital contract with your teen, as discussed in Episode 12 and reiterated today, becomes a valuable tool outlining expectations, consequences, and fostering collaboration.   For those eager to dig deeper into tech safety and communication strategies, check out Episodes 12 and 13 of No Problem Parenting. Additionally, Episode 24 introduces an alternative to screens with Drew Vernon from Tonies.com, offering a screen-free, imagination-building experience for your little ones.   Stay tuned for our next episode, where we'll explore the delicate balance of determining the right amount of screen time for your child. Ensuring our children's online safety may be tricky, but putting in the effort early on will save you frustration in the long run. Remember, preparing our kids for the digital world is one of the most important parenting jobs in this digital era. It's the future, and we want to celebrate it more than fear it.   As a bonus resource, consider exploring Learning Success Academy's Teen Coaching for Success and Empowerment. Their ICF accredited coaches specialize in helping teens overcome achievement blockers. Get a 50% discount on their Teen Neuro Assessment today at [Learning Success Academy](https://www.learningsuccessacademy.com/teenage-coaching), and don't forget to mention the No Problem Parenting Podcast referred to you.   Until the next episode, take care, and let's continue the journey of raising tech-savvy, safe kiddos together!

The Collin Kartchner Podcast
Save The Kids Ep. 133: Officer Gomez talking on digital safety educdation, and what you didn't know you're kid is doing online in school

The Collin Kartchner Podcast

Play Episode Listen Later Nov 13, 2023 33:15


Officer David Gomez is a Police Officer for the Boise County Sheriff's Office in Idaho City, Idaho and a School Resource Office.. He has a background in electronics engineering, which he integrates in schools to educate parents on the dangers of social media.  And if you guys are OG listeners of the show, you'll know that Officer Gomez was one of the first guests on the Save The Kids Podcast.  Today we talk about the digital landscape for kids and what that means for parents Fb: Officer GomezIf you want a speaker in your school, email heynate@savethekids.org and we will get you hooked up! OR fill out the form below.Link to speaker formGet a Free download for tech boundaries in the homeIf you want a speaker in your school, email heynate@savethekids.org OR fill out the form below.Link to speaker formSupport the show

Parenting Great Kids with Dr. Meg Meeker
Ep. 208: Digital Safety 101: Back to School Edition Part 2 with Guest Sarah Kimmel

Parenting Great Kids with Dr. Meg Meeker

Play Episode Listen Later Aug 10, 2023 33:08


In the second installment of our Back to School series on the Parenting Great Kids podcast, Dr. Meg Meeker interviews Sarah Kimmel, a family tech expert, to discuss effective strategies for communicating internet safety with children. Sarah emphasizes the importance of implementing parental controls and filters on devices and apps to create a safer online environment for children. She suggests using multiple layers of protection, such as in-app controls and on-device control settings like Apple Screen Time and Google Family Link. Sarah also highlights the significance of ongoing communication between parents and children about potential risks and safe online practices. This episode is a must-listen for parents who want to gain practical strategies for keeping their children safe online.  In this episode, you'll learn how to: Discover the methods to safeguard your children in the digital world. Unearth the best practices to effectively implement parental controls and filters. Learn effective ways to engage in an open dialogue with your children about web safety. Acquire up-to-date knowledge about the latest technology trends and potential online threats. Understand the empowering influence of technology on children and parents when used responsibly. The key moments in this episode are: 00:00:00 Introduction 00:00:38 Teaching Children about Online Safety 00:03:07 Transition to Family Tech Expert 00:04:25 Platforms for Consuming Tech Information 00:08:20 Role of a Family Tech Expert 00:15:28 Protecting Children from Inappropriate Content 00:18:23 Preventing Stalking and Grooming of Girls 00:20:57 Online Gaming Safety 00:24:33 Layers of Protection 00:26:45 Importance of Conversations 00:31:16 Monitoring Social Media Activity 00:31:41 Parental Control Options 00:32:11 Positive Aspects of Parental Controls 00:32:29 Understanding and Implementing Technolog 00:33:29 Recap of Key Takeaways ABOUT OUR GUEST: Having spent over 20 years as an IT Manager, Sarah now dedicates her time to helping families understand and manage the technology in their homes through her podcast, tv appearances, YouTube channel and social platforms.  FROM THE PRODUCER: Thanks for helping Dr. Meg's parenting revolution reach more than 5 MILLION downloads! If you found today's content helpful, please consider sharing it with another parent and subscribing to stay updated on future episodes. You can also visit DrMegMeeker.com for additional parenting resources and online courses. Get social with Dr. Meg on YouTube, Facebook & Instagram @MegMeekerMD Learn more about your ad choices. Visit megaphone.fm/adchoices