POPULARITY
Kara Tsuboi covers the top tech stories. OpenAI released new parental controls allowing adults to monitor the safety of teen accounts. The debut of the AI-generated actor Tilly Norwood sparked widespread outrage in Hollywood. Parents are relying on GPS-enabled apps and smart devices to monitor their children's locations for safety while they're out trick-or-treating on Halloween night.
Kara Tsuboi covers the top tech stories. OpenAI released new parental controls allowing adults to monitor the safety of teen accounts. The debut of the AI-generated actor Tilly Norwood sparked widespread outrage in Hollywood. Parents are relying on GPS-enabled apps and smart devices to monitor their children's locations for safety while they're out trick-or-treating on Halloween night.
Podcast: Industrial Cybersecurity InsiderEpisode: What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne NetworksPub date: 2025-10-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. The conversation explores why simply creating a list of vulnerabilities isn't enough – and what organizations should actually be doing to reduce risk in their OT environments.Chapters:00:00:00 - Introduction and Dan's Background00:02:00 - Biggest Misconceptions About OT Vulnerability Management00:04:00 - Blind Spots in OT Vulnerability Scanning00:07:00 - Finding Vulnerabilities: OT vs IT Differences00:10:00 - Proactive Approaches to Unknown Vulnerabilities00:12:00 - How TX One Addresses Vulnerabilities Non-Disruptively00:15:00 - Virtual Patching and Operations-First Philosophy00:18:00 - IT/OT Convergence and Team Collaboration00:21:00 - Building Relationships with Third-Party Partners00:23:00 - Tabletop Exercises and Incident Response Planning00:26:00 - Key Takeaway: Never Forget Your Original Objectives00:28:00 - Dealing with Event Overload and Zero-Day VulnerabilitiesLinks And Resources:Dan Cartmill on LinkedInTXOne NetworksDino Busalachi on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
What the Roblox Lawsuits Reveal About DIgital Safety: Rorke Wilson by Radio Islam
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
Bark is a tool for advanced content monitoring that adults can use to keep kids safe online. (Bark.us) Produced by Noble Academy, a school for students with learning differences in Greensboro, NC. https://www.nobleknights.org/
Podcast: Industrial Cybersecurity InsiderEpisode: Industrial Cybersecurity: The Gap Between Investment and Cyber Event PreventionPub date: 2025-10-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), practical ways to reduce alert fatigue and assign ownership, how to close the OT incident response gap by connecting SOC to operators, the realities of flat Layer 2 networks and undocumented zones, how to handle technical debt at scale (EOL firmware, unpatched HMIs, safe upgrade paths), and why "everyone is responsible" often means no one is. Expect candid discussion on alert fatigue, flat networks, and the human constraints driving today's gaps, plus a concrete checklist for building a coalition that actually works to protect production environments.Chapters00:00:00 – Why incidents still happen after major OT cyber spend00:02:30 – Tools vs. outcomes: underusing capabilities and alert fatigue00:05:50 – Who owns plant‑floor cyber? Why CISOs, CIOs, OEMs, and SIs talk past each other00:08:10 – Define the use case before tuning sensors and policies00:10:00 – OT IR is missing: operators are the first responders00:11:20 – Network reality check: flat L2, VLAN gaps, and unmanaged switches00:13:30 – Change management and patching in OT: risk, downtime, and technical debt00:15:20 – Skills and staffing: the silver tsunami and "jack of all trades" constraints00:18:00 – What outside partners can and cannot do in plants00:21:00 – Visibility blind spots: validating coverage with floor‑level walkthroughs00:24:00 – It won't stick without a coalition: getting plant managers, engineering, OEMs, and SOC alignedLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
What if online harassment isn't random at all—but part of a strategy? In this explosive episode of The Healthier Tech Podcast, host R Blank talks with Viktorya Vilk, Director of Digital Safety and Free Expression at PEN America, about how governments, corporations, and tech platforms are turning the internet into a weapon against free speech. Viktorya reveals how political power, economic pressure, and digital surveillance now intersect to create an ecosystem where journalists, writers, and even librarians are targeted for speaking out. She breaks down how authoritarian tactics, media consolidation, and platform indifference have combined to make the online world hostile to truth—and what each of us can do to push back. In This Episode: How the U.S. dropped to 57th in global press freedom rankings—and why that's not an accident The chilling new playbook: online harassment as a censorship tool Why Big Tech's business model thrives on surveillance, fear, and silence How Facebook and Google siphoned 70% of online ad revenue, collapsing local journalism Real-life examples of reporters attacked, arrested, and digitally terrorized for telling the truth The practical digital safety steps every person can take—starting today Why Viktorya refuses to give in to “tech nihilism” and insists users have power Why You Should Listen This isn't just a podcast about harassment or privacy—it's about democracy, power, and your voice. Viktorya explains how the same digital forces that endanger journalists are eroding safety and free expression for everyone. But she also shares concrete tools to rebuild your sense of control online: from password hygiene and privacy audits to collective advocacy that pressures tech platforms to act responsibly. She makes one thing clear: silence is the goal of harassment—and awareness is the antidote. Connect With Viktorya Vilk: Website: https://pen.org Social Handles: LinkedIn:https://www.linkedin.com/in/viktorya-v-a65b9235/ X: @VilkViktorya Resources Mentioned in the Episode: Field Manual Against Online Harrassment: https://onlineharassmentfieldmanual.pen.org/ Online abuse & Digital Safety Programs: https://pen.org/online-abuse-digital-safety/ Treating online abuse like Spam: https://pen.org/report/treating-online-abuse-like-spam/ Shouting into the void: https://pen.org/report/shouting-into-the-void/ No Excuse for abuse: https://pen.org/report/no-excuse-for-abuse/ Connect with R Blank: For more Healthier Tech Podcast episodes, and to download our Healthier Tech Quick Start Guide, visit https://HealthierTech.co and follow https://instagram.com/healthiertech Additional Links: EMF Superstore: https://ShieldYourBody.com (save 15% with code “pod”) Digital Wellbeing with a Human Soul: https://Bagby.co (save 15% with code “pod”) Youtube: https://youtube.com/shieldyourbody Instagram: https://www.instagram.com/bagbybrand/ Tiktok: https://www.tiktok.com/@bagby.co Facebook: https://www.facebook.com/shieldyourbody This episode is brought to you by Shield Your Body—a global leader in EMF protection and digital wellness. Because real wellness means protecting your body, not just optimizing it. If you found this episode eye-opening, leave a review, share it with someone tech-curious, and don't forget to subscribe to Shield Your Body on YouTube for more insights on living healthier with technology.
Technology use is on the rise. Unfortunately, so are scams. Online safety has never been more important. New developments with technology make it easier than ever to stay connected and improve accessibility. With a few tips and tricks, anyone can confidently – and safely – use technology to make their everyday life easier and better. We're talking to a technology expert about how things like smart home devices can make your life easier, how to recognize and avoid scams involving artificial intelligence (AI), and other important tips to protect yourself online.
Podcast: Industrial Cybersecurity InsiderEpisode: Hidden Cybersecurity Vulnerabilities in Today's Data CentersPub date: 2025-10-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Scott Cargill, Partner of BW Design Group, joins Craig and Dino. Together they dissect the critical vulnerability gap in data center operational technology infrastructure. While most data centers implement robust IT security protocols, their building management systems controlling cooling, power distribution, and environmental controls remain significantly under-protected. Cargill provides technical analysis of how the rapid expansion of data center capacity for AI workloads has outpaced OT security implementation, creating exploitable attack vectors where minutes of system compromise could cascade into millions in equipment damage and service disruption. Through evidence-based examination and industry insights, this episode offers CISOs and OT security professionals a practical framework for addressing the IT-OT security convergence challenge in mission-critical facilities.They offer actionable strategies for vulnerability assessment, segmentation, and defense-in-depth implementation.Chapters:- 00:00:00 - Meet Scott Cargill of BW Design Group- 00:02:30 - Data centers expanding for AI- 00:04:40 - Critical BMS vulnerabilities being ignored- 00:07:40 - Alarming OT security reality- 00:09:40 - Why OT security remains deprioritized- 00:12:10 - IT-OT security convergence challenges persist- 00:16:35 - Manufacturing parallels to data centers- 00:20:10 - Security solutions evolution underway- 00:21:45 - Managed services necessity for OT- 00:24:42 - Thought leadership driving industry standardsLinks and Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityScott Cargill on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Life, Culture and Current Events from a Biblical Perspective with Neil Johnson.Your support sends the gospel to every corner of Australia through broadcast, online and print media: https://vision.org.au/donateSee omnystudio.com/listener for privacy information.
In this episode of our new digital clinical safety podcast series, originally recorded in Autumn 2024, we are joined by Liz Barfield, who brings over 20 years of experience in this vital area. Liz's extensive background includes roles in emergency care, implementation, and her most recent position as a Clinical Safety Officer (CSO) at NHS England, where she contributed to numerous national programmes. In 2019, she completed an MSc in Patient Safety, focusing her dissertation on the DCB safety standards. Throughout the podcast, Liz shares valuable insights and practical hints and tips for those working in digital clinical safety roles. Further resources: • Digital Clinical Safety – Essentials e-learning training module https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#essentials-training • Digital Clinical Safety – Intermediate e-learning training module https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#intermediate-training • Digital Clinical Safety – Practitioner training https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#practitioner-training • Digital Safety in Practice course - https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#digital-safety-in-practice • Digital Clinical Safety – Refresher training https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#refresher-training The digital clinical risk management standards: • DCB0129: Clinical Risk Management: its Application in the Manufacture of Health IT Systems https://digital.nhs.uk/data-and-information/information-standards/governance/latest-activity/standards-and-collections/dcb0129-clinical-risk-management-its-application-in-the-manufacture-of-health-it-systems/ • DCB0160: Clinical Risk Management: its Application in the Deployment and Use of Health IT Systems - NHS England Digital https://digital.nhs.uk/data-and-information/information-standards/governance/latest-activity/standards-and-collections/dcb0160-clinical-risk-management-its-application-in-the-deployment-and-use-of-health-it-systems/ A full transcript of this episode is available on our website - https://www.england.nhs.uk/long-read/insights-from-a-national-clinical-safety-officer-podcast-transcript/ Please get in touch if you have any questions regarding this episode - Tengland.clinical.safety@nhs.net
Podcast: Industrial Cybersecurity InsiderEpisode: Building OT Cybersecurity That Works in the Real WorldPub date: 2025-09-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIndustrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must come before capabilities, how to right-size your technology stack through tool rationalization, and why interdependence mapping is foundational for real resilience.00:00:00 – Why OT maturity often stalls00:06:00 – Where to focus first: assets, segmentation, and access00:08:20 – Governance gaps: frameworks on paper vs. controls in practice00:10:10 – Interdependence mapping beyond "crown jewels"00:12:30 – Operators as first responders and safe-state realities00:16:15 – Vendor and OEM ecosystems: who owns the response plan?00:20:10 – Threat intel's limits: effects‑based security over means‑based noise00:22:00 – Incident readiness in plants: plans, practice, and ownership00:26:00 – Supply chain fragility and concentration risk in manufacturing00:29:30 – Tool rationalization: measuring ROI, coverage, and usabilityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.DJ's Blog on Interdependence Mapping: https://claroty.com/blogDanielle Jablanski on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The cybersecurity industry operates on a fundamental misconception: that consumers want to understand and manage their digital security. After 17 years at F-Secure and extensive consumer research, Dmitri Vellikok has reached a different conclusion—people simply want security problems to disappear without their involvement.This insight has driven F-Secure's transformation from traditional endpoint protection to what Vellikok calls "embedded ecosystem security." The company, which holds 55% global market share in operator-delivered consumer security, has moved beyond the conventional model of asking consumers to install and manage security software.F-Secure's approach centers on embedding security capabilities directly into applications and services consumers already use. Rather than expecting people to download separate security software, the company partners with telecom operators, insurance companies, and financial institutions to integrate protection into existing customer touchpoints.This embedded strategy addresses what Vellikok identifies as cybersecurity's biggest challenge: activation and engagement. Traditional security solutions fail when consumers don't install them, don't configure them properly, or abandon them due to complexity. By placing security within existing applications, F-Secure automatically reaches more consumers while reducing friction.The company's research reveals the extent of consumer overconfidence in digital security. Seventy percent of people believe they can easily spot scams, yet 43% of that same group admits to having been scammed. This disconnect between perception and reality drives F-Secure's focus on proactive, invisible protection rather than relying on consumer vigilance.Central to this approach is what F-Secure calls the "scam kill chain"—a framework for protecting consumers at every stage of fraudulent attempts. The company analyzes scam workflows to identify intervention points, from initial contact through trust-building phases to final exploitation. This comprehensive view enables multi-layered protection that doesn't depend on consumers recognizing threats.F-Secure's partnership with telecom operators provides unique advantages in this model. Operators see network traffic, website visits, SMS messages, and communication patterns, giving them visibility into threat landscapes that individual security solutions cannot match. However, operators typically don't communicate their protective actions to customers, creating an opportunity for F-Secure to bridge this gap.The company combines operator-level data with device-level protection and user interface elements that inform consumers about threats blocked on their behalf. This creates what Vellikok describes as a "protective ring" around users' digital lives while maintaining transparency about security actions taken.Artificial intelligence and machine learning have been core to F-Secure's operations for over a decade, but recent advances enable more sophisticated predictive capabilities. The company processes massive data volumes to identify patterns and predict threats before they materialize. Vellikok estimates that within 18 to 24 months, F-Secure will be able to warn consumers three days in advance about likely scam attempts.This predictive approach represents a fundamental shift from reactive security to proactive protection. Instead of waiting for threats to appear and then blocking them, the system identifies risk patterns and steers users away from dangerous situations before threats fully develop.The AI integration also serves as a translation layer between technical security events and consumer-friendly communications. Rather than presenting technical alerts about blocked URLs or filtered emails, the system provides context about threats in language consumers can understand and act upon.F-Secure's evolution reflects broader industry recognition that consumer cybersecurity requires different approaches than enterprise security. While businesses can mandate security training and complex protocols, consumers operate in environments where convenience and simplicity drive adoption. The embedded security model acknowledges this reality while maintaining protection effectiveness.The company's global reach through operator partnerships positions it to address cybersecurity as a systemic challenge rather than an individual consumer problem. By aggregating threat data across millions of users and multiple communication channels, F-Secure creates network effects that improve protection for all users as the system learns from new attack patterns.Looking forward, Vellikok anticipates cybersecurity challenges will continue evolving in waves. Current focus on scam protection will likely shift to AI-driven threats, followed by quantum computing challenges. The embedded security model provides a framework for adapting to these changes while maintaining consumer protection without requiring users to understand or manage evolving threat landscapes. Learn more about F-Secure: https://itspm.ag/f-secure-2748Note: This story contains promotional content. Learn more. Guest: Dmitri Vellikok, Product and Business Development at F-Secure On LinkedIn: https://www.linkedin.com/in/dmitrivellikok/ResourcesCompany Directory:https://www.itspmagazine.com/directory/f-secure Learn more about creating content with Sean Martin & Marco Ciappelli: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Podcast: Industrial Cybersecurity InsiderEpisode: Mitsubishi's Billion-Dollar Bet on OT Cybersecurity with Nozomi AcquisitionPub date: 2025-09-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market.The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-making. Craig and Dino share practical insights for security leaders and engineering professionals working in industrial environments.Topics covered: • Why Mitsubishi made this $1B investment • How this affects choosing security vendors • The growing role of managed services in OT security • What organizations should do to prepare for changesFor cybersecurity professionals, industrial engineers, and executives working with operational technology and cyber defense.Chapters:00:00:00 - Welcome to Industrial Cybersecurity Insider Podcast00:01:26 - A Trend of Cybersecurity Platform Acquisitions00:02:03 - The "Cyber-Informed Engineering" Play00:02:52 - Market Impact: Setting a Billion-Dollar Bar for Competitors00:05:06 - A Lack of Expertise and Resources00:05:48 - The Challenge of Building an In-House Team vs. Using Managed Services00:07:40 - Embedding Security Directly into Hardware Controllers00:09:33 - How Competitors Like Rockwell Might React00:10:00 - IPO or Acquisition?00:14:42 - The On-Prem vs. Cloud Debate in Manufacturing Environments00:16:50 - 87% of Organizations Are Lagging in Cybersecurity Maturity00:17:20 - The IT/OT Resource and Knowledge Gap00:18:54 - The Need for CIOs to Partner with OT Systems Integrators00:21:25 - The "OnStar" Model for Industrial Security00:22:15 - The Reality of Vendor Lock-In and Warranty Issues00:24:14 - OT Needs to Own Its Cybersecurity Strategy00:25:12 - The Risk of Underutilized Security ToolsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Responsibility Without Authority: The CISO's Industrial Cybersecurity DilemmaPub date: 2025-09-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. While executives are tasked with ensuring resilience and reporting to the board, they often hit resistance at the plant floor where production uptime and safety KPIs take priority. The conversation explores IT/OT convergence, asset visibility blind spots, OEM restrictions, and the risks of relying on remote-only deployments. With insights from decades of hands-on experience in industrial environments, Craig and Dino outline practical steps for building bridges between IT and OT, aligning financial risk with security strategy, and equipping CISOs with the authority they need to succeed.Chapters:00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast00:01:11 - The CISO's Core Conflict of Responsibility Without Authority00:02:45 - Why Security Efforts Get "Kneecapped at the Front Door"00:04:04 - Understanding the OT Environment and Its Unique Technology00:05:36 - Building Bridges Between IT and OT as the Solution00:07:44 - Overcoming OT's "Skittish" Resistance to IT00:09:43 - The Scaling Problem of Too Few Engineers for Too Many Plants00:10:57 - Why a Remote-First Approach Fails in Manufacturing00:14:44 - The "Epiphany" of Uncovering Operational Benefits for OT Teams00:17:24 - Navigating OEM Warranties and Equipment Restrictions00:19:14 - The "Trust but Verify" Mandate for a CISO00:20:56 - The Danger of Hidden Networks and the "Air Gap" Myth00:23:16 - Speaking the Language of Business in Dollars and Cents00:24:43 - Aligning Security with the Plant's Capital Master Plan00:27:24 - How Company Ownership Affects Security Investment00:28:16 - How to Give the CISO Real AuthorityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Growing up, Yasmin London was a Champion Swimmer. She then swapped the pool for the police force, but an encounter with a young girl, while working as an officer, changed London's life forever and encouraged her to become a digital safety advocate.Yas now works with businesses and schools to equip young people with digital skills. She also specialises in developing “First Movers”—individuals who step up and set new standards for success, and believes female athletes already have all the skills they need to become them.This week, Chloe sits down with Yas London to pick her brain about what sportswomen need to know about digital safety, in order to build their personal brands safely. We hope you enjoy this chat.Get the wrap delivered into your inbox as a weekly newsletter! Subscribe here for the newsletter + don't miss a merch drop. https://bit.ly/tfapsubscribeA rising tide lifts all boats. Shop our brand new TFAP merch: https://www.thefemaleathleteproject.com/shopBuy our kids book The A to Z of Who I Could Be, or book for adults GIRLS DON'T PLAY SPORT.
Podcast: Industrial Cybersecurity InsiderEpisode: The Critical Role of Local Knowledge in Industrial CybersecurityPub date: 2025-09-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this essential rewind episode, Dino Busalachi and Craig Duckworth address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection.The Power of Local PartnershipDino emphasizes a crucial principle that often gets overlooked in cybersecurity implementations: "The only way you can act local is you've got to work with those folks that are in those plants every day, all day."This insight highlights why external cybersecurity consultants must forge strong partnerships with on-site operational teams who possess intimate knowledge of their industrial environments.These local experts understand the nuanced details that can make or break a security implementation. This includes everything from vendor schedules and machine operations to maintenance windows and downtime planning.They know when critical systems are most vulnerable and which processes absolutely cannot be interrupted.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this episode, Mike Elkins maps a whole‑of‑business blueprint for digital safety that actually reduces risk you can measure. We break down what “holistic” really means in practice: identity as the control plane, data‑centric design, continuous verification, least privilege, segmentation that shrinks blast radius, and automation that removes human bottlenecks. From cloud and SaaS to OT/IoT and third‑party risk, Chase shows how to connect policy, architecture, and operations so security becomes a repeatable system—not a pile of tools.TakeawaysWhy piecemeal controls create “debt‑in‑depth”How to center Zero Trust on identities, not networksPragmatic micro‑segmentation and just‑in‑time accessA simple metric stack for the board (exposure, blast radius, dwell time)How to align GRC with day‑to‑day enforcementNo FUD. No silver bullets. Just the playbook to make “holistic” real.
Podcast: Industrial Cybersecurity InsiderEpisode: FBI Alerts, OT Vulnerabilities, and What Comes NextPub date: 2025-09-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino break down the FBI's latest cybersecurity advisory and what it means for industrial organizations. From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. They discuss why manufacturing has become ransomware's “cash register,” the importance of continuous monitoring and asset visibility, and why every organization must have an incident response plan in place before a crisis. This episode is packed with real-world insights and actionable strategies. It's a must-listen for CISOs, CIOs, OT engineers, and plant leaders safeguarding manufacturing and critical infrastructure.Chapters:00:00:52 - Welcome to Industrial Cybersecurity Insider Podcast00:01:21 - A New FBI Advisory on Nation-State OT Threats00:02:37 - Cisco Hardware on the Plant Floor Targeted in Advisory00:03:18 - The IT/OT Disconnect: OT Assets are Often Invisible to InfoSec Teams00:04:19 - The Awareness Gap: Critical Security Alerts Fail to Reach OT Operations00:04:54 - The OT Cybersecurity Skills Gap and Cultural Divide00:07:32 - Why All Manufacturing is Critical, Citing the JBS Breach00:08:37 - The Staggering Economic Cost of OT Breaches00:09:33 - The "Cash Register" Concept: Why Attackers Target Manufacturing00:10:29 - OT as the New Frontier for Attacks on Unpatched Systems00:11:28 - The "Disinterested Third Party": When OEMs See Security as the Client's Problem00:12:31 - The Foundational First Step: Gaining Asset Visibility & Continuous Monitoring00:13:53 - The Impracticality of Patching in OT Due to Downtime and Safety Risks00:15:25 - Academic vs. Practitioner: Why High-Level Advice Fails on the Plant Floor00:18:25 - The Minimum Requirement: A Practiced, OT-Inclusive Incident Response Plan00:18:58 - Why CISOs Must Build Relationships with Key OT Partners00:22:46 - Practice, Partner, and Protect NowLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Montenegro's digital journey has been one of deliberate reconstruction and collaboration. In 2022, a major cyberattack exposed critical gaps in the country's digital infrastructure. The experience sent shockwaves through Montenegro's public administration and made it abundantly clear that preparedness on paper does not equal resilience in reality. Instead of responding with short-term fixes, public institutions focused on long-term change. They initiated a wide-ranging transformation, strengthening cyber capabilities, forming new partnerships, and prioritising resilience not as an end goal, but as an everyday practice. In this podcast episode, we take a privileged look at what that transformation felt like from the inside with Dušan Polović, Director General for Infrastructure, Information Security, Digitalisation and e-Services at the Ministry of Public Administration of Montenegro, and Milan Sekuloski, Senior Cybersecurity Expert at the e-Governance Academy. Tune in!
Podcast: Industrial Cybersecurity InsiderEpisode: AI, Phishing, and the Future of Industrial Cyber DefensePub date: 2025-08-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. Whether you're dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.Chapters:00:00:00 - Pandemic's Impact on Critical Infrastructure00:01:08 - Introduction to Gary Neelan and Claroty00:01:41 - Gary's Role in OT Cybersecurity00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems00:09:46 - Addressing Complex Challenges in OT Cybersecurity00:11:56 - OT Cybersecurity Talent Shortage and Managed Services00:13:01 - Future of OT Cybersecurity: Adapting to New Threats00:14:36 - Modernizing Manufacturing Systems for Enhanced Security00:15:52 - Global Cybersecurity Trends in Critical Infrastructure00:18:01 - Regional OT Cybersecurity Challenges and Responses00:25:01 - The Role of AI in Defending OT Environments00:28:19 - Final Thoughts on OT Cybersecurity's FutureLinks And Resources:Links And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityGary Kneeland on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In part two of our safety series on the Digitalization Tech Talks podcast, Jonas Norinder and Don Mack welcome Chase Davis from EOSYS to explore how digital safety systems are transforming machine operations. Building on last month's episode with Al Prosowski from Dow on process safety, this conversation dives into implementation strategies, risk assessments, and the role of technologies like fail-safe PLCs and Profisafe.Learn how digital safety reduces downtime, simplifies upgrades, and supports flexible manufacturing while keeping safety at the core. Whether you're modernizing legacy equipment or starting fresh, this episode offers practical insights for safer, smarter operations.
Tackling Bullying and Digital Safety with Nate Webb In this episode of The Secure Family Podcast, Andy speaks with school counselor and national speaker Nate Webb about the modern challenges of bullying in 2025 and effective communication with kids. Nate shares insights from his own experiences with bullying and how he uses them to educate others. The discussion covers topics like the sneaky nature of contemporary bullying, the importance of developing a child's sense of identity, and the crucial role of parents in digital safety. Additionally, the episode provides practical steps for parents to better support their children in both preventing and addressing bullying. For more from Nate Webb: https://natewebbspeaker.com/ Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. OmniWatch is a scam and identity protection service that monitors your data, alerts you to threats, and backs you with up with insurance. Try it for only $1 for 7 days. Connect
Podcast: Industrial Cybersecurity InsiderEpisode: Partnership in Action: When Legacy Systems Meet Modern Cybersecurity ThreatsPub date: 2025-08-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure. From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.What makes this episode essential listening:Real financial impact: Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hourPractical solutions that work: Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bankPolitical warfare decoded: Understand the often-toxic dynamics between IT and OT teams that sabotage security initiativesImplementation roadmaps: Get actionable strategies for deploying zero-trust architectures on the plant floorWhether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.Chapters:00:00:00 - Cyber insurance denied over incomplete MFA 00:03:21 - What clients face as they begin the OT security journey00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime) 00:07:36 - Too many IT tools forced into OT00:08:47 - Investment hurdles and budgeting misalignment00:11:05 - Collaboration between OT asset owners and the CISO00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions00:18:22 - Who embraces TXOne first—IT or OT?00:20:58 - CISOs on OT priorities and piloting top sites00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs00:27:03 - AI useful in SOC/baselining; humans still required on OT side00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps00:29:47 - Why deployments stall—overwhelm and fatigue after tech selectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Debbie Lay, TXOne Networks on LinkedInPatrick Gillespie, GuidePoint Security on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
BSI Reports and Whitepapers provide expert insights, guidance, and analysis on various topics related to standards, compliance, and best practices. They are designed to inform and educate organizations, industries, and policymakers about emerging trends, challenges, and opportunities in areas where standards play a critical role.This episode is an audio-abridged version of the BSI Report - Supporting a safe and secure digital world for adolescents. Published in May 2025, the report reveals that nearly half (47%) of young people aged 16 to 21 would prefer to grow up without the internet - a stark reflection of concerns about its impact on their wellbeing. Drawing on a survey of 1,293 UK adolescents, it shows that time spent online has increased since COVID-19, with many spending hours each day on social media and gaming. Despite this, 42% admit to hiding their online activity from parents, and risky behaviours, such as creating fake profiles are common. The findings highlight the urgent need for stronger privacy and safety measures by tech companies and policymakers to protect young users' mental health and online safety.Series | AudiobooksFind out more about the issues raised in this episodeBSI Digital TrustCPINISO COPOLCOGet involved with standardsGet in touch with The Standards Showeducation@bsigroup.comsend a voice messageFind and follow on social mediaX @StandardsShowInstagram @thestandardsshowLinkedIn | The Standards Show
Podcast: Industrial Cybersecurity InsiderEpisode: From Shelfware to Security: Operationalizing OT Industrial Cybersecurity ToolsPub date: 2025-08-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMany manufacturing leaders believe they're seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT security. They explore why million-dollar cybersecurity tool investments aren't fully utilized, and expose the costly disconnect between corporate IT, plant-floor teams, and third-party vendors. From debunking the air gap myth to stressing the need to trust but verify every connection, they show how to turn underutilized tools into proactive defenses that improve both security and operational efficiency. If you think your ICS is fully protected, this conversation might change your mind.Chapters:00:00:00 - Introduction: When Inefficiency Becomes Expensive00:00:59 - The Hidden Danger of Feeling Secure in Manufacturing00:03:58 - Why True Visibility and Accurate Data Change Everything00:07:18 - Real-World Roadblocks: Missteps and Mixed Messages00:10:24 - Who Holds the Power vs. Who Bears the Blame in Cybersecurity00:21:47 - Charting a Smarter Path to Stronger Cyber Defenses00:25:27 - Conclusion: Actionable Moves to Level Up Your SecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: When the Plant Can't Stop: Securing Systems That Never SleepPub date: 2025-08-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the foundational questions every organization must answer:What do you need to protect? Where are your holes? Can you see what's happening and respond if something goes wrong? From AI-enabled attackers to real-time asset visibility, he shares actionable insights on risk management, OT monitoring, and why leaders must begin treating cybersecurity like safety, not just an IT function. Whether you're managing a water treatment plant, a power plant, or smart transportation infrastructure, this conversation delivers clarity in complexity - and guidance for what to do next.Chapters:00:00:00 - Uncovering Hidden Dangers in Remote Access00:00:59 - Meet Ian Bramson: Defending the World's Most Critical Systems00:02:58 - Why Critical Infrastructure Is Everyone's Business00:03:30 - Power and Water: The Frontlines of Cyber Defense00:09:07 - Decoding NERC CIP: What You Really Need to Know00:10:38 - Walking the Tightrope Between Compliance and True Security00:17:01 - Proven Cybersecurity Tactics That Actually Work00:22:50 - AI in Cybersecurity: Game-Changer or New Threat?00:24:47 - How Public and Private Sectors Tackle Cyber Risk Differently00:29:31 - Ian Bramson's Final Playbook for Today's CISOsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: The Lawyer's View: Strategic Lessons in Cybersecurity and Incident ResponsePub date: 2025-07-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today's hyper-connected, AI-augmented threat landscape. Josh shares hard-earned insights from decades of incident response leadership, emphasizing why building your cyber playbook before the attack is critical. From legal implications and executive missteps to the psychological attributes needed in your incident command post, this conversation is a masterclass in cyber resilience and proactive protection by design.Chapters:00:00:00 – Kicking Off with Chaos: Why Incident Response Matters00:01:02 – Enter Josh Cook: Legal Strategist Turned Cyber Commander00:01:18 – War Stories and Wisdom: Josh's Journey to Left of Boom00:02:38 – Planning Beats Panic: Mastering the Art of Pre-Incident Prep00:04:17 – Assembling the A-Team: Who Belongs in Your Cyber War Room00:09:07 – AI at the Front Lines: Friend, Foe, or Something in Between?00:12:42 – Industrial Chaos: What's Really Holding Cybersecurity Back00:16:07 – Boardroom to Shop Floor: Why the C-Suite Can't Stay Silent00:25:18 – No Secrets Here: Transparency and the Power of Telling the Truth00:29:08 – Parting Shots: Josh's Battle-Tested Advice for ResilienceLinks And Resources:Josh Cook on LinkedInWebsiteWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The Dad Edge Podcast (formerly The Good Dad Project Podcast)
Have you ever asked yourself: Am I really aware of how much social media and online content is influencing my kids? Have I noticed my kids becoming overly focused on their physical appearance or diet? How do I handle conversations about nutrition and fitness at home? If you've noticed your son obsessing over his physique or protein intake, or your daughter silently struggling with self-worth because of what she sees online, this episode is for you. Larry and Rich dive deep into how today's digital landscape is distorting kids' perceptions of themselves, driving issues like body dysmorphia, disordered eating, and unhealthy relationships with food and fitness—affecting boys and girls earlier than ever before. You'll hear real talk on what warning signs to watch out for, how to foster healthy conversations about food and body image, and the steps you can take to protect your kids from the relentless pressures of curated perfection online. Plus, learn practical strategies for monitoring your child's digital world and discover why it's crucial to model resilience, open dialogue, and authentic self-worth in your home. Whether you're a dad, coach, or mentor, this episode is your wake-up call and toolbox—because the world is changing, and as fathers, we need to step up, disrupt the status quo, and help our kids build unshakeable confidence in themselves. Become the best husband you can: https://bit.ly/deamarriageyoutube In this vital conversation, we dig into: Why Social Media Is A Game-Changer: Unlike the occasional magazine we grew up with, today's kids are constantly exposed to unrealistic body standards, curated feeds, and supplement ads designed to make them feel “less than.” The result? Kids (especially boys ages 12-14!) are reporting anxiety, body dysmorphia, compulsive exercising, and disordered eating at skyrocketing rates. Spot the Warning Signs: It's not just about undereating—obsession with protein grams, excessive workouts, and constant flexing in the mirror can all point to an unhealthy relationship with food and body image. Smart Conversations, Not Confrontations: The episode shares actionable tips to open up dialogue with your kids. Watch "Generation Flex" together, use it as a springboard for honest conversation, and focus on how food and fitness make us feel—not just how we look. Model Healthy Habits: As dads, it's not about being perfect—it's about showing our kids that food isn't “good” or “bad,” and that balance is key (yes, you can have that burger and a salad). Digital Safety for Peace of Mind: Larry also highlights tools like Bark, which alert you to concerning activity on your kids' devices—so you're not left in the dark about what they're seeing online. If you care about raising healthy, resilient sons and daughters in an always-connected world—and want to know the practical steps you can take at home—this episode is for you Here's what research and observation highlight about Studies show that hospitalizations for pediatric eating disorders rose by 139% from 2002 to 2018, with the largest relative increase seen in males aged 12 to 14 Boys and men now represent a third of all eating disorder diagnoses today Nearly 100% of kids with internet access are exposed to carefully curated or unrealistic fitness/body images daily. thedadedge.com/bark thedadedge.com/alliance https://menshealth.com @menshealthmag @richdorment Read more about Men's Health's documentary "Generation Flex": https://www.menshealth.com/generationflex Watch Generation Flex on Apple TV+:https://tv.apple.com/us/clip/generation-flex Watch Generation Flex on Amazon Prime Video: https://www.amazon.com/gp/video/detail/B0DJCND11R
In this eye-opening episode of The Covenant Eyes Podcast, host Karen Potter sits down with Hannah, founder of Quit Porn, in the UK, for a vital conversation about the pervasive impact of pornography in today's digital age. Hannah, a seasoned therapist, shares her unique perspective on how pornography affects individuals, marriages, and families, emphasizing that the problem begins long before it becomes a full-blown addiction.Discover the alarming realities of the "raunch culture" in the UK, where explicit content is increasingly normalized in everyday advertising and media. Hannah reveals shocking statistics, including the rapid growth of indecent images of children as a crime in the UK, and discusses the dark world of organized crime profiting from child sexual abuse material.This interview dives into the critical need for parental education and protection in an era where children are constantly exposed to harmful content. Hannah offers practical advice for parents on setting boundaries with technology and fostering open conversations with their children. The discussion also addresses the church's role in confronting this issue, highlighting the challenges and the urgent need for greater awareness and support for those struggling, including the often-overlooked impact on women.Learn why accountability is crucial for freedom from pornography and how tools like Covenant Eyes can play a vital role. Hannah challenges traditional recovery narratives, advocating for a focus on redemption and ongoing vigilance. Join Karen and Hannah as they issue a global call to prayer for an awakening within the church and a collective commitment to protecting the next generation from the dangers of online pornography.Get More Information from Hannah at: https://quit-porn.com______________________________________Learn More About Covenant Eyes:https://cvnteyes.co/4gb6xme______________________________________CHAPTERS:00:06 - Introduction to Hannah and Quit Porn00:58 - Hannah's Background and Expertise in Pornography Issues02:54 - The Subtle Start of Pornography Problems03:41 - Tools and Resources to Help Those Struggling04:53 - Pornography Culture in the UK07:28 - Protecting and Educating Children in the Digital Age08:54 - Equipping Parents and Caregivers11:26 - The Fastest Growing Crime: Indecent Images of Children13:16 - The Impact of Sextortion and AI Deepfakes14:54 - The Church's Role and Challenges in the UK18:40 - Support for Spouses and Women Struggling with Pornography20:03 - Advice for Christians Seeking Freedom from Pornography25:18 - Prayers for the UK and a Global Awakening26:42 - Final Advice for Parents28:28 - Closing Remarks and Call to Action#PornographyAwareness #QuitPorn #CovenantEyes #ChildProtection #DigitalSafety #OnlinePornography #RaunchCulture #UKCrime #ParentingTips #ChristianLiving #InternetSafety #PornAddiction #FamilyProtection #Accountability #ChurchAndPornography #SexualIntegrity #BetrayalTrauma #HannahQuitPorn #KarenPotter #PodcastInterviewSend us your feedback!Try Covenant Eyes for FREE today!Use Promo Code: FreePodcast © 2024 Covenant Eyes, All Rights Reserved
Podcast: Industrial Cybersecurity InsiderEpisode: Plant-Level Cyber Risk: Who's Actually Responsible?Pub date: 2025-07-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control systems. They emphasize the need for improved governance, enhanced vendor accountability, and clear ownership of cyber risk. Whether you're a CISO, CIO, or VP of Engineering, this episode offers actionable insight into bridging the IT/OT divide, securing plant floors, and building a cybersecurity strategy that works at the edge of your business.Chapters:00:00:00 - Kicking Off: Why Transparency in Cyber Matters00:00:43 - Who's Talking? Meet Craig & Dino00:01:05 - The Big Question: What's IT's Role in Industrial Security?00:01:35 - When Too Many Vendors = Chaos00:02:37 - How to Actually Secure OT Environments00:03:46 - Choosing the Right Partners (and Asking the Right Questions)00:12:37 - Why Cyber Teams Need Plant Floor Time00:14:24 - Getting Smarter: Use External Experts & Vendor Summits00:18:22 - IT Meets OT: Closing the Culture Gap00:30:03 - What Now? Practical Next Steps for CISOsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this powerful follow-up episode, Freedom Challenge Director, Tracy Daugherty, continues the conversation with Stacey Enmeier and Whisper James of the I-5 Freedom Network. Together, they dive deeper into the realities of human trafficking in the United States—how it often hides in plain sight, how technology and family dynamics play a role, and what we can do to protect and empower the vulnerable.Whisper, a lived experience expert, shares her personal journey of turning pain into purpose, while Stacey offers practical insights from her work with law enforcement and survivors. This episode is a call to action for parents, mentors, and community members to be present over protective, to build safe spaces, and to recognize that freedom begins with awareness.---Watch the interview: https://youtu.be/XK34THi3n-wRead the blog: https://www.thefreedomchallenge.com/2025/7/10/trafficking-in-usa---Want to learn more? The Freedom Challenge US: thefreedomchallenge.comOperation Mobilization USA: omusa.orgInstagram: @freedomchallengeusa / Facebook: @thefcusaSupport the show
Modern Wisdom: Read the notes at at podcastnotes.org. Don't forget to subscribe for free to our newsletter, the top 10 ideas of the week, every Monday --------- Jeffrey Katzenberg is a media mogul, film producer, and co-founder of DreamWorks. Hari Ravichandran is a serial entrepreneur, founder, and CEO of Aura. From bringing joy to millions of childhoods through beloved Disney films to now addressing the digital challenges facing today's youth, Jeffrey Katzenberg has partnered with Hari Ravichandran to lead a new revolution focused on safeguarding the mental health and online safety of the next generation. At the heart of it all is this vital question: how do we keep children safe online? Expect to learn what Jeffery Katzenberg is up to and the current state of modern media and film, how to reinvent yourself at pivotal moments, how to get better at dealing with change and disappointment, what the data says about kids, online safety & how parents can better protect their kids online, the big problems with mental health of the younger generation & how to best address their growing issues, and much more… Sponsors: See discounts for all the products I use and recommend: https://chriswillx.com/deals Get a Free Sample Pack of LMNT's most popular Flavours with your first purchase at https://drinklmnt.com/modernwisdom Get 35% off your first subscription on the best supplements from Momentous at https://livemomentous.com/modernwisdom Get a 20% discount on Nomatic's amazing luggage at https://nomatic.com/modernwisdom Get the best bloodwork analysis in America at https://functionhealth.com/modernwisdom Timestamps: (00:00) What Jeffrey Does & What Makes a Good Story? (10:51) What Drives Jeffrey & Hari? (16:40) What's The State Of Modern Cinema? (23:04) Jeffrey & Hari on the Star Wars Universe, Gaming, & Dealing With Change (38:05) What Technology Is Doing To Younger Kids? (46:45) The Data Behind Keeping Kids Safe Online (1:00:01) Should We Ban Social Media For Anyone Under 16? (1:07:24) Why Parents Are the Key to Digital Safety (1:14:09) The Impact Of Wearable Devices & Celebrity Endorsements On Aura (1:23:24) How Early Screen Habits Affect Lifelong Patterns (1:32:51) The Hidden Costs Of Fame & How To Learn From Your Failures (1:41:32) The Trends Associated With Bullying & What Parents Can Do About It (1:51:38) Chris' Thoughts On Adolescence (1:58:50) Learn More About Jeffrey, Hari, & Aura.com Extra Stuff: Get my free reading list of 100 books to read before you die: https://chriswillx.com/books Try my productivity energy drink Neutonic: https://neutonic.com/modernwisdom Episodes You Might Enjoy: #577 - David Goggins - This Is How To Master Your Life: https://tinyurl.com/43hv6y59 #712 - Dr Jordan Peterson - How To Destroy Your Negative Beliefs: https://tinyurl.com/2rtz7avf #700 - Dr Andrew Huberman - The Secret Tools To Hack Your Brain: https://tinyurl.com/3ccn5vkp - Get In Touch: Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/modernwisdompodcast Email: https://chriswillx.com/contact - Learn more about your ad choices. Visit megaphone.fm/adchoices
Podcast: Industrial Cybersecurity InsiderEpisode: The C-Suite's Role in Industrial CybersecurityPub date: 2025-07-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cybersecurity strategies. With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency. They emphasize the need for leadership to understand and lead the charge to ensure security for industrial control systems. This episode serves as a wake-up call for executives to embrace their role in protecting their companies from potential adverse events. This episode highlights the fact that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.Chapters:00:00:00 - Meet Dino and Craig00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing SectorLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Jeffrey Katzenberg is a media mogul, film producer, and co-founder of DreamWorks. Hari Ravichandran is a serial entrepreneur, founder, and CEO of Aura. From bringing joy to millions of childhoods through beloved Disney films to now addressing the digital challenges facing today's youth, Jeffrey Katzenberg has partnered with Hari Ravichandran to lead a new revolution focused on safeguarding the mental health and online safety of the next generation. At the heart of it all is this vital question: how do we keep children safe online? Expect to learn what Jeffery Katzenberg is up to and the current state of modern media and film, how to reinvent yourself at pivotal moments, how to get better at dealing with change and disappointment, what the data says about kids, online safety & how parents can better protect their kids online, the big problems with mental health of the younger generation & how to best address their growing issues, and much more… Sponsors: See discounts for all the products I use and recommend: https://chriswillx.com/deals Get a Free Sample Pack of LMNT's most popular Flavours with your first purchase at https://drinklmnt.com/modernwisdom Get 35% off your first subscription on the best supplements from Momentous at https://livemomentous.com/modernwisdom Get a 20% discount on Nomatic's amazing luggage at https://nomatic.com/modernwisdom Get the best bloodwork analysis in America at https://functionhealth.com/modernwisdom Timestamps: (00:00) What Jeffrey Does & What Makes a Good Story? (10:51) What Drives Jeffrey & Hari? (16:40) What's The State Of Modern Cinema? (23:04) Jeffrey & Hari on the Star Wars Universe, Gaming, & Dealing With Change (38:05) What Technology Is Doing To Younger Kids? (46:45) The Data Behind Keeping Kids Safe Online (1:00:01) Should We Ban Social Media For Anyone Under 16? (1:07:24) Why Parents Are the Key to Digital Safety (1:14:09) The Impact Of Wearable Devices & Celebrity Endorsements On Aura (1:23:24) How Early Screen Habits Affect Lifelong Patterns (1:32:51) The Hidden Costs Of Fame & How To Learn From Your Failures (1:41:32) The Trends Associated With Bullying & What Parents Can Do About It (1:51:38) Chris' Thoughts On Adolescence (1:58:50) Learn More About Jeffrey, Hari, & Aura.com Extra Stuff: Get my free reading list of 100 books to read before you die: https://chriswillx.com/books Try my productivity energy drink Neutonic: https://neutonic.com/modernwisdom Episodes You Might Enjoy: #577 - David Goggins - This Is How To Master Your Life: https://tinyurl.com/43hv6y59 #712 - Dr Jordan Peterson - How To Destroy Your Negative Beliefs: https://tinyurl.com/2rtz7avf #700 - Dr Andrew Huberman - The Secret Tools To Hack Your Brain: https://tinyurl.com/3ccn5vkp - Get In Touch: Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/modernwisdompodcast Email: https://chriswillx.com/contact - Learn more about your ad choices. Visit megaphone.fm/adchoices
Podcast: Industrial Cybersecurity InsiderEpisode: Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant FloorPub date: 2025-07-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: The System Integrator's Role in Supporting OT SecurityPub date: 2025-07-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity.Key Issues Identified:Organizations typically work with multiple specialized integrators across different facilities and systemsSome SIs lack cybersecurity expertise, focusing primarily on equipment functionalityEquipment can remain connected to networks for decades, with ownership and oversight changing hands over timeSystem integrators must exercise proper IT coordination to implement remote access solutions effectivelyRecommendations:IT and OT teams should collaborate more closely with system integrators on cybersecurity planningOrganizations need to evaluate their SIs' cybersecurity capabilities and partnershipsConsider standardizing on integrators with demonstrated cybersecurity practices and vendor certificationsApply the same due diligence used for IT vendor selection to OT system integratorsBottom Line: System integrators are essential partners in executing industrial cybersecurity strategies and protection. Organizations must actively engage them in security conversations and ensure they have the necessary skills and partnerships to implement secure solutions for their plant environments from the start.Chapters:00:00:00 - Real-World Ransomware Hits the Plant Floor00:00:52 - Meet the System Integrators Shaping Your OT Plant Floor Security00:01:17 - What System Integrators Really Do (and Don't)00:04:13 - Remote Access: The Hidden Backdoor Nobody Sees00:08:34 - Why Ongoing Monitoring Is Non-Negotiable00:13:30 - How to Pick the Right System Integrator For Your Operations00:26:17 - Building Strong Partnerships with Your IntegratorsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: When IT Cyber Events Bring Down the Plant FloorPub date: 2025-06-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino break down how cyberattacks that start in traditional IT systems can shut down entire manufacturing production lines, leading to massive financial losses. Using real-world examples like UNFI's $500 million drop in market value in 60 hours, they explain how overlooked connections between IT and the OT plant floor are often the weakest links. You'll hear why simply installing firewalls isn't enough, how organizational silos between IT and operations cause major blind spots, and what it really takes to secure industrial equipment. Whether you're in leadership, technology, or operations, this episode will change how you think about cyber risk and business continuity in connected environments.Chapters:00:00:00 - Introduction: Where Responsibility Ends and Authority Doesn't Begin00:01:08 - Meet Your Guides: Dino & Craig On the Frontlines00:01:14 - When Cyber Hits the Plant Floor00:01:28 - Real-World Wake-Up: The Unify IT Incident00:02:36 - The Gaps No One's Watching in OT Security00:03:18 - How Org Structure Can Make or Break Cyber Defense00:04:03 - Plugging in OT Visibility: IDS in Action00:04:43 - Who's Really Calling the Shots—Corporate or the Plant?00:07:02 - IT-OT Convergence: What Leaders Must Understand00:13:14 - Building Cyber Defense That Actually Works00:15:25 - Recovery Starts Before the Breach00:17:37 - Why IT Alone Can't Fix OT Problems00:24:55 - Just Getting Started? Here's What to Do First00:28:33 - Final Word: You Can't Secure OT AloneLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: When CISOs Inherit the Plant Floor: What Happens Next?Pub date: 2025-06-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when the CISO inherits responsibility for the security of the plant floor?Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility.A perpetuating trend exists where cybersecurity leaders are expected to protect factories and industrial assets without the authority, tools, or support to do so effectively.In this conversation, Dino and Craig explain why traditional IT security approaches don't work in these environments, and how things like outdated equipment, disconnected systems, and outside vendors make the challenge even harder. From weak remote access tools to the confusion around who actually manages plant security, this episode shines a light on the hidden risks most companies overlook.Whether you're in IT, operations, or a leadership role, you'll walk away with a better understanding of how to approach cybersecurity in complex industrial settings.You'll also gain insights into the steps you can take to protect your people, your technology, and your bottom line.Chapters:00:00:00 - Kicking Off: Smart Tool Choices Start Here00:01:02 - When CISOs Inherit the Factory Floor00:02:17 - Making Friends with OEMs and Integrators00:04:47 - Why OT Security Is a Whole Different Beast00:08:50 - Cyber Budgets: Where's the Money Really Coming From?00:13:10 - How to Actually Roll Out Security in the Plant00:18:35 - VPNs Aren't Enough: Fixing Remote Access00:24:42 - What OT Incident Response Really Looks Like00:27:17 - Wrapping It Up: Strategy, Buy-In, and What's NextLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
REPLAY (Original Air Date Oct 21, 2024) Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-platform screen production, culminated in the founding of Lively, which we will hear all about on this podcast. Since 2002, Stacey has been designing and delivering enterprise-wide cyber safety upskilling programs. In 2023, embodying her mission to make knowledge accessible, Stacey launched 'Dodgy or Not?' – a social enterprise offering an engaging approach to digital safety education. She continues to bridge the gap between emerging technologies and practical education, driving innovation in AI ethics and digital literacy - she is also known for deepfaking herself. [Oct 21, 2024] 00:00 - Intro 00:19 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:00 - Stacey Edmonds Intro 04:18 - Teaching, Trains & Turkeys 08:43 - Toilets vs Videos 11:16 - Dodgy or Not? 15:15 - Social Engineering for Good! 17:46 - Pause for the Cause 20:17 - Training in Real Time 24:11 - Real Time Threat Detection 27:49 - Culture is Everything 30:33 - Find Stacey Edmonds online - LinkedIn: in/staceyedmonds/ 31:28 – Mentors - Carolyn Breeze - Chris Hadnagy - Janine Thompson - Steve Rowe - Shane Bell 33:58 - Book Recommendations - Feel The Fear and Do It Anyway - Susan Jeffers - The Hitchhiker's Guide to the Galaxy - Douglas Adams - 1984 - George Orwell - Man-Made – Tracey Spicer 35:51 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Lavanya Gupta, CEO and Founder of Silana Learning and a former Meta employee, is raising awareness about the hidden dangers of tech. With insight into the inner workings of Big Tech, she made the deliberate choice to keep her young daughters offline. But when the pandemic hit and remote learning became a necessity, she realized the inescapable - and often harmful - role that digital platforms can play, even in the classroom.Many parents assume that school-approved apps are safe, but Lavanya warns otherwise. Her top concern? Data privacy. “Schools are consenting on behalf of parents without considering long-term consequences,” she says. Invited by her children's school to help shape tech policies, she found her mission: empowering parents to protect their kids online.Lavanya shares practical strategies for digital safety, rates apps based on the strength of their parental controls, and offers guidance on age-appropriate media use - all backed by research and real-world insights.Don't miss this conversation with Nicki from Scrolling 2 Death and Lavanya Gupta - packed with tips, best practices, and must-know advice to keep your kids safe online.Hindenburg Research Report
Podcast: Industrial Cybersecurity InsiderEpisode: Reflections from the Front Lines of Industrial Cyber FailuresPub date: 2025-06-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud's role on the plant floor. The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor.Chapters:00:00:00 - Cyber threats are moving faster than your patch cycle00:00:47 - Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks00:07:48 - The #1 Myth Putting Your Industrial OT Assets at Risk00:15:01 - Patch Management and Software Updates: IT versus OTLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: What Every CISO Gets Wrong About OT SecurityPub date: 2025-06-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. But is it truly convergence or more of a collision? Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence. From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.Chapters:00:00:00 - Opening Shot: Who's Really in Charge—CIOs or the Plant Floor?00:00:57 - Collision Course: IT and OT Can't Keep Dodging Each Other00:01:52 - Two Worlds, One Mission: Why OT Isn't Just “IT in a Hard Hat”00:04:07 - When Convergence Fails: What's Missing in the Middle00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor00:10:46 - OT's Tipping Point: Will the Next Move Come from IT, or the Shop Floor?00:17:32 - Your Move: What Leaders Must Do Next (Before It's Too Late)Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: OT Security in Hindsight: Visibility, Authority, and the Executive DisconnectPub date: 2025-05-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special rewind edition of Industrial Cybersecurity Insider, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into a compact, high-impact listen. Whether you're navigating remote access risks, managing hybrid architectures, or striving to align plant managers with corporate cybersecurity goals, these reflections are a roadmap for driving resilience and maturity in your OT security strategy.Chapters:00:00:00 - Rewind Kickoff: From Blind Spots to Bold Predictions00:00:46 - The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort00:10:57 - Gartner, DOGE, and the Future of OT Cybersecurity Policy00:21:38 - Uncovering Blind Spots in OT CybersecurityLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Bridging the IT-OT Divide with AI-Powered InsightPub date: 2025-05-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig tackle one of the most misunderstood challenges in cybersecurity for industrial environments. The persistent disconnect between IT-led cybersecurity tools and operational technology realities.They explore the concept of "shadow OT," as well as the limits of traditional IDS deployments.They discuss why visibility is key to protecting critical systems. Vulnerability scanning alone isn't enough.Real world case studies reveal how failing to engage OT teams derails cybersecurity strategies. One case involved rogue servers causing daily production failures. Another featured misconfigured modules choking brewery operations. These examples show that even the most advanced strategies fail without OT team involvement.For leaders in manufacturing, utilities, and critical infrastructure, this is a must-listen conversation. It's about redefining risk management through OT-first thinking.Chapters:00:00:00 - When Machines Stop, Money Bleeds: The Downtime Dilemma00:00:47 - Shadow IT or Ingenious OT? Rethinking Rogue Tech00:02:29 - Cybersecurity Isn't Enough: The OT Risk You're Missing00:04:37 - Server Ghosts & Brewery Blunders: Fixing What IT Can't See00:06:41 - Visibility is Power: Using the Tools You Already Own00:09:50 - IT vs. OT: Breaking Silos, Building Alliances00:13:28 - Final Thoughts: Who Really Owns OT Security?Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
May 15, 2025 - Common Sense Media Senior Counsel for Tech Policy Holly Grosshans and Counsel for Tech Policy Brenna Leasor discuss a package of bills designed to keep New Yorkers, especially kids, safe as they navigate social media and utilize artificial intelligence companions.
In this week's episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark's experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys. In this episode: [02:06] His early career journey - from a mathematics background to building early online banking systems [03:32] What's kept Mark excited about security for over two decades [04:40] The compound benefits of growing within a company over time [07:20] Mark's leadership style - defined by transparency, directness, and genuine care for his teammates [12:45] Communicating the business trade-off between risk and return [16:45] Reflecting on the team's response to major incidents at Riot Games [21:00] The unique challenges of securing gaming platforms [26:30] How Mark approaches strategy and planning in the fintech space [28:08] The case for building strong, partnership-driven vendor relationships [31:13] Creating space for creativity - without spreading the team too thin [34:35] Empowering his team to speak openly - even if it means calling him out [36:35] The inspiration behind Mark's books Digital Safety for Parents and The Security Path [40:20] Connect with Mark Where to find Mark: LinkedIn Brex Where to find Thomas Kinsella: LinkedIn Tines Resources mentioned: The Security Path - click here to redeem a free copy for podcast listeners (first come, first serve) Digital Safety for Parents - click here to redeem a free copy for podcast listeners (first come, first serve) Mark's talk during his time at Riot Games in 2016
Are you concerned about your child's safety in the digital age? In this important Teach Them Diligently podcast episode, Leslie Nunnery and Kevin Cronister offer practical, actionable advice for parents. Learn how to establish open communication, set boundaries for online friendships, and monitor your child's activities while respecting their privacy. Kevin shares crucial insights on recognizing grooming tactics and provides a step-by-step guide on what to do if your child is victimized online, including preserving evidence, reporting procedures, and the vital need for emotional support. This episode is a must-listen for any parent navigating the complexities of raising children in today's digital world. Meet the Guest: Kevin Cronister is a 15-year law enforcement veteran. He currently serves as a Detective with the Internet Crimes Against Children (ICAC) Task Force in the Kansas City Metro Area. He's a Squad Leader, as well as a Ballistic Shield Operator and Firearms Instructor for SWAT. Kevin earned his master's degree in forensic psychology and holds numerous certifications, such as Advanced Interview & Interrogation through the Federal Bureau of Investigation (FBI), Crisis Intervention Team (CIT) certified for responding to issues with those in mental health crises, and Advanced Digital Forensic Analysis for the iOS and Android operating system. He is a certified Force Science Analyst and currently serves on the Use of Force Review Board for his agency. Kevin is currently enrolled in the McAfee Institute's Certified Expert in Cyber Crime Investigation (CECI) program. He trains mixed martial arts and obtained his brown belt in Brazilian Jiu-Jitsu from UFC veteran Trey Ogden at Marathon MMA in Overland Park, Kansas. Kevin is the Chief Operating Officer (CEO) of Guardian Training Solutions, LLC., a law enforcement education and training company teaching tactical and investigative courses both in-person and online. Key Takeaways: Understand Online Dangers & Grooming: Parents must be aware of the specific threats children face online, including the manipulative tactics of grooming.Foster Open Communication: Creating a safe space for children to talk about their online experiences is crucial for early intervention and support.Establish Clear Online Rules & Boundaries: Setting guidelines for online friendships, interactions, and screen time is essential for safety.Monitor Responsibly & Respect Privacy: Parents should oversee online activity while fostering trust and respecting their child's appropriate boundaries.Respond Calmly & Preserve Evidence: If victimization occurs, a calm parental response and proper preservation of digital evidence are vital first steps.Prioritize Reporting & Seek Support: Timely reporting to law enforcement and providing emotional support are essential for the child's well-being and accountability.https://youtu.be/ESkT6N1j1aQ Podcast Sponsor: For years, Action Bible resources have helped homeschool kids better understand the Bible and grow their faith in Jesus. Bestselling Action Bible illustrated books, Bibles, and games can be purchased wherever books are sold. Click HERE to purchase your copies today. Additional Resources: Find out more about Kids Digital Health HEREFind out more about Guardian Training Solutions HERE
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary