Podcasts about digital safety

  • 168PODCASTS
  • 367EPISODES
  • 33mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 20, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about digital safety

Latest podcast episodes about digital safety

@BEERISAC: CPS/ICS Security Podcast Playlist
Your OT Cybersecurity Strategy Is Failing: Here's Why

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 20, 2026 30:02


Podcast: Industrial Cybersecurity InsiderEpisode: Your OT Cybersecurity Strategy Is Failing: Here's WhyPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.With threats mounting, the time for action is now—not next quarter.Chapters:(00:00:00) - Welcome & What We've Been Up To(00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services(00:03:00) - The Shelfware Problem: When Security Tools Sit Unused(00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments(00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team(00:07:43) - Who Can Actually Patch Your Control Systems?(00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link(00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small(00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice(00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?(00:19:00) - Why EDR Struggles in Control System Environments(00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore(00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences(00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity(00:27:00) - Final Thoughts: The Time for Action Is NowLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

WisPolitics Midday
Capitol Chats: Rep. Brill talks about the Legislature's drive for youth digital safety measures

WisPolitics Midday

Play Episode Listen Later Feb 18, 2026 11:46


On this week's "Capitol Chats" podcast, Rep. Lindee Brill, R-Sheboygan Falls, says protecting kids online will require a "multi-faceted" approach. She chairs the Speaker's Task Force on Protecting Kids, which has introduced bills touching on youth social media accounts and app usage, law enforcement response to internet crimes against children and AI chatbots.

BYU-Idaho Radio
Upper Valley SAFE Initiative seeks to inform community about digital safety

BYU-Idaho Radio

Play Episode Listen Later Feb 13, 2026 18:26


The Upper Valley SAFE Initiative is an effort started by Dean and Kristen Coleman. It is intended to use workshops to inform and educate families, children and the community of safety risks online and in person. The volunteer program uses law enforcement, educational, and health experts to help provide information in their workshops.

@BEERISAC: CPS/ICS Security Podcast Playlist
Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 12, 2026 33:41


Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The IT-OT Knowledge Gap Costing Organizations Millions

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 6, 2026 22:09


Podcast: Industrial Cybersecurity InsiderEpisode: The IT-OT Knowledge Gap Costing Organizations MillionsPub date: 2026-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively. The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia. They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges. AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation. Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.Chapters:(00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is(00:01:48) - Career Journey: From IT to OT Cybersecurity Focus(00:02:48) - Books on AI Transforming Security Operations Centers(00:04:44) - The Implementation Gap: Challenges Building OT SOCs(00:06:40) - The IT-OT Cultural Divide and Missing Communication(00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools(00:10:00) - Can IT-OT Convergence Actually Happen?(00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication(00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment(00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair(00:16:00) - Market Consolidation: Who's Been Acquired in OT Security(00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation(00:18:40) - Third-Party Access Control and OEM Warranty Restrictions(00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT AnymoreLinks And Resources:Adeel Shaikh Muhammad on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Patching Gap Putting Industrial Operations at Risk: IT vs OT

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 28, 2026 26:25


Podcast: Industrial Cybersecurity InsiderEpisode: The Patching Gap Putting Industrial Operations at Risk: IT vs OTPub date: 2026-01-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino tackle one of industrial cybersecurity's most critical challenges in this Rewind episode: the massive gap between IT and OT patching strategies. IT organizations patch constantly—think Patch Tuesday. OT environments rarely patch at all, creating dangerous vulnerability gaps across connected networks. The hosts explore why this disconnect exists. Production floor downtime costs are astronomical, making patching a risky business decision. OEM restrictions complicate matters further. Many vendors won't support systems or warranties after unauthorized updates. Managing decades-old equipment alongside modern systems creates another layer of complexity. Legacy PLCs weren't designed with patching in mind. The consequences of not patching are mounting. Insurance companies are tightening requirements and regulatory pressures are intensifying. Craig and Dino offer practical solutions that don't require shutting down production lines. Virtual patching technologies can protect legacy control systems without traditional software updates. The hosts emphasize the urgent need for IT-OT collaboration. All stakeholders—including OEMs and system integrators—must be part of strategic cybersecurity conversations. This episode is essential listening for CISOs, plant managers, and anyone responsible for protecting industrial operations. The connected world isn't waiting for OT to catch up. Chapters:00:00:00 - Introduction to Patching Challenges00:01:08 - IT vs OT Patching: Key Differences00:02:55 - Understanding the Cost of Downtime in OT00:03:32 - Overcoming Challenges with Legacy Systems00:05:21 - Navigating OEMs and Safety Concerns00:06:45 - The Role of Safety in OT Patching00:08:52 - Exploring Virtual Patching Solutions00:13:11 - Enhancing Vendor Collaboration and Risk Management00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity00:18:33 - Addressing Insurance and Compliance Issues00:20:12 - Significant Consequences of Not Patching00:23:14 - Building an Effective Collaborative Cybersecurity Strategy00:24:03 - Conclusion and Actionable InsightsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 22, 2026 30:23


Podcast: Industrial Cybersecurity InsiderEpisode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT SecurityPub date: 2026-01-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen. Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.Chapters:(00:00:00) - Introduction: The Core Problem of Ownership in OT Security(00:01:45) - Why IT Security Approaches Fail on the Plant Floor(00:04:30) - The Cloud Analogy: Lessons for OT Implementation(00:07:15) - The Missing Conversation: Capital Plans and OEMs(00:10:20) - IT vs OT Networks: Different Purposes, Different Risks(00:13:35) - EDR in OT: The Aftermarket Parts Problem(00:16:10) - Cyber-Informed Engineering: Building Security into Design(00:19:45) - The Have and Have-Not World of Plant Security(00:23:20) - Left of Boom: Visibility Beyond Security(00:27:15) - Who Should Lead the OT Security DiscussionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix Them

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 16, 2026 26:48


Podcast: Industrial Cybersecurity InsiderEpisode: Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix ThemPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino and Craig tackle one of manufacturing's most pressing challenges: the OEM blockade. They explore why brand-new equipment often ships with hundreds of unpatched vulnerabilities, how the gap between IT and OT teams creates operational blind spots, and why manufacturers can't rely on traditional IT solutions to secure their plant floors.From the CrowdStrike incident that took down HMIs to the "ghost in the machine" causing unexplained downtime, they reveal why OT teams must take ownership of their cybersecurity posture and build partnerships with the right ecosystem of OT-focused service providers.If you've ever wondered why your million-dollar machine center is running Windows 7 or why your cybersecurity reports don't match reality, this episode provides the answers—and a path forward.Chapters:(00:00:00) - The OEM Blockade Problem(00:01:00) - Understanding OEM Software Lock and Remote Access(00:03:00) - The Reality of Unpatched Vulnerabilities in New Equipment(00:06:00) - The IT/OT Blockade and Convergence Challenges(00:09:00) - Why IT Disciplines Don't Translate to OT Environments(00:11:00) - The CrowdStrike Incident: What Really Happened on Plant Floors(00:13:00) - The Lack of Due Diligence in Manufacturing M&A(00:16:00) - Chasing the Ghost in the Machine(00:19:00) - Process Integrity vs. Cybersecurity Tools(00:22:00) - Why OT Teams Must Take Ownership and Build the Right PartnershipsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Brian Lehrer Show
Protecting Kids' Online Safety

The Brian Lehrer Show

Play Episode Listen Later Jan 9, 2026 25:09


Governor Hochul is backing new legislation aimed at protecting children and teens online. Kris Perry, Executive Director of Children & Screens, unpacks the impact of technology and social media on young people and discuss various legislative efforts to protect kids on the internet.

Talking Wit Kevin and Son
AI Turns Story Into Brand with Denise McMillan

Talking Wit Kevin and Son

Play Episode Listen Later Jan 8, 2026 47:15


In this inspiring episode of Talking Wit' Kevin & Son, Kevin sits down with Denise McMillan — CEO of LevelUp Luxe, creative technologist, brand architect, AI innovator, and cybersecurity leader. Denise is redefining how entrepreneurs, creators, and leaders use AI to amplify their voice, protect their digital identity, and scale with intention.Blending AI-driven branding, cinematic AI Twins, automation systems, and transformational storytelling, this conversation explores how technology becomes a tool for alignment — not replacement. It's a powerful dialogue on authenticity, reinvention, and stepping fully into your highest expression.This episode connects innovation, storytelling, cybersecurity, and purpose, showing how AI can elevate—not erase—the human voice.

@BEERISAC: CPS/ICS Security Podcast Playlist
The CISO's Impossible Task: Protecting Plant Floors They've Never Seen

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 8, 2026 26:26


Podcast: Industrial Cybersecurity InsiderEpisode: The CISO's Impossible Task: Protecting Plant Floors They've Never SeenPub date: 2026-01-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino tackle one of the most pressing challenges in industrial cybersecurity: the disconnect between IT security teams and operational technology environments.They explore why traditional CISOs struggle to protect manufacturing plants despite their best intentions, revealing that most security executives get 30 minutes or less per quarter to present cyber risks to their boards—leaving little time to address the complexities of OT environments they barely understand.The conversation digs into the fundamental differences between enterprise IT and plant floor operations, where safety and uptime trump traditional security approaches, and where telling an engineer to remove a Windows 7 machine from the network might mean shutting down millions of dollars in production.Craig and Dino make a compelling case for why external expertise, cross-functional collaboration, and a fundamental shift in how organizations approach industrial cybersecurity are not just recommended—they're essential for survival in an evolving threat landscape where adversaries only need to get lucky once.Chapters:(00:00:00) - The IT Security Mindset vs. OT Reality(00:01:00) - Has the CISO Really Engaged with Industrial Cybersecurity?(00:03:00) - The Disconnect: IT Owns the Network, OT Owns the Assets(00:05:00) - What CISOs Don't Know About the Plant Floor(00:07:00) - Safety and Uptime: The Top Two Priorities CISOs Must Understand(00:10:00) - The Asset Visibility Problem: Do You Really Know What's Out There?(00:13:00) - 30 Minutes or Less Per Quarter: The CISO's Impossible Task(00:16:00) - Why External Expertise Isn't Optional Anymore(00:19:00) - The Cyber Insurance Myth: Why Your Policy Won't Save You(00:22:00) - Secure by Demand: Holding Vendors Accountable(00:25:00) - Getting to the "Know": Where to Start and What to AskLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
IT and OT Are Still Siloed - Here's Why That's Dangerous

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 2, 2026 24:23


Podcast: Industrial Cybersecurity InsiderEpisode: IT and OT Are Still Siloed - Here's Why That's DangerousPub date: 2025-12-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this rewind episode, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the gap between IT teams deploying OT security tools and the plant floor teams who desperately need the data these tools collect.They reveal why 85% of data from industrial cybersecurity platforms is meant for OT personnel, yet rarely reaches them.The conversation exposes how organizations invest heavily in tools like IDS platforms but fail to share vulnerability data, asset inventories, and network intelligence with the system integrators, OEMs, and plant teams actually working on their control systems.Craig and Dino discuss the consequences of this siloed approach—from incomplete asset visibility to duplicated tooling—and offer practical guidance on achieving true IT-OT convergence.They emphasize that organizations must work with partners who can "build the car, not just buy it," and stress the importance of tabletop exercises, proper vendor vetting, and collaborative frameworks that include the entire industrial ecosystem in cybersecurity planning and execution.Chapters:(00:00:00) - The Growing Problem: OT Teams Lack Access to Critical Security Data(00:01:47) - IT-OT Convergence in Practice: Are We Really Doing It?(00:04:42) - Why IT Teams Keep Security Data Siloed from Plant Floor Partners(00:06:38) - The Consequence: System Integrators Bring Their Own Tools(00:08:38) - The Disconnect Between IT Security Tools and OT Reality(00:11:48) - How to Bridge the Gap: Questions System Integrators Should Ask(00:15:42) - Vetting Your Security Partners: Can They Build the Car or Just Buy It?(00:17:46) - The Three-Legged Stool: Why IT-Only Security Fails in Manufacturing(00:20:48) - Action Steps: Creating a Comprehensive List of Your Industrial Ecosystem(00:22:48) - Final Thoughts: Moving Beyond Security Theater to True CollaborationLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Secure Dad Podcast
Hackers Love Your Favorite Password with Gary Orenstein

The Secure Dad Podcast

Play Episode Listen Later Dec 31, 2025 37:32


Enhancing Family Digital Security   In this episode of The Secure Family Podcast, host Andy discusses digital security for families with Gary Ornstein, Chief Customer Officer at Bitwarden. They cover the importance of strong, unique passwords, the benefits of using password managers and two-factor authentication, and practical steps for improving digital safety. Gary highlights the mission of Bitwarden to provide security for all, regardless of financial means.   For more from Gary and Bitwarden: https://bitwarden.com/  Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD.  Connect

Gears, Action, Growth: Shifting Business Culture one Conversation at a Time
2025 Unplugged: A Candid Look at the Year That Was (Episode 80)

Gears, Action, Growth: Shifting Business Culture one Conversation at a Time

Play Episode Listen Later Dec 29, 2025 59:22


"We need a new hamster wheel for 2026."  Dive into '2025 Unplugged: A Candid Look at the Year That Was' for an insightful reflection on the year's pivotal moments, societal changes, and personal stories that shaped our world. Iain and I reflect on significant global events, the impact of place and community, and the role of technology in shaping society.  We discuss personal growth, professional identity, and the importance of critical thinking in today's world. We look bacl on our favourite podcast moments and guests, emphasising the need for advocacy and understanding in a rapidly changing environment.  Chapters 00:00 Reflections on a Year of Change 05:10 The Impact of Place and Tragedy 10:43 Navigating a Complex Global Landscape 16:06 Personal Highlights and Collaborations 21:31 Technology, AI, and the Future of Work 31:15 The Impact of Technology on Identity and Vulnerability 33:05 Advocacy for Digital Safety and Regulation 34:58Personal Growth and the Third Act 36:31 Decolonization and Community Engagement 38:42 Upcoming Book Launch and Community Involvement 40:27 Exploring Literature and Audiobooks 41:29 Television and Cultural Reflections 51:26 The Beatles and Cultural Impact 56:59 Reflections on Meaningful Conversations and Future Endeavors  Share your views with us at josephine@gearedforgrowth.biz Watch on Youtube: https://youtube.com/playlist?list=PL18BTBLfckRwwraLZMvbpNj-MjHHy-cSH&si=pXJAR_mmTGGEcO2q

@BEERISAC: CPS/ICS Security Podcast Playlist
The Hidden Reason Most Manufacturing Cybersecurity Programs Fail

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 27, 2025 30:59


Podcast: Industrial Cybersecurity InsiderEpisode: The Hidden Reason Most Manufacturing Cybersecurity Programs FailPub date: 2025-12-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors.They dive deep into the communication breakdown between CISOs and plant operations, the critical role of system integrators and OEMs that IT leaders often ignore, and why the "air gap" myth continues to put manufacturing facilities at risk.Wil breaks down his framework for speaking to boards in language they understand, emphasizing business impact over technical jargon. The conversation covers everything from the challenges of MFA implementation in OT environments to why patching isn't always the answer. They discuss how organizations can build effective OT security programs by making cybersecurity everyone's responsibility - not just IT's problem.Chapters:(00:00:00) - Opening: The $50K Security Investment That Nobody Uses(00:01:00) - Will's Unconventional Journey Into OT Cybersecurity(00:03:45) - The Communication Gap Between IT and OT Teams(00:07:15) - Why Asset Visibility Tools Miss 135% of Your Equipment(00:10:30) - Speaking Board Language: Revenue Loss vs. Technical Jargon(00:13:25) - The Missing Third Leg: System Integrators and OEMs(00:17:30) - Making Cybersecurity Everyone's Job, Not Just IT's Problem(00:21:15) - Why Patching Isn't Always the Answer in OT Environments(00:25:45) - The Reality Check: Physical Security in Manufacturing Plants(00:28:30) - Building a Cybersecurity Program as a Journey, Not a DestinationLinks And Resources:Wil Online LinktreeWil Klusovsky on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Speak Like a Leader
Confessions of a Hacker with Jeremiah Baker

Speak Like a Leader

Play Episode Listen Later Dec 23, 2025 50:14


In this episode, we cover:✅ How Jeremiah went from bootstrapping websites during the dot-com boom to building a global cybersecurity business.✅ Why most cybercrime isn't about “hacking systems,” it's about hacking humans.✅ The emotional tricks scammers use, and how to spot them before you get duped.✅ Real-world stories of cybercrime that cost companies hundreds of thousands of dollars in seconds.✅ The single most important (and shockingly simple) thing you can do to protect yourself today. Jeremiah also shares powerful insights from his keynote, Confessions of a Hacker, including why it's often too late once the money is gone, and how you can take smart, preventative action without expensive software or technical know-how. 

@BEERISAC: CPS/ICS Security Podcast Playlist
Why OT Must Lead the Manufacturing Cybersecurity Conversation

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 21, 2025 30:07


Podcast: Industrial Cybersecurity InsiderEpisode: Why OT Must Lead the Manufacturing Cybersecurity ConversationPub date: 2025-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKatie O'Brien shares her unconventional journey from music teacher to industrial cybersecurity expert, bringing over 25 years of IT experience into the OT world. In this conversation with Dino, Katie discusses the critical gaps in OT cybersecurity—from the lack of university programs teaching industrial security to the disconnect between IT and OT teams. They explore why system integrators and OEMs fail to design cybersecurity into new manufacturing projects from the start, compare it to building cars without safety features, and discuss the emergence of managed services in the OT space. Katie explains how Garland Technology helps organizations get visibility into aging infrastructure with unmanaged switches, and both hosts emphasize the urgent need for the OT ecosystem to drive cybersecurity conversations proactively rather than waiting for IT teams who may never have walked the plant floor.Chapters:(00:00:00) - The Hard Truths About OT Security Nobody Wants to Hear(00:01:06) - Katie's Unconventional Journey: From Music Teacher to OT Cybersecurity Expert(00:04:00) - The Current State of OT Cybersecurity and Future Directions(00:06:00) - The Education Gap: Why Universities Aren't Teaching Industrial Cybersecurity(00:08:00) - The Disconnect Between IT/Security Teams and OT Operations(00:10:00) - Designing Cybersecurity Into New Manufacturing Projects From the Start(00:13:00) - IT Teams Who've Never Walked the Plant Floor(00:16:00) - The Emergence of Managed Services in the OT Space(00:18:00) - Garland Technology: Getting Visibility Into Aging Infrastructure(00:19:00) - Software Defined Automation and the Future of Industrial Control(00:22:00) - Why the OT Ecosystem Must Drive the Cybersecurity Conversation(00:24:00) - The Real Cost of Downtime and Cyber Incidents in ManufacturingLinks And Resources:Katie O'Brien on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Foster Friendly Podcast
Digital Safety for Foster Homes: Insights from Cybersecurity Experts

The Foster Friendly Podcast

Play Episode Listen Later Dec 17, 2025 46:48


In this episode of the Foster Friendly Podcast, host Courtney Williams engages with cybersecurity experts Chad Rychlewski and Kae David to discuss the critical importance of protecting children in the digital age. They explore various topics including digital footprints, the risks associated with social media, and the necessity of open communication between parents and children. The conversation emphasizes the need for parents, especially foster parents, to be proactive in safeguarding their children's online presence and understanding the technology they use. The episode also highlights practical tips and resources for parents to navigate the complexities of digital safety.Checkout their website:www.cybersecurityparents.comTakeawaysUnderstanding digital footprints is crucial for child safety.Parents must teach children about online risks.Open communication is key to building trust with children.Cyber bullying is a significant risk for kids online.Locking children's credit can prevent identity theft.Foster parents can set rules for technology use.Conducting tech audits helps ensure safety.Behavior contracts can clarify expectations around technology.All devices with internet access need to be monitored.Staying updated on technology changes is essential for parents.

@BEERISAC: CPS/ICS Security Podcast Playlist
How OT Managed Services Are Revolutionizing Industrial Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 13, 2025 34:02


Podcast: Industrial Cybersecurity InsiderEpisode: How OT Managed Services Are Revolutionizing Industrial CybersecurityPub date: 2025-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.Chapters:(00:00:00) - Introduction and Rockwell Automation Fair Recap(00:01:43) - The OT Managed Services Evolution and Rebranding(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility(00:14:28) - The Silver Tsunami and Training Challenges(00:18:22) - Alert Fatigue and Actionable Intelligence(00:22:45) - Software Defined Automation and Legacy Systems(00:26:18) - Why OT Must Drive the Cybersecurity Conversation(00:30:35) - Real-Time Demo and Implementation ReadinessLinks And Resources:Kevin Kumpf on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Autism Family Toolkit
49: Growing Up Autistic: Mandy's Story, Emotional Depth, Digital Safety & Empowering Families

Autism Family Toolkit

Play Episode Listen Later Dec 10, 2025 19:32


In this episode of the Autism Family Resource Podcast, Brian sits down with autism advocate Mandy Pinckley, who shares her lived experiences growing up autistic, navigating deep emotions, overcoming isolation, and finding her voice as a speaker and advocate. Mandy opens up about the challenges she faced in childhood, the bullying she endured, and the obstacles that come with being a late-diagnosed autistic girl. She also discusses digital safety, online vulnerabilities for autistic teens, and how her painful experiences led her to advocacy work—including speaking at the CARD Conference about protecting autistic adolescents online. Parents and caregivers will learn how to: • Better understand the emotional depth many autistic children experience • Foster open, judgment-free communication • Support their child's self-identity and autonomy • Build safety, connection, and community Key Topics: Mandy's late diagnosis and how it changed her life Emotional intensity & misunderstood behavior Bullying, isolation & digital-age vulnerability How parents can create safer online environments Supporting identity development in a neurodiversity-affirming way Why community and connection reduce shame and fear Resources Mentioned: • CARD – Center for Autism and Related Disabilities (Florida) • PureHearts Therapy resources & parent support services Connect / Work With Us:

@BEERISAC: CPS/ICS Security Podcast Playlist
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 9, 2025 38:23


Podcast: Industrial Cybersecurity InsiderEpisode: Former U.S. Secret Service Special Agent Shares Cyber Criminal SecretsPub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.Chapters:(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business ContextLinks And Resources:Richard LaTulip on LinkedInRichard's Book: Operation Carder KaosRecorded FutureWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 3, 2025 22:46


Podcast: Industrial Cybersecurity InsiderEpisode: Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You ThinkPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.This episode is a must-listen for anyone serious about protecting their industrial environments.Chapters:00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?00:01:45 - The Hidden Challenges Holding OT Security Back00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?00:06:15 - The Dangerous Myth of “Isolated” OT Systems00:07:58 - From Theory to Action: Winning Strategies for OT Security00:12:13 - Leadership's Role in Cybersecurity: Who's Driving the Change?00:19:55 - No More Blind Spots: Key Takeaways for a Secure FutureLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement Crisis

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 27, 2025 31:20


Podcast: Industrial Cybersecurity InsiderEpisode: The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement CrisisPub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this milestone 100th episode, Craig and Dino tackle the critical intersection of workforce retirement and industrial cybersecurity knowledge in manufacturing.They explore how 82% of manufacturing workforce exits are due to retirement, creating a dangerous knowledge vacuum as decades of plant expertise walk out the door. The conversation reveals why traditional IT security tools consistently miss 50-70% of OT assets, the problematic practice of buying equipment that's obsolete before installation, and why plant operators bypass corporate security policies when downtime costs a million dollars per day. Craig and Dino state that the solution isn't just better tools, it's bridging the gap between centralized IT teams and the decentralized OT ecosystem by partnering with the system integrators and OEMs who actually keep plants running. They discuss how manufacturers must choose between multi-million dollar capital investments in modern equipment or implementing proper network segmentation and security around legacy systems.They address the reasons why the next generation of talent won't be attracted to facilities running decades-old technology.Chapters:(00:00:00) - Introduction and Industry Growth Update(00:02:15) - The Silver Tsunami: 82% of Manufacturing Exits Are Retirements(00:05:42) - Why IT Security Tools Miss 50-70% of OT Assets(00:09:18) - The Knowledge Vacuum: What Happens When Experience Walks Out(00:13:05) - Why Plant Operators Bypass Corporate Security Policies(00:16:30) - The Problem with Buying Obsolete Equipment(00:19:45) - Centralized IT vs Decentralized OT: Bridging the Gap(00:23:20) - Building Partnerships with System Integrators and OEMs(00:26:50) - Capital Investment vs Network Segmentation Strategy(00:29:35) - Attracting Next-Gen Talent to Manufacturing EnvironmentsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Nation-State Attacks Hiding in Your OT Network

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 14, 2025 33:34


Podcast: Industrial Cybersecurity InsiderEpisode: The Nation-State Attacks Hiding in Your OT NetworkPub date: 2025-11-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the pivotal moment when his exploit code stopped a production line at a major car manufacturer. The conversation addresses the critical gaps in OT security, including why most organizations are unaware of what's actually on their networks, the dangers of default passwords on IoT devices, and how attackers often use espionage rather than ransomware to remain undetected. Matthew reveals how his team safely conducts pentests in production environments, develops proprietary detection rule sets, and helps organizations understand their infrastructure through network mapping. The discussion encompasses a range of topics, from the risks associated with smart TVs in conference rooms to the motivations behind nation-states targeting critical infrastructure, culminating in practical advice on developing a cybersecurity roadmap for cyber-physical systems.Chapters:(00:00:00) - Welcome and Introduction to Matthew Carr's OT Security Journey(00:02:30) - The Moment Exploit Code Stopped a Production Line at a Major Car Manufacturer(00:06:15) - Why Most Organizations Don't Know What's Actually on Their OT Networks(00:09:45) - The Three Pillars of Adamzsel: Pentesting, Monitoring, and Tabletop Exercises(00:14:20) - How Attackers Know Your Infrastructure Better Than You Do(00:18:50) - Smart TVs in Conference Rooms: The Hidden Security Risk with Root Access(00:22:30) - Espionage vs Ransomware: The Cyber Attacks No One Is Talking About(00:26:45) - Why Default Passwords on IoT Devices Are an Attacker's Favorite Entry Point(00:30:20) - Building a Cybersecurity Roadmap for Cyber-Physical Systems(00:33:15) - Closing Thoughts and Free OT Security White Paper from AdamzselLinks And Resources:Atumcell WebsiteMatthew Carr on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

PULSE
ChatGPT Loses Its Medical License & NHS Digital Safety Scandal

PULSE

Play Episode Listen Later Nov 13, 2025 42:55


Welcome to Pulse: Hot Topics, where Louise and George unpack the big shifts shaping healthcare right now. Australian MedTech Innovator Wins PM's Prize A Perth-based researcher-engineer-pathologist wins the Prime Minister's Prize for New Innovators with two real-world solutions — one that makes finding veins as easy as using a stud finder, and another putting “heart health in a box.” Proof that Australian innovation is alive, practical, and personal. Congrats Dr Nikhilesh Bappoo!ChatGPT Loses Its ‘Medical License' OpenAI has clipped ChatGPT's wings, banning personalised medical advice after legal and ethical backlash. We unpack what really changed, the mental health controversies driving the decision, and whether we're throwing out the baby with the bathwater when it comes to AI in healthcare.AI Drug Development: Promise, Progress, or Just Hype? Billions have poured into AI-driven drug discovery — yet the much-touted pipeline of miracle medicines still hasn't arrived. We look at why biology keeps humbling the algorithms, why hype outruns results, and what needs to change before AI truly delivers its pharmaceutical revolution.Femtech: The Oura Ring's Pregnancy Breakthrough A study of over 10,000 pregnancies using data from the Oura Ring gives us the most detailed physiological map of pregnancy ever — all from wearable tech. We explore what this means for women's health, early warning signs, and whether constant monitoring brings comfort or anxiety.NHS AI Blueprint: Regulation Before RevolutionThe UK's NHS unveils a new AI regulation blueprint promising safer, faster adoption of AI across the health system. We discuss whether the world's most-watched health service has found the right balance between innovation and accountability.NHS Digital Safety ScandalA jaw-dropping study finds that more than 70% of digital health tools in the NHS have no documented safety assurance. We break down what that means for patients, why safety can't be optional, and what other countries — including Australia — should learn from this wake-up call.Resources:Prime Minister's Science Prize Winner Pulse+IT story linkDr Nikhilesh Bappoo LinkedInAI Drug Development – turns out it's hard! Sick Economics articleFemTech: Oura Ring & Pregnancy study Research PaperNHS Digital Safety Crisis study: JMIR linkGlobal Health Connector Online Summit 18-19 November. FREE to register LinkVisit Pulse+IT.news to subscribe to breaking digital news, weekly newsletters and a rich treasure trove of archival material. People in the know, get their news from Pulse+IT – Your leading voice in digital health news.Follow us on LinkedIn Louise | George | Pulse+ITFollow us on BlueSky Louise | George | Pulse+ITSend us your questions pulsepod@pulseit.newsProduction by Octopod Productions | Ivan Juric

Education On Fire - Sharing creative and inspiring learning in our schools
Digital Seatbelts: Making Broadband Safer for Children with Network-Level Parental Controls

Education On Fire - Sharing creative and inspiring learning in our schools

Play Episode Listen Later Nov 10, 2025 45:09 Transcription Available


Mashood Ahmad is the CEO and founder of Gigabit IQ, an award-winning UK broadband provider dedicated to delivering safer, smarter, and faster internet through fully managed Wi-Fi and industry-leading online safety tools. A recognised voice in digital inclusion and child online protection, Mashood is a Council Member at ISPA UK and a vocal advocate for stronger ISP accountability in protecting families online.Under Mashood's leadership, Gigabit IQ has pioneered services like FamilyGuard+, a network-level parental control solution designed to meet the real-world needs of modern families. He has spearheaded initiatives supporting vulnerable communities, including children in care, refugees, and low-income households, through fair access broadband and safety education.Mashood is the author of the white paper “Beyond the Act: The Hidden Layer of Online Harm No One's Regulating”, which challenges current UK online safety legislation and proposes a new national ISP Safety Rating System, akin to NCAP for cars or Ofsted for schools.A frequent speaker on digital safety, Mashood is leading an Online Safety & ISP Accountability session at the UK Internet Parliament Conference with ISPA, and continues to work with regulators, MPs, and safety groups to shape a safer digital future for all.Takeaways: The introduction of digital safety measures is akin to implementing seat belts in cars, enhancing Internet safety. Gigabit IQ aims to provide parental controls that ensure children access only age-appropriate online content. The company's initiative, Parent Line, offers parents guidance on navigating online safety and concerns. Faster Internet speeds necessitate enhanced safety protocols to protect children from harmful online content. Gigabit IQ advocates for industry-wide parental controls, empowering parents to safeguard their children online. Digital inclusion is essential; broadband should be accessible to all communities, regardless of their location. Chapters:00:17 - Digital Safety in the Age of the Internet01:41 - The Launch of Parent Line13:47 - Advocating for Online Safety in Broadband Services21:12 - The Importance of Granular Parental Controls28:33 - Digital Inclusion and Accessibility39:24 - Empowering Parents for Online Safetyhttps://www.gigabitiq.com/https://www.linkedin.com/in/mashood-ahmad-gigabitiq/https://www.linkedin.com/company/gigabit-iqhttps://www.facebook.com/GigabitIQhttps://www.instagram.com/gigabit_iq/https://x.com/GigabitIQhttps://www.tiktok.com/@gigabitiqhttps://www.youtube.com/@GigabitIQhttps://bsky.app/profile/gigabitiq.bsky.socialhttps://mastodon.social/@GigabitIQhttps://www.parentline.ukShow Sponsor – National Association for Primary Education (NAPE) https://nape.org.uk/Find out more about their Primary First Journal: https://www.educationonfire.com/nape

@BEERISAC: CPS/ICS Security Podcast Playlist
When IT Security Meets OT Reality: Why One Size Doesn't Fit All

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 8, 2025 33:27


Podcast: Industrial Cybersecurity InsiderEpisode: When IT Security Meets OT Reality: Why One Size Doesn't Fit AllPub date: 2025-11-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings. Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.Chapters:(00:00:00) - Introduction and Episode Overview(00:01:19) - IT vs OT Security Mindsets(00:02:03) - Zero Trust Challenges in OT Environments(00:05:12) - Remote Access and Change Management Conflicts(00:09:00) - Who Should Learn from Whom: IT or OT?(00:10:23) - Asset Inventory: What OT Engineers Don't Know(00:15:00) - Process Integrity and Operational Value(00:21:57) - Shadow IT: The Backdoors Nobody Talks About(00:26:00) - Designing Security Into New Equipment(00:28:00) - Digital Safety vs Physical SafetyLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInJim Cook on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Dispelling IT/OT Convergence Challenges and Myths

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 31, 2025 22:21


Podcast: Industrial Cybersecurity InsiderEpisode: Dispelling IT/OT Convergence Challenges and MythsPub date: 2025-10-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino tackle IT/OT convergence, operational technology security, and manufacturing cybersecurity challenges head-on. They challenge the notion of OT being a "shadow IT group" and explore the fundamental differences between IT and OT operations in industrial environments. The discussion emphasizes that OT focuses on safety and physical outcomes, while IT prioritizes data security. They stress the importance of collaboration between IT and OT teams, highlighting how system integrators, OEMs, and plant operators must work together to improve cybersecurity posture. The conversation covers practical issues like Overall Equipment Effectiveness (OEE), incident response, and the need for proper funding and governance. Both advocate for CISOs and CIOs to actively engage with OT teams and system integrators, visit manufacturing facilities, and understand the unique challenges of industrial control systems to achieve true convergence and protect manufacturing plants and critical infrastructure.Chapters:00:00:00 - Opening Shot: Who's Really in Charge—CIOs or the Plant Floor?00:00:57 - Collision Course: IT and OT Can't Keep Dodging Each Other00:01:52 - Two Worlds, One Mission: Why OT Isn't Just “IT in a Hard Hat”00:04:07 - When Convergence Fails: What's Missing in the Middle00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor00:10:46 - OT's Tipping Point: Will the Next Move Come from IT, or the Shop Floor?00:17:32 - Your Move: What Leaders Must Do Next (Before It's Too Late)Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

All CNET Video Podcasts (HD)
Parental Control for ChatGPT, AI Tilly Norwood Stuns Hollywood, Digital Safety for Halloween Night | Tech Today

All CNET Video Podcasts (HD)

Play Episode Listen Later Oct 24, 2025


Kara Tsuboi covers the top tech stories. OpenAI released new parental controls allowing adults to monitor the safety of teen accounts. The debut of the AI-generated actor Tilly Norwood sparked widespread outrage in Hollywood. Parents are relying on GPS-enabled apps and smart devices to monitor their children's locations for safety while they're out trick-or-treating on Halloween night.

CNET News (HD)
Parental Control for ChatGPT, AI Tilly Norwood Stuns Hollywood, Digital Safety for Halloween Night | Tech Today

CNET News (HD)

Play Episode Listen Later Oct 24, 2025


Kara Tsuboi covers the top tech stories. OpenAI released new parental controls allowing adults to monitor the safety of teen accounts. The debut of the AI-generated actor Tilly Norwood sparked widespread outrage in Hollywood. Parents are relying on GPS-enabled apps and smart devices to monitor their children's locations for safety while they're out trick-or-treating on Halloween night.

@BEERISAC: CPS/ICS Security Podcast Playlist
What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 23, 2025 31:18


Podcast: Industrial Cybersecurity InsiderEpisode: What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne NetworksPub date: 2025-10-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. The conversation explores why simply creating a list of vulnerabilities isn't enough – and what organizations should actually be doing to reduce risk in their OT environments.Chapters:00:00:00 - Introduction and Dan's Background00:02:00 - Biggest Misconceptions About OT Vulnerability Management00:04:00 - Blind Spots in OT Vulnerability Scanning00:07:00 - Finding Vulnerabilities: OT vs IT Differences00:10:00 - Proactive Approaches to Unknown Vulnerabilities00:12:00 - How TX One Addresses Vulnerabilities Non-Disruptively00:15:00 - Virtual Patching and Operations-First Philosophy00:18:00 - IT/OT Convergence and Team Collaboration00:21:00 - Building Relationships with Third-Party Partners00:23:00 - Tabletop Exercises and Incident Response Planning00:26:00 - Key Takeaway: Never Forget Your Original Objectives00:28:00 - Dealing with Event Overload and Zero-Day VulnerabilitiesLinks And Resources:Dan Cartmill on LinkedInTXOne NetworksDino Busalachi on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Radio Islam
What the Roblox Lawsuits Reveal About DIgital Safety: Rorke Wilson

Radio Islam

Play Episode Listen Later Oct 22, 2025 12:17


What the Roblox Lawsuits Reveal About DIgital Safety: Rorke Wilson by Radio Islam

ITSPmagazine | Technology. Cybersecurity. Society
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 21, 2025 48:16


____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com  ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society

Blue & Gold Chat
Bark Technologies - Parental Controls Reimagined

Blue & Gold Chat

Play Episode Listen Later Oct 16, 2025 9:25


Bark is a tool for advanced content monitoring that adults can use to keep kids safe online. (Bark.us) Produced by Noble Academy, a school for students with learning differences in Greensboro, NC. https://www.nobleknights.org/

@BEERISAC: CPS/ICS Security Podcast Playlist
Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 16, 2025 33:54


Podcast: Industrial Cybersecurity InsiderEpisode: Industrial Cybersecurity: The Gap Between Investment and Cyber Event PreventionPub date: 2025-10-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), practical ways to reduce alert fatigue and assign ownership, how to close the OT incident response gap by connecting SOC to operators, the realities of flat Layer 2 networks and undocumented zones, how to handle technical debt at scale (EOL firmware, unpatched HMIs, safe upgrade paths), and why "everyone is responsible" often means no one is. Expect candid discussion on alert fatigue, flat networks, and the human constraints driving today's gaps, plus a concrete checklist for building a coalition that actually works to protect production environments.Chapters00:00:00 – Why incidents still happen after major OT cyber spend00:02:30 – Tools vs. outcomes: underusing capabilities and alert fatigue00:05:50 – Who owns plant‑floor cyber? Why CISOs, CIOs, OEMs, and SIs talk past each other00:08:10 – Define the use case before tuning sensors and policies00:10:00 – OT IR is missing: operators are the first responders00:11:20 – Network reality check: flat L2, VLAN gaps, and unmanaged switches00:13:30 – Change management and patching in OT: risk, downtime, and technical debt00:15:20 – Skills and staffing: the silver tsunami and "jack of all trades" constraints00:18:00 – What outside partners can and cannot do in plants00:21:00 – Visibility blind spots: validating coverage with floor‑level walkthroughs00:24:00 – It won't stick without a coalition: getting plant managers, engineering, OEMs, and SOC alignedLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Healthier Tech Podcast
Viktorya Vilk Reveals How Governments Are Weaponizing the Internet—And Big Tech Is Letting It Happen

The Healthier Tech Podcast

Play Episode Listen Later Oct 14, 2025 39:54


What if online harassment isn't random at all—but part of a strategy? In this explosive episode of The Healthier Tech Podcast, host R Blank talks with Viktorya Vilk, Director of Digital Safety and Free Expression at PEN America, about how governments, corporations, and tech platforms are turning the internet into a weapon against free speech. Viktorya reveals how political power, economic pressure, and digital surveillance now intersect to create an ecosystem where journalists, writers, and even librarians are targeted for speaking out. She breaks down how authoritarian tactics, media consolidation, and platform indifference have combined to make the online world hostile to truth—and what each of us can do to push back.   In This Episode: How the U.S. dropped to 57th in global press freedom rankings—and why that's not an accident The chilling new playbook: online harassment as a censorship tool Why Big Tech's business model thrives on surveillance, fear, and silence How Facebook and Google siphoned 70% of online ad revenue, collapsing local journalism Real-life examples of reporters attacked, arrested, and digitally terrorized for telling the truth The practical digital safety steps every person can take—starting today Why Viktorya refuses to give in to “tech nihilism” and insists users have power   Why You Should Listen This isn't just a podcast about harassment or privacy—it's about democracy, power, and your voice. Viktorya explains how the same digital forces that endanger journalists are eroding safety and free expression for everyone. But she also shares concrete tools to rebuild your sense of control online: from password hygiene and privacy audits to collective advocacy that pressures tech platforms to act responsibly. She makes one thing clear: silence is the goal of harassment—and awareness is the antidote.   Connect With Viktorya Vilk: Website: https://pen.org Social Handles: LinkedIn:https://www.linkedin.com/in/viktorya-v-a65b9235/ X: @VilkViktorya   Resources Mentioned in the Episode: Field Manual Against Online Harrassment: https://onlineharassmentfieldmanual.pen.org/  Online abuse & Digital Safety Programs: https://pen.org/online-abuse-digital-safety/  Treating online abuse like Spam: https://pen.org/report/treating-online-abuse-like-spam/ Shouting into the void: https://pen.org/report/shouting-into-the-void/  No Excuse for abuse: https://pen.org/report/no-excuse-for-abuse/    Connect with R Blank: For more Healthier Tech Podcast episodes, and to download our Healthier Tech Quick Start Guide, visit https://HealthierTech.co and follow https://instagram.com/healthiertech    Additional Links: EMF Superstore: https://ShieldYourBody.com (save 15% with code “pod”) Digital Wellbeing with a Human Soul: https://Bagby.co (save 15% with code “pod”) Youtube: https://youtube.com/shieldyourbody Instagram: https://www.instagram.com/bagbybrand/  Tiktok: https://www.tiktok.com/@bagby.co Facebook: https://www.facebook.com/shieldyourbody  This episode is brought to you by Shield Your Body—a global leader in EMF protection and digital wellness. Because real wellness means protecting your body, not just optimizing it. If you found this episode eye-opening, leave a review, share it with someone tech-curious, and don't forget to subscribe to Shield Your Body on YouTube for more insights on living healthier with technology.

@BEERISAC: CPS/ICS Security Podcast Playlist
Hidden Cybersecurity Vulnerabilities in Today's Data Centers

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 9, 2025 26:59


Podcast: Industrial Cybersecurity InsiderEpisode: Hidden Cybersecurity Vulnerabilities in Today's Data CentersPub date: 2025-10-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Scott Cargill, Partner of BW Design Group, joins Craig and Dino. Together they dissect the critical vulnerability gap in data center operational technology infrastructure. While most data centers implement robust IT security protocols, their building management systems controlling cooling, power distribution, and environmental controls remain significantly under-protected. Cargill provides technical analysis of how the rapid expansion of data center capacity for AI workloads has outpaced OT security implementation, creating exploitable attack vectors where minutes of system compromise could cascade into millions in equipment damage and service disruption. Through evidence-based examination and industry insights, this episode offers CISOs and OT security professionals a practical framework for addressing the IT-OT security convergence challenge in mission-critical facilities.They offer actionable strategies for vulnerability assessment, segmentation, and defense-in-depth implementation.Chapters:- 00:00:00 - Meet Scott Cargill of BW Design Group- 00:02:30 - Data centers expanding for AI- 00:04:40 - Critical BMS vulnerabilities being ignored- 00:07:40 - Alarming OT security reality- 00:09:40 - Why OT security remains deprioritized- 00:12:10 - IT-OT security convergence challenges persist- 00:16:35 - Manufacturing parallels to data centers- 00:20:10 - Security solutions evolution underway- 00:21:45 - Managed services necessity for OT- 00:24:42 - Thought leadership driving industry standardsLinks and Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityScott Cargill on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

NHS England and NHS Improvement Podcast
Insights from a national Clinical Safety Officer

NHS England and NHS Improvement Podcast

Play Episode Listen Later Oct 8, 2025 58:38


In this episode of our new digital clinical safety podcast series, originally recorded in Autumn 2024, we are joined by Liz Barfield, who brings over 20 years of experience in this vital area. Liz's extensive background includes roles in emergency care, implementation, and her most recent position as a Clinical Safety Officer (CSO) at NHS England, where she contributed to numerous national programmes. In 2019, she completed an MSc in Patient Safety, focusing her dissertation on the DCB safety standards. Throughout the podcast, Liz shares valuable insights and practical hints and tips for those working in digital clinical safety roles. Further resources: • Digital Clinical Safety – Essentials e-learning training module https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#essentials-training • Digital Clinical Safety – Intermediate e-learning training module https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#intermediate-training • Digital Clinical Safety – Practitioner training https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#practitioner-training • Digital Safety in Practice course - https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#digital-safety-in-practice • Digital Clinical Safety – Refresher training https://digital.nhs.uk/services/clinical-safety/clinical-risk-management-training#refresher-training The digital clinical risk management standards: • DCB0129: Clinical Risk Management: its Application in the Manufacture of Health IT Systems https://digital.nhs.uk/data-and-information/information-standards/governance/latest-activity/standards-and-collections/dcb0129-clinical-risk-management-its-application-in-the-manufacture-of-health-it-systems/ • DCB0160: Clinical Risk Management: its Application in the Deployment and Use of Health IT Systems - NHS England Digital https://digital.nhs.uk/data-and-information/information-standards/governance/latest-activity/standards-and-collections/dcb0160-clinical-risk-management-its-application-in-the-deployment-and-use-of-health-it-systems/ A full transcript of this episode is available on our website - https://www.england.nhs.uk/long-read/insights-from-a-national-clinical-safety-officer-podcast-transcript/ Please get in touch if you have any questions regarding this episode - Tengland.clinical.safety@nhs.net

@BEERISAC: CPS/ICS Security Podcast Playlist
Building OT Cybersecurity That Works in the Real World

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 5, 2025 37:46


Podcast: Industrial Cybersecurity InsiderEpisode: Building OT Cybersecurity That Works in the Real WorldPub date: 2025-09-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIndustrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must come before capabilities, how to right-size your technology stack through tool rationalization, and why interdependence mapping is foundational for real resilience.00:00:00 – Why OT maturity often stalls00:06:00 – Where to focus first: assets, segmentation, and access00:08:20 – Governance gaps: frameworks on paper vs. controls in practice00:10:10 – Interdependence mapping beyond "crown jewels"00:12:30 – Operators as first responders and safe-state realities00:16:15 – Vendor and OEM ecosystems: who owns the response plan?00:20:10 – Threat intel's limits: effects‑based security over means‑based noise00:22:00 – Incident readiness in plants: plans, practice, and ownership00:26:00 – Supply chain fragility and concentration risk in manufacturing00:29:30 – Tool rationalization: measuring ROI, coverage, and usabilityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.DJ's Blog on Interdependence Mapping: https://claroty.com/blogDanielle Jablanski on LinkedInIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ITSPmagazine | Technology. Cybersecurity. Society
How F-Secure Transformed from Endpoint Security to Predicting Scams Before They Happen | A Brand Story Conversation with Dmitri Vellikok, Product and Business Development at F-Secure

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 26, 2025 36:23


The cybersecurity industry operates on a fundamental misconception: that consumers want to understand and manage their digital security. After 17 years at F-Secure and extensive consumer research, Dmitri Vellikok has reached a different conclusion—people simply want security problems to disappear without their involvement.This insight has driven F-Secure's transformation from traditional endpoint protection to what Vellikok calls "embedded ecosystem security." The company, which holds 55% global market share in operator-delivered consumer security, has moved beyond the conventional model of asking consumers to install and manage security software.F-Secure's approach centers on embedding security capabilities directly into applications and services consumers already use. Rather than expecting people to download separate security software, the company partners with telecom operators, insurance companies, and financial institutions to integrate protection into existing customer touchpoints.This embedded strategy addresses what Vellikok identifies as cybersecurity's biggest challenge: activation and engagement. Traditional security solutions fail when consumers don't install them, don't configure them properly, or abandon them due to complexity. By placing security within existing applications, F-Secure automatically reaches more consumers while reducing friction.The company's research reveals the extent of consumer overconfidence in digital security. Seventy percent of people believe they can easily spot scams, yet 43% of that same group admits to having been scammed. This disconnect between perception and reality drives F-Secure's focus on proactive, invisible protection rather than relying on consumer vigilance.Central to this approach is what F-Secure calls the "scam kill chain"—a framework for protecting consumers at every stage of fraudulent attempts. The company analyzes scam workflows to identify intervention points, from initial contact through trust-building phases to final exploitation. This comprehensive view enables multi-layered protection that doesn't depend on consumers recognizing threats.F-Secure's partnership with telecom operators provides unique advantages in this model. Operators see network traffic, website visits, SMS messages, and communication patterns, giving them visibility into threat landscapes that individual security solutions cannot match. However, operators typically don't communicate their protective actions to customers, creating an opportunity for F-Secure to bridge this gap.The company combines operator-level data with device-level protection and user interface elements that inform consumers about threats blocked on their behalf. This creates what Vellikok describes as a "protective ring" around users' digital lives while maintaining transparency about security actions taken.Artificial intelligence and machine learning have been core to F-Secure's operations for over a decade, but recent advances enable more sophisticated predictive capabilities. The company processes massive data volumes to identify patterns and predict threats before they materialize. Vellikok estimates that within 18 to 24 months, F-Secure will be able to warn consumers three days in advance about likely scam attempts.This predictive approach represents a fundamental shift from reactive security to proactive protection. Instead of waiting for threats to appear and then blocking them, the system identifies risk patterns and steers users away from dangerous situations before threats fully develop.The AI integration also serves as a translation layer between technical security events and consumer-friendly communications. Rather than presenting technical alerts about blocked URLs or filtered emails, the system provides context about threats in language consumers can understand and act upon.F-Secure's evolution reflects broader industry recognition that consumer cybersecurity requires different approaches than enterprise security. While businesses can mandate security training and complex protocols, consumers operate in environments where convenience and simplicity drive adoption. The embedded security model acknowledges this reality while maintaining protection effectiveness.The company's global reach through operator partnerships positions it to address cybersecurity as a systemic challenge rather than an individual consumer problem. By aggregating threat data across millions of users and multiple communication channels, F-Secure creates network effects that improve protection for all users as the system learns from new attack patterns.Looking forward, Vellikok anticipates cybersecurity challenges will continue evolving in waves. Current focus on scam protection will likely shift to AI-driven threats, followed by quantum computing challenges. The embedded security model provides a framework for adapting to these changes while maintaining consumer protection without requiring users to understand or manage evolving threat landscapes. Learn more about F-Secure: https://itspm.ag/f-secure-2748Note: This story contains promotional content. Learn more. Guest: Dmitri Vellikok, Product and Business Development at F-Secure  On LinkedIn: https://www.linkedin.com/in/dmitrivellikok/ResourcesCompany Directory:https://www.itspmagazine.com/directory/f-secure Learn more about creating content with Sean Martin & Marco Ciappelli:  https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

@BEERISAC: CPS/ICS Security Podcast Playlist
Mitsubishi's Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 24, 2025 26:29


Podcast: Industrial Cybersecurity InsiderEpisode: Mitsubishi's Billion-Dollar Bet on OT Cybersecurity with Nozomi AcquisitionPub date: 2025-09-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market.The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-making. Craig and Dino share practical insights for security leaders and engineering professionals working in industrial environments.Topics covered: • Why Mitsubishi made this $1B investment • How this affects choosing security vendors • The growing role of managed services in OT security • What organizations should do to prepare for changesFor cybersecurity professionals, industrial engineers, and executives working with operational technology and cyber defense.Chapters:00:00:00 - Welcome to Industrial Cybersecurity Insider Podcast00:01:26 - A Trend of Cybersecurity Platform Acquisitions00:02:03 - The "Cyber-Informed Engineering" Play00:02:52 - Market Impact: Setting a Billion-Dollar Bar for Competitors00:05:06 - A Lack of Expertise and Resources00:05:48 - The Challenge of Building an In-House Team vs. Using Managed Services00:07:40 - Embedding Security Directly into Hardware Controllers00:09:33 - How Competitors Like Rockwell Might React00:10:00 - IPO or Acquisition?00:14:42 - The On-Prem vs. Cloud Debate in Manufacturing Environments00:16:50 - 87% of Organizations Are Lagging in Cybersecurity Maturity00:17:20 - The IT/OT Resource and Knowledge Gap00:18:54 - The Need for CIOs to Partner with OT Systems Integrators00:21:25 - The "OnStar" Model for Industrial Security00:22:15 - The Reality of Vendor Lock-In and Warranty Issues00:24:14 - OT Needs to Own Its Cybersecurity Strategy00:25:12 - The Risk of Underutilized Security ToolsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Responsibility Without Authority: The CISO's Industrial Cybersecurity Dilemma

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 20, 2025 30:44


Podcast: Industrial Cybersecurity InsiderEpisode: Responsibility Without Authority: The CISO's Industrial Cybersecurity DilemmaPub date: 2025-09-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. While executives are tasked with ensuring resilience and reporting to the board, they often hit resistance at the plant floor where production uptime and safety KPIs take priority. The conversation explores IT/OT convergence, asset visibility blind spots, OEM restrictions, and the risks of relying on remote-only deployments. With insights from decades of hands-on experience in industrial environments, Craig and Dino outline practical steps for building bridges between IT and OT, aligning financial risk with security strategy, and equipping CISOs with the authority they need to succeed.Chapters:00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast00:01:11 - The CISO's Core Conflict of Responsibility Without Authority00:02:45 - Why Security Efforts Get "Kneecapped at the Front Door"00:04:04 - Understanding the OT Environment and Its Unique Technology00:05:36 - Building Bridges Between IT and OT as the Solution00:07:44 - Overcoming OT's "Skittish" Resistance to IT00:09:43 - The Scaling Problem of Too Few Engineers for Too Many Plants00:10:57 - Why a Remote-First Approach Fails in Manufacturing00:14:44 - The "Epiphany" of Uncovering Operational Benefits for OT Teams00:17:24 - Navigating OEM Warranties and Equipment Restrictions00:19:14 - The "Trust but Verify" Mandate for a CISO00:20:56 - The Danger of Hidden Networks and the "Air Gap" Myth00:23:16 - Speaking the Language of Business in Dollars and Cents00:24:43 - Aligning Security with the Plant's Capital Master Plan00:27:24 - How Company Ownership Affects Security Investment00:28:16 - How to Give the CISO Real AuthorityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Critical Role of Local Knowledge in Industrial Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 12, 2025 24:25


Podcast: Industrial Cybersecurity InsiderEpisode: The Critical Role of Local Knowledge in Industrial CybersecurityPub date: 2025-09-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this essential rewind episode, Dino Busalachi and Craig Duckworth address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection.The Power of Local PartnershipDino emphasizes a crucial principle that often gets overlooked in cybersecurity implementations: "The only way you can act local is you've got to work with those folks that are in those plants every day, all day."This insight highlights why external cybersecurity consultants must forge strong partnerships with on-site operational teams who possess intimate knowledge of their industrial environments.These local experts understand the nuanced details that can make or break a security implementation. This includes everything from vendor schedules and machine operations to maintenance windows and downtime planning.They know when critical systems are most vulnerable and which processes absolutely cannot be interrupted.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

DrZeroTrust
"Holistic Cybersecurity: A Comprehensive Approach to Digital Safety"

DrZeroTrust

Play Episode Listen Later Sep 8, 2025 24:15


In this episode, Mike Elkins maps a whole‑of‑business blueprint for digital safety that actually reduces risk you can measure. We break down what “holistic” really means in practice: identity as the control plane, data‑centric design, continuous verification, least privilege, segmentation that shrinks blast radius, and automation that removes human bottlenecks. From cloud and SaaS to OT/IoT and third‑party risk, Chase shows how to connect policy, architecture, and operations so security becomes a repeatable system—not a pile of tools.TakeawaysWhy piecemeal controls create “debt‑in‑depth”How to center Zero Trust on identities, not networksPragmatic micro‑segmentation and just‑in‑time accessA simple metric stack for the board (exposure, blast radius, dwell time)How to align GRC with day‑to‑day enforcementNo FUD. No silver bullets. Just the playbook to make “holistic” real.

The Secure Dad Podcast
Overcoming Bullying with Nate Webb

The Secure Dad Podcast

Play Episode Listen Later Aug 27, 2025 29:06 Transcription Available


Tackling Bullying and Digital Safety with Nate Webb   In this episode of The Secure Family Podcast, Andy speaks with school counselor and national speaker Nate Webb about the modern challenges of bullying in 2025 and effective communication with kids. Nate shares insights from his own experiences with bullying and how he uses them to educate others.    The discussion covers topics like the sneaky nature of contemporary bullying, the importance of developing a child's sense of identity, and the crucial role of parents in digital safety. Additionally, the episode provides practical steps for parents to better support their children in both preventing and addressing bullying.   For more from Nate Webb: https://natewebbspeaker.com/   Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD.  OmniWatch is a scam and identity protection service that monitors your data, alerts you to threats, and backs you with up with insurance. Try it for only $1 for 7 days. Connect

The Standards Show
Audiobook | Report - Supporting digital safety for adolescents

The Standards Show

Play Episode Listen Later Aug 18, 2025 11:02


BSI Reports and Whitepapers provide expert insights, guidance, and analysis on various topics related to standards, compliance, and best practices. They are designed to inform and educate organizations, industries, and policymakers about emerging trends, challenges, and opportunities in areas where standards play a critical role.This episode is an audio-abridged version of the BSI Report - Supporting a safe and secure digital world for adolescents. Published in May 2025, the report reveals that nearly half (47%) of young people aged 16 to 21 would prefer to grow up without the internet - a stark reflection of concerns about its impact on their wellbeing. Drawing on a survey of 1,293 UK adolescents, it shows that time spent online has increased since COVID-19, with many spending hours each day on social media and gaming. Despite this, 42% admit to hiding their online activity from parents, and risky behaviours, such as creating fake profiles are common. The findings highlight the urgent need for stronger privacy and safety measures by tech companies and policymakers to protect young users' mental health and online safety.Series | AudiobooksFind out more about the issues raised in this episodeBSI Digital TrustCPINISO COPOLCOGet involved with standardsGet in touch with The Standards Showeducation@bsigroup.comsend a voice messageFind and follow on social mediaX @StandardsShowInstagram @thestandardsshowLinkedIn | The Standards Show

The Dad Edge Podcast (formerly The Good Dad Project Podcast)
The Social Media Body Image Trap - Rich Dorment

The Dad Edge Podcast (formerly The Good Dad Project Podcast)

Play Episode Listen Later Jul 28, 2025 55:26


Have you ever asked yourself: Am I really aware of how much social media and online content is influencing my kids? Have I noticed my kids becoming overly focused on their physical appearance or diet? How do I handle conversations about nutrition and fitness at home? If you've noticed your son obsessing over his physique or protein intake, or your daughter silently struggling with self-worth because of what she sees online, this episode is for you. Larry and Rich dive deep into how today's digital landscape is distorting kids' perceptions of themselves, driving issues like body dysmorphia, disordered eating, and unhealthy relationships with food and fitness—affecting boys and girls earlier than ever before. You'll hear real talk on what warning signs to watch out for, how to foster healthy conversations about food and body image, and the steps you can take to protect your kids from the relentless pressures of curated perfection online. Plus, learn practical strategies for monitoring your child's digital world and discover why it's crucial to model resilience, open dialogue, and authentic self-worth in your home. Whether you're a dad, coach, or mentor, this episode is your wake-up call and toolbox—because the world is changing, and as fathers, we need to step up, disrupt the status quo, and help our kids build unshakeable confidence in themselves. Become the best husband you can: https://bit.ly/deamarriageyoutube In this vital conversation, we dig into: Why Social Media Is A Game-Changer: Unlike the occasional magazine we grew up with, today's kids are constantly exposed to unrealistic body standards, curated feeds, and supplement ads designed to make them feel “less than.” The result? Kids (especially boys ages 12-14!) are reporting anxiety, body dysmorphia, compulsive exercising, and disordered eating at skyrocketing rates. Spot the Warning Signs: It's not just about undereating—obsession with protein grams, excessive workouts, and constant flexing in the mirror can all point to an unhealthy relationship with food and body image. Smart Conversations, Not Confrontations: The episode shares actionable tips to open up dialogue with your kids. Watch "Generation Flex" together, use it as a springboard for honest conversation, and focus on how food and fitness make us feel—not just how we look. Model Healthy Habits: As dads, it's not about being perfect—it's about showing our kids that food isn't “good” or “bad,” and that balance is key (yes, you can have that burger and a salad). Digital Safety for Peace of Mind: Larry also highlights tools like Bark, which alert you to concerning activity on your kids' devices—so you're not left in the dark about what they're seeing online. If you care about raising healthy, resilient sons and daughters in an always-connected world—and want to know the practical steps you can take at home—this episode is for you Here's what research and observation highlight about Studies show that hospitalizations for pediatric eating disorders rose by 139% from 2002 to 2018, with the largest relative increase seen in males aged 12 to 14 Boys and men now represent a third of all eating disorder diagnoses today Nearly 100% of kids with internet access are exposed to carefully curated or unrealistic fitness/body images daily. thedadedge.com/bark  thedadedge.com/alliance  https://menshealth.com @menshealthmag @richdorment Read more about Men's Health's documentary "Generation Flex": https://www.menshealth.com/generationflex Watch Generation Flex on Apple TV+:https://tv.apple.com/us/clip/generation-flex Watch Generation Flex on Amazon Prime Video: https://www.amazon.com/gp/video/detail/B0DJCND11R  

Modern Wisdom
#967 - Jeffrey Katzenberg & Hari Ravichandran - Hollywood Trouble, Big Tech & The Crisis With Kids

Modern Wisdom

Play Episode Listen Later Jul 14, 2025 119:36


Jeffrey Katzenberg is a media mogul, film producer, and co-founder of DreamWorks. Hari Ravichandran is a serial entrepreneur, founder, and CEO of Aura. From bringing joy to millions of childhoods through beloved Disney films to now addressing the digital challenges facing today's youth, Jeffrey Katzenberg has partnered with Hari Ravichandran to lead a new revolution focused on safeguarding the mental health and online safety of the next generation. At the heart of it all is this vital question: how do we keep children safe online? Expect to learn what Jeffery Katzenberg is up to and the current state of modern media and film, how to reinvent yourself at pivotal moments, how to get better at dealing with change and disappointment, what the data says about kids, online safety & how parents can better protect their kids online, the big problems with mental health of the younger generation & how to best address their growing issues, and much more… Sponsors: See discounts for all the products I use and recommend: https://chriswillx.com/deals Get a Free Sample Pack of LMNT's most popular Flavours with your first purchase at https://drinklmnt.com/modernwisdom Get 35% off your first subscription on the best supplements from Momentous at https://livemomentous.com/modernwisdom Get a 20% discount on Nomatic's amazing luggage at https://nomatic.com/modernwisdom Get the best bloodwork analysis in America at https://functionhealth.com/modernwisdom Timestamps: (00:00) What Jeffrey Does & What Makes a Good Story? (10:51) What Drives Jeffrey & Hari? (16:40) What's The State Of Modern Cinema? (23:04) Jeffrey & Hari on the Star Wars Universe, Gaming, & Dealing With Change (38:05) What Technology Is Doing To Younger Kids? (46:45) The Data Behind Keeping Kids Safe Online (1:00:01) Should We Ban Social Media For Anyone Under 16? (1:07:24) Why Parents Are the Key to Digital Safety (1:14:09) The Impact Of Wearable Devices & Celebrity Endorsements On Aura (1:23:24) How Early Screen Habits Affect Lifelong Patterns (1:32:51) The Hidden Costs Of Fame & How To Learn From Your Failures (1:41:32) The Trends Associated With Bullying & What Parents Can Do About It (1:51:38) Chris' Thoughts On Adolescence (1:58:50) Learn More About Jeffrey, Hari, & Aura.com Extra Stuff: Get my free reading list of 100 books to read before you die: https://chriswillx.com/books Try my productivity energy drink Neutonic: https://neutonic.com/modernwisdom Episodes You Might Enjoy: #577 - David Goggins - This Is How To Master Your Life: https://tinyurl.com/43hv6y59 #712 - Dr Jordan Peterson - How To Destroy Your Negative Beliefs: https://tinyurl.com/2rtz7avf #700 - Dr Andrew Huberman - The Secret Tools To Hack Your Brain: https://tinyurl.com/3ccn5vkp - Get In Touch: Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/modernwisdompodcast Email: https://chriswillx.com/contact - Learn more about your ad choices. Visit megaphone.fm/adchoices

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary