Podcasts about Digital security

  • 297PODCASTS
  • 585EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 21, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Digital security

Latest podcast episodes about Digital security

Divorce Master Radio
How to Organize Digital Accounts and Passwords Post-Divorce? | Los Angeles Divorce

Divorce Master Radio

Play Episode Listen Later May 21, 2025 1:57


The Darrell McClain show
When Digital Security Meets Military Politics: A Defense Department Drama

The Darrell McClain show

Play Episode Listen Later May 6, 2025 58:50 Transcription Available


Send us a textThe Pentagon is embroiled in a crisis of credibility as Secretary of Defense Pete Hegseth finds himself caught in a web of contradictions over information security practices. What began as a seemingly straightforward disciplinary action against alleged leakers has evolved into a revealing portrait of double standards at the highest levels of military leadership.When three senior Pentagon advisors—Dan Caldwell, Colin Carroll, and Darren Selnick—were unceremoniously escorted from the building and subsequently fired, they raised a troubling claim: they were never told what specific information they allegedly leaked, nor were they given any opportunity to defend themselves. "We have not been told what we're being investigated for," Caldwell stated bluntly in a follow-up interview, questioning whether a legitimate investigation ever took place.The situation took a dramatic turn when reports emerged that Secretary Hegseth himself had been sharing sensitive operational details about military strikes against Houthi targets in Yemen—not through secure government channels, but in Signal chat groups that included family members. This followed an earlier incident where Hegseth participated in another Signal group that accidentally included a journalist from The Atlantic. Security experts and congressional representatives have expressed alarm, with Rep. Jim Himes highlighting that "preparations for an attack... are to be classified top secret."This controversy strikes at fundamental questions about accountability and equal application of rules. While Hegseth publicly decried leakers and anonymous sources as "hoaxsters," his own information-sharing practices appear to violate the very standards he's enforcing among his staff. Rep. Don Bacon, a Republican and retired Air Force general, described Hegseth's actions as "amateur hour," noting that "Russia and China are all over his phone and for him to be putting secret stuff on his phone is not right."What makes this pattern particularly concerning is how it mirrors broader issues of due process throughout government enforcement. As similar stories emerge from immigration enforcement and other sectors, we're confronted with critical questions about the consistent application of rules and the protections afforded to those accused of wrongdoing.Has our rush to address perceived security threats led us to abandon core principles of fairness? Does the digital age require new frameworks for handling sensitive information? Join us as we explore these pressing questions—and be sure to subscribe for our continuing coverage of this developing story.REAL ID Enforcement Begins - Digital Surveillance COMING SOON?https://youtu.be/ZYBoH35OjXs?si=rEhZWO-h0mU_DwQL  Boundless Insights - with Aviva KlompasIn depth analysis of what's happening in Israel—and why it matters everywhere.Listen on: Apple Podcasts SpotifySupport the show

Security Clearance Careers Podcast
Leading with Heart: Gwen Clavon on Building Strong Teams in National Security

Security Clearance Careers Podcast

Play Episode Listen Later May 1, 2025 39:43


Gwen Clavon, Senior Vice President for Digital Security and Analytics at Amentum, joins ClearedCast to discuss leadership, resilience, and wellness in cleared careers—and why it's okay to not be okay in national security. To learn more about careers at Amentum, visit their ClearanceJobs profile. Hosted on Acast. See acast.com/privacy for more information.

DevCast
The Journey of Zero Trust: Insights and Applications

DevCast

Play Episode Listen Later Apr 29, 2025 40:40


Join Chief Technologist, John Janek and Technical Director for Digital Security, Niroop Gonchikar, as they discuss the concept of Zero Trust and its practical applications in cybersecurity. They explore its application across various environments, emphasizing the philosophy behind constant authentication and authorization to enhance security. The conversation includes insights from Niroop's experience at the Zero Trust Summit, where government agencies and vendors discussed their progress and challenges.They highlight the importance of making security easy for users, leveraging AI, maintaining continuous delivery and monitoring, and the evolving complexities of modern digital environments. The discussion also touches on the necessity of mentoring, community, and systemic understanding in developing secure codes and systems.

Breakfast with Refilwe Moloto
What the Hack! Safety tech leads at Auto Shanghai and more

Breakfast with Refilwe Moloto

Play Episode Listen Later Apr 29, 2025 7:21


In this week’s edition of What the Hack! on CapeTalk, Arthur Goldstuck joined John Maytham to explore the shift towards vehicle safety at the Auto Shanghai 2025 expo, unpack the power (and challenges) of the new Acer Predator Connect W6x Wi-Fi router, preview Meta’s LlamaCon and its AI ambitions, and share expert advice for World Password Day on how to better protect your online accounts. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live – Good Morning CapeTalk with Lester Kiewit is broadcast weekdays between 06:00 and 09:00 (SA Time) https://www.primediaplus.com/station/capetalk Find all the catch-up podcasts here https://www.primediaplus.com/capetalk/good-morning-cape-town-with-lester-kiewit/audio-podcasts/good-morning-cape-town-with-lester-kiewit/ Subscribe to the CapeTalk daily and weekly newsletters https://www.primediaplus.com/competitions/newsletter-subscription/ Follow us on social media: CapeTalk on Facebook: www.facebook.com/CapeTalk   CapeTalk on TikTok: www.tiktok.com/@capetalk   CapeTalk on Instagram: www.instagram.com/capetalkza  CapeTalk on X: www.x.com/CapeTalk  CapeTalk on YouTube: www.youtube.com/@CapeTalk567  See omnystudio.com/listener for privacy information.

Digital Transformation & Leadership with Danny Levy
Transforming Digital Security: Leadership, Innovation & the Future of Identity w/ David Mahdi

Digital Transformation & Leadership with Danny Levy

Play Episode Listen Later Apr 17, 2025 66:34


On todays episode Danny is joined by David Mahdi, Chief Identity Officer (CIO) for Transmit Security. David is a globally recognized leader in cybersecurity and digital identity, renowned for his pioneering work in establishing digital trust across complex enterprise ecosystems. With over two decades of experience, he has been instrumental in shaping the fields of identity-first security, cryptography, and machine identity management. As the CIO at Transmit Security and former Chief Strategy Officer and CISO Advisor at Sectigo, David has guided organizations through digital transformation initiatives, including the development of cryptography centers of excellence and the implementation of passwordless authentication systems. His tenure as a top-performing VP Analyst at Gartner solidified his reputation as a trusted advisor to Fortune 500 companies, where he provided insights on cybersecurity, blockchain, PKI, and IoT security. David's thought leadership extends to his contributions to the Forbes Technology Council and the Fast Company Executive Board, where he continues to influence the discourse on digital trust and cybersecurity. His holistic approach, encompassing IT, engineering, business development, and marketing, positions him uniquely to address the multifaceted challenges of today's digital landscape. In this podcast, David shares his insights on the evolving landscape of digital identity, the importance of establishing digital trust, and the future of cybersecurity in an increasingly interconnected world:The most surprising challenge David has faced in leading innovation at scaleSomething David struggles with as a leader in the tech spaceHow to maintain peak performance and keep your team motivatedThe role AI plays in the evolution of digital identity and fraud preventionHow to manage energy and focusWhat excites David most about the future of digital security and identity managementAnd more...Are you getting every episode of Digital Transformation & Leadership in your favourite podcast player? You can find us Apple Podcasts and Spotify to subscribe.

Thank God for Nostr

bitcoinplebdev and cmd are building FROSTR, a multi-signature aggregation scheme for nostr key management. 

Darn IT Podcast
Risks of Putting Your Intimate Photos Online

Darn IT Podcast

Play Episode Listen Later Apr 2, 2025 7:12


Think your intimate photos are safe on private apps? Think again. A shocking new data leak has exposed millions of private images from dating platforms, putting users at serious risk. In this episode of Darnley's Cyber Cafe, we uncover what went wrong, the hidden dangers of sharing sensitive photos online, and how you can protect yourself from cyber threats. Tune in now—your privacy may depend on it.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

Chicago's Afternoon News with Steve Bertrand
Digital security expert urges 23andMe users to delete their profile

Chicago's Afternoon News with Steve Bertrand

Play Episode Listen Later Mar 29, 2025


Tazin Khan, CEO of Cyber Collective, joins Lisa Dent to discuss digital privacy. 23andMe has declared bankruptcy and its assets, including the genetic data that their users gave the company, will soon be owned by someone else. Khan warns that the new owners of the genetic data may not have the same privacy standards.

Uncommon Sense with Ginny Robinson
My Stalker Story Cont.

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 25, 2025 51:08


On today's episode, we're going even deeper into my stalker situation. I'll be sharing more details about his delusional tendencies—including how he's gone as far as pretending to be a police officer to manipulate and control people (which is a crime, by the way). I'll also be answering the questions I've received from you all about this ongoing situation.Law enforcement is now more involved (actual police, not to be confused with blue light bandits), we know everything, and we'll be handling it all legally. Tune in for the full update.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmJnibJBpoe9p7ReNXovwJMQN&gclid=Cj0KCQjwqIm_BhDnARIsAKBYcmsZOengz4NFStC14G_b2eziJgYpA8kGt2sokaR9i3PcTxs0QmcaPosaAtbGEALw_wcB

law trauma crime security threats fraud true crime self awareness deception mental illness predator investigation true stories breaking free law enforcement gaslighting stalker scammers cont taking action criminal justice self defense stalking harassment overcoming adversity warning signs public safety cybercrime breaking the cycle identity theft delusional intimidation speaking up justice system psychological safety delusions fight or flight community support criminal minds self empowerment court cases fighting back law and order emotional abuse safety tips breaking the silence legal system overcoming trauma staying safe criminal justice reform raising awareness trauma recovery manipulators coping strategies online safety crime and punishment criminal charges legal action restraining orders legal challenges criminal investigations personal empowerment dealing with fear crisis response criminal records criminal defense internet safety personal boundaries fraud prevention crime podcast speaking out crime prevention personal safety community safety self protection community policing digital security sharing knowledge legal protection cyberstalking cyber defense security awareness online harassment public awareness psychological trauma psychological abuse understanding risk personal security personal resilience personal protection protecting yourself false identity crime statistics identity fraud criminal behavior security training survival tactics victim support justice for all supporting survivors security awareness training crime reporting police reports personal rights personal defense victim advocacy crime survivors internet fraud crime analysis internet predators
Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation missing person malware cyberbullying justice system community support defamation true crime podcasts personality disorders blackmail court cases encryption emotional abuse taser risk assessment data protection crime scene emotional resilience media coverage extortion social engineering narcissistic abuse private investigators criminal justice reform personal freedom emergency preparedness trauma recovery background checks healing from trauma situational awareness emergency response cyber threats spyware peeping toms mental resilience revenge porn forensic science criminal charges post traumatic stress legal action restraining orders security policies whistleblowing home security data breaches surveillance state it security federal laws mental health resources digital literacy security cameras security breach forensic psychology psychological warfare doxxing victim blaming criminal defense internet safety threat intelligence personal boundaries pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection digital security public records news coverage ethical hacking crisis hotline legal protection cyberstalking cyber defense digital rights emotional manipulation threat assessment security tips online harassment emotional distress public awareness internet privacy personal security mobile security protective services gps tracking email security online fraud crime scene investigations identity fraud criminal behavior identity protection forensic investigations onlinepredators behavioral analysis victim support local law enforcement emotional recovery privacy settings detective work legal advocacy criminal profiling criminal intent security awareness training aggressive behavior crime reporting protective gear police reports personal rights digital evidence home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing cyber investigations technology safety
ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity in Italy: ITASEC 2025 Recap & Future Outlook with Professor Alessandro Armando | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 18, 2025 25:35


Cybersecurity in Italy: ITASEC 2025 Recap & Future Outlook with Professor Alessandro ArmandoCybersecurity is no longer a niche topic—it's a fundamental pillar of modern society. And in Italy, ITASEC has become the go-to event for bringing together researchers, government officials, and industry leaders to tackle the biggest security challenges of our time.Although we weren't there in person this year, we're diving into everything that happened at ITASEC 2025 in this special On Location recap with Professor Alessandro Armando. As Deputy Director of the Cybersecurity National Laboratory at CINI and Chairman of the Scientific Committee of the SERICS Foundation, Alessandro has a front-row seat to the evolution of cybersecurity in Italy.This year's event, held in Bologna, showcased the growing maturity of Italy's cybersecurity landscape, featuring keynotes, technical sessions, and even hands-on experiences for the next generation of security professionals. From government regulations like DORA (Digital Operational Resilience Act) to the challenges of AI security, ITASEC 2025 covered a vast range of topics shaping the future of digital defense.One major theme? Cybersecurity as an investment, not just a cost. Italian companies are increasingly recognizing security as a competitive advantage—something that enhances trust and reputation rather than just a compliance checkbox.We also discuss the critical role of education in cybersecurity, from university initiatives to national competitions that are training the next wave of security experts. With programs like Cyber Challenge.IT, Italy is making significant strides in developing a strong cybersecurity workforce, ensuring that organizations are prepared for the evolving threat landscape.And of course, Alessandro shares a big reveal: ITASEC 2026 is heading to Sardinia! A stunning location for what promises to be another exciting edition of the conference.Join us for this insightful discussion as we reflect on where cybersecurity in Italy is today, where it's headed, and why events like ITASEC matter now more than ever.

The Social-Engineer Podcast
Ep. 297 - Security Awareness Series - Quantifying and Owning Risk with Roy Luongo

The Social-Engineer Podcast

Play Episode Listen Later Mar 17, 2025 34:34


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025]   00:00 - Intro 00:17 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors -          Ed Skoudis -          Brigadier General Brian D. Vile -          Shawn Turskey 29:55 - Lollipop Moments -          TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations -          Cybersecurity Canon - Rick Howard -          Kingpin - Kevin Poulsen -          Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Hempresent
AI, Bots, and Digital Security in the New Environment with Jeff Crawford

Hempresent

Play Episode Listen Later Mar 17, 2025 26:20


Jeff Crawford has been involved in independent media, activism, and technology for decades. He started with Bohemia AfterDark, one of the first indie music video shows, and later organized the Portland Hemp Festival in the mid-90s. His work spans media preservation, AI, and digital activism, focusing on counteracting algorithmic manipulation and censorship. Jeff has worked extensively with content archiving, including rare footage restoration for Getty, and he's deeply invested in exploring how AI can be utilized to reclaim digital spaces from corporate and political influence.Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 222 Securing Federal Systems: How API Management Transforms Digital Security

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Mar 13, 2025 23:24


The federal government is transforming from on-premises and private cloud systems to a hybrid cloud. What most listeners do not realize is that the linchpin to this transition is the Application Program Interface (API). It has been hiding under the radar for so many years that malicious actors use this perspective to attack the API. Info Security Magazine reports that 99% of organizations struggle with API security. Where to start? First, get an inventory of how many APIs you are dealing with. Stephen Ringo emphasizes the need for discovery tools to identify rogue and shadow APIs, noting that passive discovery methods are preferred to avoid network disruptions. He also points out that API security is often overlooked, even in cloud-native solutions, and that misuse, rather than malformation, is the primary threat. Ringo advocates initiative-taking measures to secure APIs and prevent data breaches. Three main ways to protect APIs: Educate and raise awareness about API security risks among federal CIOs and IT leaders. Discover and inventory all APIs, including rogue or shadow APIs, within the organization. Evaluate API security capabilities of cloud providers and ensure proper security controls are in place.

Afternoon Drive with John Maytham
POPIA unpacked: Why won't these marketing calls stop?

Afternoon Drive with John Maytham

Play Episode Listen Later Mar 12, 2025 7:37


John Maytham is joined by John Giles, Managing Director and Digital, Data, and Tech Attorney at Michalsons Attorneys, to unpack the Protection of Personal Information Act (POPIA) and why data privacy matters now more than ever.See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | A Conversation with Sarah Fluchs | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 11, 2025 44:10


⬥GUEST⬥Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥The European Commission's Cyber Resilience Act (CRA) introduces a regulatory framework designed to improve the security of digital products sold within the European Union. In a recent episode of Redefining CyberSecurity, host Sean Martin spoke with Sarah Fluchs, Chief Technology Officer at admeritia and a member of the CRA expert group at the EU Commission. Fluchs, who has spent her career in industrial control system cybersecurity, offers critical insights into what the CRA means for manufacturers, retailers, and consumers.A Broad Scope: More Than Just Industrial AutomationUnlike previous security regulations that focused on specific sectors, the CRA applies to virtually all digital products. Fluchs emphasizes that if a device is digital and sold in the EU, it likely falls under the CRA's requirements. From smartwatches and baby monitors to firewalls and industrial control systems, the regulation covers a wide array of consumer and business-facing products.The CRA also extends beyond just hardware—software and services required for product functionality (such as cloud-based components) are also in scope. This broad application is part of what makes the regulation so impactful. Manufacturers now face mandatory cybersecurity requirements that will shape product design, development, and post-sale support.What the CRA RequiresThe CRA introduces mandatory cybersecurity standards across the product lifecycle. Manufacturers will need to:Ensure products are free from known, exploitable vulnerabilities at the time of release.Implement security by design, considering cybersecurity from the earliest stages of product development.Provide security patches for the product's defined lifecycle, with a minimum of five years unless justified otherwise.Maintain a vulnerability disclosure process, ensuring consumers and authorities are informed of security risks.Include cybersecurity documentation, requiring manufacturers to provide detailed security instructions to users.Fluchs notes that these requirements align with established security best practices. For businesses already committed to cybersecurity, the CRA should feel like a structured extension of what they are already doing, rather than a disruptive change.Compliance Challenges: No Detailed Checklist YetOne of the biggest concerns among manufacturers is the lack of detailed compliance guidance. While other EU regulations provide extensive technical specifications, the CRA's security requirements span just one and a half pages. This ambiguity is intentional—it allows flexibility across different industries—but it also creates uncertainty.To address this, the EU will introduce harmonized standards to help manufacturers interpret the CRA. However, with tight deadlines, many of these standards may not be ready before enforcement begins. As a result, companies will need to conduct their own cybersecurity risk assessments and demonstrate due diligence in securing their products.The Impact on Critical Infrastructure and Industrial SystemsWhile the CRA is not specifically a critical infrastructure regulation, it has major implications for industrial environments. Operators of critical systems, such as utilities and manufacturing plants, will benefit from stronger security in the components they rely on.Fluchs highlights that many security gaps in industrial environments stem from weak product security. The CRA aims to fix this by ensuring that manufacturers, rather than operators, bear the responsibility for secure-by-design components. This shift could significantly reduce cybersecurity risks for organizations that rely on complex supply chains.A Security Milestone: Holding Manufacturers AccountableThe CRA represents a fundamental shift in cybersecurity responsibility. For the first time, manufacturers, importers, and retailers must guarantee the security of their products or risk being banned from selling in the EU.Fluchs points out that while the burden of compliance is significant, the benefits for consumers and businesses will be substantial. Security-conscious companies may even gain a competitive advantage, as customers start to prioritize products that meet CRA security standards.For those in the industry wondering how strictly the EU will enforce compliance, Fluchs reassures that the goal is not to punish manufacturers for small mistakes. Instead, the EU Commission aims to improve cybersecurity without unnecessary bureaucracy.The Bottom LineThe Cyber Resilience Act is set to reshape cybersecurity expectations for digital products. While manufacturers face new compliance challenges, consumers and businesses will benefit from stronger security measures, better vulnerability management, and increased transparency.Want to learn more? Listen to the full episode of Redefining CyberSecurity with Sean Martin and Sarah Fluchs to hear more insights into the CRA and what it means for the future of cybersecurity.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/sarah-fluchs_aaand-its-official-the-cyber-resilience-activity-7250162223493300224-zECA/Adopted CRA text: https://data.consilium.europa.eu/doc/document/PE-100-2023-INIT/en/pdfA list of Sarah's blog posts to get your CRA knowledge up to speed:1️⃣ Introduction to the CRA, the CE marking, and the regulatory ecosystem around it: https://fluchsfriction.medium.com/eu-cyber-resilience-act-9e092fffbd732️⃣ Explanation how the standards ("harmonised European norms, hEN") are defined that will detail the actual cybersecurity requirements in the CRA (2023): https://fluchsfriction.medium.com/what-cybersecurity-standards-will-products-in-the-eu-soon-have-to-meet-590854ba3c8c3️⃣ Overview of the essential requirements outlined in the CRA (2024): https://fluchsfriction.medium.com/what-the-cyber-resilience-act-requires-from-manufacturers-0ee0b917d2094️⃣ Overview of the global product security regulation landscape and how the CRA fits into it (2024): https://fluchsfriction.medium.com/product-security-regulation-in-2024-93ddc6dd89005️⃣ Good-practice example for the "information and instructions to the user," one of the central documentations that need to be written for CRA compliance and the only one that must be provided to the product's users (2024): https://fluchsfriction.medium.com/how-to-be-cra-compliant-and-make-your-critical-infrastructure-clients-happy-441ecd859f52⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity: 

Redefining CyberSecurity
The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | A Conversation with Sarah Fluchs | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Mar 11, 2025 44:10


⬥GUEST⬥Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥The European Commission's Cyber Resilience Act (CRA) introduces a regulatory framework designed to improve the security of digital products sold within the European Union. In a recent episode of Redefining CyberSecurity, host Sean Martin spoke with Sarah Fluchs, Chief Technology Officer at admeritia and a member of the CRA expert group at the EU Commission. Fluchs, who has spent her career in industrial control system cybersecurity, offers critical insights into what the CRA means for manufacturers, retailers, and consumers.A Broad Scope: More Than Just Industrial AutomationUnlike previous security regulations that focused on specific sectors, the CRA applies to virtually all digital products. Fluchs emphasizes that if a device is digital and sold in the EU, it likely falls under the CRA's requirements. From smartwatches and baby monitors to firewalls and industrial control systems, the regulation covers a wide array of consumer and business-facing products.The CRA also extends beyond just hardware—software and services required for product functionality (such as cloud-based components) are also in scope. This broad application is part of what makes the regulation so impactful. Manufacturers now face mandatory cybersecurity requirements that will shape product design, development, and post-sale support.What the CRA RequiresThe CRA introduces mandatory cybersecurity standards across the product lifecycle. Manufacturers will need to:Ensure products are free from known, exploitable vulnerabilities at the time of release.Implement security by design, considering cybersecurity from the earliest stages of product development.Provide security patches for the product's defined lifecycle, with a minimum of five years unless justified otherwise.Maintain a vulnerability disclosure process, ensuring consumers and authorities are informed of security risks.Include cybersecurity documentation, requiring manufacturers to provide detailed security instructions to users.Fluchs notes that these requirements align with established security best practices. For businesses already committed to cybersecurity, the CRA should feel like a structured extension of what they are already doing, rather than a disruptive change.Compliance Challenges: No Detailed Checklist YetOne of the biggest concerns among manufacturers is the lack of detailed compliance guidance. While other EU regulations provide extensive technical specifications, the CRA's security requirements span just one and a half pages. This ambiguity is intentional—it allows flexibility across different industries—but it also creates uncertainty.To address this, the EU will introduce harmonized standards to help manufacturers interpret the CRA. However, with tight deadlines, many of these standards may not be ready before enforcement begins. As a result, companies will need to conduct their own cybersecurity risk assessments and demonstrate due diligence in securing their products.The Impact on Critical Infrastructure and Industrial SystemsWhile the CRA is not specifically a critical infrastructure regulation, it has major implications for industrial environments. Operators of critical systems, such as utilities and manufacturing plants, will benefit from stronger security in the components they rely on.Fluchs highlights that many security gaps in industrial environments stem from weak product security. The CRA aims to fix this by ensuring that manufacturers, rather than operators, bear the responsibility for secure-by-design components. This shift could significantly reduce cybersecurity risks for organizations that rely on complex supply chains.A Security Milestone: Holding Manufacturers AccountableThe CRA represents a fundamental shift in cybersecurity responsibility. For the first time, manufacturers, importers, and retailers must guarantee the security of their products or risk being banned from selling in the EU.Fluchs points out that while the burden of compliance is significant, the benefits for consumers and businesses will be substantial. Security-conscious companies may even gain a competitive advantage, as customers start to prioritize products that meet CRA security standards.For those in the industry wondering how strictly the EU will enforce compliance, Fluchs reassures that the goal is not to punish manufacturers for small mistakes. Instead, the EU Commission aims to improve cybersecurity without unnecessary bureaucracy.The Bottom LineThe Cyber Resilience Act is set to reshape cybersecurity expectations for digital products. While manufacturers face new compliance challenges, consumers and businesses will benefit from stronger security measures, better vulnerability management, and increased transparency.Want to learn more? Listen to the full episode of Redefining CyberSecurity with Sean Martin and Sarah Fluchs to hear more insights into the CRA and what it means for the future of cybersecurity.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/sarah-fluchs_aaand-its-official-the-cyber-resilience-activity-7250162223493300224-zECA/Adopted CRA text: https://data.consilium.europa.eu/doc/document/PE-100-2023-INIT/en/pdfA list of Sarah's blog posts to get your CRA knowledge up to speed:1️⃣ Introduction to the CRA, the CE marking, and the regulatory ecosystem around it: https://fluchsfriction.medium.com/eu-cyber-resilience-act-9e092fffbd732️⃣ Explanation how the standards ("harmonised European norms, hEN") are defined that will detail the actual cybersecurity requirements in the CRA (2023): https://fluchsfriction.medium.com/what-cybersecurity-standards-will-products-in-the-eu-soon-have-to-meet-590854ba3c8c3️⃣ Overview of the essential requirements outlined in the CRA (2024): https://fluchsfriction.medium.com/what-the-cyber-resilience-act-requires-from-manufacturers-0ee0b917d2094️⃣ Overview of the global product security regulation landscape and how the CRA fits into it (2024): https://fluchsfriction.medium.com/product-security-regulation-in-2024-93ddc6dd89005️⃣ Good-practice example for the "information and instructions to the user," one of the central documentations that need to be written for CRA compliance and the only one that must be provided to the product's users (2024): https://fluchsfriction.medium.com/how-to-be-cra-compliant-and-make-your-critical-infrastructure-clients-happy-441ecd859f52⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity: 

Morning Air
Why No Meat?/ Digital Security

Morning Air

Play Episode Listen Later Mar 6, 2025 48:29


3/6/25 6am CT Hour - Fr. Brice Higginbotham/ Bruno Schroeder John, Glen and Sarah give n update on Pope Francis health, President Trump and Hamas, how Ash Wednesday went and play What's That Sound. Fr. Brice breaks down why we give up meat for Fridays in Lent and how to observe this sacrifice well. Bruno explains digital security and why w should uphold Catholic values in this arena.

Autonomous IT
Teach IT – But Why Do I Need to Update? E02

Autonomous IT

Play Episode Listen Later Feb 27, 2025 2:44


Ever wonder why those software updates keep popping up? In this episode, we uncover how updates boost your security, introduce exciting new features, and keep your devices running at their best. Share it with friends, family, or coworkers who might feel overwhelmed by all things tech—help them stay safe and informed, too!Hosted by IT expert Landon Miles, the Teach IT podcast delivers bite-sized, actionable IT tips in three minutes or less. Perfect for both tech pros and beginners, each minisode simplifies complex concepts into clear, practical advice. Tune in to sharpen your IT skills and discover smarter solutions, one quick episode at a time.

Women PetPreneurs
Document Security and Mental Resilience Tips for Crisis Times

Women PetPreneurs

Play Episode Listen Later Feb 25, 2025 39:22


Welcome to "Women Petpreneurs Presents Family Readiness," where we explore the essential topics impacting our lives and businesses. I'm your host, Mary Oquendo, joined by my co-host, Kate Klasen. In today's episode, we'll dive into the crucial subject of emergency preparedness. We'll discuss the importance of having accessible identification and documents, especially during times of crisis. With recent events highlighting vulnerabilities, we'll stress why keeping IDs like passports, military IDs, and even student IDs ready is more vital than ever. We'll also explore digital solutions for storing important documents and personal anecdotes emphasizing the need for communication within families about digital access. Additionally, we'll address mental health's role in disaster recovery, offering insights and resources to help you navigate these challenging times. Stay tuned for practical tips, inspiring stories, and more on how to safeguard yourself, your business, and your furry friends.

The Final Straw Radio
Surveillance Self Defense, Encrypted Chat Apps and Securing Devices with Thorin Klosowski

The Final Straw Radio

Play Episode Listen Later Feb 16, 2025 83:37


This week, a conversation with Thorin Klosowski of the Electronic Frontier Foundation about some basic tools and ideas for keeping our information a little safer online and the Surveillance Self-Defense site, ssd.eff.org . We discuss device encryption, tor-browser, vpns, encrypted messaging apps like WhatsApp, Signal and Telegram as well as password vaults. I'm hoping this'll be the first of a few interviews to try to make digital security concepts a little more accessible. SSD.EFF.org Consumer Reports Digital Security and Privacy site (including personal planning app): https://www.consumerreports.org/digital-security-privacy/ https://www.404media.co/ https://www.theverge.com/ https://techcrunch.com/

Built In The Bluegrass
Richard Connor of LockStock Cybersecurity & Analytics

Built In The Bluegrass

Play Episode Listen Later Jan 31, 2025 42:02


In this episode of Built In the Bluegrass, we're diving into the world of cybersecurity with Rich Connor, President of LockStock Cybersecurity & Analytics. With the increasing threat of digital vulnerabilities, LockStock is on the front lines, providing cutting-edge security solutions to businesses big and small. Join us as we chat with Rich about how they're helping companies navigate the ever-evolving cybersecurity landscape, their approach to risk management, and what every entrepreneur needs to know to keep their business safe in the digital age. Tune in for insights on protecting your digital assets and securing a safer future—right here in the Bluegrass State. Find all Built In The Bluegrass links here https://linktr.ee/builtinthebluegrass We want to take a moment to thank our partner – the Kentucky Association of Manufacturers. For over 100 years, KAM has served our state's manufacturing industry through advocacy, workforce development, education, and training, as well as cost-saving benefits for members. Fighting for manufacturers is what KAM does best, representing the industry in both Frankfort and Washington, D.C. Whether it's advocacy, offering shipping discounts, or group health insurance, KAM has its members covered. Learn more and become a member by visiting www.kam.us.com

Making Money Personal
Episode 78: The Importance of Digital Security for Individuals and Businesses | Chris Conway CEJ Technologies

Making Money Personal

Play Episode Listen Later Jan 30, 2025 68:37


Maintaining digital security is vital, whether you're an individual using your computer or phone or a business using organized networks and complex systems. The sad reality is that threats exist across the vast digital environment that every one of us should be taking steps to avoid. In this episode, we're chatting with Chris Conway, owner of CEJ technologies, and security expert, about the many dangers cyber threats impose on all digital users and what kinds of systems and safeguards we can incorporate to protect ourselves and our devices.  Links: Learn more about CEJ Technologies: 395 Daniel Webster Highway, Merrimack, NH CEJ Technologies Contact Chris or his team at: 603-424-3117 Check out TCU University for financial education tips and resources!  Follow us on Facebook, Instagram and Twitter!  Learn more about Triangle Credit Union  

The Fintech Blueprint
Protecting 2,700 Customers Across 100 Million Transactions, with Socure's CTO Arun Kumar

The Fintech Blueprint

Play Episode Listen Later Jan 28, 2025 41:50


Lex interviews Arun Kumar, the CTO of Socure, an identity management and risk assessment company. In this exciting episode, Arun touches on: (1) his experience building large-scale, high-throughput, and low-latency systems at companies like Amazon and Citadel, and how he applies that expertise to the identity verification and fraud detection challenges at Socure. (2) Socure's rapid growth, serving over 2,700 customers including 9 of the top 10 U.S. banks and over 30 state agencies, processing hundreds of millions of transactions per month. (3) Socure's approach to building a real-time identity graph by aggregating signals from devices, phone numbers, IPs, and other data points to detect and prevent sophisticated fraud tactics like deepfakes and fraud GPTs. (4) The company's recent acquisition of Effectiv to simplify the integration process for customers and improve efficiency, as well as its use of Generative AI to automate various tasks. Lastly, (5) Socure's future plans to expand beyond account opening and login into transaction monitoring, as well as exploring opportunities in the growing embedded finance and digital identity spaces. MENTIONED IN THE CONVERSATION Topics: Socure, Effectiv, Citadel, Amazon, Identity management, digital identity, generative AI, deepfakes, fraud prevention, machine learning, identity verification ABOUT THE FINTECH BLUEPRINT 

KPFA - Law & Disorder w/ Cat Brooks
Digital Security Concerns Under Trump w/ EFF’s India McKinney

KPFA - Law & Disorder w/ Cat Brooks

Play Episode Listen Later Jan 28, 2025 28:23


On today's show, we explore electronic surveillance and privacy concerns under the new Trump presidency. We'll be in conversation with India McKinney, the Director of Federal Affairs with the Electronic Frontier Foundation, the leading nonprofit organization defending civil liberties in the digital world.  Read the EFF's memo to the federal government outlining technology and surveillance concerns: https://www.eff.org/press/releases/eff-sends-transition-memo-digital-policy-priorities-new-administration-and-congress — Subscribe to this podcast: https://plinkhq.com/i/1637968343?to=page Get in touch: lawanddisorder@kpfa.org Follow us on socials @LawAndDis: https://twitter.com/LawAndDis; https://www.instagram.com/lawanddis/ The post Digital Security Concerns Under Trump w/ EFF's India McKinney appeared first on KPFA.

Digital Transformation Podcast
Battling Corporate Terrorism and Cyberthreats

Digital Transformation Podcast

Play Episode Listen Later Jan 16, 2025 24:09


Richard Chasdi discusses his book “Corporate Security Crossroads” and how to respond to corporate terrorism and cyber-threats. Richard is professor and associate director of the Center for Complex and Strategic Decisions at Walsh College. He serves on the editorial board of Armed Forces & Society and Perspectives on Terrorism. He received his master's from Boston College and his doctorate in political science from Purdue. Listen for three action items you can use today. Host, Kevin Craine Do you want to be a guest? DigitalTransformationPodcast.net/guest Do you want to be a sponsor? DigitalTransformationPodcast.net/sponsor

Social Soup
Social Soup Podcast (Episode 32: Protecting Data and Peace of Mind: Key Tips for Digital Security)

Social Soup

Play Episode Listen Later Jan 10, 2025 18:15


Let's get digital! Michelle shares tips for keeping your digital accounts safe. Tune in for important advice about password protection, avoiding scams, and maintaining digital privacy. It's all about protecting data and peace of mind. What's your digital resolution this year? We'd love to hear it! If you dig our flavors, be sure to subscribe and share. That helps us out!  Connect with Michelle on LinkedIn: ⁠linkedin.com/in/michelledattilio⁠  Learn more about sōsh! Visit our website and reach out at: ⁠getsosh.com ⁠   Meet us here next week for another pot of Social Soup!

Haunt Weekly
Haunt Weekly - Episode 470 - Digital Security for Haunts

Haunt Weekly

Play Episode Listen Later Jan 6, 2025 54:15 Transcription Available


Send us a textThis week on Haunt Weekly, we're talking about digital security and what you can do to ensure that you and your haunt are safe from professional hackers and drunken customers alike.Haunts are in an unusual place when it comes to digital security. They are very exposed but, as small businesses, don't usually have the expertise or the manpower to lock things down.Fortunately, we're here to help with a few simple things you can do to improve your digital security.This Week's Episode Includes:1. Intro2. Housekeeping3. Question of the Week4. Conference Reminders5. How I Drunkenly Sabotaged a Bar's TVs6. 5 Areas of Cybersecurity Concern7. ConclusionsAll in all, this is one episode that you do NOT want to miss!Get in Touch and Follow Us!Facebook: @HauntWeeklyTwitter: @HauntWeeklyYouTube: @HauntWeeklyEmail: info@hauntweekly.com

Security Conversations
US government's VPN advice, dropping bombs on ransomware gangs

Security Conversations

Play Episode Listen Later Dec 23, 2024 118:40


Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

StarTalk Radio
The Power of Probability with Alex Cosoi

StarTalk Radio

Play Episode Listen Later Nov 22, 2024 50:40


What is the probability of our existence? Neil deGrasse Tyson and cohosts Chuck Nice and Gary O'Reilly learn about the probabilities all around us, the idea of risk, and how they factor into our own security in the digital age with cybersecurity expert Alex Cosoi.NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/the-power-of-probability-with-alex-cosoi/Thanks to our Patrons Ben Jackson, James Hall, XYZ, Rick Reyes, Brian Gilstrap, Jeffrey Silva, Simon Schwartz, Lori Thomas, Sally Sapp, Alberto.p, Kenneth W Miller, Richard Hart, Patience, Brent Fraliex, 4 Light Years Away, Michele Raiola, Tess Gleason, Connie Schreiber, Metthew Tucker, Hickory Ogle, and Aldeeep for supporting us this week. Subscribe to SiriusXM Podcasts+ on Apple Podcasts to listen to new episodes ad-free and a whole week early.

Neurocareers: How to be successful in STEM?
Brainwave Authentication & Neurotech Security with Violeta Tulceanu

Neurocareers: How to be successful in STEM?

Play Episode Listen Later Nov 22, 2024 86:09


What if your brainwaves could unlock doors, sign documents, and protect your most sensitive information without ever touching a keypad or fingerprint scanner? Welcome to a mind-bending episode of Neurocareers: Doing the Impossible! hosted by me, Milena Korostenskaja, a neurocareers coach and your guide into the world of neurotech! Today, I'm delighted to interview Violeta Tulceanu, a pioneering researcher from KU Leuven, Belgium, who stands at the forefront of brainwave authentication and neurotechnology security. In this episode, we dive deep into a world where your thoughts could become the next frontier in cybersecurity. But here's the kicker: what if your brain password revealed more than your identity? What if it exposed secrets about your emotions, health, or mental state? The stakes are incredibly high, and Violeta is here to unravel the fascinating—and complex—possibilities of using the human mind as a digital signature. Together, we'll discuss the career challenges she's encountered in this cutting-edge field, explore the ethical dilemmas of mind security, and tackle the technological hurdles of making brainwave authentication reliable and secure. Violeta will also share her insights into the evolving world of neuroethics and the philosophical questions that arise when we treat thoughts as credentials. Prepare to be amazed and maybe slightly unsettled as we journey into the thrilling—and sometimes unnerving—future of brain-computer interfaces and digital security. Tune in to Neurocareers: Doing the Impossible! Join us as we unlock the secrets of the mind with Violeta Tulceanu! This episode is a must-listen for anyone curious about the ever-evolving intersection of neuroscience, technology, and cybersecurity. About the Podcast Guest: Affiliation: Violeta Tulceanu is a doctoral researcher at KU Leuven, in the Computer Security and Industrial Cryptography (COSIC) department, working under the supervision of prof. Bart Preneel. KU Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium. Violeta has a cryptography, neuroscience, AI background, and a dash of philosophy. Her research focuses on brainwave authentication, decoding and formally modeling thoughts, emotions, and cognitive processes, security of neurotechnologies and neurorights, pre-clinical diagnosis and monitoring of the collective mind, the applications of neurotechnologies in state security, the role of neurosemantics and neurotech in group 'war games,' creating dissent, rebellion and establishing or challenging the legitimacy of leadership. Also, she has an interest in brain-to-brain communications.  If you are interested in collaboration, I look forward to hearing from you! Contact information: vtulcean@esat.kuleuven.be Job opening for master student: https://www.ntxl.org/positions/microcontroller-expert---medtronic About the Podcast Host: The Neurocareers podcast is brought to you by The Institute of Neuroapproaches (https://www.neuroapproaches.org/) and its founder, Milena Korostenskaja, Ph.D. (Dr. K), a career coach for people in neuroscience and neurotechnologies. As a professional coach with a background in neurotech and Brain-Computer Interfaces, Dr. K understands the unique challenges and opportunities job applicants face in this field and can provide personalized coaching and support to help you succeed. Here's what you'll get with one-on-one coaching sessions from Dr. K: Identification and pursuit of career goals Guidance on job search strategies, resume, and cover letter development Neurotech / neuroscience job interview preparation and practice Networking strategies to connect with professionals in the field of neuroscience and neurotechnologies Ongoing support and guidance to help you stay on track and achieve your goals You can always schedule a free neurocareer consultation/coaching session with Dr. K at https://neuroapproaches.as.me/free-neurocareer-consultation Subscribe to our Nerocareers Newsletter to stay on top of all our cool neurocareers news at updates https://www.neuroapproaches.org/neurocareers-news © 2024 Neurocareers: Doing the Impossible! All rights reserved.  

ITSPmagazine | Technology. Cybersecurity. Society
The Future of Cybersecurity at the Australian Cyber Conference 2024, in Melbourne | A Pre-Event Conversation with Akash Mittal | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 7, 2024 34:44


Guest: Akash Mittal, CISO, Group Security, Sumitomo Forestry AustraliaOn LinkedIn | https://www.linkedin.com/in/akashgmittal/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesWelcome to Melbourne for AU Cyber Con 2024From November 26th to 28th, Melbourne will transform into the epicenter of cybersecurity as it hosts AU Cyber Con 2024. Organized by the Australian Information Security Association (AISA), the conference brings a diverse lineup of global thought leaders and innovators to the stage, all focused on shaping the next wave of cybersecurity.Conference Highlights and ThemeThe theme, "The Future is Now," reflects the urgent need for organizations and individuals alike to adapt to our rapidly changing digital landscape. Over three days, the event will feature 440+ speakers and 350 sessions, offering a deep dive into the intersection of cybersecurity, society, and technology.Engage with Industry LeadersThis year's lineup includes top voices in cybersecurity and beyond, like former Facebook CSO Joe Sullivan, astronaut Jose Hernandez, and security icon Mikko Hypponen. With appearances from cultural figures such as actor Kal Penn, the event will highlight the broader societal impact of cybersecurity, demonstrating how it affects everything from the arts to government policy.Interactive Villages and Hands-On WorkshopsAU Cyber Con goes beyond the stage with interactive villages like the Careers Village, Lockpicking Village, and AI Village. Here, attendees can gain hands-on experience with everything from physical security tools to AI applications and prompt injections. For those interested in personal brand-building, industry insights, or getting into the nuts and bolts of cybersecurity, these workshops offer something for everyone.Spotlight on Sponsors and ExhibitorsWith support from over 150 exhibitors, the event provides a unique opportunity for attendees to connect with leading companies and uncover the latest in cybersecurity tech. For exhibitors, it's a valuable chance to meet professionals tackling real-world cybersecurity challenges head-on.Fostering Global CollaborationAU Cyber Con 2024 emphasizes the need for global teamwork to advance cybersecurity. Government representatives and international delegates will discuss strategic initiatives and regulatory advancements to strengthen cyber resilience. This gathering is the perfect platform to build connections, share ideas, and work toward a unified digital security future.Looking Ahead: Coverage from ITSPmagazineSean Martin and Marco Ciappelli will be covering AU Cyber Con in real time. Join us for pre-event discussions, live updates, and post-event insights—all crafted to keep you connected to the latest innovations and collaborations shaping the future of cybersecurity.____________________________This Episode's SponsorsTHREATLOCKER: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/asia24Learn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More

Community IT Innovators Nonprofit Technology Topics
Cybersecurity Readiness for Nonprofits Playbook with Matt Eshleman pt 2

Community IT Innovators Nonprofit Technology Topics

Play Episode Listen Later Nov 1, 2024 29:39


Is your nonprofit struggling to understand cybersecurity fundamentals? Are you unsure what level of protection you need or can afford?In part 1, Matt discussed the cybersecurity landscape for nonprofits and some of the changes that prompted this update to the Playbook. In pt 2, Matt walks through the "foundational" suggestions and takes audience questions.October is Cybersecurity month! Community IT Chief Technology Officer Matt Eshleman walked through our revised Playbook on Cybersecurity Readiness for Nonprofits in a webinar designed to get your nonprofit prepped to face cyberliability insurance requirements and ever-evolving threats. Learn the Community IT approach to cybersecurity and how even small changes will protect your organization against threats big and small. 2024 Updated Playbook on Cybersecurity Readiness for Nonprofits – DownloadMatt shares updated advice on security improvements that provide protection against the most common attacks. You will learn about AI and cybersecurity, best practices in staff training, how to qualify for cyber insurance, and why you need written IT documentation and governance policies. Do you have an approach to compliance? Do you know if your staff are following your cybersecurity policies and procedures? With the rise of automated and realistic AI tools and more sophisticated methods of identity and email verification, your nonprofit can't afford not to prioritize cybersecurity. It may be difficult to qualify for business insurance if you don't complete certain checklists of cybersecurity precautions. But if you don't know where to start, it can be tempting to delay indefinitely.This Playbook gives you a simple structure to understand how to think about cybersecurity risks and costs for your nonprofit. Matt's presentation gives you tips you can put in place quickly and train your staff on immediately. You can download the new Playbook for free here.This webinar is appropriate for nonprofit executives, managers, accounting, development, and nonprofit IT personnel – and as with all our webinars, it is appropriate for a varied audience.Community IT is proudly vendor-agnostic and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community.Presenter:As the Chief Technology Officer at Community IT and our resident cybersecurity expert, Matthew Eshleman is responsible for shaping Community IT's strategy around the technology platforms used by organizations to be secure and productive. With a deep background in network infrastructure, he fundamentally understands how technology works and interoperates both in the office and in the cloud.Matt is a frequent speaker at NTEN events and has presented at the Inside NGO conference, Non-Profit Risk Management Summit and Credit Builders Alliance Symposium. He is also the session designer and trainer for TechSoup's Digital Security course.  _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.

Community IT Innovators Nonprofit Technology Topics
Cybersecurity Readiness for Nonprofits Playbook with Matt Eshleman pt 1

Community IT Innovators Nonprofit Technology Topics

Play Episode Listen Later Oct 25, 2024 30:47


Is your nonprofit struggling to understand cybersecurity fundamentals? Are you unsure what level of protection you need or can afford?October is Cybersecurity month! Community IT Chief Technology Officer Matt Eshleman walked through our revised Playbook on Cybersecurity Readiness for Nonprofits in a webinar designed to get your nonprofit prepped to face cyberliability insurance requirements and ever-evolving threats. Learn the Community IT approach to cybersecurity and how even small changes will protect your organization against threats big and small. 2024 Updated Playbook on Cybersecurity Readiness for Nonprofits – DownloadMatt shares updated advice on security improvements that provide protection against the most common attacks. You will learn about AI and cybersecurity, best practices in staff training, how to qualify for cyber insurance, and why you need written IT documentation and governance policies. Do you have an approach to compliance? Do you know if your staff are following your cybersecurity policies and procedures? With the rise of automated and realistic AI tools and more sophisticated methods of identity and email verification, your nonprofit can't afford not to prioritize cybersecurity. It may be difficult to qualify for business insurance if you don't complete certain checklists of cybersecurity precautions. But if you don't know where to start, it can be tempting to delay indefinitely.This Playbook gives you a simple structure to understand how to think about cybersecurity risks and costs for your nonprofit. Matt's presentation gives you tips you can put in place quickly and train your staff on immediately. You can download the new Playbook for free here.This webinar is appropriate for nonprofit executives, managers, accounting, development, and nonprofit IT personnel – and as with all our webinars, it is appropriate for a varied audience.Community IT is proudly vendor-agnostic and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community.Presenter:As the Chief Technology Officer at Community IT and our resident cybersecurity expert, Matthew Eshleman is responsible for shaping Community IT's strategy around the technology platforms used by organizations to be secure and productive. With a deep background in network infrastructure, he fundamentally understands how technology works and interoperates both in the office and in the cloud.Matt joined Community IT as an intern in the summer of 2000 and after finishing his dual degrees in Computer Science and Computer Information Systems at Eastern Mennonite University, he rejoined Community IT as a network administrator in January of 2001. Matt has steadily progressed up at Community IT and while working full time received his MBA from the Carey School of Business at Johns Hopkins University.Matt is a frequent speaker at NTEN events and has presented at the Inside NGO conference, Non-Profit Risk Management Summit and Credit Builders Alliance Symposium. He is also the session designer and trainer for TechSoup's Digital Security course.  _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.

The Mint Condition: NFT and Digital Collectibles Entertainment

In this byte-sized episode of Mid Mic Daily Bite, AI versions of hosts Bunchu and Chamber dive into the wild story of a ByteDance intern allegedly sabotaging the company's AI model training. They explore the implications for AI security, ethics, and the future of tech giants. From the unexpected risks posed by internal actors to the potential fallout of such breaches, the discussion takes a deep dive into the vulnerabilities of modern AI development. Plus, don't miss the debut of the new segment, AI Security Theater, where the hosts humorously reimagine the breach in a "Choose Your Own Adventure" style. Prepare for tech thrills, laughs, and some serious questions about AI safety! Follow Us:Website: https://midmiccrisis.com/  YouTube: https://www.youtube.com/@midmiccrisisInstagram: https://www.instagram.com/midmiccrisis/?hl=enTikTok: https://www.tiktok.com/@mid.mic.crisis?lang=enTwitter: https://twitter.com/MidMicCrisisNewsletter: https://mid-mic-crisis-newsletter.beehiiv.com/subscribeMMC Push Pass: https://ks-pages-119byl.web.app/pass/66db3c111db9a79db7fdaafeFireBrain AI: https://www.skool.com/firebrainPowered by @dGenNetworkWebsite: https://dgen.network/Support the show

Title Agents Podcast
Cybersecurity Tactics to Hack-Proof Your Title Business with Genady Vishnevetsky

Title Agents Podcast

Play Episode Listen Later Oct 22, 2024 54:15


In an era where digital threats are more pervasive than ever, the title industry is no stranger to these risks. So, Genady Vishnevetsky is on the show to share the latest tactics cybercriminals use to infiltrate title companies and the strategies to ensure your clients' sensitive data remains impenetrable. Arm yourself with the knowledge and tools to outsmart the hackers and safeguard your business in the face of relentless cyber threats by tuning in!     What you'll learn from this episode Benefits of moving from local servers to cloud-based systems for your business Top cybersecurity threats in the title industry and what agents should do about it  Reasons why you should implement Multi-Factor Authentication (MFA) across all systems The value of continuous, tailored, and role-specific cybersecurity training programs for your employees How to create a cybersecurity incident response plan and why your company should have one     Resources mentioned in this episode  Open Forum - American Land Title Association KnowBe4® Cofense SANS Institute CISA  Perplexity AI Microsoft 365  Google Suite Gmail Yahoo Mail     About Genady Vishnevetsky Genady serves as CISO for Stewart Information Services Corporation, a leading provider of real estate services. As an established leader with experience in building successful security programs and developing defenses against emerging threats, Vishnevetsky leads security, governance, and compliance programs for global enterprises. He is an active, contributing member of the Cybersecurity community, a frequent speaker at security events and conferences, a security advocate, blogger, and influencer.     Connect with Genady Website: Stewart LinkedIn: Genady V.     Connect With Us Love what you're hearing? Don't miss an episode! Follow us on our social media channels and stay connected.    Explore more on our website: www.alltechnational.com/podcast Stay updated with our newsletter: www.mochoumil.com Follow Mo on LinkedIn: Mo Choumil  

The CyberWire
Key player unmasked in global ransomware takedown.

The CyberWire

Play Episode Listen Later Oct 8, 2024 34:02


Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel Prize.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang Chung hwang, Palo Alto Networks VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research, discuss the pressing challenges of securing Operational Technology (OT) environments.  Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David, Michela and Qiang's full discussion, check it out here.  Selected Reading Police unmask Aleksandr Ryzhenkov as Evil Corp member and LockBit affiliate (The Record) American Water, the largest water utility in US, is targeted by a cyberattack (Associated Press) US Warns of Foreign Interference in Congressional Races (Infosecurity Magazine) US Judge Blocks California's Law Curbing Election Deepfakes (BankInfo Security) Global Police Track Human Traffickers in Online Crackdown (Infosecurity Magazine) Recently spotted Trinity ransomware spurs federal warning to healthcare industry (The Record) Qualcomm patches high-severity zero-day exploited in attacks (Bleeping Computer) ADT says hacker stole encrypted internal employee data after compromising business partner (The Record) North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques (Cyber Security News) ‘Godfather of AI' shares Nobel Prize in physics for work on machine learning (CNN) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Fearless Mindset
Episode 223 - The Future of Security: AI, Global Economics, and Preparedness | Brittany Galli (Part 2)

The Fearless Mindset

Play Episode Listen Later Oct 7, 2024 26:33


In this episode, Mark Ledlow is joined by Brittany Galli, a leading figure in the security industry with a notable focus on promoting women in security, and a C-Suite Advisor & Strategist at BFG Ventures. They discuss a range of topics essential to security and executive protection. They discuss the role of AI in transforming security operations, including the potential of AI-generated intelligence reports. The dialogue covers the current economic climate, including inflation, corporate layoffs, and the financial strain on middle-class families, and relates these issues back to security concerns. They also touch upon geopolitical threats, such as China's global economic strategy, and the importance of long-term planning for national security. The episode concludes with reflections on upcoming elections, their impact on security, and preparations being made by the executive protection industry. Lastly, Mark highlights the Women in Security gala event in Orlando and encourages listeners to show their support. Enjoy an insightful conversation packed with expert analysis and forward-thinking perspectives.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAI Implementation in Security: AI has the potential to significantly streamline security operations, enabling faster and more accurate threat assessments.Impact on Jobs: AI will modify the role of intel analysts, making it more strategic rather than simply data-gathering.Human Trafficking Concerns: There's a focus on leveraging technology and global-scale databases to combat and track human trafficking more effectively.Economic Challenges: Inflation and cost of living have put middle and lower-class families under significant financial pressure.Election Preparedness: Companies in the security sector are preparing for the potential chaos surrounding upcoming elections, with emphasis on maintaining operational readiness and budget management.Residential Security Spike: Increased nervousness and referrals have led to a spike in demand for residential security services.Global Economic Strategies: There's a critical need for long-term planning and strategic economic policies in the U.S. to address national debt and future financial stability.Corporate Budget Cuts: Many companies are cutting budgets, including security spending, due to economic pressures and missed earnings.Networking in Security: Emphasized the importance of connections and referrals within the industry for business growth and stability.QUOTES"AI will make us finally catch up technologically where other industries have already excelled for years." - Brittany Galli"Technology creates efficiencies for humans to use, spending less time on data gathering." - Brittany Galli"Security, we can only go up from where we are and we just need to jump generations in software." - Brittany Galli"Human trafficking is not slowing down. It's like a trillion-dollar business." - Mark Ledlow"Chaos is an opportunity, unfortunately." - Mark Ledlow"When large Fortune 100s start missing their earnings, that's when inflation finally caught up." - Brittany GalliGet to know more about Brittany Galli:LinkedIn: https://www.linkedin.com/in/brittanygalli/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Afternoons with Helen Farmer
Are you eating a banana wrong?

Afternoons with Helen Farmer

Play Episode Listen Later Oct 3, 2024 27:41


A viral etiquette expert says you might be…See omnystudio.com/listener for privacy information.

The Fearless Mindset
Episode 220 - Empowering Women in Security | Brittany Galli (Part 1)

The Fearless Mindset

Play Episode Listen Later Sep 10, 2024 29:32


In this episode, Mark Ledlow is joined by Brittany Galli, a leading figure in the security industry with a notable focus on promoting women in security, and a C-Suite Advisor & Strategist at BFG Ventures. They discuss the importance of diversity, the challenges and strategies for women in the industry, and how AI is revolutionizing security practices. Brittany shares her journey and insights on creating impactful networking opportunities and achieving a balanced representation of genders in leadership roles. They also highlight the upcoming Women in Security Gala at GSX in Florida, which aims to foster community and recognition for women in this field.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSWomen in Security: Brittany Galli's entry into the security industry and her significant contributions to the Women in Security movement. She emphasizes the need for diverse and creative thinking in the field.Leveraging AI: Brittany discusses the future of security jobs, emphasizing the importance of AI and suggesting that new entrants to the field should focus on AI tools and their applications in security.Industry Networking: The inherent value and relational strength of the security industry, which Brittany highlights as being driven by courageous and brave individuals.Engagement at Conferences: Brittany addresses the generational gap in conference participation and suggests enhanced virtual and global networking opportunities.Ongoing Initiatives: Discussion about the upcoming Women in Security Gala, its background, and its importance for networking and recognition within the community.Career Longevity in Security: Insight into challenges faced by young professionals and women in the industry, and the need for initiatives to retain this talent.Consulting in Security: Brittany's personal experience in the security tech startup world and her current consulting role, focusing on C-suite executive strategies and security education.AI and Future Trends: An analysis of AI's growing role in the security sector and its projected impact on the industry, emphasizing education and the integration of AI as a tool rather than a replacement.QUOTES"It's all about selling your ideas with the risk of not doing it or the cost of not doing it.""You need to be the knowledge expert of the top 10 tools that are out there.""It's about catching up with the younger generation and figuring out ways to just deepen the relationships virtually.""The turnover is really high. They just don't see value in the industry that they're in.""I've heard from many mentors: You sell with risk or budget or cost."Get to know more about Brittany Galli:LinkedIn: https://www.linkedin.com/in/brittanygalli/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Sean White's Solar and Energy Storage Podcast
Dave Maher: Digital Security, CTO Intertrust

Sean White's Solar and Energy Storage Podcast

Play Episode Listen Later Sep 1, 2024 41:42


Title: Dave Maher: Digital Security, CTO Intertrust   Description: David Maher has over 30 years of experience in secure computing and is responsible for Research and Development at Intertrust. In addition, he is currently President of Seacert Corporation, a certificate authority for the Internet of Things, President of WhiteCryption Corporation, a developer of application security software, and Co-chairman of the Marlin Trust Management Organization which oversees the world's only independent digital rights management ecosystem. Before joining Intertrust in 1999, Maher was chief scientist for AT&T Secure Communications Systems, Head of the Secure Systems Research Department, and security architect for AT&T's Internet services platform. After joining Bell Labs in 1981, he developed secure communications, information vending, and e-commerce systems. He was Chief Architect for AT&T's STU-III secure voice, data, and video products used by the White House and Department of Defense for top-secret communications. In 1992, Maher became a Bell Labs Fellow in recognition of his accomplishments in communications security. Maher holds dozens of patents in secure computing; has published papers in the fields of mathematics and computer science; and has consulted with the National Science Foundation, National Security Agency, National Institute of Standards and Technology, and the Congressional Office of Technology Assessment. Maher holds a Ph.D. in mathematics from Lehigh University. He has taught electrical engineering, mathematics, and computer science at several institutions.   CTO of Intertrust Dave Maher, was recently selected to join the nation's leading artificial intelligence (AI) stakeholders to participate in a Department of Commerce initiative established by NIST. Dave can discuss the electric demands of AI and what innovative energy resource will save the electric grid.   Topics: VPP = Virtual Power Plants AI Safety Institute Consortium Using AI to optimize energy systems Hash Functionality Blockchain Bitcoin Satoshi Nakamoto Hal Finney Stuart Haber Diffie–Hellman Soviet Union Transatlantic cable US-UK wartime communications Secure Systems Design Cyber attack prevention Data Communication Digital Communication Zero Trust Architectures Quantum Computing Operational Technology Systems SCADA = Supervisory Control and Data Acquisition TEIA = Trusted Energy Interoperability Alliance GCHQ = Government Communications Headquarters NSA = National Security Agency Asset Protection Dual Use Technologies   Check him out here: Dave's email address: dpm@intertrust.com Intertrust Website: https://www.intertrust.com TEIA Website: https://www.trusted-energy.org   Learn more at www.solarSEAN.com and be sure to get NABCEP certified by taking Sean's classes at www.heatspring.com/sean

Cyber Security Today
Deepfake Technology advancements pose a real and present threat: Cyber Security Today for Friday, August 16, 2024

Cyber Security Today

Play Episode Listen Later Aug 16, 2024 6:02 Transcription Available


Cybersecurity Insights: Paris Olympics and Deepfake Technologies In this episode, host Jim Love discusses proactive cybersecurity measures taken during the Paris 2024 Olympics to combat threats such as domain abuse, counterfeit shops, unauthorized live streaming, cryptocurrency scams, and betting fraud. He highlights a report from before AI on pre-Olympic threats and emphasizes the importance of relying on official sources. Additionally, Love covers advancements in deepfake technologies, including new offerings like Hey Gen, Elon Musk's GROK, and the open-source Deep Live Cam, which raise significant concerns about digital impersonation and fraud. Simple verification strategies, like safe words, are suggested as countermeasures as these technologies become more accessible. Tune in for a Week in Review panel on these topics. 00:00 Introduction and Overview 00:23 Cybersecurity Measures for the Paris Olympics 00:53 Key Findings from the Before AI Report 01:55 Proactive Measures and Advice for Viewers 02:48 Deep Fake Technology Demonstrations at DEF CON 03:54 Concerns Over Deep Live Cam and Digital Security 05:32 Ethical Implications and Future Considerations 05:40 Conclusion and Week in Review Preview

Inner Edison Podcast by Ed Parcaut
Enhancing Security: Protecting Your Identity and Finances with Colin Sanburg

Inner Edison Podcast by Ed Parcaut

Play Episode Listen Later Aug 13, 2024 30:49


Welcome to another insightful episode of the Inner Edison Podcast! In this week's episode, Ed sits down with serial entrepreneur Colin Sanburg to discuss the critical importance of securing both personal and business information in today's digital age.

ITSPmagazine | Technology. Cybersecurity. Society
From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 9, 2024 31:28


In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.Learn more about BlackCloak:https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more.Guest: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakView all of our Black Hat USA  2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals | Part 2 of 3 | A Conversation with Kush Sharma | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 5, 2024 45:42


Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario)On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin___________________________Episode NotesIn this part two of the three-part series on The Redefining CyberSecurity Podcast, host Sean Martin is joined by Kush Sharma to discuss the critical topic of building a Chief Information Security Officer (CISO) office from the ground up. Both speakers bring invaluable insights from their extensive experiences, illustrating key points and real-world scenarios to help organizations navigate the complexities of cybersecurity and business transformation.Sean kicks off the conversation by emphasizing the strategic role of the CISO in business transformation. He explains that a successful CISO not only secures what the business wants to create but also contributes to developing a powerful and secure business. He points out that CISOs often have a unique perspective, experience, and data that can significantly impact the way business processes are transformed and managed.Kush expands on this by highlighting the need for adaptability and a mindset of continuous change. He shares that CISOs should view their organization as a business function solely dedicated to protecting assets. He uses examples to demonstrate how missions change every few years due to the rapid evolution of technology and processes, making it essential for security teams to pivot and adjust their strategies accordingly.Kush stresses the importance of collaboration across different teams—from digital to physical—and notes that a key to successful security management is building a culture that is adaptable and aligned with the business's changing objectives. One of the most interesting points brought up is the significance of involving security from the outset of any new project.Sean and Kush discuss the importance of integrating the CISO into discussions around business requirements, system architecture, and technology selection. By being involved early, CISOs can help ensure that the organization makes informed decisions that can save time, reduce risks, and ultimately contribute to a more secure business environment.Another critical aspect discussed is the approach to risk management. Kush describes a structured method where security teams provide options and recommendations rather than outright saying 'no' to business requests. He mentions the use of risk acceptance forms, which require high-level sign-offs, thus ensuring that decision-makers are fully aware of the risks involved and are accountable for them. This transparency fosters a sense of shared responsibility and encourages more informed decision-making.Both Sean and Kush provide a comprehensive look at the evolving role of the CISO. They make it clear that today's CISOs need to be strategic thinkers, skilled negotiators, and effective communicators to successfully lead their organizations through the complexities of modern cybersecurity challenges. The insights shared in this episode are invaluable for anyone looking to understand the multifaceted responsibilities of a CISO and the indispensable contributions they make to business success.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

AI, Government, and the Future by Alan Pentz
Combating Deepfakes and Misinformation: Insights from Steg AI's Eric Wengrowski

AI, Government, and the Future by Alan Pentz

Play Episode Listen Later Jul 31, 2024 40:05


In this episode of AI, Government, and the Future, host Marc Leh is joined by Eric Wengrowski, co-founder and CEO of Steg AI, to discuss the critical role of AI in digital watermarking and authentication. They explore how Steg AI's technology can combat deepfakes, protect against data leaks, and ensure the integrity of government communications in an era of rapidly advancing AI capabilities.

ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity Leadership: AL, Burnout, and Success Strategies | A Conversation with Jack Leidecker | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 9, 2024 29:44


Firearms Radio Network (All Shows)
ZERT Coffee & Chaos 70 – CDK Global Cyber Attack: Importance Of Digital Security

Firearms Radio Network (All Shows)

Play Episode Listen Later Jul 4, 2024


If you are keeping up on current events it may be hard to see things that are not focused on the political atmosphere right now, but there are always things happening that might directly impact you.  Today we bring the national cyber hack to CDK Global to the forefront and do a little dive into […] The post ZERT Coffee & Chaos 70 – CDK Global Cyber Attack: Importance Of Digital Security appeared first on Firearms Radio Network.

The Tim Ferriss Show
#712: The Random Show — 2024 New Year's Resolutions, Tim's 30-Day No-Caffeine Experiment, Mental Health Breakthroughs, AI Upheaval, Dealmaking and Advising for Startups, The Next-Gen of Note-Taking, Digital Security Tips, and Much More

The Tim Ferriss Show

Play Episode Listen Later Dec 27, 2023 166:53


Brought to you by Wealthfront high-yield savings account; AG1 all-in-one nutritional supplement; and Shopify global commerce platform, providing tools to start, grow, market, and manage a retail business. Technologist, serial entrepreneur, world-class investor, self-experimenter, and all-around wild and crazy guy Kevin Rose (@KevinRose) rejoins me for another episode of The Random Show!Please enjoy!P.S. Links to everything discussed: https://tim.blog/2023/12/27/the-random-show-2024-new-years-resolutions/*This episode is brought to you by Shopify! Shopify is one of my favorite platforms and one of my favorite companies. Shopify is designed for anyone to sell anywhere, giving entrepreneurs the resources once reserved for big business. In no time flat, you can have a great-looking online store that brings your ideas to life, and you can have the tools to manage your day-to-day and drive sales. No coding or design experience required.Go to shopify.com/tim to sign up for a one-dollar-per-month trial period. It's a great deal for a great service, so I encourage you to check it out. Take your business to the next level today by visiting shopify.com/tim.*This episode is also brought to you by Wealthfront! Wealthfront is an app that helps you save and invest your money. Right now, you can earn 5% APY—that's the Annual Percentage Yield—with the Wealthfront Cash Account. That's more than ten times more interest than if you left your money in a savings account at the average bank, according to FDIC.gov. It takes just a few minutes to sign up, and then you'll immediately start earning 5% interest on your savings. And when you open an account today, you'll get an extra fifty-dollar bonus with a deposit of five hundred dollars or more. Visit Wealthfront.com/Tim to get started.*This episode is also brought to you by AG1! I get asked all the time, “If you could use only one supplement, what would it be?” My answer is usually AG1, my all-in-one nutritional insurance. I recommended it in The 4-Hour Body in 2010 and did not get paid to do so. I do my best with nutrient-dense meals, of course, but AG1 further covers my bases with vitamins, minerals, and whole-food-sourced micronutrients that support gut health and the immune system. Right now, you'll get a 1-year supply of Vitamin D free with your first subscription purchase—a vital nutrient for a strong immune system and strong bones. Visit DrinkAG1.com/Tim to claim this special offer today and receive your 1-year supply of Vitamin D (and 5 free AG1 travel packs) with your first subscription purchase! That's up to a one-year supply of Vitamin D as added value when you try their delicious and comprehensive daily, foundational nutrition supplement that supports whole-body health.*[04:57] Tequila disclosures and investment discourse.[10:42] Startup advisor advice.[18:40] The hit rate of past New Year's resolutions.[20:13] Henry Shukman's new meditation app: The Way.[22:44] An overlooked advantage for the early investor.[24:15] Saucelessness and second brains.[27:41] Protecting your phone's collage of schwanzes.[34:20] Privacy and liability concerns in an AI-guided world.[40:42] Minimalist delegation, foot faults, and surrender.[46:30] Quick, creative collaborations.[51:39] My post-holiday physical reboot.[59:02] Kevin's physical reboot.[1:03:18] Taking a break from caffeine, alcohol, sex, and sweetness.[1:16:26] Cacao ceremonies and perilous tobacco cocktails.[1:22:18] Radical Acceptance and the origin of TimTim.[1:24:34] How NFTs drove Kevin to ketamine.[1:57:09] Kevin's robot-enhanced Tyler Hobbs tattoo.[2:02:45] What kind of tattoo might I get, and why?[2:09:11] Advice for our former (and current) versions.[2:21:25] Ayahuasca agony alleviation and alternatives.[2:34:07] Gratitude and parting thoughts.*For show notes and past guests on The Tim Ferriss Show, please visit tim.blog/podcast.For deals from sponsors of The Tim Ferriss Show, please visit tim.blog/podcast-sponsorsSign up for Tim's email newsletter (5-Bullet Friday) at tim.blog/friday.For transcripts of episodes, go to tim.blog/transcripts.Discover Tim's books: tim.blog/books.Follow Tim:Twitter: twitter.com/tferriss Instagram: instagram.com/timferrissYouTube: youtube.com/timferrissFacebook: facebook.com/timferriss LinkedIn: linkedin.com/in/timferrissPast guests on The Tim Ferriss Show include Jerry Seinfeld, Hugh Jackman, Dr. Jane Goodall, LeBron James, Kevin Hart, Doris Kearns Goodwin, Jamie Foxx, Matthew McConaughey, Esther Perel, Elizabeth Gilbert, Terry Crews, Sia, Yuval Noah Harari, Malcolm Gladwell, Madeleine Albright, Cheryl Strayed, Jim Collins, Mary Karr, Maria Popova, Sam Harris, Michael Phelps, Bob Iger, Edward Norton, Arnold Schwarzenegger, Neil Strauss, Ken Burns, Maria Sharapova, Marc Andreessen, Neil Gaiman, Neil de Grasse Tyson, Jocko Willink, Daniel Ek, Kelly Slater, Dr. Peter Attia, Seth Godin, Howard Marks, Dr. Brené Brown, Eric Schmidt, Michael Lewis, Joe Gebbia, Michael Pollan, Dr. Jordan Peterson, Vince Vaughn, Brian Koppelman, Ramit Sethi, Dax Shepard, Tony Robbins, Jim Dethmer, Dan Harris, Ray Dalio, Naval Ravikant, Vitalik Buterin, Elizabeth Lesser, Amanda Palmer, Katie Haun, Sir Richard Branson, Chuck Palahniuk, Arianna Huffington, Reid Hoffman, Bill Burr, Whitney Cummings, Rick Rubin, Dr. Vivek Murthy, Darren Aronofsky, Margaret Atwood, Mark Zuckerberg, Peter Thiel, Dr. Gabor Maté, Anne Lamott, Sarah Silverman, Dr. Andrew Huberman, and many more.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

new year ai mental health advice gratitude entrepreneurship resolutions startups lebron james productivity protecting experiments privacy mark zuckerberg tony robbins arnold schwarzenegger next gen kevin hart shopify jordan peterson richard branson tequila vitamin d matthew mcconaughey ayahuasca hugh jackman jamie foxx tim ferriss breakthroughs seth godin neil gaiman jerry seinfeld bren brown malcolm gladwell sia minimalists bill burr neil degrasse tyson peter thiel bob iger margaret atwood sam harris ray dalio elizabeth gilbert michael phelps cacao terry crews vince vaughn jocko willink fdic jane goodall edward norton yuval noah harari ken burns darren aronofsky rick rubin jim collins advising technologists arianna huffington sarah silverman michael lewis upheaval esther perel michael pollan andrew huberman radical acceptance gabor mat reid hoffman eric schmidt dax shepard naval ravikant ramit sethi marc andreessen whitney cummings dan harris anne lamott peter attia lifestyle design cheryl strayed vitalik buterin chuck palahniuk vivek murthy amanda palmer madeleine albright dealmaking day no kelly slater maria sharapova howard marks daniel ek tim ferriss show wealthfront kevin rose neil strauss doris kearns goodwin timothy ferriss digital security apy brian koppelman hour body security tips maria popova mary karr elizabeth lesser tim tim random show how nfts joe gebbia jim dethmer tools of titans henry shukman no caffeine katie haun tyler hobbs discover tim timferrissfacebook longform interviews