POPULARITY
We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects. First we discuss how China strategically infiltrated technology systems in the US and other countries as a geopolitical message rather than attacks. He discusses the challenges of securing complex, interconnected systems and the need for proactive defense. Next we review the rise of corporate power and influence and how the increasing wealth and influence of individuals like Elon Musk is disrupting the traditional balance of power in democracies. The ethical concerns around wealthy individuals wielding disproportionate political influence could result in something the oligarchs are not expecting. Finally, we review potential trade wars and the possibility of Canada and Mexico joining the BRICS alliance. 2025 is going to be bumpy but very interesting.
Guest: Ian Thorton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesOn LinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine
Guest: Ian Thornton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesLinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine
The Money Laundering Machine: Inside the global crime epidemicIn this episode of the Cybersecurity & Geopolitical Discussion, our trio of hosts discuss paradoxes surrounding money laundering and the reasons it's so popular, particularly among well-establish organised criminal gangs.
In this episode of the Cybersecurity & Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media debate the geopolitical and security dimensions of The real space race: Inside geopolitics and security of a $1.8T industry. Our PODCAST is sponsored by CYJAX.
Broken China? China borders 14 countries and is the 4th largest country in the world and second largest in terms of population. It's very surprising to know so little about the Chinese even though western think tanks and news articles have written volumes. It's shocking that a county which is at the very enter of the global supply chain for nearly every other country in the world is enigmatic, challenging, and difficult to understand. Perhaps it's due to China being an officially atheist state with over 40% of the population identifying as agnostic or atheist? This is remarkably different from nearly any other country in the world as is the lack of ethnic diversity 91.6% identify as ethnically Han. China is different, or is it really? In this video podcast with Comrade Ian Thornton-Trump CD, CISO for Cyjax, Comrade Lisa Forte and Comrade Philip Ingram MBE we wave the Chinese flag passionately as we explore China. Lisa, was our woman on the ground who travelled the length and width of the region including rural Mongolia in -45 Celsius (-49 Fahrenheit) and visited Beijing as well as some rural villages - we can categorically state China has some of the best ice climbing opportunities in the world. The ice climbing opportunities aside this video podcast is supported by a new report from our sponsor Cyjax written by Comrade Nikita Cole whose draft helped structured our discussion - the paper is available here: This short excerpt from the CIA world fact book paints the picture and rather surprisingly is unbiased in relating to China's resent ascension to the second largest economy in the world (2024). "MAO Zedong died in 1976. Beginning in 1978, subsequent leaders DENG Xiaoping, JIANG Zemin, and HU Jintao focused on market-oriented economic development and opening the country to foreign trade, while maintaining the rule of the CCP. Since the change, China has been among the world's fastest growing economies, with real gross domestic product averaging over 9% growth annually through 2021, lifting an estimated 800 million people out of poverty, and dramatically improving overall living standards." What the CIA world fact book has left out is the lifting out of poverty has created a massive middle class anxious for western consumer and luxury goods. The 2023 McKinsey China Consumer Report also found the middle class continues to rise. There is still no other country that adds as many households to the middle class each year as China does. Over the next three years, China is expected to add another 71 million upper-middle and high-income households adding to the 693.3 million identified in 2022. It's massive and a massive market opportunity for any firm. But all may not be as well as it seems - the panel explores some of doom and gloom associated with China and how cracks may be showing in foreign policy, international relations and its relationship with the world's largest economy the USA - join us for a fascinating look at a country described by some as a "Frenemy" to the west but has radically transformed in less than 1/2 a lifetime - 45 years.
An August report from the Canadian Centre for Cyber Security said over the next two years, Canada is going to face significant threats from state-supported cyberattacks from Russia, China and North Korea. Canada? What the heck did Canada do to earn the ire of those folks. Canadians are arguably the nicest people in the world. So we called up our favorite Canadian “cybersleuth”, Ian Thornton-Trump, Cyjax's CISO. to get the skinny. --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support
In this episode, Richard Tubb talks to Ian Thornton-Trump, a cybersecurity expert and the chief security officer of Cyjax, a threat intelligence and cyber security company. During their short chat, Richard and Ian talked about the current state of the MSP industry, why vendor solutions should give real business value to MSPs and their clients, and the impact of AI on the sector.Plus, Ian gives his thoughts on how MSPs can compete in an overcrowded cybersecurity market and shares his experiences at the Pax8 Beyond event in Denver, and why he'd go back next year.Mentioned in This EpisodePax8ThreatLockerCrowdStrikeConnectWisePassword Manager from N-ableSyncroDatto
In Episode 16 of the Cybersecurity & Geopolitical Discussion from Security magazine, co-hosts Phillip Ingram, MBE, and Ian Thornton-Trump, CD, discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. The trio examines findings from a strategic intelligence report from Cyjax that detail China and Russia's colonial and developmental activities on the continent. Watch the video version here.
TikTok has been in the news for quite a while, but at Cyber Protection Magazine, we are pretty sure we aren't getting the whole story, so we are starting a series of articles and podcasts to get to the bottom of the issue, starting with this episode. We talk to Ian Thornton-Trump -- raconteur, iconoclast, cyberwarrior, and CISO for Cyjax -- and he, as usual, has a lot to say. As you listen you will find that the real problem is not in the app, but in ourselves... and in bad algorithm design. Also, this is an ad-free episode. If you want to support the work we are doing, go to Cyber Protection Magazine and donate to the cause. The button is on the bottom of the page. --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support
In Episode 15 of the Cybersecurity & Geopolitical Podcast from Security magazine, hosts Ian Thornton-Trump and Philip Ingram discuss current developments in the Russian invasion of Ukraine, geopolitical shifts in global intelligence, and app-based data collection. Watch the video version here.
In Episode 15 of the Cybersecurity & Geopolitical Podcast from Security magazine, hosts Ian Thornton-Trump and Philip Ingram discuss current developments in the Russian invasion of Ukraine, geopolitical shifts in global intelligence, and app-based data collection. Watch the video version here.
Our guest today is Ian Thornton-Trump, Chief Information Security Officer at Cyjax Limited.In this episode, Ian tells us about his journey to his current role, his experiences working as a threat intelligence analyst for the Canadian military, and the lessons he learned along the way.He discusses with us what he believes to be the most important yet underappreciated cybersecurity skill, as well as the mistakes that can land a CISO in jail and how to prevent them.We'll talk about his thought on certifications in today's modern hiring market, why he thinks that backups are “the Alamo” in cybersecurity and why he started a community that, in his words, is more of an anti-community.-It takes a cyber village to raise a cyber idiot.-Ian's Links:Twitter LinkedIn YouTubeCyjax Limitedhttps://www.octopitech.com/--Thanks for being an imposter - a part of the Imposter Syndrome Network (ISN)! We'd love it if you connected with us at the links below: The ISN LinkedIn group (community): https://www.linkedin.com/groups/14098596/ The ISN on Twitter: https://twitter.com/ImposterNetwork Zoë on Twitter: https://twitter.com/RoseSecOps Chris on Twitter: https://twitter.com/ChrisGrundemann Make it a great day.
China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity & Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.
China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity & Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.
For the second year we are publishing predictions for 2023 in Cyber Protection Magazine by asking people and organizations to submit a brief, one-paragraph statement. Our friend and Cyjax CISO sent an entire presentation. And it was fun and scary all at the same time.,So we went with it. Check out the other predictions on the magazine and let us know what you think. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support
One of my favorite security gurus, Ian Thornton-Trump sent me a text recently about the top-five security failures in recent history that we have yet to learn from. So I decided to call him and ask what he meant. It's worth listening to. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support
Much of the West has feared Russian aggression since the Cuban Missile Crisis 1962. Then it was their technologically superior military. Most recently it's been their vaunted cyber warfare capabilities. This podcast episode is about the one positive coming out of the Ukraine war: the Russians are not as scary as we thought they were. Oh, they are still scary, but scary like a feral, rabid house cat, rather than a man-eating tiger. The genesis of this interview was a Linkedin post by Ian Thornton-Trump, who is something of a celebrity in the cybersecurity world. Ian is a certified IT professional with 25 years of experience in IT security and information technology. His post in Linked in, essentially said, “Russian cyber warfare? Meh.” That intrigued me so I sent him a private message and asked him to elaborate, and boy did he. So I invited him on the podcast. Turns out he's a fan. Who knew? Be prepared to be encouraged. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support
Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax, and Philip Ingram, CEO of Grey Hare Media, take a close look at the Russian invasion of Ukraine through the lens of conflict in the Middle East in the tenth episode of The Cybersecurity and Geopolitical Podcast presented by Security magazine. From determining Russia's current trajectory in Ukraine via the nation's playbook in Syria to comparing the root of Russia's border aggression, the security leaders draw parallels between the invasion and previous events in the Middle Eastern region.You can watch the video version here.
In this episode, Ian Thornton-Trump, CISO at Cyjax, digests nation state's disinformation campaigns and the cybersecurity landscape. He also discusses the role disinformation on social media plays in cybersecurity.
Security magazine presents the latest episode of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist. Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax and Gareth Corfield, Security and Legal Correspondent at The Register, review the current conflict between Russia and Ukraine and discuss the ongoing “cyber war” in the region. This entertaining and illuminating episode spotlights the latest challenges and intriguing flashpoints within the cybersecurity and geopolitical landscape for enterprise security and risk professionals. You can watch the video version here.
In this episode of TubbTalk, Richard talks to Ian Thornton-Trump, expert in cybersecurity and chief security officer of Cyjax, a threat intelligence and cyber security company. They discuss how MSPs can keep their clients, and why many MSPs fail at security before an attack even happens – and what to do about that. Ian explains the concept of trusted advisor as a service and the importance of keeping up to date with technology. They also talk about why you need to communicate the importance of security to clients, and what to do if they won't help themselves. Ian discusses the merits of being agile and resilient, and shares what's in his current security stack for personal use. Mentioned in This Episode https://www.ibm.com/security/security-intelligence/qradar (QRadar) https://www.threatq.com/ (ThreatQ) https://banduracyber.com/ (Bandura) https://www.lastpass.com/ (LastPass) https://www.privatise.com/ (Privatise) https://syncromsp.com/ (Syncro) https://www.kaspersky.com (Kaspersky) https://www.blackfog.com/blackfog-msp/ (BlackFog) https://www.todyl.com/ (Todyl) https://www.servicenow.com/ (ServiceNow) https://www.bmc.com/it-solutions/it-security.html (BMC) https://buckets.grayhatwarfare.com/ (GrayhatWarfare) https://connect.comptia.org/membership/comptia-isao (CompTIA ISAO)
It's a warm welcome today to our guest Ian Thornton-Trump, CISO at Cyjax Limited, also known as @phat_hobbit on Twitter.Ian talks about his career journey, from joining the Military Intelligence Branch of the Canadian Forces, to managing IT projects at the Canadian Museum of Human Rights, to being a CISO. He also shares his top lessons learned from 30 years in the cybersecurity industry, from his paper '8 Leadership Principles' (or, as Ian refers to it "8 of my biggest mistakes").In the studio, Geraldo, currently studying Film and Television at college, disucsses how cybersecurity is represented in the media. We discuss Mr Robot, Silicon Valley, The Matrix, and how Hollywood has led some accurate (and very inaccurate) portrayals of the industry.In Threat Corner, Ben takes us through the storied history of the REVil ransomware family, and how the attackers operate under a ransomware-as-a-service model. Follow along at https://blogs.cisco.com/security/threat-protection-the-revil-ransomwareEpisode time stamps:03:20 - 25:23: Cybersecurity in the media25:24 - 40:53: Ian Thornton Trump interview, Part 140:54 - 50:54: Threat Corner: REVil ransomware family50:55 - 65:47: Ian Thornton Trump interview, Part 265:48: Closing thoughts and outro
What does the NSO Pegasus hack mean for Device Security? Philip Ingram MBE chats with Ashish Patel from Zimperium Technology, Ian Thornton-Trump, CISO with Cyjax and Andi Robinson, with Data Shield UK. The realities of our poor approach to device security become apparent. For more information about Zimperium, please visit: https://blog.zimperium.com
Have you thought deeply—and we mean deeply—about what was in the last box lunch you ate? You will after listening to this week's show, in which Matt, Rich, and their returning guest host—MSP and certified ethical hacker Michael Cocanower, of itSynergy—discuss that important topic along with the latest cybersecurity news from ConnectWise and opportunities to take your Azure skills from the 101 to 201 level. Then stay tuned for further security talk with interview guest Ian Thornton-Trump, of both threat intelligence vendor Cyjax and Octopi Managed Services, in Winnipeg. Way more interesting than the pasta salad you got with that boxed ham sandwich. Subscribe to ChannelPro Weekly! iTunes: https://itunes.apple.com/us/podcast/channelpro-weekly-podcast/id1095568582?mt=2 Google Play Podcasts: https://play.google.com/music/m/Igodza5l63vd5w5mdybtpq2cr7e?t=ChannelPro_Weekly_Podcast Spotify: https://open.spotify.com/show/7hWuOWbrIcwtrK6UJLSHvU Amazon Music: https://music.amazon.com/podcasts/a1d93194-a5f3-46d8-b625-abdc0ba032f1/ChannelPro-Weekly-Podcast More here: https://www.channelpronetwork.com/download/podcast/channelpro-weekly-podcast-episode-190-box-lunch-analysis Topics and Related Links Mentioned: ConnectWise Warns MSPs: Get Serious About Security Soon or Else - https://www.channelpronetwork.com/news/connectwise-warns-msps-get-serious-about-security-soon-or-else ConnectWise Reports Progress Made But More Needed in the Fight Against MSP Breaches - https://www.channelpronetwork.com/news/connectwise-reports-progress-made-more-needed-fight-against-msp-breaches ConnectWise Launches Consolidated Management Interface for Third-Party BDR Solutions - https://www.channelpronetwork.com/news/connectwise-launches-consolidated-management-interface-third-party-bdr-solutions Now's the Time to Advance to Azure 201 - https://www.channelpronetwork.com/article/now-s-time-advance-azure-201 Rich's ICYMI plug and quickie preview of the week ahead - https://www.channelpronetwork.com/tags/icymi
With us today is Ian Thornton-Trump, Chief Information Security Officer at Cyjax and an ITIL-certified IT professional with 25 years of experience in IT security and information technology. Ian shares his background which started back in the Canadian military. During those times, "IT" was called "automated data processing", and it is quite clear how far this has advanced. He joined the Royal Canadian Mounted Police and spent a year working on criminal intelligence. Soon after he became a consultant and made his way to the UK in 2015. Oftentimes organizations have not planned or prepared for risk, and that includes cyber. In that sense, cyber can be compared to the environmental landscapes and infrastructure, which Ian finds eerily similar. A lot of problems created in cyber mimic a lot of the environment problems we face in today's world. One example is the recent failure of the Texas power grid during a very harsh winter. Investment in cybersecurity is critical. Allan feels there are a lot of environmental laws, but there are also already some pretty strict cyber laws as well. However, they seem more aimed at the anonymous or extrajurisdictional perpetrators and end up useless when their anonymity is involved. And some cyber laws seem to punish the victim as well - after suffering ransomware you are now penalized for not being prepared for it in the first place? How can we get laws in place that are helping the situation and not blaming the victim? Ian suggest that positive incentives are the answer. If we can just get companies to do a bare minimum cyber hygiene, by incentivizing them through tax breaks, Ian thinks we could move the ball up more forward, without making it too onerous, to meet some sort of regulatory standard. How do we possibly extend our stretch? Because at the end of the day, the root cause is the “bad guys”, so how do we get to them? America is already doing a lot, but other countries need to put their money where their mouth is. Ian and Allan discuss President Biden's Executive Order on Cybersecurity. This can enforce behavior in the government, but only suggest behavior in the private sector. To sum up, we're nowhere, and we need to get somewhere because what we've done, at the federal and state level in the United States, is taken a lot of dollars, put them in parking lots, and set fire to them. And then after we finished that exercise, we asked for more dollars. We have to change the entire system from the ground up. And we have to incentivize cyber security. Key Takeaways 1:10 How Ian got into Cyber 2:21 Ian's day job 4:18 Issues with infrastructure and environment 7:38 Meaningful laws 12:47 Getting to the bad guys 16:35 Catching “Fred Smith” or someone like him 17:43 Rewards 21:17 Preparedness and helplessness 23:43 Einstein program 26:24 What keeps Ian going Links: Learn more about Ian Thorton-Trump on LinkedIn and Twitter Follow Allan Alford on LinkedIn and Twitter Learn more about Hacker Valley Studio and The Cyber Ranch Podcast Sponsored by our good friends at Axonius
Philip Ingram MBE today is chatting with Ian Thornton Trump the CISO with Cyjax about Intelligence led cyber business decisions. Two intelligencers chewing the cud... this could go anywhere! You can find out more about Cyjax here: https://www.cyjax.comAnd we chat about threat documents they release - an example can be found here: https://www.cyjax.com/2021/04/06/geopolitical-and-cybersecurity-weekly-brief-6-april-2021/
In this show I interview Phil and Ian about the Ever Given Ship being stuck in the Suez canal, Ice Breaker ships and the northern passage. We also discuss the reallocation of funds for the UK military, the new ranger force and the significance of the changing of the guard in the White House to the new administration. To follow Philip, click the link here for his Twitter. To follow Ian, click the link here for his Twitter. To get in touch try the contact page of the Human Factor Security website or follow me on Twitter, where I can be found at @Jenny_Radcliffe Note: music for the show was provided by; Spinnin' by Alex (c) copyright 2011 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/AlexBeroza/32423 Ft: spinningmerkaba
Pride comes before a fall. That was certainly the case with SolarWinds, who were warned by Ian Thornton-Trump of their security shortcomings back in 2017. In this episode of Cybersecurity Unplugged, Thornton-Trump, CISO at Cyjax and former security adviser to SolarWinds discusses: The history of SolarWinds and his warning to them; The current threat landscape and our biggest vulnerabilities today; And how best to incentivize proper cybersecurity hygiene.