POPULARITY
Cyber attacks against public safety agencies are rising, with 324 confirmed globally in 2024, including 25 complete system shutdowns. The Public Safety Threat Alliance, established by Motorola Solutions, is a cyber threat Information Sharing and Analysis Organization (ISAO) recognized by CISA that provides actionable intelligence to public safety agencies across the globe to improve their resilience and defense capabilities. Membership in the PSTA is open to all public safety agencies, and there is no cost to join for public sector organizations. In this episode of the Policing Matters podcast, part of a special report from Motorola Solutions Summit 2025, host Jim Dudley speaks with William DeCoste, STARS Program Manager and Telecommunications Engineer Manager with the Virginia State Police Communications Division and Jay Kaine, the Director of Threat Intelligence at Motorola Solutions. They tackle the direct effect cyber attacks can have on public safety agencies and the collaborative efforts underway to combat them. About our sponsor This episode of the Policing Matters podcast is sponsored by Motorola Solutions.
In this episode, we talk with Ashley Howden (FKA) and Kelly Brand (Foundation House) to discuss how early childhood professionals can support families from diverse backgrounds when using the Child Information Sharing Scheme.
Today on the show, we discuss why the IRS is sharing some taxpayer information, why bonds and stocks both fell, and how robots will replace you,or at least most of your chore wheel, in the near future.Related episodes: Why are stocks and bonds both falling? For sponsor-free episodes of The Indicator from Planet Money, subscribe to Planet Money+ via Apple Podcasts or at plus.npr.org. Fact-checking by Sierra Juarez. Music by Drop Electric. Find us: TikTok, Instagram, Facebook, Newsletter. Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy
Thanks for listening to The Morning Five! Thanks for listening, rating/subscribing The Morning Five on your favorite podcast platform. Learn more about the work of CCPL at www.ccpubliclife.org. Michael's new book, The Spirit of Our Politics: Spiritual Formation and the Renovation of Public Life, is now available! You can order on Amazon, Bookshop.org, Barnes & Noble, or at your favorite local bookstore. Join the conversation and follow us at: Instagram: @michaelwear, @ccpubliclife Twitter: @MichaelRWear, @ccpubliclifeAnd check out @tsfnetwork Music by: King Sis #politics #faith #prayer #tariffs #China #IRS #immigration #ICE #SCOTUS #government Learn more about your ad choices. Visit megaphone.fm/adchoices
From the Shadow of the Wall: Finding Inspiration in a Divided Berlin Want to uncover the secrets behind David Bowie's creative process and the impact of Berlin on his music? Discover the solution to gaining a deeper understanding of the legendary artist's Heroes album analysis. Get ready to dive into the intriguing world of Bowie's musical journey and the influential forces that shaped his iconic sound. Stay tuned for a mind-bending exploration of Bowie's artistry and musical evolution. In this episode, you will be able to: Explore the intricate layers of David Bowie's "Heroes" album and unravel its artistic brilliance. Uncover how the city of Berlin significantly influenced David Bowie's musical evolution and creative expression. Discover the captivating influence of Chris Burden on the creation of "Joe the Lion" and its impact on Bowie's music. Gain insight into the fascinating and innovative creative process behind David Bowie's iconic "Heroes" album. Delve into the intriguing relationship between performance art and its profound influence on music, including David Bowie's work. The key moments in this episode are: 00:03:13 - Oblique Strategies 00:06:25 - Album Vibes and Dinner 00:09:29 - History of "Heroes" 00:13:44 - Embracing Unnerving Experiments 00:15:43 - Responding to Emergency 00:20:54 - Tony de Visconti's Production Technique 00:27:10 - David Bowie's Vocal Recording Process 00:29:36 - David Bowie's Appearance 00:31:51 - Blue Apron Ad Read and Robert Fripp's Performance 00:32:36 - Planning the Episode 00:33:53 - Musical Depth and Track by Track 00:37:26 - David Bowie and Iggy Pop in Berlin 00:41:31 - Brian Eno's Artistic Antics 00:47:09 - Bowie's World Tour Adventures 00:49:12 - David Bowie's approach to substance use 00:51:32 - Bowie's voracious reading habits 00:58:23 - Mentality during the recording of "Heroes" 01:00:14 - Bowie's creative energy in Berlin 01:04:33 - Evolution of Bowie's music 01:05:58 - Dan's Approach to Information Sharing 01:06:41 - Discussion about Real Songs and Music 01:09:10 - Chris Burden's Artistic Stunts 01:15:55 - Bluechew Ad Read 01:19:04 - Tier List Ranking of Albums 01:23:57 - Ranking David Bowie Albums 01:25:32 - Album Ranking Continues 01:27:02 - Assessing Scary Monsters 01:28:34 - Final Album Rankings 01:35:34 - Closing Remarks 01:40:24 - British Man vs. American Cuisine 01:41:14 - Introduction to Meatloaf and Other British Dishes 01:42:25 - Exploring American Dishes 01:43:41 - Cornbread, Biscuits, and Gravy 01:46:11 - Waffle House Training Video 01:53:58 - Waffle House Breakfast Orders 01:59:25 - Omelet Marking System 02:03:01 - Breakfast Sandwiches and Deluxe Orders 02:05:26 - Hash Brown and Dinner Orders 02:08:03 - Waffle House Marking System 02:09:12 - Major Meat Sandwiches 02:10:53 - Special Preparation for Sandwiches 02:11:03 - Burritos and Hispanic Food 02:12:50 - Importance of the Pull Drop Mark System This podcast is powered by Pinecast.
Join me for a conversation with USAF Col. (Ret.) Matt Yocum as we delve into his unique career trajectory, starting from his non-standard background in the Air Force's acquisition and engineering fields. Matt discusses his pivotal assignments, including his time in Israel as part of the Engineer and Scientist Exchange Program and later as an Air Force attaché, where he navigated through significant events like the Second Lebanon War. This episode also explores his role as a Commander's Action Group (CAG) director at CENTCOM, where he was instrumental in providing detailed and narratively rich reports on international engagements. Matt reflects on the importance of storytelling in military communication and its impact on effective diplomacy. The talk also covers his post-military career as a writer of comic books and graphic novels, highlighting his passion for the art form and his current projects, including a biographical graphic novel on a notable Pakistani figure. Throughout the episode, Matt emphasizes the significance of relationship-building, effective communication, and relentless helpfulness in both military and personal endeavors. Links: www.Hangar19Consulting.com www.MattYocum.com Closet World Kickstarter Books: The Twilight War by David Crist Brief by Joe McCormick Lawrence in Arabia by Scott Anderson The New Map by Daniel Jurgen Power Broker by Robert Caro The Years of Lyndon Johnson by Robert Caro The Vision by King, Waltaand Bellaire Supergirl: Woman of Tomorrow by King, Evely and Lopes Pluto: Urusawa x Tekuza by Nagasaki and Urasawa Bone by Jeff Smith Time Stamps: 00:00 Introduction and Disclaimers 00:46 Meet Colonel Matt Yocum 01:15 Colonel Yocum's Air Force Journey 01:59 The Engineer and Scientist Exchange Program (ESEP) 02:44 Life and Work in Israel 04:42 Challenges and Experiences in Israel 09:01 Language Learning and Cultural Insights 34:58 The Second Lebanon War 39:35 Observations and Responsibilities as an Attache 45:31 Career Transitions and Future Plans 50:37 Arrival in Amman, Jordan 50:46 The New Normal: ISIS Crisis 51:44 Embassy Life and Community 54:02 Building Relationships and Cooperation 55:19 Information Sharing and Collaboration 01:03:34 Training and Equipping the Jordanian Air Force 01:18:44 Commander's Action Group (CAG) Experience 01:37:51 Decision to Stay in CAG 01:39:06 Balancing Family and Duty 01:40:43 Returning to JSO and Preparing for Retirement 01:42:14 Final Assignment and Retirement Ceremony 01:45:37 Reflecting on a Military Career 01:47:30 Challenges and Triumphs in Promotions 01:55:37 Post-Military Career in Comics 02:02:18 The Art of Storytelling in Communication 02:14:07 Recommended Reads and Final Thoughts
Warm Start:• That breach cost HOW MUCH? How CISOs can talk effectively about a cyber incident's toll• Perspective: 25 Years of Evolving Information Sharing Into Actionable Intelligence, new from IT-ISAC Director Scott Algeier.• The Gate 15 Interview EP 56. Information Sharing, Cybersecurity Politics, Threats, and More & New Podcast – Information Sharing, Cybersecurity Politics, Threats, and More! The Gate 15 Interview will be released on all the usual channels later today. Catch this month's special crossover episode now via the Cybersecurity Advisors Network post and on YouTube!• Crypto ISAC at WSJ Tech Live: Exploring the Future of Blockchain & CybersecurityMain Topics:• If it can happen to them, it can happen to you, part one. Managing Communications: The Trump Administration Accidentally Texted Me Its War Plans. Considerations for businesses. • If it can happen to them, it can happen to you, part two. Phishing: A Sneaky Phish Just Grabbed my Mailchimp Mailing List. • Some thoughts on punishment, consistency, standards, and compassion.• White House - Achieving Efficiency Through State and Local Preparednesso Fact Sheet: President Donald J. Trump Achieves Efficiency Through State and Local Preparednesso Trump prioritizes infrastructure resilience against cyber attacks, rolls out National Resilience StrategyQuick Hits:• New Dates Added: Live Virtual Presentations on Targeted Violence Prevention. Live Virtual Presentations on Targeted Violence Prevention. The U.S. Secret Service National Threat Assessment Center (NTAC) is pleased to offer new opportunities to attend live virtual presentations on preventing targeted violence. In these presentations, our expert researchers will share findings and implications from decades of research on targeted violence and offer strategies for preventing acts of violence impacting the places where we work, learn, worship, and otherwise live our daily lives. This list of available virtual training events is regularly updated, and presentation topics change from month to month. To learn more about this series of live virtual presentations, or to register for one or more of these events, please follow the link below. Register here.• FBI PSA - Individuals Target Tesla Vehicles and Dealerships Nationwide with Arson, Gunfire, and Vandalism• Man drives car into protesters outside a Tesla dealership, nobody hurt, sheriff says• Attorney General Bondi Statement on Violent Attacks Against Tesla Property• Violent attacks on Tesla dealerships spike as Musk takes prominent role in Trump White House• Multiple cars set on fire at Tesla service center in Las Vegas in 'targeted attack'• Potential Terror Threat Targeted at Health Sector – AHA & Health-ISAC Joint Threat Bulletin• FBI, healthcare agencies warn of credible threat against hospitals, after multi-city social media terror plot alert• Exclusive: FBI scales back staffing and tracking of domestic terrorism probes• This AP map shows sabotage across Europe that has been blamed on Russia and its proxies• Spring Outlook: Dry in the West, milder than average in the South and East; Drought to develop or persist for Rocky Mountains, Southwest and southern Plains• Halcyon - Last Year in Ransomware: Overview, Developments and Vulnerabilities• Chairmen Green, Garbarino, Brecheen Conduct Oversight Of The Federal Government's Response To China-Backed “Typhoon” Intrusions Under Previous Administration• The Biggest Supply Chain Hack Of 2025: 6M Records Exfiltrated from Oracle Cloud affecting over 140k Tenants • Risky Bulletin: The looming epochalypse
In this episode of The Gate 15 Interview, Andy Jabbourspeaks with John Salomon. John is an information security executive and cybersecurity expert with 25 years of in-depth, cross-cultural, international experience across multiple critical industry sectors. Learn more about John on LinkedIn. In this episode John and Andy discuss: · John's Background. · Information Sharing.· ISACs, international partnership, and political transitions.· Critical threats and challenges.· John plays 3 Questions! · Lots more! Selected links:· Watch the episode on YouTube! Information Sharing, Cybersecurity Politics, Threats, and More· CyAN: New Podcast – Information Sharing, Cybersecurity Politics, Threats, and More. This post links to the YouTube and includes a timeline and links you may enjoy.· John Salomon · Cybersecurity Advisors Network - Secure in Mind on YouTube· CyAN's Position on Encryption Backdoor Legislation· https://cybersecurityadvisors.network
In this episode of The Daily Windup, host Eric Coffie engages in a conversation with a Jeff Stutzman, a cybersecurity expert and entrepreneur. Jeff shares his journey, starting from his work at the DOD Cyber Crime Center to building a collaborative Information Sharing environment for defense contractors and banks. They discuss the evolution of cyber attacks, emphasizing their increasing sophistication and the shift towards more user-friendly tools. Jeff also reveals his decision to become an entrepreneur and highlights the challenges faced in the cybersecurity industry, particularly regarding the diminishing value of cyber threat intelligence. Join me and Jeff in this insightful episode as we explore the fascinating world of cybersecurity, from its early days to the present, while uncovering the entrepreneurial journey of Jeff and the strategies employed to navigate the evolving landscape.
Agweek Podcast host, Al Winmill, recently had the chance to chat with Nate Schlief of the Greater Grand Forks Farm Toy Show about their upcoming 4th Annual show in Grand Forks, ND. Nate shared information about the show, located at the Alerus Center, March 28-29, along with his history in the farm toy hobby, how the show started and more. Learn more about the 4th Annual Greater Grand Forks Farm Toy Show at Nate's preferred communication platform, their public Facebook Group: Greater Grand Forks Farm Toy Show Here's a link to the Alerus Center's write up on the show: https://www.aleruscenter.com/events/detail/3rd-annual-grand-forks-farm-toy-show-1 Here's a summary of the episode: Show Origins and Initial Planning (0:00 - 2:14) Al Winmill welcomes Nate Schlief, organizer of the Greater Grand Forks Farm Toy Show, to the Ag Week podcast. Schlief discusses his lifelong passion for farm toys and the inspiration behind starting the show. He explains that the decline of farm toy shows in smaller North Dakota towns, combined with his son's participation in national shows, led to the idea. He partnered with a friend and his wife, choosing the Alerus Center due to its accessibility for vendors. Their initial plan was to have 50-60 vendor tables. Show Growth and Vendor Collaboration (2:15 - 4:47) Schlief details the show's growth, noting that they aimed for a March date to avoid overlap with other shows and to accommodate their shared vendor base. The first year saw 65 tables, and the show has since grown to around 100 tables, even turning vendors away due to space limitations. He highlights the community support and nostalgia for past local toy shows, emphasizing the show's role in connecting people with a shared hobby. He also mentions the possibility of a future show in Bismarck. Vendor Diversity and Display Highlights (4:48 - 6:20) The discussion shifts to the variety of vendors at the show. Schlief describes the range of merchandise, including farm toys, clothing, literature, and steel signs, and mentions unique vendors like one selling goat milk products. He notes the trading and selling among vendors and attendees, and highlights the display of collections, such as a Big Bud tractor display and handcrafted versatile tractors. Interactive Exhibits and Community Engagement (6:21 - 10:03) Schlief describes unique exhibits, including 3D printers and NDSU's Department of Ag Engineering. He emphasizes the addition of a kids' play area with a corn-filled pool and toys, and a designated space for remote-controlled semi tractors and bulldozers. He discusses the farm toy displays, noting they are not yet judged, and shares tips on creating displays using affordable materials. He highlights the show's Facebook page and the Toy Farmer magazine as resources for hobbyists. Information Sharing and Community Impact (10:03 - 11:18) Schlief explains how information about the hobby is shared, including through their Facebook page, the Toy Farmer magazine, and word-of-mouth. He highlights the show's positive impact on the Grand Forks community, attracting visitors who stay in hotels and eat at local restaurants. He notes the significant increase in vendor bookings, from the initial 65 tables to approximately 120 currently. Future Growth and Audience Diversification (11:20 - 18:00) Looking ahead, Schlief discusses the show's potential for further growth, referencing the large regional show in Sioux Falls. He emphasizes the importance of attracting younger generations to the hobby, highlighting the educational and imaginative aspects of playing with farm toys. He acknowledges the diverse interests of attendees, from casual enthusiasts to serious collectors. He reiterates the goal of creating an entry point for younger individuals to engage with the hobby and continue its legacy. Nostalgia and the Evolving Hobby (18:00 - 20:30) Schlief emphasizes the nostalgic aspect of the farm toy hobby, sharing his own childhood memories of receiving toy combines and the joy of being able to purchase those same toys as an adult. He highlights the hobby's evolution, noting the blend of traditional craftsmanship (like brass and soldering) with modern techniques (such as 3D printing). He expresses admiration for the genuine, down-to-earth people involved in the hobby, which he considers a major draw. Vendor Information and Contact (20:30 - 22:15) Winmill inquires about vendor registration. Schlief directs potential vendors to the "Grand Forks Farm Toy Show" Facebook page and provides the contact information for his partner, Mike Ratty (218-791-5818). He clarifies that there is no charge for displaying farm toy collections, only for vendors selling merchandise. Show Dates, Times, and Attendance Information (22:15 - 23:30) Schlief provides the show's dates and times: Friday, March 28th, from noon to 7 p.m., and Saturday, March 29th, from 9 a.m. to 5 p.m., at the Alerus Center in Grand Forks. He encourages attendees to check the show's Facebook page for updates and raffle information. Concluding Remarks and Well Wishes (23:30 - 23:58) Winmill thanks Schlief for sharing his passion and information about the show, wishing him a successful event and continued growth. Schlief expresses his appreciation for the opportunity to be on the podcast.
Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the Automotive Information Sharing and Analysis Center, otherwise known as Auto-ISAC. Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the global automotive industry, including light- and heavy-duty vehicle OEMs, suppliers and the commercial vehicle sector. To learn more, visit https://automotiveisac.com. See the full list of associations at https://cybersecurityventures.com/cybersecurity-associations.
Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the CompT-I-A Information Sharing and Analysis Organization, or ISAO. Tailoring proactive threat intelligence and actionable analysis to meet the needs of technology vendors, MSPs, solution providers, integrators, distributors, business technology consultants, and their customers, the CompTIA Information Sharing and Analysis Organization provides members with a trusted community of peers with whom to share cybersecurity information and best practices. To learn more, visit https://isao.org/group/comptia-isao. See the full list of associations at https://cybersecurityventures.com/cybersecurity-associations.
On this week's episode, Scott and A talk about how storytellers deftly share important information, and how exposition sometimes goes wrong. Scott talks about his tools and tips to keep the story flowing and readers engaged. Deep Cuts is created by Scott Sigler and A B Kovacs Produced by Steve Riekeberg Production Assistance by Allie Press Copyright 2025 by Empty Set Entertainment Did you know it was the jilted ex-lover the whole time? You should start a blog and snag a new three-year dot-com domain registration for 99% off year one by using GoDaddy Promo Code CJCFOSSIG. Make sure you keep those storytellers on their toes! Learn more about your ad choices. Visit megaphone.fm/adchoices
As the financial industry continues to evolve, it's important to stay ahead of emerging risks and trends. On this episode of FINRA Unscripted, the leaders of FINRA's new Strategic Intelligence and Analytics (StratIntel) team discuss how they are working to identify and analyze these industry developments.On this episode, we sit down with the leaders of the StratIntel team: Senior Vice President of Data and Analytics for Member Supervision Jim Reese, and his two Vice Presidents, Brita Bayatmakou and Clint Johnson. The three share insights on how this new team is evolving FINRA's approach to intelligence gathering and risk monitoring, and the innovative ways they are using data and analytics to support FINRA's mission of investor protection and market integrity.Resources mentioned in this episode:2025 Regulatory Oversight Report3110. SupervisionEpisode 168: Investing Wisely in 2025: Avoiding Scams and Achieving Your Financial GoalsEpisode 169: Unpacking FINRA's 2025 Regulatory Oversight Report Find us: X / YouTube /LinkedIn / Facebook / E-mail
Two longtime power transmission/motion control industry veterans, Brian Short and Bill Shepard, join to discuss career retrospection; what's changed in the market over the past four decades; their thoughts on AI; and the role of product information management, including how two leading associations are driving it forward.
Well winter is on our doorsteps, and for the general population any thoughts of gardening stops, as the common thought is the 'garden has gone to sleep'...Well nothing could be farther from the truth, as the season of shorter days and chilly weather could be one of the most important and busy in the yearly life of your garden. Join Lucy and Saul every week as they show you exactly how busy they are, whether getting everything festive for Xmas, clearing up after the latest storm, enjoying the emergent shoots of early flowering plants or getting ready for spring and a return to the start of the great garden cycle!Anything that stands still runs the risk of being overtaken, so the Royal Horticultural Society is sprinting forth in its plans for 2025 to lead our industry through excellent research, communication and garden development. Lucy and Saul have been privy to these details this week, and the duo are also deliberating their own horticultural activities, too. Does Lucy think her begonias will see the light of day in 2025, and is Saul right to embrace his present 'benign' Devonshire weather? Instagram links:Lucy lucychamberlaingardensBluesky links:Lucy @lucycgardens.bsky.socialTwitter links:Saul @GardeningSaulIntro and Outro music from https://filmmusic.io"Fireflies and Stardust" by Kevin MacLeod (https://incompetech.com)License: CC BY (http://creativecommons.org/licenses/by/4.0/)Support the show
AJ Thompson, Chief Commercial Officer, Northdoor Financial services providers are under increasing pressure to tackle risk in critical digital systems. AJ Thompson, CCO at UK IT consultancy Northdoor speaks to Robin Amlôt of IBS Intelligence about the impact of DORA, the prospect of itchy feet on the part of VC investors, and what established institutions and FinTechs can do better to prepare themselves for the challenges that 2025 is going to present.
Are you looking for the secret sauce to keep your relationship thriving with your spouse? Countless women have rebuilt love and connection in their marriages with this “How to Strengthen Your Marriage” eBook. Download it for FREE here: https://bit.ly/marriage-strength --------------------------------------------------------------- In this episode, The host of Mindful Muslimah shares practical strategies to bridge communication gaps in marriages. Drawing from her experience as a licensed educator and counselor to thousands of Muslim women, she explains the key differences in how men and women communicate and how understanding these differences can strengthen relationships. Whether you're identifying common miscommunication issues or looking to deepen your connection with your spouse, this episode offers actionable insights and tools to transform your relationship.
✨ Subscribe to the Green Pill Podcast ✨ https://pod.link/1609313639
In this Friday's OP-ED, I talk about a topic near and dear to my heart: Incident information/Intelligence sharing. We do it poorly in the cyber world. Can't we please try to do it better. Would love to hear other thoughts on this. Give a listen, tell a friend. Feel free to contact me at darren@thecyburguy.com or follow me at linkedin.com/in/darrenmott. Also check out my new website - www.goldshieldcyber.com.
Three Buddy Problem - Episode 22: We discuss Volexity's presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks. We also cover two new Apple zero-days being exploited in the wild, the US Government's demand that Google sell the Chrome browser, and the value of data in the context of AI. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
In this episode of the Identity at the Center podcast, hosts Jim McDonald and Jeff Steadman delve into the significance of shared signals in identity and access management (IAM). Featuring Mike Kiser, Director of Strategy and Standards at SailPoint, the discussion spans Kiser's career journey from IBM to SailPoint, the importance of standards and security in IAM, and the influence of AI on authenticity. The episode highlights the Shared Signals Framework, drawing parallels to cooperative dolphins and fishermen, and underscores the benefits of a standardized approach to signal sharing. The conversation also touches on the challenges and potential of event-based architectures and the evolving role of identity in cybersecurity. 00:00 Introduction and Initial Thoughts 02:50 Conference and Discount Codes 05:33 Guest Introduction and Background 11:31 AI and Authenticity 15:21 Shared Signals Framework 25:40 Decentralized Identity Management 26:28 Real-Time Identity Data Sharing 27:55 Developing Identity Standards 29:19 Vendor Collaboration and Challenges 31:28 Event-Based Identity Architectures 33:03 The Role of Big Tech in Identity Security 39:22 Customer Demand for Identity Solutions 40:49 Identity Security and Digital Identity 42:47 Technology vs. Humanity: A Musical Perspective 48:41 Conclusion and Final Thoughts Connect with Mike: https://www.linkedin.com/in/mike-kiser/ Learn more about SailPoint: https://www.sailpoint.com/ SailPoint Navigate 2024 London - Use code IDAC for a £300 discount - https://www.sailpoint.com/navigate/london Semperis' Hybrid Identity Protection Conference (HIP Conf) - Use code IDACpod for 20% off: https://www.hipconf.com/ Gartner IAM Summit - Save $375 on registration using our exclusive code IDAC375: https://www.gartner.com/en/conferences/na/identity-access-management-us Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com
Podcast: Cyber Security Weekly Podcast (LS 38 · TOP 2% what is this?)Episode: Episode 416 - OT ISAC - Singapore Operational Technology Information Sharing and Analysis Summit 2024Pub date: 2024-11-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore. As a seasoned expert in operational technology (OT) cybersecurity, Sim shared valuable insights into the importance of information sharing, the growing threat of ransomware, and the transformative role of AI in cybersecurity.Kicking off the podcast, Steven introduced the Executive Committee and its pivotal role in driving OT-ISAC's mission to foster a collaborative community and promote best practices. By providing advisory support and strategic guidance, the committee ensures OT-ISAC stays at the forefront of cybersecurity initiatives.Balancing Information Sharing and ConfidentialityOne of the most pressing challenges in OT cybersecurity is striking the right balance between information sharing and safeguarding sensitive data. He explained that OT-ISAC has implemented robust measures, such as the Traffic Light Protocol and data anonymization techniques, to protect confidentiality while promoting collaboration. The platform also employs protocols like STIX and TAXII to automate the exchange of cyber threat intelligence, enabling members to quickly share and respond to emerging threats.Cross-Jurisdictional CollaborationWith cyber threats spanning borders, cross-jurisdictional collaboration is essential. Sim highlighted that OT-ISAC allows members to share threat intelligence across different regions without breaching data sovereignty regulations by anonymizing the information sources. This approach strengthens global defenses against transnational cyberattacks.The Growing Threat of RansomwareRansomware remains a significant risk to OT environments. Steven urged organizations to avoid paying ransoms, citing the risks and long-term consequences. Instead, he emphasized the importance of investing in strong business continuity and incident response plans. By focusing on resilience and preparedness, organizations can minimize their exposure to future attacks.AI's Role in OT CybersecurityHe also discussed the potential of AI in OT cybersecurity, noting its ability to streamline incident response and improve threat detection. However, he cautioned that while AI offers powerful advantages, it must be implemented with human oversight to manage the risks associated with automated systems.Steven Sim has worked for more than 25 years in the cybersecurity field with large end-user enterprises and critical infrastructures, undertaken global CISO role, driven award-winning CSO50 security governance and management initiatives and headed incident response, security architecture, technology, awareness and operations at local, regional and global levels. He leads cybersecurity across large MNC, heading 8 direct reports at Group Cybersecurity Department as well as indirect reports across regional offices and local business units in 42 countries. He oversees both IT and OT Security Governance, Global Cybersecurity Technology Management and Incident Response as well as Cyber Security Masterplan Office. Always keen to give back to the community, he also volunteers at the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as the President (from 2021 to 2022) and OT-ISAC (since 2021), the second key thrust of the SG's OT Cybersecurity Masterplan 2019, as Chair Executive Committee, as well as member of Geneva Dialogue Technical Community, and holds Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. Recorded 5th Sept 2.30pm. Singapore Operational Technology Information Sharing and Analysis Summit 2024#otcybersecurity #mysecuritytv #cybersecurity #singaporecybersecurityThe podcast and artwork embedded on this page are from MySecurity Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this episode, Elizabeth talks to Nick Taylor-Vaisey, a journalist for Politico who works on the Ottawa Playbook, a free daily morning newsletter decoding Canadian politics. Nick and Elizabeth discuss the role of newsletters in curating information in a high-choice media environment and the way journalism has adapted to becoming digital. They discuss newsletters as a form of political information sharing and how this type of media can facilitate a direct relationship between author and reader. Elizabeth and Nick close out the show by chatting about the different reasons that individuals might subscribe to a political newsletter, the role of news aggregators in curating information, and what it's like to work in the Ottawa “fishbowl”.Additional Resources:To learn more about the high-choice media environment, check out Wonks and War Rooms' first episode: The High-Choice Media Environment with Jane Lytvynenko.Nick mentions how newsletters are an old medium that are being updated to stay fresh and trendy. For some background on the history of the newsletter, consult The Newsletter Boom, 300 Years before Substack.Nick provides examples of how the unmediated and relational nature of newsletters allows him to cultivate a direct relationship with his subscribers. For an academic perspective on this, consult: Email Newsletters and the Changing Journalist-Audience Relationship. Elizabeth and Nick talk about how audiences are increasingly seeking out journalists' opinions on the news. For an example of this, consult The Rise of the Talking Journalist: Human Voice, Engagement, and Trust in Live Journalism Performance.Elizabeth and Nick discuss the parasocial relationship between the author and reader, for more details on parasocial relationships, check out the Wonks and War Rooms episode on Parasocial Relationships with T.X. WatsonElizabeth also mentions the blurring of the boundaries between political journalist and political pundit or social media influencer or columnist or opinion writer. For more information about the difference between journalism and punditry, consult the article: Are pundits journalists?ContributorsHost: Elizabeth DuboisResearch Lead: Mykenzie BarreraTranscript: Michelle Rodrigues Audio Editing: Ayman NaciriTranslation: Els Thant & Helena LegaultPublishing and Promotion: Helena Legault Producer: Michelle Hennessey Check out www.polcommtech.ca for annotated transcripts of this episode in English and French.
Three Buddy Problem - Episode 20: We revisit the ‘hack-back' debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero's Clem Lecinge's Hexacon talk, Apple's new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace' Bitcoin attacks and more details on North Korean cryptocurrency theft. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore. As a seasoned expert in operational technology (OT) cybersecurity, Sim shared valuable insights into the importance of information sharing, the growing threat of ransomware, and the transformative role of AI in cybersecurity.Kicking off the podcast, Steven introduced the Executive Committee and its pivotal role in driving OT-ISAC's mission to foster a collaborative community and promote best practices. By providing advisory support and strategic guidance, the committee ensures OT-ISAC stays at the forefront of cybersecurity initiatives.Balancing Information Sharing and ConfidentialityOne of the most pressing challenges in OT cybersecurity is striking the right balance between information sharing and safeguarding sensitive data. He explained that OT-ISAC has implemented robust measures, such as the Traffic Light Protocol and data anonymization techniques, to protect confidentiality while promoting collaboration. The platform also employs protocols like STIX and TAXII to automate the exchange of cyber threat intelligence, enabling members to quickly share and respond to emerging threats.Cross-Jurisdictional CollaborationWith cyber threats spanning borders, cross-jurisdictional collaboration is essential. Sim highlighted that OT-ISAC allows members to share threat intelligence across different regions without breaching data sovereignty regulations by anonymizing the information sources. This approach strengthens global defenses against transnational cyberattacks.The Growing Threat of RansomwareRansomware remains a significant risk to OT environments. Steven urged organizations to avoid paying ransoms, citing the risks and long-term consequences. Instead, he emphasized the importance of investing in strong business continuity and incident response plans. By focusing on resilience and preparedness, organizations can minimize their exposure to future attacks.AI's Role in OT CybersecurityHe also discussed the potential of AI in OT cybersecurity, noting its ability to streamline incident response and improve threat detection. However, he cautioned that while AI offers powerful advantages, it must be implemented with human oversight to manage the risks associated with automated systems.Steven Sim has worked for more than 25 years in the cybersecurity field with large end-user enterprises and critical infrastructures, undertaken global CISO role, driven award-winning CSO50 security governance and management initiatives and headed incident response, security architecture, technology, awareness and operations at local, regional and global levels. He leads cybersecurity across large MNC, heading 8 direct reports at Group Cybersecurity Department as well as indirect reports across regional offices and local business units in 42 countries. He oversees both IT and OT Security Governance, Global Cybersecurity Technology Management and Incident Response as well as Cyber Security Masterplan Office. Always keen to give back to the community, he also volunteers at the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as the President (from 2021 to 2022) and OT-ISAC (since 2021), the second key thrust of the SG's OT Cybersecurity Masterplan 2019, as Chair Executive Committee, as well as member of Geneva Dialogue Technical Community, and holds Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. Recorded 5th Sept 2.30pm. Singapore Operational Technology Information Sharing and Analysis Summit 2024#otcybersecurity #mysecuritytv #cybersecurity #singaporecybersecurity
Join the dialogue - text your questions, insights, and feedback to The Dignity Lab podcast.This episode of The Dignity Lab explores the evolution and significance of gossip, from its origins as a term for spiritual kinship to its modern social functions. We explain the ways in which gossip can serve positive purposes like social bonding and norm enforcement while also examining when it becomes harmful through practices like case-building.Book Recommendation:Sapiens: A Brief History of Humankind by Yuval Noah HarariTakeaways:The word "gossip" originated from "godsibb" (god + sibling), initially referring to spiritual kinship and close friendships before becoming associated with idle talkGossip serves evolutionary and social purposes, helping humans share information, enforce social norms, and build larger group cooperationWhen gossiping, people often seek answers to unspoken questions like "Is what this person did okay?" and "Am I okay?" while trying to meet basic needs for validation and understandingCase-building, a form of repetitive negative gossip about someone who has wronged us, can be destructive and keep us stuck in negative patternsBody awareness and self-reflection can help determine whether gossip is serving a productive purpose or becoming harmful to ourselves and otherLeaders have a responsibility to enforce a culture of dignityExploring what it means to live and lead with dignity at work, in our families, in our communities, and in the world. What is dignity? How can we honor the dignity of others? And how can we repair and reclaim our dignity after harm? Tune in to hear stories about violations of dignity and ways in which we heal, forgive, and make choices about how we show up in a chaotic and fractured world. Hosted by physician and coach Jennifer Griggs.For more information on the podcast, please visit www.thedignitylab.com.For more information on podcast host Dr. Jennifer Griggs, please visit https://jennifergriggs.com/.For additional free resources, including the periodic table of dignity elements, please visit https://jennifergriggs.com/resources/.The Dignity Lab is an affiliate of Bookshop.org and will receive 10% of the purchase price when you click through and make a purchase. This supports our production and hosting costs. Bookshop.org doesn't earn money off bookstore sales, all profits go to independent bookstores. We encourage our listeners to purchase books through Bookshop.org for this reason.
In this episode of the Ducks Unlimited Podcast, host Matt Harrison sits down with waterfowl legend Jim Ronquest. With over 50 years of experience, Ronquest offers valuable hunting tips, personal stories from the field, and insights on elevating your waterfowl hunting game. He also reflects on his deep passion for conservation and the future of waterfowl habitats. Whether you're new to hunting or a seasoned pro, this episode is packed with knowledge and inspiration from one of the best in the industry.Listen now: www.ducks.org/DUPodcastSend feedback: DUPodcast@ducks.org
Dr. Austin Wessell changed the trajectory of his practice by introducing a special templated schedule. He shares how he solves dentistry's modern problems, his love for photography, and proper information sharing with patients. Ladies & Gentlemen, you're listening to "Confessions From A Dental Lab" and we're happy you're here. Subscribe today and tell a friend so we can all get 1% better :) Connect with Dr. Wessell on instagram at @draustinwessell and email him at draustin@themadisondentist.com Follow KJ & NuArt on Instagram at @lifeatnuartdental, you can also reach us via email: kj@nuartdental.com Learn more about the lab and request information via our website: https://www.nuartdental.com/new-dentist-contact-form/
Newsradio WFLA's Read Shepherd talks with Marci Andino, VP-Elections Infrastructure, Information Sharing and Analysis Center, about the impact of Artificial Intelligence on the 2024 elections.
In this episode of CHIMEcast, CHIME President & CEO Russ Branzell engages in an insightful discussion with Sara Meinke, Sr. Director of Enterprise IT Ambulatory Network Innovation at Baptist Health. The conversation focuses on overcoming healthcare's data silos and the strategies that organizations can implement to enable seamless information sharing. Sara shares her experience leading data integration at Baptist Health and discusses the challenges, best practices, and future trends in healthcare interoperability. With 85% of healthcare organizations prioritizing data integration but only 40% confident in their systems' abilities, this episode provides valuable insights on advancing digital health strategies.
Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, turns over hosting responsibilities to Errol Weiss, the Chief Security Officer (CSO) of the HEALTH-ISAC and one of the original contributors to the N2K CyberWire Hash Table. He will make the business case for information sharing. References: White and Williams LLP, Staff Osborne Clarke LLP , 2018. Threat Information Sharing and GDPR [Legal Review]. FS-ISAC. Senator Richard Burr (R-NC), 2015. S.754 - 114th Congress (2015-2016): To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes [Law]. Library of Congress. Staff, n.d. National Council of ISACs [Website]. NCI. Staff, 2020. Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015 [Guidance]. CISA. Staff, 2023. Information Sharing Best Practices [White paper]. Health-ISAC. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this eye-opening episode, I explore the innovative world of repurposing materials with Damon Carson, founder of repurposedMATERIALS. We uncover how farmers and ranchers across America are finding creative solutions to common challenges using discarded industrial items. From billboards transformed into hay tarps to street sweeper brushes reborn as cattle back scratchers, Damon shares a treasure trove of ingenious ideas that showcase the resourcefulness of the agricultural community. We delve into the economic and environmental benefits of repurposing, highlighting how this practice aligns with the frugal nature of cattle production while contributing to sustainability efforts. Discover: • Why used conveyor belting is considered the "Swiss Army knife" of farm and ranch materials • How retired swimming pool covers find new life as shade screens for livestock • The surprising second act for football field turf in poultry operations This conversation is a testament to the ingenuity of American farmers and ranchers, proving that one industry's trash can truly become agriculture's treasure. Whether you're looking to stretch your budget, reduce waste, or simply spark your creativity, this episode offers a wealth of inspiration for giving materials a second chance at usefulness. Join us as we celebrate the art of repurposing and uncover how this practice is shaping a more sustainable and resourceful future for agriculture. 00:00:00 Introduction to Repurposing Materials in Agriculture 00:02:41 Repurposing Byproducts for Farms and Ranches 00:06:31 Unique Repurposing Projects for Ranchers 00:08:33 Creative Use of Swimming Pool Covers 00:09:52 The Chicken or the Egg Dilemma in Material Repurposing 00:11:34 Raw Material Supply and Customization 00:12:45 Diverse Industries Served and Focus on Repurposing 00:14:15 Motivations Behind Material Repurposing 00:16:09 Collaboration Across Industries for Waste Reduction 00:19:57 Regional Differences in Material Sourcing 00:21:13 The Concept of Repurposing Across Industries 00:22:45 The Frugality of the Agricultural Community 00:23:03 Information Sharing and Thought Leadership 00:24:00 Closing Remarks and Podcast Support https://www.repurposedmaterialsinc.com/ https://www.casualcattleconversations.com/
In this week's Security Sprint, Dave and Andy covered the following topics: Warm Start: CISA: Shaping the legacy of partnership between government and private sector globally: JCDC Main Topics: International Security Incidents: Solingen: Main suspect behind deadly attack in custody Three dead after stabbing attack at festival in western Germany German police arrest boy accused of knowing about knife attack in advance French police arrest synagogue blast suspect Explosions Outside a France Synagogue Were a Terrorist Attack, Prosecutors Say Suspect Caught On CCTV In French Synagogue Attack Held Palestinian Flag: Source Close To Probe US ‘kinetic strike' takes out senior leader of terrorist group aligned with al Qaeda in Syria Iran says 14 Daesh suspects arrested planning attacks Four Islamic State Terrorists ‘Liquidated' By Russian Snipers After Taking Prison Guards Hostage: REPORT NATO airbase in Germany raises security level due to 'potential threat.' Hamas said to decide to target Israelis abroad in bid to avenge Haniyeh killing Forgotten radios and missed warnings: New details emerge about communication failures before Trump rally shooting. The day before the attempted assassination of Donald Trump, a tactical team of local police officers set aside radios for their Secret Service partners so the two agencies could communicate during the former president's July 13 campaign rally. But those radios were never picked up. Invest in Resilience! Cyber Resilience Overestimation Leads to Business Continuity Issues, Ransom Payments Corvus: Q2 Cyber Threat Report: Ransomware Season Arrives Early Kroll: Q2 2024 Threat Landscape Report: Threat Actors Do Their Homework, Ransomware and Cloud Risks Accelerate Rapid7: Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum Malwarebytes / ThreatDown: Why you need to know about ransomware NCC Group Monthly Threat Pulse – Review of July 2024 WithSecure: Ransomware Landscape H1/2024 Quick Hits: From cybercrime to terrorism, FBI director says America faces many elevated threats 'all at once' ASD's ACSC, CISA, FBI, and NSA, with the support of International Partners Release Best Practices for Event Logging and Threat Detection Alabama Man Pleads Guilty to Detonating an Explosive Device Outside of the Alabama Attorney General's Office VFC: Bomb Threats at Jewish Institutions Bomb threats reported at more than 100 Canadian Jewish institutions Oregon Man Charged in Swatting and Bomb Threats Scheme That Targeted Jewish Hospitals in New York City and Long Island Arizona man in custody amid investigation into alleged threats to kill former President Donald Trump Iran Tries To 'Storm' U.S. Election With Russian-Style Disinformation Campaign Meta: Taking Action Against Malicious Accounts in Iran How Russian Trolls Are Trying to Go Viral on X Trump attorney was targeted by hackers, sources say ‘Several opportunities' to prevent Maine mass shooting were missed, commission finds International report confirms record-high global temperatures, greenhouse gases in 2023
In this weeks Security Sprint, Dave and Andy covered the following topics: Warm Start: · FB-ISAO Releases an All-Faiths Analysis of Attacks on U.S. Houses of Worship in 2023. · New Cyware Survey Reveals Critical Gaps in Cybersecurity Threat Intelligence Sharing and Collaboration. · Private-public partnership releases new bank resources for cloud computing adoption. o Financial Sector Cloud Outsourcing Issues and Considerations. Main Topics: CrowdStrike Outage: · CISA: Widespread IT Outage Due to CrowdStrike Update (being updated; update 9:45 a.m., EDT, July 21, 2024) · Canadian Centre for Cyber Security - Alert - Issue impacting CrowdStrike Falcon EDR · UK NCSC: Statement on major IT outage · NZ-NCSC: NCSC statement on global IT outage · CrowdStrike says significant number of devices back online after global outage. o Technical Details: Falcon Content Update for Windows Hosts, 20 Jul · Microsoft: New Recovery Tool to help with CrowdStrike issue impacting Windows endpoints · CrowdStrike CEO George Kurtz speaks out after failed tech update causes worldwide chaos at airports and banks · Microsoft says 8.5M Windows devices were affected by CrowdStrike outage · Brian Krebs: Global Microsoft Meltdown Tied to Bad Crowdstrike Update · Blue Screens Everywhere Are Latest Tech Woe for Microsoft · Don't Fall for CrowdStrike Outage Scams Donald Trump Assassination Attempt & Associated Physical Security: · FBI, DHS warn of possible retaliation for attack on Trump. · Trump's would-be assassin researched previous mass shooter Ethan Crumbley and his family before attack. · Gunman Might Have Scoped Out Site Six Days Before Trump Rally. · Secret Service Arrests Florida Man Threatening to Kill Joe Biden. · Roswell Man Indicted for Threatening FBI Director Christopher Wray. · Secretary Mayorkas Delivers Remarks at White House Press Briefing. · TIME: What We Know—and Don't Know—So Far About the Trump Rally Gunman · Militias Are Recruiting Off of the Trump Shooting Misinfo: o Conspiracy theories spread wildly after the first assassination attempt on a US president in the social media age o One in Three Biden Supporters Think Trump Shooting Might Have Been Staged o 4chan post claiming Secret Service told not to fire on Trump shooter explodes into full-on TikTok conspiracy o Top Conspiracy Theories Around Trump Assassination Attempt Debunked Health: · CDC Confirms Human Cases of H5 Bird Flu Among Colorado Poultry Workers. · In 2 years since the launch of 988, 10 million contacts have been answered · Global childhood vaccination hits plateau, with 35 million not fully protected from measles · UK Covid-19 Inquiry: Resilience and preparedness (Module 1) Ransomware: · CDK hack shows SEC disclosure standards are unsettled · ReliaQuest: Ransomware and Cyber Extortion in Q2 2024 · California officials say largest trial court in US victim of ransomware attack. · Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group Quick Hits: · China seeks space supremacy and to exploit it ‘to our detriment': US intelligence head · US to issue proposed rules limiting Chinese vehicle software in August · Fragmented and multiplied cybercriminal landscape, warns new Europol report · Europol: Internet Organised Crime Threat Assessment (IOCTA) 2024. · Patagonia invaded privacy by using AI to analyze customer service interactions, lawsuit alleges · CISA Releases Playbook for Infrastructure Resilience Planning. · Software Bill of Materials (SBOM) FAQ Resource. · Why the Pentagon Is Warning That ISIS Attacks Could Double This Year · US says ISIL trying ‘to reconstitute' amid uptick in Syria, Iraq attacks · Neo-Nazi group demonstrates on Tennessee overpass
Today we are tackling a topic that we have never covered before, not even a little. Imagine walking into a crowded room and not knowing who to talk to or what to say, a situation I have found myself uncomfortably in more times that my therapist can ignore. The ability to build meaningful relationships and strategic alliances is a critical part of the success of any business. Today, Andrew and I will discuss a topic that at least from my side of things, have zero training in but is nonetheless a part of my job description and responsibilities in the office. Time to have a frank conversation about the indispensable practice of turning professional interactions into valuable assets. Welcome to EP 154: Networking [Note: If you are reading this via email, click here to access the on-site audio player] [hoops name="top1"] Today we are going to be discussing the topic of Networking as it pertains to business development, not the cat5 cables running from your computer to some windowless closet in the building. On a scale of 1 to 10, I rate myself as a solid 5 when it comes to networking - which I define as “better than most” but worse than those that are actually skilled at the process, and my skills drop off once you get past charm and Leprechaun stories. So when I decided to make "networking" as a topic for today's conversation, I knew it would require a lot of research and a fair amount of self-reflection specific to what I think I am actually good at doing. In preparation I started with the most basic definition of what networking actually is: Networking is a part of business development that ultimately addresses the question of how leads come into the office. This is a topic that I have wanted to talk about for a long time, mostly because I have some pretty significant responsibilities in my office to network and bring in business. I am constantly asking myself “How do I go about networking?!?” There are a million questions on this and depending on your goals, or responsibilities, there are a million different answers to this question. When I talk to the more experienced principals and owners in my office, they tend to answer the “How do you network” question in a similar manner - almost all of them say that it has very little to do with talking about work, but rather it's about making a personal connection and finding people you like and want to work with. What is Networking and Why is it Worth Your Time jump to 7:53 Networking is the eventual evolution for anyone who is in a professional services profession if you have any sort of leadership and business responsibilities. The long and short of it is that networking is the engine that drives your business and as a result, its value is self-evident. Now that I am 15 years into that portion of my career where I have some responsibility to bring in work, I have come into the decision the hardest part of networking is showing up. The second hardest thing is walking up to someone and saying hello and asking people questions. What makes these simple things hard is the idea that you are putting yourself out there and have opened yourself up to some level of embarrassment and rejection. Andrew and I talk about our own experiences networking, the good, the bad, and the ugly, and with the experience and success we have achieved, we have broken this topic down into 8 key areas for consideration. 1. Relationship Building: Initial Contact: Making the first connection, often through introductions, events, or online platforms. Nurturing Relationships: Consistently maintaining and strengthening these connections over time through regular communication and engagement. 2. Exchange of Information: Sharing knowledge, insights, and updates relevant to your industry or profession. Learning from others' experiences and expertise to enhance your own understanding and skills. 3. Resource Sharing: Providing and receiving access to valuable resources such as...
Today we are tackling a topic that we have never covered before, not even a little. Imagine walking into a crowded room and not knowing who to talk to or what to say, a situation I have found myself uncomfortably in more times that my therapist can ignore. The ability to build meaningful relationships and strategic alliances is a critical part of the success of any business. Today, Andrew and I will discuss a topic that at least from my side of things, have zero training in but is nonetheless a part of my job description and responsibilities in the office. Time to have a frank conversation about the indispensable practice of turning professional interactions into valuable assets. Welcome to EP 154: Networking [Note: If you are reading this via email, click here to access the on-site audio player] Today we are going to be discussing the topic of Networking as it pertains to business development, not the cat5 cables running from your computer to some windowless closet in the building. On a scale of 1 to 10, I rate myself as a solid 5 when it comes to networking - which I define as “better than most” but worse than those that are actually skilled at the process, and my skills drop off once you get past charm and Leprechaun stories. So when I decided to make "networking" as a topic for today's conversation, I knew it would require a lot of research and a fair amount of self-reflection specific to what I think I am actually good at doing. In preparation I started with the most basic definition of what networking actually is: Networking is a part of business development that ultimately addresses the question of how leads come into the office. This is a topic that I have wanted to talk about for a long time, mostly because I have some pretty significant responsibilities in my office to network and bring in business. I am constantly asking myself “How do I go about networking?!?” There are a million questions on this and depending on your goals, or responsibilities, there are a million different answers to this question. When I talk to the more experienced principals and owners in my office, they tend to answer the “How do you network” question in a similar manner - almost all of them say that it has very little to do with talking about work, but rather it's about making a personal connection and finding people you like and want to work with. What is Networking and Why is it Worth Your Time jump to 7:53 Networking is the eventual evolution for anyone who is in a professional services profession if you have any sort of leadership and business responsibilities. The long and short of it is that networking is the engine that drives your business and as a result, its value is self-evident. Now that I am 15 years into that portion of my career where I have some responsibility to bring in work, I have come into the decision the hardest part of networking is showing up. The second hardest thing is walking up to someone and saying hello and asking people questions. What makes these simple things hard is the idea that you are putting yourself out there and have opened yourself up to some level of embarrassment and rejection. Andrew and I talk about our own experiences networking, the good, the bad, and the ugly, and with the experience and success we have achieved, we have broken this topic down into 8 key areas for consideration. 1. Relationship Building: Initial Contact: Making the first connection, often through introductions, events, or online platforms. Nurturing Relationships: Consistently maintaining and strengthening these connections over time through regular communication and engagement. 2. Exchange of Information: Sharing knowledge, insights, and updates relevant to your industry or profession. Learning from others' experiences and expertise to enhance your own understanding and skills. 3. Resource Sharing: Providing and receiving access to valuable resources such as contacts, tools,
Thanks to our Partner, NAPA Autotech napaautotech.com Matt Fanslow discusses the importance of forming relationships with tool truck dealers. He emphasizes the benefits of sharing information and knowledge, highlighting the potential for mutual support and collaboration within the automotive industry. Show NotesInteractions with Tool Dealers (00:01:08) Discussion on the visits by tool dealers and the challenges in communicating needs and preferences to them.Developing Relationships (00:02:15) Importance of developing relationships with tool dealers, outside salespeople, and distributors, emphasizing the need for networking and knowledge sharing.Challenges with Tool Offerings (00:03:37) Exploration of the limitations and challenges in the offerings of tool dealers, including the lack of awareness about alternative products.Quid Pro Quo in Information Sharing (00:05:03) Discussion on the concept of quid pro quo, where information sharing with tool dealers can lead to mutual benefits over time.Challenges Faced by Tool Dealers (00:06:14) Insight into the challenges faced by tool dealers in keeping up with product knowledge.Enhancing Relationships with Tool Dealers (00:13:04) Encouragement for forming strong relationships with tool dealers, emphasizing the mutual exchange of knowledge and support.Expanding Services and Product Offerings (00:16:01) Exploration of the potential for expanding services and product offerings, including high voltage gloves and technical tools, to support the evolving needs of automotive professionals.Symbiotic Relationship with Tool Dealers (00:17:19) Emphasis on the symbiotic relationship between automotive professionals and tool dealers, highlighting the mutual benefits of collaboration.Thanks to our Partner, NAPA Autotech napaautotech.com Email Matt: mattfanslowpodcast@gmail.comDiagnosing the Aftermarket A - Z YouTube Channel HEREAftermarket Radio Network: https://aftermarketradionetwork.com/
Thanks to our Partner, NAPA Autotech napaautotech.com Matt Fanslow discusses the importance of forming relationships with tool truck dealers. He emphasizes the benefits of sharing information and knowledge, highlighting the potential for mutual support and collaboration within the automotive industry. Show NotesInteractions with Tool Dealers (00:01:08) Discussion on the visits by tool dealers and the challenges in communicating needs and preferences to them.Developing Relationships (00:02:15) Importance of developing relationships with tool dealers, outside salespeople, and distributors, emphasizing the need for networking and knowledge sharing.Challenges with Tool Offerings (00:03:37) Exploration of the limitations and challenges in the offerings of tool dealers, including the lack of awareness about alternative products.Quid Pro Quo in Information Sharing (00:05:03) Discussion on the concept of quid pro quo, where information sharing with tool dealers can lead to mutual benefits over time.Challenges Faced by Tool Dealers (00:06:14) Insight into the challenges faced by tool dealers in keeping up with product knowledge.Enhancing Relationships with Tool Dealers (00:13:04) Encouragement for forming strong relationships with tool dealers, emphasizing the mutual exchange of knowledge and support.Expanding Services and Product Offerings (00:16:01) Exploration of the potential for expanding services and product offerings, including high voltage gloves and technical tools, to support the evolving needs of automotive professionals.Symbiotic Relationship with Tool Dealers (00:17:19) Emphasis on the symbiotic relationship between automotive professionals and tool dealers, highlighting the mutual benefits of collaboration.Thanks to our Partner, NAPA Autotech napaautotech.com Email Matt: mattfanslowpodcast@gmail.comDiagnosing the Aftermarket A - Z YouTube Channel HEREAftermarket Radio Network: https://aftermarketradionetwork.com/
The conversation discusses the trend of regulated industries adopting military-grade cyber defenses and the importance of information sharing and collaboration in the cybersecurity field. It emphasizes the need for a collective approach to cybersecurity and the adoption of strategies like zero trust. The conversation also highlights the significance of protecting unclassified data and the potential impact of future technologies like AI. The hosts express optimism about the future of cybersecurity but stress the importance of security awareness and understanding among both older and younger generations. Please LISTEN
Information sharing is critical to Department of Defense and Intelligence missions but comes with challenges. GDIT's Eric Tapp and Nick Townsend discuss the technological and policy solutions necessary to overcome them. In Voices of Innovation—a podcast by GDIT—we bring you into conversations with the thinkers, innovators, and mission experts who are shaping some of the most complex government, defense, and intelligence projects across the country. We explore cutting-edge technologies, from artificial intelligence to quantum computing, that are crucial for leading and accelerating government missions. Each episode features insights and stories from GDIT, government, and industry technologists. They are at the helm, leveraging groundbreaking technology to drive missions that matter most. Join us as we dive into a world where technological innovation meets strategic execution. Subscribe now to never miss an episode. GDIT is a global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development.
In this episode the host, Charlotte Bayala, delves into the delicate balance of friendships through the lens of caregiving. She opens up about the emotional complexities of sharing her husband's cancer journey with friends and the inevitable hierarchy of communication that forms when managing such personal news. She reflects on the challenges of not overwhelming friends while also needing their support, the nuanced decisions of who to inform and when, and how different friends play different roles in our lives. Whether it's the people who are in the trenches with us or those we share light moments with, navigating these relationships requires tact, empathy, and an understanding of each other's capacities. This episode explores not just the act of sharing difficult news, but also the broader implications of friendship, support, and personal boundaries within the caregiving space. Join us as we unpack these themes and consider how to appreciate and maintain the invaluable friendships that help sustain us through tough times. Find the full transcript and more caregiver support at https://www.loveyourcaregivinglife.com
In this episode, I highlight the impact that dedicating 10 minutes a day to a specific task can have. I shared my own goal of writing a book based on the incredible information I've learned from interviewing my guests over the last 5 years and how committing 10 minutes each day will make a significant dent in that over the span of a year. I'm also excited to introduce my new co-host, Dave Ragosa, who's an expert in franchising & entrepreneurship. He'll be joining me on the show next week, stay tuned for that! I'd love to hear about your own 10-minute commitments, feel free to share them in the comments on YouTube or on my social media that is linked below. Connect with Mike: Linktree Produced by Social Chameleon Interview Recorded via Riverside.fm Mike'D Up! Merch SPONSORS: Magic Mind: https://www.magicmind.com/JANmikedup Use promo code to MIKEDUP20 to save 20% OFF! Social Chameleon: https://socialchameleon.us Navigator Bookkeeping: https://navigatingyourbooks.com Copyright © 2024 Mike'D Up! with Mike DiCioccio | For permission to use this content in any way, please email mike@socialchameleon.us
In this sponsored conversation, I speak with Corey Ranslem, CEO of Dryad—and the resident expert on Maritime Attacks—and Ismael Valenzuela, VP of Threat Intelligence and Research at Blackberry. We talked about all things Maritime Security, and I learned a whole lot from the conversation. Digital Hijacking at Sea: Unveiling a Cyber Attack Scenario in the Red Sea BlackBerry Quarterly Global Threat Report — March 2024 00:00:00 Introduction and Guest Welcome00:00:30 Maritime Security Overview00:01:15 Baltimore Incident Discussion00:02:00 Legacy Systems on Ships00:03:20 Connectivity Challenges at Sea00:04:10 Cyber Threats in Maritime Industry00:05:00 Post-Accident Cyber Investigations00:06:00 Potential Cyber Attacks on Ships00:07:30 Threat Scenarios and Models00:08:45 USB and External Media Threats00:09:30 Evolution of Navigation System Connectivity00:10:30 Crew Connectivity and Cyber Risks00:11:30 Lessons from Other Industries00:12:15 GPS Spoofing and Navigation Interference00:13:30 Digital Hijacking of Ships00:14:45 Economic Disruption via Cyber Attacks00:16:00 Financial Motivation Behind Attacks00:17:15 Ransomware in Maritime Context00:18:30 Panama Canal and Economic Impact00:19:30 Cyber Security Maturity in Maritime Industry00:21:00 Legacy Systems and Geopolitical Interests00:22:15 Challenges with Security Solutions at Sea00:23:30 Historical Cyber Incidents in Maritime00:24:30 GPS Spoofing Techniques00:25:15 International Maritime Organization Standards00:26:30 Criminal Trends and Cyber Attacks00:27:45 Open Source Tools and Threat Actors00:28:45 Information Sharing in Maritime Industry00:29:30 Real-World Examples of Cyber Incidents00:31:00 Cruise Ships and Large Yachts Security00:32:15 Autonomous Vessels and Cyber Protection00:33:30 Future of Autonomous Vessels00:34:15 Learning and Improving Cyber Security in Maritime00:35:30 Role of Threat Intelligence in Maritime Security00:36:15 Optimism for the Future of Maritime Security00:37:30 Industry Awareness and Education Efforts00:38:30 AI Integration in Maritime Security Solutions00:39:15 Conclusion and Final ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.
On this episode of Real Estate Insiders Unfiltered, Tim Dain, President and CEO of NorthstarMLS joins James and Keith to share his experience after attending the Minnesota School of Law “open forum” regarding the NAR settlement. He was one of few in attendance from the real estate industry, mostly surrounded by class action lawyers, attorney generals and others who want to file further legal claims to regulate the business. In addition, hear his insights on leveraging big data, such as knowing the serial number of every appliance in the home and what could you do with that information to enhance consumer experiences and the future of the MLS. Check out NorthstarMLS on - Facebook - Instagram - LinkedIn - X - YouTube or visit them at northstarmls.com. Click here for the Commission and Compensation Study done by Bright MLS about steering in the industry. And check out a breakdown of that study with our previous episode The True Value of the MLS. Follow Real Estate Insiders Unfiltered Podcast on Instagram - YouTube - Facebook - LinkedIn - TikTok. Visit us online at realestateinsidersunfiltered.com. This podcast is produced by Two Brothers Creative 2024.
Guests:Emily Coyle, President & Founding Partner, Cyber Governance AllianceOn LinkedIn | https://www.linkedin.com/in/emily-elaine-coyle-a8243328/Dr. Amit Elazari, Co-Founder & CEO, OpenPolicyOn LinkedIn | https://www.linkedin.com/in/amit-elazari-bar-on/On X | https://www.twitter.com/AmitElazariAndrew Goldstein, Chair of Global White Collar Defense and Investigations Practice, Cooley LLP [@CooleyLLP]On LinkedIn | https://www.linkedin.com/in/andrew-d-goldstein/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn the episode of Redefining CyberSecurity Podcast, host Sean Martin discusses the issues surrounding the SEC's precedent-setting decision to charge the CISO of SolarWinds, Tim Brown, in the aftermath of the Sunburst cyberattack. Joining Sean are Emily Coyle, the founder of Cyber Governance Alliance, Andrew Goldstein from law firm Cooley and Amit Elazari from OpenPolicy. Emily elucidates on the work of the Cyber Governance Alliance, aiming to lobby for methodology change by bringing the best practices of cybersecurity into the legal framework. The Alliance is seeking to provide cyber security professionals with the protections they need to carry out their role, including limitations on liability and protection against the chilling effect of litigation. Andrew speaks to the potential impacts their arguments could have on the wider cyber security field. A pressing concern he highlights is the effect of the SEC's decision on aspiring cyber security professionals and their willingness to engage in the field, potentially exacerbating an already vulnerable shortage of professionals.Amit points out the contradictions between best practice standards for cybersecurity, enshrined in legislation, and the SEC's decision. She puts a call to action to the cyber community to collectively support the renewal of the amicus, around furthering discussions with policy makers to create a balanced decision.The group concludes that the lawsuit sets a challenging precedence for cybersecurity professionals. They argue that aligning legal and policy frameworks with cybersecurity practices should be a priority. They also encourage the community to engage the policymakers in discussion, starting with commenting on and signing the next amicus brief being drafted. Collectively they emphasize the urgency and importance of the cybersecurity community's involvement in shaping the future of cybersecurity policy and governance before it's set in stone.Key Questions AddressedWhat has been the impact, thus far, of the SEC's decision to charge the CISO of SolarWinds, Tim Brown, after the Sunburst cyberattack?How can conflicting policies potentially impact the sustainability of effective cybersecurity practices and what is the call to action for the cybersecurity community?How is the Cyber Governance Alliance challenging the current cybersecurity legal framework and what protections are they seeking for cybersecurity professionals?Top Insights from the ConversationThe SEC's decision to charge the CISO of SolarWinds has far-reaching implications for the cybersecurity community and can deter aspiring professionals for a long time to come.Through the Cyber Governance Alliance, there's an ongoing effort to integrate the best practices of cybersecurity into the legal framework and provide basic liability protections for cybersecurity professionals.Despite the contradictions in cybersecurity policies, there's an urgent call for the cybersecurity community to unify and shape the future of cybersecurity policies and governance.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Sidney Pearl, Executive Director at AI-ISACOn Linkedin | https://www.linkedin.com/in/sidney-pearl/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesWelcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.Key Insights Provided:What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Tim Schigel's life and career have been shaped by his Cleveland roots, a large ethnic family, and a passion for music. In this interview transcript, Tim shares his journey from growing up in Cleveland to becoming a pioneering figure in the tech and venture capital space. His VC firm, Refinery Ventures, has invested in top-tier companies like bitewell, FRAYT, StoryFit, and Livegistics.
Industrial Talk is chatting with Ahmik Hindman, Sr. Network and Security Solutions Consultant with Rockwell Automation about “Security solutions for protecting your connected assets and operations”. The following is a summary of our conversation: Collaboration and information sharing are crucial in the cybersecurity landscape. There are various platforms and initiatives where manufacturers can share threat intelligence, experiences, and best practices. One notable example is the **Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)**, a division of the U.S. Department of Homeland Security. ICS-CERT provides a platform for critical infrastructure owners and operators to report cybersecurity incidents and receive assistance in incident response and recovery. Additionally, there are industry-specific Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs) where companies within the same sector share cybersecurity information. These platforms facilitate collaboration and enable organizations to stay updated on emerging threats and mitigation strategies. Furthermore, private cybersecurity firms often host forums and conferences where professionals can network, share insights, and discuss the latest developments in the field. These collaborative efforts help manufacturers enhance their cybersecurity postures by learning from the experiences of others and staying informed about evolving threats. Finally, get your exclusive free access to the Industrial Academy and a series on “Why You Need To Podcast” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy! AHMIK HINDMAN'S CONTACT INFORMATION: Personal LinkedIn: https://www.linkedin.com/in/ahmik-hindman/ Company LinkedIn: https://www.linkedin.com/company/rockwell-automation/ Company Website: https://www.rockwellautomation.com/ PODCAST VIDEO: https://youtu.be/GTPuX3INfRs THE STRATEGIC REASON "WHY YOU NEED TO PODCAST": OTHER GREAT INDUSTRIAL RESOURCES: NEOM: https://www.neom.com/en-us Fictiv: https://www.fictiv.com/ Hexagon: https://hexagon.com/solutions/enterprise-asset-management Arduino Pro: https://www.arduino.cc/pro/ Hitachi Vantara: https://www.hitachivantara.com/en-us/home.html CAP Logistics: https://www.caplogistics.com/ Armis: https://www.armis.com/ Saviant Consulting: