POPULARITY
Categories
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today's episode, Chris and Abbie are discussing Emotional Regulation in the Workplace. They will talk about the different strategies that can be used to help, not just at work, but in most areas of our lives. [May 5, 2025] 00:00 - Intro 00:38 - Dr. Abbie Maroño Intro 00:57 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:30 - The Topic of the Day: Emotional Regulation in the Workplace 04:14 - Strategy 1: Deep Acting 14:10 - Strategy 2: Mindfulness & Acceptance 19:24 - Strategy 3: Social Sharing 26:40 - Strategy 4: Humor & Distraction 31:21 - Wrap Up 33:07 - Next Month: The Lonely Chapter 33:41 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - LinkedIn: linkedin.com/in/dr-abbie-maroño-phd - Instagram: @DoctorAbbieofficial - LinkedIn: linkedin.com/in/christopherhadnagy References: Kalokerinos, E. K., Résibois, M., Verduyn, P., & Kuppens, P. (2017). The temporal deployment of emotion regulation strategies during negative emotional episodes. Emotion, 17(3), 450–458. https://doi.org/10.1037/emo0000248 Côté, S., & Hideg, I. (2011). The consequences of faking emotions: Emotional dissonance, relationship quality, and employee well-being. Emotion, 11(4), 803–815. https://doi.org/10.1037/a0023868 Lomas, T., Medina, J. C., Ivtzan, I., Rupprecht, S., & Eiroa-Orosa, F. J. (2019). The impact of mindfulness on well-being and performance in the workplace: An inclusive systematic review of the empirical literature. European Journal of Work and Organizational Psychology, 28(6), 782–804. https://doi.org/10.1080/1359432X.2019.1659420 Bono, J. E., Foldes, H. J., Vinson, G., & Muros, J. P. (2007). Workplace emotions: The role of supervision and leadership. Journal of Applied Psychology, 92(5), 1357–1367. https://doi.org/10.1037/0021-9010.92.5.1357 Clayton, S. (2024). Working well: The simple act of taking deep breaths can reduce stress and anxiety. Associated Press. Ordali, E., et al. (2024). Exhaustion at work can lead to difficulty controlling emotions, scientists say. The Guardian. Mesmer-Magnus, J., Glew, D. J., & Viswesvaran, C. (2012). A meta-analysis of positive humor in the workplace. Journal of Managerial Psychology, 27(2), 155–190. https://doi.org/10.1108/02683941211199554 Scheibe, S., & Zacher, H. (2013). A lifespan perspective on emotion regulation, stress, and well-being in the workplace. In The Oxford Handbook of Stress, Health, and Coping (pp. 291–306). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780195375343.013.0017
Kevin Szczepanski welcomes Gregg Davis, managing principal and technical advisory solutions leader at EPIC Insurance Brokers & Consultants. Kevin and Gregg start by discussing the increasing risks of insider threats to cybersecurity and the sophistication of threat actors along with the need for organizations to create a culture of verification and for real-world training. Diving into strategies to mitigate insider threats, they emphasize awareness and proactive measures. Kevin and Gregg touch on business email compromise, insurance policies, the evolving role of the CISO, and much more. Tune in for the whole episode.
Insider threats are no longer just about disgruntled employees. In 2025, threat actors are recruiting from within—sometimes using underground "job boards" to find insiders willing to sell credentials, plant malware, or steal data. In this episode of Today in Tech, host Keith Shaw talks with Ryan LaSalle, CEO of Nisos, about how insider threats are evolving and how companies can detect and prevent them. :mag: Topics covered: How North Korean IT workers infiltrated U.S. companies remotely The rise of “polyworking” and fraudulent employment scams Real-world examples of sabotage and credential brokering Warning signs of insider threats: mental health, financial duress, disengagement Why remote and hybrid work has made detection harder Balancing employee trust with cybersecurity monitoring :loudspeaker: Don't miss this important discussion if you work in InfoSec, HR, or IT management. :+1: Like this video, subscribe to our channel, and comment below with your thoughts or experiences! #Cybersecurity #InsiderThreats #RemoteWork #ITSecurity #TodayInTech #Nisos #KeithShaw #RyanLaSalle #Infosec #DataBreach #WorkplaceSecurity
Following up to last week's show and answering the question posed in it - yes, they did it again. In this week's episode I will recap the poop show that was the Sevier County Republican Party Re-Organization meeting from last Tuesday. I will also be letting the audience know about a couple of upcoming guests to the program. Additionally, I stress the importance of why it is important to always wait for the facts to come out before jumping to any conclusions about a news story being pushed by the propaganda wing of the communists - the national news media.You can subscribe to or follow the podcast on Apple or Spotify, or on your favorite podcast platform – Rumble | YouTube | Overcast | Amazon Music | iHeartRadio | Pocket Casts | RadioPublicJoin me on social media:Twitter – both at @LarryForTN12 @LiesLibertyTruth Social – @LarryForTN12Instagram – @larry_for_tn12 @libertyleadershipandliesFacebook – both at Larry Linton - Sevier County Conservative Activist Liberty, Leadership and LiesGab – @LarryLintonGETTR – @LarryLintonTelegram – t.me/libertyleadershipandliesOr on the web at – https://libertyleadershipandlies.com#LarryForTN12 #LintonForTN12 #LarryLintonForTN12 #LibertyLeadershipAndLies #Liberty #Leadership #Lies #Constitutionalist #Conservative #Tennessee #StandInTheArena #PrincipledLeadership #ServantLeadership #FYP #GOP #RepublicanParty #GoodOldBoys #Corrupt #EthicallyChallenged #InsiderThreat
This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.Chapters00:00 Introduction to Security Vendors00:50 Welcome to the Identity at the Center Podcast01:30 Sponsored Spotlight: Permiso02:14 Meet Paul Nguyen, Co-Founder of Permiso03:34 The Importance of Identity in Security05:35 Permiso's Unique Approach to Identity Security07:36 Real-Time Monitoring and Threat Detection09:23 Challenges and Solutions in Identity Security15:16 Modern Attacks and Identity Threats25:56 The Role of Honeypots in Security Research26:49 Challenges of Maintaining Security27:15 Honeypots and Breach Detection27:46 Dwell Time and Reconnaissance28:34 Password Complexity and Monitoring Gaps29:24 Roles and Responsibilities in Identity Security29:49 Unified Identity Security Teams30:57 Emerging Threats and Joint Efforts32:49 Permiso's Role in Identity Security34:10 Detection and Response Strategies36:11 Managing Identity Risks36:51 Combining Prevention and Detection39:44 Real-World Applications and Challenges51:17 Personal Insights and Final ThoughtsConnect with Paul: https://www.linkedin.com/in/paulnguyen/Learn more about Permiso: https://permiso.io/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at idacpodcast.tvKeywords:identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe importance of proactive surveillance and intelligence gathering in security.Lessons learned from historical security breaches and attack plots.The significance of cultural fit and adaptability in security teams.Challenges faced by security personnel in adjusting to different operational environments.The necessity to constantly update and share intelligence within the security community.The evolving methods of threat actors and their preparedness.Fred Burton's involvement in upcoming TV and film projects based on his books.QUOTES"The scope of detail that some of these threat actors are engaged with is just frightening.""Intelligence is powerful when done correctly.""You can't run a program without intelligence today.""If you've got a good security team, trained in observation skills, you should be able to spot threat actors ahead of time.""Getting people in and out without being hassled is the kind of value add that we routinely do in this business.""It's amazing what you can do if you just try to blend in and ask questions.""Some degree of protection at public venues is essential, especially for controversial issues.""Surveillance is critical before you get the bodies out there. Get that team out there moving around snooping."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Preventing and detecting insider threats is tricky business, as they arise from within the castle. That's why a high quality program requires a comprehensive and multi-faceted approach, encompassing employee education, risk assessments and monitoring technologies. But what exactly does such a program look like? Where should limited resources be allocated, and how can IT professionals determine a general order of priorities if many elements need attention? In this timely webinar, we'll hear from leaders sharing actionable insights to ensure threats from within get as much attention as threats from without. Source: Keys to Implementing a Comprehensive Insider Threat Mitigation Program on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
Cloud adoption is growing rapidly, but so are the cyber threats that come with it! In this insightful episode of the InfosecTrain podcast, Prabh & Krish explore the most common cloud security threats and share expert strategies to mitigate them.
Cloud adoption is growing rapidly, but so are the cyber threats that come with it! In this insightful episode of the InfosecTrain podcast, Prabh & Krish explore the most common cloud security threats and share expert strategies to mitigate them.
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSecurity Concerns on Open Borders: Despite the high number of migrants, there has not been a domestic act of terror directly linked to transnational terrorists from the southern border.Domestic vs. Geopolitical Threats: Domestic threats such as school shootings are more frequent and concerning compared to geopolitical and international threats.Historical Predictive Failures: The U.S. has historically struggled to predict major geopolitical events, regardless of advancements in intelligence.Adaptation and Responsiveness: The executive protection industry often operates reactively, highlighting the need for better proactive measures and adequate resourcing.Regional Differences in Security Perception: Security needs and perceptions differ greatly across the U.S., with coastal regions being more open to private security compared to more self-reliant attitudes in middle America.QUOTES"To the best of my knowledge, there never has been a domestic act of terror directly linked to a transnational terrorist coming from the southern border.""Trust me, you'll be the first one to know if I uncover something that you really need to be concerned about for you or your family.""Our nation seems to always be surprised... I want to believe that we're better today at anticipating surprise, but history has shown we're not.""Most CEOs today are almost more receptive to that kind of low-key protection."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from innocent mistakes to malicious actors, and how companies can effectively protect their sensitive data. Learn about data loss prevention strategies, the impact of remote work, and the role of AI in enhancing data security. Get insights on practical steps that CISOs can take to mitigate risks and safeguard their organization's crown jewels. 00:00 Introduction and Guest Welcome 00:10 Understanding Insider Threats 01:20 Types of Insider Threats 02:18 Monitoring and Preventing Data Leaks 03:37 Remote Work and Security Risks 06:03 Access Control and Permissions 08:41 Real-World Scenarios and Solutions 21:20 The Role of AI in Data Security 34:53 Final Thoughts and Conclusion
In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In the 100th episode of the Security Sprint, Dave and Andy covered the following topics:Warm Open:· H2OSecCon 2025 Call for Presentations Now Open Main Topic: DOGE, the Private Sector. Insider Threats & Info Sharing· DOGE Now Has Access to the Top US Cybersecurity Agency· DOGE employee Edward Coristine lands at CISAwith DHS email· ISAC chief on CISA security rollbacks: ‘The sky isn't falling, yet.'· The Gate 15 Interview EP 55. Allan Liska, Ransomware Sommelier. Threats, mental health, comic books and Diet Dr. Pepper· Trump 2.0 Brings Cuts to Cyber, Consumer Protections· DOGE will use AI to assess the responsesof federal workers who were told to justify their jobs via email· PERSPECTIVE: Current U.S. GovernmentAdministration and the Risk of Increased Insider Threat· Opinion: DOGE's US worker purge has created aspike in insider risk Quick Hits:· Bybit Hack: Crypto exchange Bybit says it was hacked andlost around $1.4Bo Risky Bulletin: North Korean hackers steal $1.5 billion from Bybito Big Day for Crypto Goes South in a Hurry After a Giant Hacko Ethereum Developer Counters Idea Of Blockchain Rollback Amid Bybit Hacko Bybit's Phantom Hacker Becomes Ethereum's Shadow Whale by Fragmenting Fortune Across 54 Walletso Bybit Hack Funds Funneled Through Meme Coins, Onchain Sleuth Reportso Crisis Management in $1.4 Billion Hack Sets New Industry Standard, Bybit Officials Sayo What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection· Stablecoin Bank Infini Earn Latest Hack Victim, Sees $49.5M USDC Flow Out to Attackers· Apple is removing iCloud end-to-encryption features from the UK after government compelled it to add backdoors· CISA and Partners Release Advisory on Ghost (Cring) Ransomware· Risky Bulletin: BlackBasta implodes, internal chats leak online· Salt Typhoon hackers exploited stolen credentials and a 7-year-old software flaw in Cisco systems· Terror Thwarted: Man Threatening Violent Attacks On New York Shuls Arrested In Lincoln Tunnel On Friday Evening· Early data show homicides dropped 16% in 2024
The episode delves into the impact of artificial intelligence (AI) on cybersecurity, particularly focusing on the rise of AI-driven phishing attacks. Bryant G. Tow, Chief Security Officer at LeapFrog Services, discusses how cybercriminals are leveraging generative AI to create more convincing phishing schemes, which can lead to identity theft. Despite the advancements in attack methods, Tao emphasizes that the fundamental defenses against these threats remain unchanged. He highlights the importance of understanding the evolving landscape of cyber threats and the necessity for organizations to adapt their security measures accordingly. Tow elaborates on the concept of an "arms race" in cybersecurity, where defenders must continuously improve their strategies to keep pace with increasingly sophisticated attacks. He points out that while phishing remains a common entry point for cyber threats, the use of AI is transforming these attacks into more personalized and effective schemes. The conversation shifts to the implications of deepfake technology, which can create realistic impersonations of individuals, further complicating the security landscape. Tao warns that the ability to produce convincing deepfake videos and audio can lead to significant risks for organizations. The discussion also touches on the challenges of insider threats, particularly when employees intentionally disregard security policies. Tao stresses the importance of establishing clear acceptable use policies and implementing a zero-trust framework to mitigate these risks. He notes that most insider threats are accidental, but organizations must be prepared to address malicious actions as well. Effective governance, training, and monitoring are essential components in managing insider threats and ensuring compliance with security protocols. Finally, the episode highlights the evolving role of government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) in addressing cybersecurity challenges. Tow reflects on recent changes in leadership and the potential for new perspectives on cybersecurity governance. He expresses hope that the shift in focus will lead to more accessible resources and support for organizations navigating the complex landscape of cyber threats. The conversation underscores the need for continuous adaptation and vigilance in the face of emerging technologies and evolving attack methods. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
In this episode, the hosts discuss critical cybersecurity issues, focusing on the implications of non-compliance with security protocols in government networks. They highlight the importance of the CIA triad (Confidentiality, Integrity, Availability) and the risks posed by insider threats. The conversation emphasizes the need for stringent security measures to protect sensitive information and the potential long-term consequences of security breaches. Article: Is DOGE a cybersecurity threat? https://www.minnpost.com/community-voices/2025/02/is-doge-a-cybersecurity-threat/?fbclid=IwZXh0bgNhZW0CMTAAAR0FNJ-Z4jgUxIwzSNBN7mHv_05kNAhzTfhsCGxDewaXmQEcUIyGlW87kI4_aem_UVhh2I21JPmEqLfNNNxWeQ Please LISTEN
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Peter Warmka. Peter is a Former Senior Intelligence Officer with the CIA with over 20 years' experience in breaching the security of organizations overseas. Peter is the founder of the Orlando-based firm Counterintelligence Institute, LLC and an Adjunct Professor at Webster University's Masters Cybersecurity Program. Peter is passionate about using his expertise in helping city, state, and federal government entities, non-profits, academic institutes, private companies, and individuals safeguard their sensitive proprietary and/or personal data. He is also the author of two books. [Feb 17, 2025] 00:00 - Intro 00:21 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:25 - Peter Warmka Intro 03:14 - Getting Recruited 12:11 - Working Above Cybersecurity 21:33 - Identifying Potential Candidates 23:20 - Tip to CISO's: Learn About AI 25:17 - The Importance of Guardrails 28:37 - Peter's Books - Confessions of a CIA Spy - Peter Warmka - Why Are You Messing With Me? - Peter Warmka 31:10 - Find Peter Warmka online - LinkedIn: in/peterwarmka - Website: counterintelligence-institute.com 32:18 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur discussdiscuss a newly discovered SSH backdoor used by Chinese cyber spies, the alarming rise of insider threats in critical U.S. infrastructure, and the significant drop in ransomware payments in 2024. Hector also delivers a passionate rant about government security oversight and the risks posed by unvetted personnel in federal systems. Plus, the duo shares insights on bypassing corporate security with SSH tunneling, the evolution of cybercrime tactics, and why cybersecurity resilience is more crucial than ever. Send HATF your questions at questions@hackerandthefed.com.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Jon Roginski and Stephanie Jaros discuss the strategic landscape for insider threat and workforce protection programs, emphasizing the need for a more holistic approach that considers both technical and human factors. They also explored the importance of balancing the use of analytics with human involvement in decision-making processes, and the need for organizations to be proactive in minimizing risks. Lastly, they discussed "Project Beyonce" and the importance of cultural development within organizations for workforce protection, and recommended groups for private sector involvement in security. Recording Date: 15 Jan 2025 Research Question: Stephanie Jaros suggests an interested student or researcher examine: How do organizations not leak highly sensitive information? (For example: “Project Beyonce”) Resources: Cognitive Crucible Podcast Episodes Mentioned #123 Jonathan Roginski on Insider Threats #73 Ori Brafman on The Starfish, Spider, and Resilient Societies Workforce Protection: The Next Generation of Insider Risk Programs On the Right Track: Worker-on-Worker Violence (“Project Beyonce”) by Stephanie L. Jaros, Katlin J. Rhyner, & Erik R. Gregory INFRAGARD Legacy: What The All Blacks Can Teach Us About The Business Of Life by James Kerr The Premonition: A Pandemic Story by Michael Lewis Link to full show notes and resources Guest Bio: Dr. Jon Roginski is the Program Manager for the West Point Insider Threat Program, which serves as the "research arm" for the Pentagon-administered Army Insider Threat Program. Stephanie Jaros is an insider risk expert with 15 years of experience in program design, implementation, assessment, and research across government and industry. Currently, she is a Visiting Research Scientist and the Lead Scientist for Personnel Security Research at the University of Maryland's Applied Research Laboratory for Intelligence & Security (ARLIS). About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
President Trump sets Elon Musk on a new target: the Pentagon. The young members of his team are facing new scrutiny as Elon Musk is rapidly expanding his scope while he seeks to slash the federal budget. Plus, President Trump confirms his plans to fire some FBI agents as quickly and surgically as possible. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The National Security Hour with Major Fred Galvin – Join Major Fred Galvin as he interviews cybersecurity expert Ryan Rambo, a retired Army Counterintelligence Specialist. Learn about rising cyber threats, insider risks, and the nations targeting sensitive data. Discover the truth about VPNs, online privacy, and best practices to protect your identity at home, abroad, and in the digital world. Stay secure!
The National Security Hour with Major Fred Galvin – Join Major Fred Galvin as he interviews cybersecurity expert Ryan Rambo, a retired Army Counterintelligence Specialist. Learn about rising cyber threats, insider risks, and the nations targeting sensitive data. Discover the truth about VPNs, online privacy, and best practices to protect your identity at home, abroad, and in the digital world. Stay secure!
Stand Up is a daily podcast that I book,host,edit, post and promote new episodes with brilliant guests every day. Please subscribe now for as little as 5$ and gain access to a community of over 700 awesome, curious, kind, funny, brilliant, generous souls Check out StandUpwithPete.com to learn more GET TICKETS TO PODJAM II In Vegas March 27-30 Confirmed Guests! Professor Eric Segall, Dr Aaron Carroll, Maura Quint, Tim Wise, JL Cauvin, Ophira Eisenberg, Christian Finnegan and More! Frank Figliuzzi is a national security contributor and regular columnist for NBC News and MSNBC. He was the assistant director for counterintelligence at the FBI, where he served 25 years as a special agent and directed all espionage investigations across the government. He is the author of “The FBI Way: Inside the Bureau's Code of Excellence.” Frank Figliuzzi was the FBI's Assistant Director for Counterintelligence and served 25 years as a Special Agent. In his current role as a respected National Security Analyst, Frank appears weekly on live television for NBC and MSNBC news. Frank held senior FBI leadership positions in major American cities and was appointed the FBI's Chief Inspector by then Director Robert Mueller to oversee sensitive internal inquiries, shooting reviews, and performance audits. Following his FBI career, Frank became a corporate security executive for a Fortune 10 company and led global Investigations, Insider Threat, Workplace Violence Prevention, and Special Event security for 200,000 employees in 180 countries. As the Bureau's head of Counterintelligence, Mr. Figliuzzi directed all espionage investigations across the U.S. government. Frank frequently briefed the White House, Congress, and the Attorney General. Mr. Figliuzzi directed an FBI internal disciplinary unit in the Office of Professional Responsibility and adjudicated allegations of serious misconduct against FBI personnel. Frank is the author of THE FBI WAY: Inside the Bureau's Code of Excellence (HarperCollins). Frank is most noted for his clear and compelling television commentary regarding the Special Counsel investigation of Russian interference in the 2016 U.S. Presidential campaign, and coverage of tragic mass shootings. His FBI career highlights include: Leading the FBI's efforts to counter economic espionage in Silicon Valley, California; Overseeing major financial crimes and public corruption investigations in Miami, Florida, and Cleveland, Ohio; Serving as on-scene commander of the largest HAZMAT evidence recovery effort in FBI history at the Boca Raton, Florida, site of the nation's first anthrax murder; and, Publicly explaining the FBI's successful operation against ten Russian sleeper agents inside the United States. Mr. Figliuzzi earned a Juris Doctorate cum laude from the University of Connecticut School of Law, and a Bachelor of Arts Degree in English Literature from Fairfield University. Frank completed certificate programs at the Harvard University National Security Program for Senior Executives in Government at the John F. Kennedy School of Government, and at Northwestern University's executive course on Leading Strategic Change at the Kellogg School of Management. He is a sought-after speaker, panelist and instructor on leadership, violence prevention, risk management, and the external and internal threats facing the United States Join us Monday's and Thursday's at 8EST for our Bi-Weekly Happy Hour Hangout! Pete on Blue Sky Pete on Threads Pete on Tik Tok Pete on YouTube Pete on Twitter Pete On Instagram Pete Personal FB page Stand Up with Pete FB page All things Jon Carroll Follow and Support Pete Coe Buy Ava's Art Hire DJ Monzyk to build your website or help you with Marketing
Send us a text descriptionNISPOM Compliance Consulting and FSO Services: https://www.thriveanalysis.comNISPOM Books and Training Resources https://www.nispomcentral.comContact Jeff: jeff.bennett@nispomcentral.comImplementing an Effective Insider Threat Program for NISPOM ComplianceJeff Bennett from Thrive Analysis Group discusses the importance of implementing an aggressive insider threat program to ensure NISPOM compliance. He explains how such a program can protect sensitive information within clear defense contractors, commercial entities, institutions, and nonprofits. The video outlines the identification of sensitive assets, developing countermeasures, and training employees to recognize and report suspicious behavior as focal points of a robust insider threat program. Continuous evaluation, education on adverse information reporting, and practical steps for effective insider threat management are also covered.00:00 Introduction to Jeff Bennett and Thrive Analysis Group00:25 Understanding Insider Threat Programs01:52 Identifying Insider Threat Behaviors03:28 Implementing a Robust Insider Threat Program05:27 Continuous Evaluation and Reporting09:55 Training Employees on Insider Threats12:36 Conclusion and Contact InformationNISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting
This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur talk hector's much-needed vacation in the rainforest, and onto the major cybersecurity stories they missed while away. They discuss the recent pardon of Ross Ulbricht, second chances in life, and the complexities of law enforcement and the justice system. The conversation covers everything from insider threats, corporate security risks, personal attack surface reduction and even a recent high-profile crypto kidnapping. Send HATF your questions at questions@hackerandthefed.com.
Beverly Hills Precious Metals Exchange - Buy Gold & Silver https://themelkshow.com/gold/ Speak with Gold Expert Andrew Sorchini…Tell Him Mel K Sent You! Adam Book - The Insider Threat: How the Deep State Undermines America from Within https://www.amazon.com/dp/1641774312?ref_=cm_sw_r_ffobk_cp_ud_dp_RHTZHTDJJT08EF799M95&skipTwisterOG=1&bestFormat=true&newOGT=1 Learn more about Adam Lovinger: https://www.goldiis.org/adam-lovinger Order Mel's New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK We The People must stand strong, stay united, resolute, calm, and focus on the mission. We at www.themelkshow.com want to thank all our amazing patriot pals for joining us on this journey, for your support of our work, and for your faith in this biblical transition to greatness. We love what we do and are working hard to keep on top of everything to help this transition along peacefully and with love. Please help us amplify our message: Like, Comment & Share! The Show's Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Another way to get involved and find ways to become active in the community is to come meet Mel and many amazing truth warriors at our upcoming live in-person speaking events. Together we are unstoppable. We look forward to seeing you. God Wins! https://themelkshow.com/events/ Remember to mention Mel K for great discounts on all these fun and informative events. See you there! Our Website www.TheMelKShow.com Support Patriots With MyPillow Go to https://www.mypillow.com/melk Use offer code “MelK” to support both MyPillow and The Mel K Show Mel K Superfoods Supercharge your wellness with Mel K Superfoods Use Code: MELKWELLNESS and Save Over $100 off retail today! https://themelkshow.com/partners/ Healthy Hydration: https://themelkshow.com/partners/ Patriot Mobile Support your values, your freedom and the Mel K Show. Switch to Patriot Mobile for Free. Use free activation code MELK https://themelkshow.com/partners/ HempWorx The #1 selling CBD brand. Offering cutting edge products that run the gamut from CBD oils and other hemp products to essential oils in our Mantra Brand, MDC Daily Sprays which are Vitamin and Herb combination sprays/ https://themelkshow.com/partners/ Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK The Wellness Company - Emergency Medical Kits: https://themelkshow.com/partners/ Dr. Jason Dean and BraveTV bring you the most innovative and cutting edge science in Nutrition with Nano-Particle Detoxification, The Full Moon Parasite Protocol and Clot Shot Defense. https://themelkshow.com/partners/ Dr. Stella Immanuel, MD. Consult with a renowned healthcare provider! Offering Telehealth Services & Supplements. Use offer code ‘MelK' for 5% Off https://themelkshow.com/partners/ Rumble (Video) - The Mel K Show: https://rumble.com/c/TheMelKShow Twitter: https://twitter.com/MelKShow Twitter (Original): https://twitter.com/originalmelk TRUTH Social: https://truthsocial.com/@themelkshow Instagram: https://www.instagram.com/themelkshow/ CloutHub: https://app.clouthub.com/#/users/u/TheMelKShow Mel K Show Video Platform (Subscription): https://www.themelkshow.tv Bitchute: https://www.bitchute.com/channel/Iw2kiviwZpwx/ Podbean: https://themelkshow.podbean.com/ Gab: https://gab.com/MelKShow GETTR: https://www.gettr.com/user/themelkshow Locals.com: https://melk.locals.com/ Banned Video: https://banned.video/channel/the-mel-k-show Brighteon: https://www.brighteon.com/channels/themelkshow
Listen into the Saturday edition as Victor Davis Hanson interviews Adam Lovinger, the Vice President of Strategic Affairs at the Gold Institute for International Strategy. He reveals the Orwellian situation under the Obama-Biden administration when it came to Iran, national security, and lawfare, all subjects of his new book The Insider Threat.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Adam Lovinger is the Vice President for Strategic Affairs at the Gold Institute for International Strategy, a Washington D.C.-based think tank. In 2017 Lovinger was Senior Director for Strategic Assessments at the U.S. National Security Council (NSC). From 2006-2017 he provided direct support on long-term U.S. national security strategy to the Secretary of Defense from the Pentagon's Office of Net Assessment (ONA).Lovinger is the author of “The Insider Threat: How the Deep State Undermines America from Within”ORDER: https://www.encounterbooks.com/books/the-insider-threat/?srsltid=AfmBOor7fwXDLBbTTMHfZLDXQtZFYubjI5UQNOhSZue9U2xqozSxPOS0SUPPORT OUR WORK https://www.judicialwatch.org/donate/thank-youtube/ VISIT OUR WEBSITE http://www.judicialwatch.org
In today's interconnected world, the threat landscape for businesses has evolved significantly. One of the most insidious and challenging risks to manage is the insider threat. This article delves into what insider threats are, their implications, common threats, and effective risk mitigation strategies.
Former CIA officer Michele Assad joins the Cyber Rants Podcast to reveal the hidden dangers of insider threats, from Nation-State recruitment to false flag operations, and why businesses can't afford to ignore them. Michele shares actionable strategies to recognize, prevent, and respond to these risks while highlighting the power of resilience and mental toughness. She also introduces her upcoming book, Get Off The X, offering tools to overcome challenges and thrive under pressure. Don't miss this insightful episode packed with expertise and practical advice!More about Michelle Assad and "Get Off The X" - https://michelerigbyassad.comMichelle Assad on LinkedIn - https://www.linkedin.com/in/michele-rigby-assad-b25695135/Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!
In this episode of the Happy Women podcast, author and former Senior Director for Strategic Assessments at the U.S. National Security Council, Adam Lovinger, joins Jen Horn and Katie Gorka to discuss his experiences within the U.S. national security framework, particularly focusing on the Office of Net Assessment and the implications of the deep state during the Obama administration. He shares insights on the ideological shifts in national security, the origins of the Russia hoax, and the threats posed by figures like General Flynn. Lovinger also recounts his personal struggles against the deep state and the tragic story of whistleblower Stephen Luke, while expressing hope for restoring integrity in government. Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.
In this episode of the Happy Women podcast, author and former Senior Director for Strategic Assessments at the U.S. National Security Council, Adam Lovinger, joins Jen Horn and Katie Gorka to discuss his experiences within the U.S. national security framework, particularly focusing on the Office of Net Assessment and the implications of the deep state during the Obama administration. He shares insights on the ideological shifts in national security, the origins of the Russia hoax, and the threats posed by figures like General Flynn. Lovinger also recounts his personal struggles against the deep state and the tragic story of whistleblower Stephen Luke, while expressing hope for restoring integrity in government. See omnystudio.com/listener for privacy information.
Sebastian is joined in-studio by Adam Lovinger, former Senior Director of the National Security Council, to talk about his book "The Insider Threat."Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.
Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
Frank Figliuzzi is a national security contributor and regular columnist for NBC News and MSNBC. He was the assistant director for counterintelligence at the FBI, where he served 25 years as a special agent and directed all espionage investigations across the government. He held senior FBI leadership positions in major American cities and was appointed the FBI's Chief Inspector by then Director Robert Mueller to oversee sensitive internal inquiries, shooting reviews, and performance audits. Following his FBI career, Frank became a corporate security executive for a Fortune 10 company and led global Investigations, Insider Threat, Workplace Violence Prevention, and Special Event security for 200,000 employees in 180 countries. He is the author of “The FBI Way: Inside the Bureau's Code of Excellence", and this year's "Long Haul: Hunting the Highway Serial Killers". Frank and I discuss his latest book, Trump's controversial cabinet nominations, and the existential threats to our democracy as we head into Trump 2.0. Got somethin' to say?! Email us at BackroomAndy@gmail.com Leave us a message: 845-307-7446 Twitter: @AndyOstroy Produced by Andy Ostroy, Matty Rosenberg, and Jennifer Hammoud @ Radio Free Rhiniecliff Design by Cricket Lengyel
This week, Lauro and Zach are joined by Eric O'Neill, a former FBI agent who brought down Robert Hanssen, the most notorious and damaging spy in United States history. Eric recounts his role in one of the FBI's most significant spy takedowns and dives deep into the world of espionage and counter-espionage. He sheds light on the realities of insider threats lurking within the United States and shares actionable insights into defending against modern cyber risks. Tune in for a compelling discussion on the intersection of national security and cybersecurity resilience.Eric O'Neill's Website: https://ericoneill.netEric O'Neill on LinkedIn: https://www.linkedin.com/in/eric-m-oneill/Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!
summaryIn this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity. takeawaysStar Health Insurance experienced a major data breach affecting millions.Insider threats are predicted to be a significant risk in 2025.Dr. Sunny Ware transitioned from software development to cybersecurity.Understanding application logic is crucial in penetration testing.AI can be a valuable tool in penetration testing.Bug bounty programs offer focused opportunities for security testing.Mentorship is important for the next generation of cybersecurity professionals.Dr. Sunny emphasizes the creativity involved in coding and security.Vulnerability disclosure programs differ from bug bounty programs.Dr. Sunny's passion for teaching and sharing knowledge is evident.titlesThe Star Health Insurance Data Breach: A Deep DiveInsider Threats: The New Face of Cybersecurity RisksMeet Dr. Sunny Ware: A Cybersecurity TrailblazerThe Art of Penetration Testing with Dr. SunnyExploring AI's Role in Cybersecuritysound bites"Star Health Insurance suffered a significant data security incident.""There's a hacker and then there's this kind of cool insider twist.""The alleged hackers claimed that Star Health's CISO facilitated the breach.""Insider threats are going to be the risk to prepare for in 2025.""I came from very humble beginnings.""I think coding is like making a painting on a blank canvas.""I want to capitalize on the experience I already have in web API.""I use AI almost every day on every pen test.""I actively do bug hunting.""I want to make sure that if there's anything I can share to help."chapters00:00 Data Breach at Star Health Insurance06:06 Insider Threats and Whistleblowers07:05 Introduction to Dr. Sunny Ware30:14 Dr. Sunny's Career Path and Penetration Testing37:00 Lifestyle Polygraph with Dr. Sunny48:55 Key Takeaways and Closing Thoughts
Guest: Jinan Budge, Vice President, Principal Analyst serving Security & Risk professionals, ForresterOn LinkedIn | https://www.linkedin.com/in/jinan-budge-2898132/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Australian Cyber Conference Melbourne 2024 is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry's most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a conversation with Jinan Budge, Vice President at Forrester Research, focusing on the vital role of human-centered security in today's evolving landscape.Building a Human-Centered Cybersecurity CultureOne of the central themes of the discussion was the shift from traditional security awareness programs to human risk management. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward human-centered cybersecurity is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.Collaboration Between Enterprises and VendorsThe podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace adaptive security solutions tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.Understanding the Human Element in Data BreachesBudge introduced a framework she calls the “wheel of human element breaches,” which categorizes risks such as social engineering, human error, and insider threats. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.Education and Continuous LearningMarco Ciappelli and Jinan Budge underscored the importance of integrating cybersecurity education into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.ConclusionThe discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry's growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Guest: Jinan Budge, Vice President, Principal Analyst serving Security & Risk professionals, ForresterOn LinkedIn | https://www.linkedin.com/in/jinan-budge-2898132/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Australian Cyber Conference Melbourne 2024 is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry's most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a conversation with Jinan Budge, Vice President at Forrester Research, focusing on the vital role of human-centered security in today's evolving landscape.Building a Human-Centered Cybersecurity CultureOne of the central themes of the discussion was the shift from traditional security awareness programs to human risk management. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward human-centered cybersecurity is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.Collaboration Between Enterprises and VendorsThe podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace adaptive security solutions tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.Understanding the Human Element in Data BreachesBudge introduced a framework she calls the “wheel of human element breaches,” which categorizes risks such as social engineering, human error, and insider threats. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.Education and Continuous LearningMarco Ciappelli and Jinan Budge underscored the importance of integrating cybersecurity education into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.ConclusionThe discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry's growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
This podcast episode of CISO Tradecraft features Shawnee Delaney, an insider threat expert, discussing insider threats in cybersecurity. Delaney, whose background includes espionage, explains how understanding human motivation and vulnerabilities is crucial for identifying and mitigating insider threats. The conversation highlights the importance of organizational culture, employee well-being, and proactive measures like employee lifecycle management and psychological testing in preventing such threats. Practical advice is offered for leaders to foster a supportive and communicative work environment to detect potential threats early. Finally, methods for creating effective insider threat programs and addressing cultural issues are explored. Shawnee Delaney's LinkedIn - https://www.linkedin.com/in/shawnee-delaney/ Vaillance Group - https://www.vaillancegroup.com/ Transcripts: https://docs.google.com/document/d/1xJiEMDL8CjNwwfBSvNHfnhfsrVgOMuk0 Chapters 00:00 Introduction to Insider Threat 00:26 Guest Introduction: Shawnee Delaney 00:58 CruiseCon 2025 Announcement 01:33 Shawnee's Career Journey 02:18 Understanding Espionage 03:43 Motivations Behind Espionage 07:46 Indicators of Insider Threat 10:48 Building a Positive Organizational Culture 18:21 Implementing an Insider Threat Program 21:05 Psychological Testing in Hiring 23:26 Assessing Organizational Culture 25:34 Core Values in the Navy and Marine Corps 26:16 A Commanding Officer's Story 28:32 Identifying Insider Threats 32:01 The Impact of Job Uncertainty 36:50 Gamifying Security Incentives 39:12 Building a Strong Security Culture 42:05 Final Thoughts and Recommendations
This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur dive into a massive hacking scandal targeting Italian political elites, revealing insider threats and international intrigue. They break down NSA mobile device security best practices and share their own successes (and failures) in following them. Plus, updates on their personal lives, community work, and how ethical hacking can prevent breaches like this. Send HATF your questions at questions@hackerandthefed.com.
The Trudeau Government found a report to what happened to the Winnipeg Lab. It's confirmed that CSIS issued a warning back in August 2018 raising concerns about ''insider threat activity'' that involves Dr. Xiangguo Qiu and her husband, Keding Cheng. Host Alex Pierson speaks with Sam Cooper, Investigative Journalist, Founder of the Bureau & Author of Willful Blindness; How A Network of Narcos, Tycoons and CCP Agents Infiltrated The West. Learn more about your ad choices. Visit megaphone.fm/adchoices
If smart buildings are vulnerable to hacking, what about smart offices? Even devices like printers and lighting systems could give an attacker a way in. John Terrell, CSO at Phosphorus, recalls a moment while working at a hedge fund when he found himself in a room filled with priceless art. He realized that the security cameras safeguarding these artworks were operating on outdated software, potentially containing known vulnerabilities.
Mitigating Insider Threats in SMBs: Strategies for SuccessThis video addresses the significant security concern of insider threats in small and medium-sized businesses (SMBs). It explores how such threats, often arising from individuals with authorized access who misuse their privileges, can result in data breaches, financial losses, and reputational damage. The video provides practical strategies for mitigating these risks, including implementing strong access control policies, using behavioral monitoring technologies, and fostering a security-conscious culture among employees. The content further discusses the importance of customized threat solutions for SMBs and the role of employee security awareness training in preventing insider threats. Ultimately, the video emphasizes the need for SMBs to proactively address insider threats to protect their assets and ensure business success.00:00 Understanding and Addressing Insider Threats in SMBs00:50 Introduction to Insider Threats in SMBs02:31 Mitigating Employee-Related Risks04:00 Insider Threat Identification Techniques05:20 Effective Access Control Policies06:47 Enhancing Employee Security Awareness08:01 SMB Insider Threat Solutions09:08 Summary and Future Outlook09:58 Get Help with Your Security StrategyMentioned in this episode:Thank you to CPF Coaching for Sponsoring
In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with discussing the 'big three' of cybersecurity, which are: Network Inventory: Knowing what's on your network is crucial. This involves having a comprehensive inventory of all devices and systems connected to the network.Configuration and Patching: Keeping systems configured correctly and up-to-date with patches is essential to prevent vulnerabilities that could be exploited by malicious actors.Identity and Authentication Protection: Ensuring robust identity and authentication measures are in place to protect against unauthorized access and maintain the integrity of user accounts.
In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Eric Siron provide a comprehensive monthly threat review. They cover several major cybersecurity incidents and trends from the past month, including: The massive data breach at data broker National Public Data exposed over 2.9 billion personal information records. They discuss the risks of this breach, such as increased targeted phishing and social engineering attacks. A joint government agency warning about the Ransom Hub ransomware has impacted over 200 victims since February 2022, including critical infrastructure and high-profile organizations. A case study of an IT administrator who held his employer's systems for ransom by deploying logic bombs, highlighting the risks of insider threats even within trusted IT teams. They also touch on the topics of vendor risk management and the history of election tampering and provide recommendations for organizations to mitigate these threats. In conclusion, EP62 provides valuable insights into the ever-changing cybersecurity landscape and offers practical advice for security professionals. -- Secure your organization against the evolving threat landscape! Discover how Hornetsecurity's Advanced Threat Protection, Security Awareness Service, and 365 Total Protection can safeguard your business from data breaches, insider threats, and more. Learn more and protect your organization today! -- Do you want to join the conversation? Join us in our Security Lab LinkedIn Group! Key Takeaways: The National Public Data breach exposed a vast amount of personal information, including names, email addresses, phone numbers, Social Security numbers, and more. This creates risks of more targeted phishing and social engineering attacks. The continued use of easily abused identification methods like Social Security numbers underscores the urgent need to explore more secure alternatives, such as cryptographic key pairs. This is crucial in reducing the risks of identity theft. Insider threats from trusted IT staff members can pose a significant risk, as evidenced by the case of an IT admin holding their employer's systems for ransom. Implementing practices like just-in-time administration and least-privilege access is crucial to mitigate these potentially devastating threats. Overreliance on cloud-based services and a single vendor for critical business functions can lead to vendor risk and single points of failure. Election security remains a significant concern, with the threat of interference and disinformation campaigns continuing. Ensuring robust cybersecurity measures at the state and local levels is crucial for protecting the integrity of elections. Timestamps: (03:17) The National Public Data Breach (12:21) The Issues with Social Security Numbers (18:02) The Danger of Insider Threats (27:10) The Risks of Vendor Dependence (34:12) Recommendations for Protecting Against Threats Episode Resources: Security Lab LinkedIn Group - Security Lab LinkedIn Group September Monthly Threat Report - In-depth analyses from Hornetsecurity's Security Lab Joint Government Agency Announcement on RansomHub - #StopRansomware: RansomHub Ransomware | CISA Security Swarm Passkeys Episode - Passkeys in Microsoft Entra: Benefits, Implementation Tips & More (hornetsecurity.com) Security Swarm Election Tampering Episode - How Threat Actors Tamper with Elections (hornetsecurity.com)
Cybersecurity Insights: Vulnerabilities, Insider Threats, and the Future of Online Safety In this weekend edition of Cybersecurity Today, host Jim Love is joined by regulars Terry Cutler of Cyology Labs and David Shipley of Beauceron Security, alongside special guest Laura Payne from White Tuque. They discuss significant cybersecurity news including the new additions to CISA's known exploited vulnerabilities catalog, a hilarious yet eye-opening domain purchase incident, and the ongoing issue of insider threats. The panel also dives into the complexities surrounding recent breaches like the one at Avis and the broader implications of data vulnerabilities. Stay tuned for the latest insights and expert opinions on what's happening in the cybersecurity world. 00:00 Introduction and Panelist Introductions 01:31 Format Overview and First Cybersecurity Story 01:47 Discussion on CISA's Vulnerability Catalog 02:51 Challenges in Patch Management 06:45 Microsoft's Patch Tuesday Controversy 10:49 The $20 Domain Vulnerability 15:42 Insider Threats and Real-World Incidents 18:11 Handling Disgruntled Employees 18:51 Insider Threats: Real-Life Examples 19:41 Preventing Insider Threats 21:30 Password Management and Security 22:53 Case Study: Sales Employee Walks Out with Client List 23:42 Jurassic Park and Risk Management 24:32 Avis Data Breach: What Happened? 25:51 The Importance of Identity Theft Protection 29:44 Challenges in Cybersecurity Awareness 34:27 Microsoft's New Security Measures 35:07 Conclusion and Farewell
Guest: Royal Hansen, CISO, Alphabet Topics: What were you thinking before you took that “Google CISO” job? Google's infrastructure is vast and complex, yet also modern. How does this influence the design and implementation of your security programs compared to other organizations? Are there any specific challenges or advantages that arise from operating at such a massive scale? What has been most surprising about Google's internal security culture that you wish you could export to the world at large? What have you learned about scaling teams in the Google context? How do you design effective metrics for your teams and programs? So, yes, AI. Every organization is trying to weigh the risks and benefits of generative AI–do you have advice for the world at large based on how we've done this here? Resources: EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil CISA Secure by Design EP20 Security Operations, Reliability, and Securing Google with Heather Adkins EP91 “Hacking Google”, Op Aurora and Insider Threat at Google “Delivering Security at Scale: From Artisanal to Industrial” SRE book: CHapter 5: Toil Elimination SRS book: Security as an Emergent Property What are Security Invariants? EP185 SAIF-powered Collaboration to Secure AI: CoSAI and Why It Matters to You “Against the Gods - Remarkable Story of Risk” book
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.Here are some highlights from our episode:01:28. How KnowBe4 detected an insider threat from North Korea09:09. How the Center for Internet Security® (CIS®) responded to news of this incident21:02. The role of technical controls in detecting these types of threats23:56. Common signs you can use to detect fake employees in your hiring process29:22. How cybersecurity companies can use this incident to improve their defensesResourcesHow a North Korean Fake IT Worker Tried to Infiltrate UsNorth Korean Fake IT Worker FAQEpisode 77: Data's Value to Decision-Making in CybersecurityDefense-in-Depth: A Necessary Approach to Cloud SecurityeBook: A CISO's Guide to Bolstering Cybersecurity PostureIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, lack of sleep, and anxiety. IT and Security burnout leads to breaches. For the past 4 years, Devo has been hosting SOC Analyst Appreciation Day, a virtual event where they shower SOC analysts with the love, appreciation and recognition that they deserve. Impactful Moments: 00:00 - Introduction 01:25 - Kayla Williams, Chief Information Security Officer at Devo 01:38 - How Kayla Became a CISO 03:06 - Challenges and Rewards 04:23 - Burnout in Cybersecurity 04:31 - 83% of IT professionals are Burnt Out 09:38 - How AI Fits into the SOC 09:59 - Key Use Cases for AI in Cybersecurity 15:07 - Insider Threat and Employees Stealing Company Data 18:14 - Non-Traditional Paths into Cybersecurity 21:00 - Future of Cybersecurity and AI 22:31 - Advice for Aspiring CISOs Links: Connect with our guest, Kayla Williams: https://www.linkedin.com/in/kaylamwilliams1/ Check out Devo: https://www.devo.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
For this One on One, Sebastian talks to Michael Waller, author of the new book "Big Intel," about the corruption that overtook America's intelligence community, and whether or not these agencies can be redeemed.Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.