Podcasts about insider threats

  • 325PODCASTS
  • 801EPISODES
  • 34mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 16, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about insider threats

Show all podcasts related to insider threats

Latest podcast episodes about insider threats

Paul's Security Weekly
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411

Paul's Security Weekly

Play Episode Listen Later Jun 16, 2025 79:04


Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry's first AI native,unified Data Security Platform. Yotam Segev, Cyera's CEO sits down with CyberRisk TV at RSAC Conference 2025 to discuss Cyera's skyrocketing growth, its founding story and why an increasing number of Fortune500 companies are partnering with Cyera, and the company's latest product release: Adaptive DLP, a new AI data loss prevention solution. Recent Cyera News: Cyera Breaks World Record as the Fastest-Growing Data Security Company in History Data Security Leader Cyera Secures $300M in Series D Funding Cyera Acquires Trail Security for $162M Cyera Launches Data Incident Response Service Cyera Appoints Renowned Tech Exec Frank Slootman to Board of Directors This segment is sponsored by Cyera. Visit https://securityweekly.com/cyerarsac to learn more about them! Blumira In the evolving world of cybersecurity, the shift from a purely threat-centric mindset to a focus on operational excellence is no longer just a trend—it's a necessity. Matthew Warner, CEO and co-founder of Blumira, argues that this shift is particularly crucial for small and mid-sized businesses (SMBs) and the managed service providers (MSPs) that support them. Matthew believes that traditional SIEM and detection solutions have historically fallen short for these organizations, often due to their complexity, high cost, and steep learning curves. As a result, many SMBs have struggled to keep up with the sophistication of modern threats. Blumira was founded to change that. Matthew's vision is rooted in democratizing security—making powerful, automated detection and response tools simple, affordable, and accessible for everyone, especially those who need them most. By designing platforms that prioritize operational excellence—efficiency, usability, and actionable intelligence—Blumira enables organizations to be proactive rather than reactive. During the conversation, Matthew will share insights into the latest technologies and trends transforming the cybersecurity space, and offer actionable guidance for IT decision-makers. He'll explore how shifting strategy from chasing every alert to building a solid, efficient operational foundation can lead to better outcomes and stronger protection in the long run. Blumira Partners Blumira Launches New M365 Threat Response Feature Security should be accessible to everyone. At Blumira, we're building the future of detection and response — simple, smart, and built to empower the teams who need it most. Check out https://securityweekly.com/blumirarsac and take control of your security today. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-411

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 212 - DIA Insider Threat Hunter Leaks Classified Data, Australia Mandates Reporting Ransomware Payments, Coinbase Hacked Through Support Provider, Building Cybersecurity Practices

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Jun 16, 2025 58:30


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   DIA Insider Threat member leaked classified data https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government   Australia ransomware victims must report payments https://therecord.media/australia-ransomware-victims-must-report-payments https://www.nomoreransom.org/en/index.html   Coinbase hack tied to support contractor https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/   Good cybersecurity hygiene https://www.csoonline.com/article/567737/the-5-cis-controls-you-should-implement-first.html     Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Ben - https://www.linkedin.com/in/benjamincorll/

Enterprise Security Weekly (Audio)
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jun 16, 2025 79:04


Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry's first AI native,unified Data Security Platform. Yotam Segev, Cyera's CEO sits down with CyberRisk TV at RSAC Conference 2025 to discuss Cyera's skyrocketing growth, its founding story and why an increasing number of Fortune500 companies are partnering with Cyera, and the company's latest product release: Adaptive DLP, a new AI data loss prevention solution. Recent Cyera News: Cyera Breaks World Record as the Fastest-Growing Data Security Company in History Data Security Leader Cyera Secures $300M in Series D Funding Cyera Acquires Trail Security for $162M Cyera Launches Data Incident Response Service Cyera Appoints Renowned Tech Exec Frank Slootman to Board of Directors This segment is sponsored by Cyera. Visit https://securityweekly.com/cyerarsac to learn more about them! Blumira In the evolving world of cybersecurity, the shift from a purely threat-centric mindset to a focus on operational excellence is no longer just a trend—it's a necessity. Matthew Warner, CEO and co-founder of Blumira, argues that this shift is particularly crucial for small and mid-sized businesses (SMBs) and the managed service providers (MSPs) that support them. Matthew believes that traditional SIEM and detection solutions have historically fallen short for these organizations, often due to their complexity, high cost, and steep learning curves. As a result, many SMBs have struggled to keep up with the sophistication of modern threats. Blumira was founded to change that. Matthew's vision is rooted in democratizing security—making powerful, automated detection and response tools simple, affordable, and accessible for everyone, especially those who need them most. By designing platforms that prioritize operational excellence—efficiency, usability, and actionable intelligence—Blumira enables organizations to be proactive rather than reactive. During the conversation, Matthew will share insights into the latest technologies and trends transforming the cybersecurity space, and offer actionable guidance for IT decision-makers. He'll explore how shifting strategy from chasing every alert to building a solid, efficient operational foundation can lead to better outcomes and stronger protection in the long run. Blumira Partners Blumira Launches New M365 Threat Response Feature Security should be accessible to everyone. At Blumira, we're building the future of detection and response — simple, smart, and built to empower the teams who need it most. Check out https://securityweekly.com/blumirarsac and take control of your security today. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-411

Law Enforcement Life Coach / Sometimes Heroes Need Help Podcast
Tom Coyle / NCIS Special Agent Ret. / Leading with Humility & Accountability

Law Enforcement Life Coach / Sometimes Heroes Need Help Podcast

Play Episode Listen Later Jun 16, 2025 71:38


This week I had the great privilege of sitting down with NCIS retired special agent Tom Coyle. Tom has been serving in various law enforcement capacities since the 80's at the local, state, and federal levels. Tom and I discuss his career, some great assignments, and the role leadership plays in all that we do. Sit back and give this episode a listen as we dig deep into what makes leadership memorable.More about Tom:Experienced public speaker, Leadership and Security Instructor. CEO and counterintelligence/Insider Threat Thought Leader with a diverse background in complex investigations, U.S. counterintelligence operations, training (leadership and ops-related), and policy writing. Visiting Lecturer, University of Virginia, Charlottesville, VA.Experience comes as the result of service with local (Fairfax County, VA police officer), state (Indiana Gaming Commission Investigator), and Federal law enforcement (career NCIS Special Agent). Served 6+ years overseas supporting the Navy and Marine Corps, and later the Ofc of Secretary of Defense. Founder and CEO of Talon Security Solutions, LLC, located in Carmel, Indiana, I earned multiple engagements for key personnel vetting, facility vulnerability studies, and sensitive internal inquiries.At the Natl Insider Threat Task Force, I provided expert guidance, training and recommendations to multiple government agencies on the issue of Insider Threat Vulnerability and the creation of formal Insider Threat detection and mitigation programs. As the LE Advisor for the Office of the Army Provost Marshal General, I delivered policy advice to the seniors leaders within the Army MP Corps and CID.I helped to both to create and conduct formal training for Insider Threat Personnel, Program Managers and Senior Officials from over 55 government Departments and Agencies. Hired in May 2023 as Adjunct Professor, UVA Charlottesville, VA to teach Leadership to Law Enforcement - in July presented to over 40 DEA Supervisors (Special Agents, Analysts and professional Support Staff). Website: https://www.leading4life.com/leading4life0088@gmail.comThank you for taking the time to give this podcast a listen. If you would like more information on other Law enforcement Life Coach initiatives, our "Sometimes Heroes Need Help" wellness seminar or our One-On-One life coaching please visit :www.lawenforcementlifecoach.comJohn@lawenforcementlifecoach.comAnd if you would like to watch the interview you can view it in it's entirety on the Law Enforcement Life Coach YouTube Channel : https://studio.youtube.com/channel/UCib6HRqAFO08gAkZQ-B9Ajw/videos/upload?filter=%5B%5D&sort=%7B%22columnType%22%3A%22date%22%2C%22sortOrder%22%3A%22DESCENDING%22%7D

Enterprise Security Weekly (Video)
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Yotam Segev, Matthew Warner, Rob Allen - ESW #411

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 16, 2025 79:04


Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry's first AI native,unified Data Security Platform. Yotam Segev, Cyera's CEO sits down with CyberRisk TV at RSAC Conference 2025 to discuss Cyera's skyrocketing growth, its founding story and why an increasing number of Fortune500 companies are partnering with Cyera, and the company's latest product release: Adaptive DLP, a new AI data loss prevention solution. Recent Cyera News: Cyera Breaks World Record as the Fastest-Growing Data Security Company in History Data Security Leader Cyera Secures $300M in Series D Funding Cyera Acquires Trail Security for $162M Cyera Launches Data Incident Response Service Cyera Appoints Renowned Tech Exec Frank Slootman to Board of Directors This segment is sponsored by Cyera. Visit https://securityweekly.com/cyerarsac to learn more about them! Blumira In the evolving world of cybersecurity, the shift from a purely threat-centric mindset to a focus on operational excellence is no longer just a trend—it's a necessity. Matthew Warner, CEO and co-founder of Blumira, argues that this shift is particularly crucial for small and mid-sized businesses (SMBs) and the managed service providers (MSPs) that support them. Matthew believes that traditional SIEM and detection solutions have historically fallen short for these organizations, often due to their complexity, high cost, and steep learning curves. As a result, many SMBs have struggled to keep up with the sophistication of modern threats. Blumira was founded to change that. Matthew's vision is rooted in democratizing security—making powerful, automated detection and response tools simple, affordable, and accessible for everyone, especially those who need them most. By designing platforms that prioritize operational excellence—efficiency, usability, and actionable intelligence—Blumira enables organizations to be proactive rather than reactive. During the conversation, Matthew will share insights into the latest technologies and trends transforming the cybersecurity space, and offer actionable guidance for IT decision-makers. He'll explore how shifting strategy from chasing every alert to building a solid, efficient operational foundation can lead to better outcomes and stronger protection in the long run. Blumira Partners Blumira Launches New M365 Threat Response Feature Security should be accessible to everyone. At Blumira, we're building the future of detection and response — simple, smart, and built to empower the teams who need it most. Check out https://securityweekly.com/blumirarsac and take control of your security today. Show Notes: https://securityweekly.com/esw-411

@BEERISAC: CPS/ICS Security Podcast Playlist
What do we need to deter insider threats? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 5, 2025 27:29


Podcast: OT Security Made SimpleEpisode: What do we need to deter insider threats? | OT Security Made SimplePub date: 2025-06-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMandana White, CEO of Smart Grid Forums, talks about the rise of insider threats to a company's cybersecurity and what it has to do with the cost-of-living crisis as well as the Western Robin Hood mentality. Diving a bit into societal psychology and politics there might even be a bit to learn from – of all places – Dubai to get IT and OT cybersecurity working in both companies and society.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Other Side Of The Firewall
Insider Threat or Lapse in Cyber Hygiene?

The Other Side Of The Firewall

Play Episode Listen Later Jun 4, 2025 11:24


In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the alarming rise in government data being sold online, the implications of poor cyber hygiene, and the complexities surrounding insider threats. They emphasize the need for better security practices and awareness to protect sensitive information in the face of increasing cyber threats. Article: Local cyber security expert seeing rise in government data for sale online https://www.gjsentinel.com/news/western_colorado/local-cyber-security-expert-seeing-rise-in-government-data-for-sale-online/article_3c6d4bc9-0c95-4317-914c-8aa70710509d.amp.html?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExVUptR1oyaThVdnpiQzdpYQEenk5NUdaEeBlBX2eN9YNt_Es4TDXtv3gz-fwWbI15kc91drgV2cz0uuTeeTI_aem__r0c41pnrrFaHj4oK4zkyA Please LISTEN

The Gate 15 Podcast Channel
Weekly Security Sprint EP 113. Hostile events and geopolitics, insider threats, and ransomware

The Gate 15 Podcast Channel

Play Episode Listen Later Jun 3, 2025 24:21


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Start:·      The Gate 15 Interview EP 58 – Cathy Lanier: Leading NFL Security with Attitude, Effort, Crabs and Beer·      Gate 15: Test, Don't Guess: Exercising Your Response Plan·      WaterISAC's H2OEx: Click Below to Register for a Location Near You! o  Daytona, FL- July 28 o  Los Angeles, CA- Sept 11 o  Arlington, TX- Nov 6·      26th Annual TribalNet Conference & Tradeshow Main Topics: Boulder:·      DOJ: Justice Department Files Federal Charges Against Alleged Perpetrator of Anti-Semitic Terror Attack in Colorado. The Justice Department has filed federal charges against illegal alien Mohammed Sabry Soliman, the alleged perpetrator of yesterday's anti-Semitic terrorist attack in Colorado… Soliman is being charged with a federal hate crime in addition to facing state charges for attempted murder in Colorado. Read the federal complaint HERE·      Updates: Colorado Attack That Injured 12 Was Planned for a Year, Officials Say. The F.B.I. said in a court filing that thesuspect, an Egyptian citizen who had sought asylum in the U.S., brought more than a dozen incendiary devices to a march in support of hostages in Gaza.·      Colorado suspect, now charged with federal hate crime, planned antisemitic attack for a year, FBI says·      12 burned in Boulder attack; suspect charged with federal hate crime:·      Boulder terror attack suspect planned mass shooting but was stopped from buying gun due to immigration status, as he faces 624 years in prison·      What We Know About the Boulder, Colorado Attack·      After Several Attacks, Heightened Anxiety Among American Jews Pride Month: Trans community most targeted in anti-LGBTQ+ incidents, GLAAD data shows. Transgender and gender-nonconforming people were the target of over half of allanti-LGBTQ+ incidents tracked by GLAAD over the last year in a new report… GLAAD counted more than 930 anti-LGBTQ+ incidents from May 2024 through April 2025, 52% of which targeted transgender and gender nonconforming people, across 49 states and Washington, D.C. Insider Threat:o  U.S. Government Employee Arrested for Attempting to Provide ClassifiedInformation to Foreign Government. ·      Intelligence agency employee accused of attempting to leak classified documents out of frustration with Trump.  Ransomware! ·      Gate 15: Test, Don't Guess: Exercising Your Response Plan·      Q1 '25 Travelers' Cyber Threat Report: Record Attack Activity·      Delinea - 2025 State of Ransomware Report - Adapting with agility to a fast-changing threat landscape·      FBI PIN - Silent Ransom Group Targeting Law Firms·      Firm in Baltimore Archdiocese bankruptcy case says stolen data wasdeleted after cyber breach·      Akira Ransomware: When Paying Isn't Enough to Stay Anonymous·      The State of State-Sponsored Hacktivist Attacks Quick Hits·      Ukraine launches massive drone strike on air bases deep inside Russia ·      Crypto Hacks in May 2025 Hit $244M, But $157M Frozen in Swift Recovery Efforts·      FBI FLASH: Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025 ·      US DIA 2025 Threat Assessment warns of growing complexity in global threats, national security·      DIA Releases 2025 Worldwide Threat Assessment: Cyber, Cartels, and Global Military Buildup Dominate Outlook·      Get ready for several years of killer heat,top weather forecasters warn·      America's summers keep getting warmer·      North Korea Infiltrates U.S. Remote Jobs—With the Help of Everyday Americans·      Tornado season 2025: active through April, andMay is keeping pace·      Treasury Takes Action Against Major Cyber Scam Facilitator

OT Security Made Simple Podcast
What do we need to deter insider threats? | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Jun 3, 2025 27:29


Mandana White, CEO of Smart Grid Forums, talks about the rise of insider threats to a company's cybersecurity and what it has to do with the cost-of-living crisis as well as the Western Robin Hood mentality. Diving a bit into societal psychology and politics there might even be a bit to learn from – of all places – Dubai to get IT and OT cybersecurity working in both companies and society.

The Kyle Seraphin Show
FBI Nabs INSIDER THREAT: Guy Gives Classified Stuff to FBI | Ep 576

The Kyle Seraphin Show

Play Episode Listen Later May 31, 2025 77:45


Join the Kyle Seraphin Show LIVE 9:30a ET on Rumble, orfind me on Spotify for ad-free video: https://KyleSeraphinShow.com__________________________________________________Our Sponsors make this program possible:https://SLNT.com/KYLE (Save 15% off everyday Faraday bags)http://patriot-protect.com/KYLE (15% off Protecting yourself from scams/Identity theft)https://BlackoutCoffee.com/KYLE (20% off your First Order) keywords:Insider,Threat,Kash,Patel,Fox,Interview,Bongino,Epstein,FBI,Recruiting,

Life in Bomb City Podcast
Episode 36 - "The Insider Threat Is Closer Than You Think"

Life in Bomb City Podcast

Play Episode Listen Later May 24, 2025 64:00


@LifeinBombCityPodcast‬ sits down with (Ret.) Command Sergeant Major Bart Womack to discuss his book and upcoming movie, "Embedded Enemy." Drawing from his long service and tragic experience in March 2003, Womack shares the lessons learned and more.

Cyber Security Today
From English Literature to Cybersecurity: A Journey Through Blockchain and Security

Cyber Security Today

Play Episode Listen Later May 24, 2025 54:36 Transcription Available


LINKS:  https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability:  https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja  from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement

Hacker And The Fed
SIM Swaps, Insider Threats & the Rise of 'Zishing'

Hacker And The Fed

Play Episode Listen Later May 22, 2025 36:34


Chris and Hector break down recent crypto security breaches, including Coinbase's insider-driven data leak and the SEC's SIM swap hack. They explore the rise of “Zishing” (Zoom phishing), deepfake scams, and the real-world dangers facing crypto holders. Join our new Patreon! ⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠questions@hackerandthefed.com

Reimagining Cyber
The Enemy Within: The Hidden Risk of Insider Threats - Ep 150

Reimagining Cyber

Play Episode Listen Later May 21, 2025 17:47


In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, delves inro the complex issue of insider threats. He concentrates on the two main types of insider threats: malicious insiders who knowingly abuse their access, and unintentional insiders who fall prey to phishing and other social engineering attacks. The conversation is highlighted by recent high-profile cases such as the Coinbase breach, where a third-party contractor was bribed, and the Scattered Spider group's attack on UK retailers like Marks and Spencer and Co-op. The episode explores the real-world financial impacts of these breaches and offers detailed strategies for defending against insider threats, emphasizing the importance of layered security, strict access controls, and thorough training. Listen to learn more about the evolving landscape of insider threats and how to protect your organization.Links mentioned in this episode:https://community.opentext.com/cybersecFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

Cyber Risk Management Podcast
EP 184: Spies, Honeypots, and Lawsuits

Cyber Risk Management Podcast

Play Episode Listen Later May 20, 2025 39:26


Is the so-called "Insider Threat" a big deal? If so, how could you use a honeypot to catch them? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.    If you want to know more about honeypots, check out Kip's newest LinkedIn Learning course: “Active Defense: The New Frontier in Cybersecurity” -- https://www.linkedin.com/learning/active-defense-the-new-frontier-in-cybersecurity/

The Other Side Of The Firewall
Coinbase Puts A $20M Bounty Out For Ransomers

The Other Side Of The Firewall

Play Episode Listen Later May 20, 2025 12:14


In this episode, the hosts discuss a significant cybersecurity incident involving Coinbase, which reportedly cost the company $400 million. They explore the implications of such attacks on financial institutions, the role of insider threats and bribery, and the importance of robust cybersecurity measures. The conversation also touches on investment strategies in the tech industry, particularly highlighting the success of notable figures like Nas in venture capital. The episode concludes with a call for improved security practices in the face of evolving cyber threats. Article: Coinbase Says Cybersecurity Incident Could Cost It $400 Million https://www.pymnts.com/cybersecurity/2025/coinbase-says-cybersecurity-incident-could-cost-it-400-million/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExRVJZN2JHRmNVRUoxNFF1agEeBqQ0wtW_Ix6VESXOx22WcCCeylU2lCckdhoCo6Pzlryk-G-Kx86g9v0DKfA_aem_65sqZR-dnRmCSfcmigFqBQ Please LISTEN

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode 131: Insider Threats: What to Watch For & How to Report

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later May 9, 2025 25:15


 In this cybersecurity awareness training episode, we're digging into one of the most overlooked risks in any organization: insider threats. From malicious intent to simple negligence and even blackmail, insiders can pose serious security challenges. Learn how to recognize the warning signs—like job dissatisfaction, policy violations, or sudden lifestyle changes—and what you should do if something doesn't seem right. With real-world case studies like Edward Snowden and Chelsea Manning, we'll show why everyone plays a role in prevention. Don't wait for someone else to speak up—know what to look for, understand how to report it, and help build a culture of trust and vigilance in your workplace.Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!

Sermons - Vineyard Church of Holly Springs

Speaker: Josh Pavel

The Social-Engineer Podcast
Ep. 303 - The Doctor Is In Series - Emotional Regulation in the Workplace

The Social-Engineer Podcast

Play Episode Listen Later May 5, 2025 34:01


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie are discussing Emotional Regulation in the Workplace.  They will talk about the different strategies that can be used to help, not just at work, but in most areas of our lives. [May 5, 2025]   00:00 - Intro 00:38 - Dr. Abbie Maroño Intro 00:57 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                 02:30 - The Topic of the Day: Emotional Regulation in the Workplace 04:14 - Strategy 1: Deep Acting 14:10 - Strategy 2: Mindfulness & Acceptance 19:24 - Strategy 3: Social Sharing 26:40 - Strategy 4: Humor & Distraction 31:21 - Wrap Up 33:07 - Next Month: The Lonely Chapter 33:41 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd -          Instagram: @DoctorAbbieofficial -          LinkedIn: linkedin.com/in/christopherhadnagy     References: Kalokerinos, E. K., Résibois, M., Verduyn, P., & Kuppens, P. (2017). The temporal deployment of emotion regulation strategies during negative emotional episodes. Emotion, 17(3), 450–458. https://doi.org/10.1037/emo0000248 Côté, S., & Hideg, I. (2011). The consequences of faking emotions: Emotional dissonance, relationship quality, and employee well-being. Emotion, 11(4), 803–815. https://doi.org/10.1037/a0023868 Lomas, T., Medina, J. C., Ivtzan, I., Rupprecht, S., & Eiroa-Orosa, F. J. (2019). The impact of mindfulness on well-being and performance in the workplace: An inclusive systematic review of the empirical literature. European Journal of Work and Organizational Psychology, 28(6), 782–804. https://doi.org/10.1080/1359432X.2019.1659420 Bono, J. E., Foldes, H. J., Vinson, G., & Muros, J. P. (2007). Workplace emotions: The role of supervision and leadership. Journal of Applied Psychology, 92(5), 1357–1367. https://doi.org/10.1037/0021-9010.92.5.1357 Clayton, S. (2024). Working well: The simple act of taking deep breaths can reduce stress and anxiety. Associated Press. Ordali, E., et al. (2024). Exhaustion at work can lead to difficulty controlling emotions, scientists say. The Guardian. Mesmer-Magnus, J., Glew, D. J., & Viswesvaran, C. (2012). A meta-analysis of positive humor in the workplace. Journal of Managerial Psychology, 27(2), 155–190. https://doi.org/10.1108/02683941211199554 Scheibe, S., & Zacher, H. (2013). A lifespan perspective on emotion regulation, stress, and well-being in the workplace. In The Oxford Handbook of Stress, Health, and Coping (pp. 291–306). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780195375343.013.0017

Cyber Sip
Insider Threats, Training, and CISOs at Risk

Cyber Sip

Play Episode Listen Later Apr 30, 2025 41:03


Kevin Szczepanski welcomes Gregg Davis, managing principal and technical advisory solutions leader at EPIC Insurance Brokers & Consultants. Kevin and Gregg start by discussing the increasing risks of insider threats to cybersecurity and the sophistication of threat actors along with the need for organizations to create a culture of verification and for real-world training. Diving into strategies to mitigate insider threats, they emphasize awareness and proactive measures. Kevin and Gregg touch on business email compromise, insurance policies, the evolving role of the CISO, and much more. Tune in for the whole episode.

Mingis on Tech
How Insider Threats Are Evolving in 2025 | Ep. 226

Mingis on Tech

Play Episode Listen Later Apr 29, 2025 24:34


Insider threats are no longer just about disgruntled employees. In 2025, threat actors are recruiting from within—sometimes using underground "job boards" to find insiders willing to sell credentials, plant malware, or steal data. In this episode of Today in Tech, host Keith Shaw talks with Ryan LaSalle, CEO of Nisos, about how insider threats are evolving and how companies can detect and prevent them. :mag: Topics covered: How North Korean IT workers infiltrated U.S. companies remotely The rise of “polyworking” and fraudulent employment scams Real-world examples of sabotage and credential brokering Warning signs of insider threats: mental health, financial duress, disengagement Why remote and hybrid work has made detection harder Balancing employee trust with cybersecurity monitoring :loudspeaker: Don't miss this important discussion if you work in InfoSec, HR, or IT management. :+1: Like this video, subscribe to our channel, and comment below with your thoughts or experiences! #Cybersecurity #InsiderThreats #RemoteWork #ITSecurity #TodayInTech #Nisos #KeithShaw #RyanLaSalle #Infosec #DataBreach #WorkplaceSecurity

Liberty, Leadership and Lies with Larry Linton
Episode 193: Liberty - The Insider Threat

Liberty, Leadership and Lies with Larry Linton

Play Episode Listen Later Mar 31, 2025 29:40


Following up to last week's show and answering the question posed in it - yes, they did it again. In this week's episode I will recap the poop show that was the Sevier County Republican Party Re-Organization meeting from last Tuesday. I will also be letting the audience know about a couple of upcoming guests to the program. Additionally, I stress the importance of why it is important to always wait for the facts to come out before jumping to any conclusions about a news story being pushed by the propaganda wing of the communists - the national news media.You can subscribe to or follow the podcast on Apple or Spotify, or on your favorite podcast platform – Rumble | YouTube | Overcast | Amazon Music | iHeartRadio | Pocket Casts | RadioPublicJoin me on social media:Twitter – both at @LarryForTN12 @LiesLibertyTruth Social – @LarryForTN12Instagram – @larry_for_tn12 @libertyleadershipandliesFacebook – both at Larry Linton - Sevier County Conservative Activist Liberty, Leadership and LiesGab – @LarryLintonGETTR – @LarryLintonTelegram – t.me/libertyleadershipandliesOr on the web at – https://libertyleadershipandlies.com#LarryForTN12 #LintonForTN12 #LarryLintonForTN12 #LibertyLeadershipAndLies #Liberty #Leadership #Lies #Constitutionalist #Conservative #Tennessee #StandInTheArena #PrincipledLeadership #ServantLeadership #FYP #GOP #RepublicanParty #GoodOldBoys #Corrupt #EthicallyChallenged #InsiderThreat

Identity At The Center
#339 - Sponsor Spotlight - Permiso

Identity At The Center

Play Episode Listen Later Mar 26, 2025 56:38


This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.Chapters00:00 Introduction to Security Vendors00:50 Welcome to the Identity at the Center Podcast01:30 Sponsored Spotlight: Permiso02:14 Meet Paul Nguyen, Co-Founder of Permiso03:34 The Importance of Identity in Security05:35 Permiso's Unique Approach to Identity Security07:36 Real-Time Monitoring and Threat Detection09:23 Challenges and Solutions in Identity Security15:16 Modern Attacks and Identity Threats25:56 The Role of Honeypots in Security Research26:49 Challenges of Maintaining Security27:15 Honeypots and Breach Detection27:46 Dwell Time and Reconnaissance28:34 Password Complexity and Monitoring Gaps29:24 Roles and Responsibilities in Identity Security29:49 Unified Identity Security Teams30:57 Emerging Threats and Joint Efforts32:49 Permiso's Role in Identity Security34:10 Detection and Response Strategies36:11 Managing Identity Risks36:51 Combining Prevention and Detection39:44 Real-World Applications and Challenges51:17 Personal Insights and Final ThoughtsConnect with Paul: https://www.linkedin.com/in/paulnguyen/Learn more about Permiso: https://permiso.io/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at idacpodcast.tvKeywords:identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity

The Fearless Mindset
Episode 241 - Inside the Intelligence Game: Fred Burton on Terrorism, Security & High-Profile Threats

The Fearless Mindset

Play Episode Listen Later Mar 25, 2025 29:22


In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe importance of proactive surveillance and intelligence gathering in security.Lessons learned from historical security breaches and attack plots.The significance of cultural fit and adaptability in security teams.Challenges faced by security personnel in adjusting to different operational environments.The necessity to constantly update and share intelligence within the security community.The evolving methods of threat actors and their preparedness.Fred Burton's involvement in upcoming TV and film projects based on his books.QUOTES"The scope of detail that some of these threat actors are engaged with is just frightening.""Intelligence is powerful when done correctly.""You can't run a program without intelligence today.""If you've got a good security team, trained in observation skills, you should be able to spot threat actors ahead of time.""Getting people in and out without being hassled is the kind of value add that we routinely do in this business.""It's amazing what you can do if you just try to blend in and ask questions.""Some degree of protection at public venues is essential, especially for controversial issues.""Surveillance is critical before you get the bodies out there. Get that team out there moving around snooping."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

healthsystemCIO.com
Keys to Implementing a Comprehensive Insider Threat Mitigation Program

healthsystemCIO.com

Play Episode Listen Later Mar 25, 2025 58:35


Preventing and detecting insider threats is tricky business, as they arise from within the castle. That's why a high quality program requires a comprehensive and multi-faceted approach, encompassing employee education, risk assessments and monitoring technologies. But what exactly does such a program look like? Where should limited resources be allocated, and how can IT professionals determine a general order of priorities if many elements need attention? In this timely webinar, we'll hear from leaders sharing actionable insights to ensure threats from within get as much attention as threats from without. Source: Keys to Implementing a Comprehensive Insider Threat Mitigation Program on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

The Fearless Mindset
Episode 239 - The Truth About Terror Threats & U.S. Security Gaps

The Fearless Mindset

Play Episode Listen Later Mar 11, 2025 28:57


In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSecurity Concerns on Open Borders: Despite the high number of migrants, there has not been a domestic act of terror directly linked to transnational terrorists from the southern border.Domestic vs. Geopolitical Threats: Domestic threats such as school shootings are more frequent and concerning compared to geopolitical and international threats.Historical Predictive Failures: The U.S. has historically struggled to predict major geopolitical events, regardless of advancements in intelligence.Adaptation and Responsiveness: The executive protection industry often operates reactively, highlighting the need for better proactive measures and adequate resourcing.Regional Differences in Security Perception: Security needs and perceptions differ greatly across the U.S., with coastal regions being more open to private security compared to more self-reliant attitudes in middle America.QUOTES"To the best of my knowledge, there never has been a domestic act of terror directly linked to a transnational terrorist coming from the southern border.""Trust me, you'll be the first one to know if I uncover something that you really need to be concerned about for you or your family.""Our nation seems to always be surprised... I want to believe that we're better today at anticipating surprise, but history has shown we're not.""Most CEOs today are almost more receptive to that kind of low-key protection."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Cyber Security Today
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025

Cyber Security Today

Play Episode Listen Later Mar 8, 2025 35:49 Transcription Available


Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from innocent mistakes to malicious actors, and how companies can effectively protect their sensitive data. Learn about data loss prevention strategies, the impact of remote work, and the role of AI in enhancing data security. Get insights on practical steps that CISOs can take to mitigate risks and safeguard their organization's crown jewels. 00:00 Introduction and Guest Welcome 00:10 Understanding Insider Threats 01:20 Types of Insider Threats 02:18 Monitoring and Preventing Data Leaks 03:37 Remote Work and Security Risks 06:03 Access Control and Permissions 08:41 Real-World Scenarios and Solutions 21:20 The Role of AI in Data Security 34:53 Final Thoughts and Conclusion

The Fearless Mindset
Episode 237 - Fred Burton on Navigating Evolving Security Threats & Protective Intelligence (Part 1)

The Fearless Mindset

Play Episode Listen Later Feb 25, 2025 30:05


In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 100! Hitting the century mark with DOGE, CISA and insider threat

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 25, 2025 25:46


In the 100th episode of the Security Sprint, Dave and Andy covered the following topics:Warm Open:·      H2OSecCon 2025 Call for Presentations Now Open Main Topic: DOGE, the Private Sector. Insider Threats & Info Sharing·      DOGE Now Has Access to the Top US Cybersecurity Agency·      DOGE employee Edward Coristine lands at CISAwith DHS email·      ISAC chief on CISA security rollbacks: ‘The sky isn't falling, yet.'·      The Gate 15 Interview EP 55. Allan Liska, Ransomware Sommelier. Threats, mental health, comic books and Diet Dr. Pepper·      Trump 2.0 Brings Cuts to Cyber, Consumer Protections·      DOGE will use AI to assess the responsesof federal workers who were told to justify their jobs via email·      PERSPECTIVE: Current U.S. GovernmentAdministration and the Risk of Increased Insider Threat·      Opinion: DOGE's US worker purge has created aspike in insider risk Quick Hits:·  Bybit Hack: Crypto exchange Bybit says it was hacked andlost around $1.4Bo  Risky Bulletin: North Korean hackers steal $1.5 billion from Bybito   Big Day for Crypto Goes South in a Hurry After a Giant Hacko  Ethereum Developer Counters Idea Of Blockchain Rollback Amid Bybit Hacko  Bybit's Phantom Hacker Becomes Ethereum's Shadow Whale by Fragmenting Fortune Across 54 Walletso  Bybit Hack Funds Funneled Through Meme Coins, Onchain Sleuth Reportso  Crisis Management in $1.4 Billion Hack Sets New Industry Standard, Bybit Officials Sayo  What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection·      Stablecoin Bank Infini Earn Latest Hack Victim, Sees $49.5M USDC Flow Out to Attackers·      Apple is removing iCloud end-to-encryption features from the UK after government compelled it to add backdoors·      CISA and Partners Release Advisory on Ghost (Cring) Ransomware·      Risky Bulletin: BlackBasta implodes, internal chats leak online·      Salt Typhoon hackers exploited stolen credentials and a 7-year-old software flaw in Cisco systems·      Terror Thwarted: Man Threatening Violent Attacks On New York Shuls Arrested In Lincoln Tunnel On Friday Evening·      Early data show homicides dropped 16% in 2024

Business of Tech
AI's Role in Cybersecurity: Insider Threats, Phishing Scams, and Deepfake Risks with Bryant G. Tow

Business of Tech

Play Episode Listen Later Feb 22, 2025 35:35


The episode delves into the impact of artificial intelligence (AI) on cybersecurity, particularly focusing on the rise of AI-driven phishing attacks. Bryant G. Tow, Chief Security Officer at LeapFrog Services, discusses how cybercriminals are leveraging generative AI to create more convincing phishing schemes, which can lead to identity theft. Despite the advancements in attack methods, Tao emphasizes that the fundamental defenses against these threats remain unchanged. He highlights the importance of understanding the evolving landscape of cyber threats and the necessity for organizations to adapt their security measures accordingly. Tow elaborates on the concept of an "arms race" in cybersecurity, where defenders must continuously improve their strategies to keep pace with increasingly sophisticated attacks. He points out that while phishing remains a common entry point for cyber threats, the use of AI is transforming these attacks into more personalized and effective schemes. The conversation shifts to the implications of deepfake technology, which can create realistic impersonations of individuals, further complicating the security landscape. Tao warns that the ability to produce convincing deepfake videos and audio can lead to significant risks for organizations. The discussion also touches on the challenges of insider threats, particularly when employees intentionally disregard security policies. Tao stresses the importance of establishing clear acceptable use policies and implementing a zero-trust framework to mitigate these risks. He notes that most insider threats are accidental, but organizations must be prepared to address malicious actions as well. Effective governance, training, and monitoring are essential components in managing insider threats and ensuring compliance with security protocols. Finally, the episode highlights the evolving role of government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) in addressing cybersecurity challenges. Tow reflects on recent changes in leadership and the potential for new perspectives on cybersecurity governance. He expresses hope that the shift in focus will lead to more accessible resources and support for organizations navigating the complex landscape of cyber threats. The conversation underscores the need for continuous adaptation and vigilance in the face of emerging technologies and evolving attack methods. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Other Side Of The Firewall
Is DOGE The Next Insider Threat?

The Other Side Of The Firewall

Play Episode Listen Later Feb 20, 2025 14:53


In this episode, the hosts discuss critical cybersecurity issues, focusing on the implications of non-compliance with security protocols in government networks. They highlight the importance of the CIA triad (Confidentiality, Integrity, Availability) and the risks posed by insider threats. The conversation emphasizes the need for stringent security measures to protect sensitive information and the potential long-term consequences of security breaches. Article: Is DOGE a cybersecurity threat? https://www.minnpost.com/community-voices/2025/02/is-doge-a-cybersecurity-threat/?fbclid=IwZXh0bgNhZW0CMTAAAR0FNJ-Z4jgUxIwzSNBN7mHv_05kNAhzTfhsCGxDewaXmQEcUIyGlW87kI4_aem_UVhh2I21JPmEqLfNNNxWeQ Please LISTEN

The Social-Engineer Podcast
Ep. 293 - Security Awareness Series - From Banker to Spy to Cyber Security Expert with Peter Warmka

The Social-Engineer Podcast

Play Episode Listen Later Feb 17, 2025 33:14


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Peter Warmka. Peter is a Former Senior Intelligence Officer with the CIA with over 20 years' experience in breaching the security of organizations overseas. Peter is the founder of the Orlando-based firm Counterintelligence Institute, LLC and an Adjunct Professor at Webster University's Masters Cybersecurity Program. Peter is passionate about using his expertise in helping city, state, and federal government entities, non-profits, academic institutes, private companies, and individuals safeguard their sensitive proprietary and/or personal data. He is also the author of two books. [Feb 17, 2025]   00:00 - Intro 00:21 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:25 - Peter Warmka Intro 03:14 - Getting Recruited 12:11 - Working Above Cybersecurity 21:33 - Identifying Potential Candidates 23:20 - Tip to CISO's: Learn About AI 25:17 - The Importance of Guardrails 28:37 - Peter's Books -          Confessions of a CIA Spy - Peter Warmka -          Why Are You Messing With Me? - Peter Warmka 31:10 - Find Peter Warmka online -          LinkedIn: in/peterwarmka -          Website: counterintelligence-institute.com 32:18 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Hacker And The Fed
SSH Backdoors, the Decline of Ransomware Payments, and Hector Rants on a MASSIVE Insider Threat

Hacker And The Fed

Play Episode Listen Later Feb 13, 2025 54:40


This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur discussdiscuss a newly discovered SSH backdoor used by Chinese cyber spies, the alarming rise of insider threats in critical U.S. infrastructure, and the significant drop in ransomware payments in 2024. Hector also delivers a passionate rant about government security oversight and the risks posed by unvetted personnel in federal systems. Plus, the duo shares insights on bypassing corporate security with SSH tunneling, the evolution of cybercrime tactics, and why cybersecurity resilience is more crucial than ever. Send HATF your questions at questions@hackerandthefed.com.

The Cognitive Crucible
#214 Jon Roginski and Stephanie Jaros on Insider Threat and Workforce Protection

The Cognitive Crucible

Play Episode Listen Later Feb 11, 2025 48:29


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Jon Roginski and Stephanie Jaros discuss the strategic landscape for insider threat and workforce protection programs, emphasizing the need for a more holistic approach that considers both technical and human factors. They also explored the importance of balancing the use of analytics with human involvement in decision-making processes, and the need for organizations to be proactive in minimizing risks. Lastly, they discussed "Project Beyonce" and the importance of cultural development within organizations for workforce protection, and recommended groups for private sector involvement in security. Recording Date: 15 Jan 2025 Research Question: Stephanie Jaros suggests an interested student or researcher examine: How do organizations not leak highly sensitive information? (For example: “Project Beyonce”) Resources: Cognitive Crucible Podcast Episodes Mentioned #123 Jonathan Roginski on Insider Threats #73 Ori Brafman on The Starfish, Spider, and Resilient Societies Workforce Protection: The Next Generation of Insider Risk Programs On the Right Track: Worker-on-Worker Violence (“Project Beyonce”) by Stephanie L. Jaros, Katlin J. Rhyner, & Erik R. Gregory INFRAGARD Legacy: What The All Blacks Can Teach Us About The Business Of Life by James Kerr The Premonition: A Pandemic Story by Michael Lewis Link to full show notes and resources Guest Bio:  Dr. Jon Roginski is the Program Manager for the West Point Insider Threat Program, which serves as the "research arm" for the Pentagon-administered Army Insider Threat Program. Stephanie Jaros is an insider risk expert with 15 years of experience in program design, implementation, assessment, and research across government and industry. Currently, she is a Visiting Research Scientist and the Lead Scientist for Personnel Security Research at the University of Maryland's Applied Research Laboratory for Intelligence & Security (ARLIS). About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

The Source with Kaitlan Collins
Treasury Memo Warned DOGE Poses “Insider Threat Risk”

The Source with Kaitlan Collins

Play Episode Listen Later Feb 8, 2025 47:49


President Trump sets Elon Musk on a new target: the Pentagon. The young members of his team are facing new scrutiny as Elon Musk is rapidly expanding his scope while he seeks to slash the federal budget. Plus, President Trump confirms his plans to fire some FBI agents as quickly and surgically as possible.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

AMERICA OUT LOUD PODCAST NETWORK
Cybersecurity & insider threats: How to protect your information

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Feb 7, 2025 58:00


The National Security Hour with Major Fred Galvin – Join Major Fred Galvin as he interviews cybersecurity expert Ryan Rambo, a retired Army Counterintelligence Specialist. Learn about rising cyber threats, insider risks, and the nations targeting sensitive data. Discover the truth about VPNs, online privacy, and best practices to protect your identity at home, abroad, and in the digital world. Stay secure!

The National Security Hour
Cybersecurity & insider threats: How to protect your information

The National Security Hour

Play Episode Listen Later Feb 7, 2025 58:00


The National Security Hour with Major Fred Galvin – Join Major Fred Galvin as he interviews cybersecurity expert Ryan Rambo, a retired Army Counterintelligence Specialist. Learn about rising cyber threats, insider risks, and the nations targeting sensitive data. Discover the truth about VPNs, online privacy, and best practices to protect your identity at home, abroad, and in the digital world. Stay secure!

Stand Up! with Pete Dominick
1288 Frank Figliuzzi + Headlines and Clips

Stand Up! with Pete Dominick

Play Episode Listen Later Feb 5, 2025 57:52


 Stand Up is a daily podcast that I book,host,edit, post and promote new episodes with brilliant guests every day. Please subscribe now for as little as 5$ and gain access to a community of over 700 awesome, curious, kind, funny, brilliant, generous souls Check out StandUpwithPete.com to learn more GET TICKETS TO PODJAM II In Vegas March 27-30 Confirmed Guests! Professor Eric Segall, Dr Aaron Carroll, Maura Quint, Tim Wise, JL Cauvin, Ophira Eisenberg, Christian Finnegan and More! Frank Figliuzzi is a national security contributor and regular columnist for NBC News and MSNBC. He was the assistant director for counterintelligence at the FBI, where he served 25 years as a special agent and directed all espionage investigations across the government. He is the author of “The FBI Way: Inside the Bureau's Code of Excellence.” Frank Figliuzzi was the FBI's Assistant Director for Counterintelligence and served 25 years as a Special Agent. In his current role as a respected National Security Analyst, Frank appears weekly on live television for NBC and MSNBC news. Frank held senior FBI leadership positions in major American cities and was appointed the FBI's Chief Inspector by then Director Robert Mueller to oversee sensitive internal inquiries, shooting reviews, and performance audits. Following his FBI career, Frank became a corporate security executive for a Fortune 10 company and led global Investigations, Insider Threat, Workplace Violence Prevention, and Special Event security for 200,000 employees in 180 countries. As the Bureau's head of Counterintelligence, Mr. Figliuzzi directed all espionage investigations across the U.S. government. Frank frequently briefed the White House, Congress, and the Attorney General. Mr. Figliuzzi directed an FBI internal disciplinary unit in the Office of Professional Responsibility and adjudicated allegations of serious misconduct against FBI personnel. Frank is the author of THE FBI WAY: Inside the Bureau's Code of Excellence (HarperCollins). Frank is most noted for his clear and compelling television commentary regarding the Special Counsel investigation of Russian interference in the 2016 U.S. Presidential campaign, and coverage of tragic mass shootings. His FBI career highlights include: Leading the FBI's efforts to counter economic espionage in Silicon Valley, California; Overseeing major financial crimes and public corruption investigations in Miami, Florida, and Cleveland, Ohio; Serving as on-scene commander of the largest HAZMAT evidence recovery effort in FBI history at the Boca Raton, Florida, site of the nation's first anthrax murder; and, Publicly explaining the FBI's successful operation against ten Russian sleeper agents inside the United States. Mr. Figliuzzi earned a Juris Doctorate cum laude from the University of Connecticut School of Law, and a Bachelor of Arts Degree in English Literature from Fairfield University. Frank completed certificate programs at the Harvard University National Security Program for Senior Executives in Government at the John F. Kennedy School of Government, and at Northwestern University's executive course on Leading Strategic Change at the Kellogg School of Management. He is a sought-after speaker, panelist and instructor on leadership, violence prevention, risk management, and the external and internal threats facing the United States   Join us Monday's and Thursday's at 8EST for our Bi-Weekly Happy Hour Hangout!  Pete on Blue Sky Pete on Threads Pete on Tik Tok Pete on YouTube  Pete on Twitter Pete On Instagram Pete Personal FB page Stand Up with Pete FB page All things Jon Carroll  Follow and Support Pete Coe Buy Ava's Art  Hire DJ Monzyk to build your website or help you with Marketing

DoD Secure
Implementing an Effective Insider Threat Program for NISPOM Compliance

DoD Secure

Play Episode Listen Later Feb 3, 2025 13:50


Send us a text descriptionNISPOM Compliance Consulting and FSO Services: https://www.thriveanalysis.comNISPOM Books and Training Resources https://www.nispomcentral.comContact Jeff: jeff.bennett@nispomcentral.comImplementing an Effective Insider Threat Program for NISPOM ComplianceJeff Bennett from Thrive Analysis Group discusses the importance of implementing an aggressive insider threat program to ensure NISPOM compliance. He explains how such a program can protect sensitive information within clear defense contractors, commercial entities, institutions, and nonprofits. The video outlines the identification of sensitive assets, developing countermeasures, and training employees to recognize and report suspicious behavior as focal points of a robust insider threat program. Continuous evaluation, education on adverse information reporting, and practical steps for effective insider threat management are also covered.00:00 Introduction to Jeff Bennett and Thrive Analysis Group00:25 Understanding Insider Threat Programs01:52 Identifying Insider Threat Behaviors03:28 Implementing a Robust Insider Threat Program05:27 Continuous Evaluation and Reporting09:55 Training Employees on Insider Threats12:36 Conclusion and Contact InformationNISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

Hacker And The Fed
ROSS ULBRICHT PARDONED, Plus Insider Threats, Corporate Security Risks, and A High-Profile Crypto Kidnapping

Hacker And The Fed

Play Episode Listen Later Feb 1, 2025 48:49


This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur talk hector's much-needed vacation in the rainforest, and onto the major cybersecurity stories they missed while away. They discuss the recent pardon of Ross Ulbricht, second chances in life, and the complexities of law enforcement and the justice system. The conversation covers everything from insider threats, corporate security risks, personal attack surface reduction and even a recent high-profile crypto kidnapping. Send HATF your questions at questions@hackerandthefed.com.

The Mel K Show
Mel K & Adam Lovinger | The Insider Threat: How Deep Does it Go? | 1-26-25

The Mel K Show

Play Episode Listen Later Jan 27, 2025 55:53


Beverly Hills Precious Metals Exchange - Buy Gold & Silver https://themelkshow.com/gold/ Speak with Gold Expert Andrew Sorchini…Tell Him Mel K Sent You!   Adam Book - The Insider Threat: How the Deep State Undermines America from Within https://www.amazon.com/dp/1641774312?ref_=cm_sw_r_ffobk_cp_ud_dp_RHTZHTDJJT08EF799M95&skipTwisterOG=1&bestFormat=true&newOGT=1   Learn more about Adam Lovinger: https://www.goldiis.org/adam-lovinger   Order Mel's New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book   Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK   We The People must stand strong, stay united, resolute, calm, and focus on the mission.   We at www.themelkshow.com want to thank all our amazing patriot pals for joining us on this journey, for your support of our work, and for your faith in this biblical transition to greatness. We love what we do and are working hard to keep on top of everything to help this transition along peacefully and with love. Please help us amplify our message: Like, Comment & Share!   The Show's Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/   Another way to get involved and find ways to become active in the community is to come meet Mel and many amazing truth warriors at our upcoming live in-person speaking events. Together we are unstoppable. We look forward to seeing you. God Wins! https://themelkshow.com/events/ Remember to mention Mel K for great discounts on all these fun and informative events. See you there! Our Website www.TheMelKShow.com Support Patriots With MyPillow Go to https://www.mypillow.com/melk Use offer code “MelK” to support both MyPillow and The Mel K Show   Mel K Superfoods Supercharge your wellness with Mel K Superfoods Use Code: MELKWELLNESS and Save Over $100 off retail today! https://themelkshow.com/partners/   Healthy Hydration: https://themelkshow.com/partners/   Patriot Mobile Support your values, your freedom and the Mel K Show. Switch to Patriot Mobile for Free. Use free activation code MELK https://themelkshow.com/partners/   HempWorx The #1 selling CBD brand. Offering cutting edge products that run the gamut from CBD oils and other hemp products to essential oils in our Mantra Brand, MDC Daily Sprays which are Vitamin and Herb combination sprays/ https://themelkshow.com/partners/   Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK   The Wellness Company - Emergency Medical Kits: https://themelkshow.com/partners/   Dr. Jason Dean and BraveTV bring you the most innovative and cutting edge science in Nutrition with Nano-Particle Detoxification, The Full Moon Parasite Protocol and Clot Shot Defense. https://themelkshow.com/partners/   Dr. Stella Immanuel, MD. Consult with a renowned healthcare provider! Offering Telehealth Services & Supplements. Use offer code ‘MelK' for 5% Off https://themelkshow.com/partners/   Rumble (Video) - The Mel K Show: https://rumble.com/c/TheMelKShow Twitter: https://twitter.com/MelKShow Twitter (Original): https://twitter.com/originalmelk TRUTH Social: https://truthsocial.com/@themelkshow Instagram: https://www.instagram.com/themelkshow/ CloutHub: https://app.clouthub.com/#/users/u/TheMelKShow Mel K Show Video Platform (Subscription): https://www.themelkshow.tv Bitchute: https://www.bitchute.com/channel/Iw2kiviwZpwx/ Podbean: https://themelkshow.podbean.com/ Gab: https://gab.com/MelKShow GETTR: https://www.gettr.com/user/themelkshow Locals.com: https://melk.locals.com/ Banned Video: https://banned.video/channel/the-mel-k-show Brighteon: https://www.brighteon.com/channels/themelkshow

The Victor Davis Hanson Show
National Security and the Deep State: VDH Interviews Adam Lovinger

The Victor Davis Hanson Show

Play Episode Listen Later Jan 18, 2025 49:22


Listen into the Saturday edition as Victor Davis Hanson interviews Adam Lovinger, the Vice President of Strategic Affairs at the Gold Institute for International Strategy. He reveals the Orwellian situation under the Obama-Biden administration when it came to Iran, national security, and lawfare, all subjects of his new book The Insider Threat.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Chris Farrell's On Watch Podcast
The Insider Threat with Adam Lovinger

Chris Farrell's On Watch Podcast

Play Episode Listen Later Jan 15, 2025 48:49


Adam Lovinger is the Vice President for Strategic Affairs at the Gold Institute for International Strategy, a Washington D.C.-based think tank. In 2017 Lovinger was Senior Director for Strategic Assessments at the U.S. National Security Council (NSC). From 2006-2017 he provided direct support on long-term U.S. national security strategy to the Secretary of Defense from the Pentagon's Office of Net Assessment (ONA).Lovinger is the author of “The Insider Threat: How the Deep State Undermines America from Within”ORDER: https://www.encounterbooks.com/books/the-insider-threat/?srsltid=AfmBOor7fwXDLBbTTMHfZLDXQtZFYubjI5UQNOhSZue9U2xqozSxPOS0SUPPORT OUR WORK https://www.judicialwatch.org/donate/thank-youtube/ VISIT OUR WEBSITE http://www.judicialwatch.org

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode 127 - The Hidden Risks Within: CIA Lessons on Insider Threats

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later Jan 10, 2025 59:13


Former CIA officer Michele Assad joins the Cyber Rants Podcast to reveal the hidden dangers of insider threats, from Nation-State recruitment to false flag operations, and why businesses can't afford to ignore them. Michele shares actionable strategies to recognize, prevent, and respond to these risks while highlighting the power of resilience and mental toughness. She also introduces her upcoming book, Get Off The X, offering tools to overcome challenges and thrive under pressure. Don't miss this insightful episode packed with expertise and practical advice!More about Michelle Assad and "Get Off The X" - https://michelerigbyassad.comMichelle Assad on LinkedIn - https://www.linkedin.com/in/michele-rigby-assad-b25695135/Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!

America First with Sebastian Gorka Podcast
Adam Lovinger on the Insider Threat

America First with Sebastian Gorka Podcast

Play Episode Listen Later Jan 7, 2025 37:13


In this episode of the Happy Women podcast, author and former Senior Director for Strategic Assessments at the U.S. National Security Council, Adam Lovinger, joins Jen Horn and Katie Gorka to discuss his experiences within the U.S. national security framework, particularly focusing on the Office of Net Assessment and the implications of the deep state during the Obama administration. He shares insights on the ideological shifts in national security, the origins of the Russia hoax, and the threats posed by figures like General Flynn. Lovinger also recounts his personal struggles against the deep state and the tragic story of whistleblower Stephen Luke, while expressing hope for restoring integrity in government. Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.

The Happy Women Podcast
Adam Lovinger on the Insider Threat

The Happy Women Podcast

Play Episode Listen Later Jan 7, 2025 37:13


In this episode of the Happy Women podcast, author and former Senior Director for Strategic Assessments at the U.S. National Security Council, Adam Lovinger, joins Jen Horn and Katie Gorka to discuss his experiences within the U.S. national security framework, particularly focusing on the Office of Net Assessment and the implications of the deep state during the Obama administration. He shares insights on the ideological shifts in national security, the origins of the Russia hoax, and the threats posed by figures like General Flynn. Lovinger also recounts his personal struggles against the deep state and the tragic story of whistleblower Stephen Luke, while expressing hope for restoring integrity in government. See omnystudio.com/listener for privacy information.

America First with Sebastian Gorka Podcast
What to do about the Deep State. Adam Lovinger with Sebastian Gorka on The Manhood Hour

America First with Sebastian Gorka Podcast

Play Episode Listen Later Dec 31, 2024 38:49


Sebastian is joined in-studio by Adam Lovinger, former Senior Director of the National Security Council, to talk about his book "The Insider Threat."Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.

Security Conversations
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights

Security Conversations

Play Episode Listen Later Dec 27, 2024 113:11


Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

ITSPmagazine | Technology. Cybersecurity. Society
The present and future of Human-Centered Cybersecurity: Managing Risks and Fostering Digital Safety | An Australian Cyber Conference 2024 in Melbourne Conversation with Jinan Budge | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 27, 2024 39:44


Guest: Jinan Budge, Vice President, Principal Analyst serving Security & Risk professionals, ForresterOn LinkedIn | https://www.linkedin.com/in/jinan-budge-2898132/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Australian Cyber Conference Melbourne 2024 is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry's most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a  conversation with Jinan Budge, Vice President at Forrester Research, focusing on the vital role of human-centered security in today's evolving landscape.Building a Human-Centered Cybersecurity CultureOne of the central themes of the discussion was the shift from traditional security awareness programs to human risk management. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward human-centered cybersecurity is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.Collaboration Between Enterprises and VendorsThe podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace adaptive security solutions tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.Understanding the Human Element in Data BreachesBudge introduced a framework she calls the “wheel of human element breaches,” which categorizes risks such as social engineering, human error, and insider threats. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.Education and Continuous LearningMarco Ciappelli and Jinan Budge underscored the importance of integrating cybersecurity education into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.ConclusionThe discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry's growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Hacker And The Fed
Italian Hacking Scandal, NSA Best Practices, Insider Threats & a Former Anonymous Hacker?

Hacker And The Fed

Play Episode Listen Later Nov 21, 2024 40:19


This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur dive into a massive hacking scandal targeting Italian political elites, revealing insider threats and international intrigue. They break down NSA mobile device security best practices and share their own successes (and failures) in following them. Plus, updates on their personal lives, community work, and how ethical hacking can prevent breaches like this. Send HATF your questions at questions@hackerandthefed.com.