POPULARITY
Categories
Vi sitter denna vecka med lagets 45:a, Isac Andersson! Vi pratar om Jagr-siffrorna i Lysekil/Munkedal, att spela i Sveriges U16-19-lag, utlåningen från Mora-Tingsryd-Vimmerby för att sedan stanna i 5 år. Vart i staden trivs han bäst? Tankar inför säsongen samt ett Sveriges J20-quiz. Detta och mycket annat!God lyssning!
In the latest episode of "The Brand Called You" podcast, we dive into the fascinating world of eco-conscious entrepreneurship with Yanni Ching, Co-founder and Chief Commercial Officer of Entomal Biotech. This blog post offers a glimpse into Yanni's journey and the revolutionary work her company is doing with Black Soldier Fly larvae to tackle food waste and contribute to sustainable food systems.00:00:08 - Yanni's Introduction and Early InspirationsYanni's journey into sustainability was sparked at 16 by Al Gore's "An Inconvenient Truth."Early eco-consciousness focused on energy and resource use.University involvement with ISAC and exposure to Sustainable Development Goals (SDGs).Engineering background is driven by a desire to create meaningful change.
Det er fredag, solen skinner og Mari har vært ute og drukket utepils! Vilde gir lette sangtekster en dypere atmosfære og deler av sin indre gressplen. Isac mimrer om sitt barndoms verste traume. Nei, det er ikke den danske barne-tv-figuren med verdens lengste penis, men selvfølgelig en blekksprut. God lytting
In this week's episode, Chris and Mark delve into a recent massive data breach that has had significant repercussions for hundreds of thousands of educators in Pennsylvania. They explore the startling details of the breach, discussing its implications and the timeline of the response. The episode features an interview with Terry Loftus, the CIO of San Diego County and chair of the MS-ISAC Executive Committee. Loftus provides insight into the recent funding cuts to MS-ISAC, explaining the potential impacts on education technology and the broader context of these changes. Additionally, the guys address the latest news on tech tariffs, examining how these tariffs are beginning to affect K-12 district budgets and procurement processes via K12TechPro survey. 00:00:00-Intro 00:03:25-Pennsylvania Data Breach 00:09:20-Tariff Survey Results 00:17:11-Interview with Terry Loftus -------------------- NTP CTL Classlink Lightspeed Fortinet -------------------- Email us at k12techtalk@gmail.com OR info@k12techtalkpodcast.com Call us at 314-329-0363 Join the K12TechPro Community Buy some swag X @k12techtalkpod Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
2Drex discuss CSA's decision to cut $10 million in funding to the Center for Internet Security's management of MS-ISAC and EI-ISAC programs, which coordinate critical threat information for state, local, and election infrastructure. Meanwhile, a new ransomware gang called Mora 0 0 1 is targeting 49 firewalls by exploiting known vulnerabilities to gain initial network access. The FBI and CISA have also issued warnings about the Medusa ransomware-as-a-service, which has attacked over 300 victims across multiple industries including healthcare since February.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
In this episode of the K12 Tech Talk podcast, hosts Josh, Chris, and Mark delve into the recent challenges facing K-12 technology in light of new tariffs and significant budget cuts. They discuss the potential impact of these economic and political changes on school services, with a specific focus on the technology and cybersecurity landscapes. A key highlight of this episode is an in-depth analysis of the MS-ISAC funding cuts announced this week. As a member of the MS-ISAC Executive Committee, Josh shares insights on the repercussions these cuts could have on cybersecurity measures and services provided to schools. The hosts also explore the broader impact of tariffs on technology purchases, from student devices to school infrastructure, and discuss alternative strategies that schools may need to adopt. They consider the potential domino effects on construction, transportation, and food services within schools due to tariffs on imports from Canada, Mexico, and China. Throughout the episode, there's also a segment about the enduring presence of fax machines in schools, reflecting on how some traditional technologies remain integral despite advancements. MS-ISAC Cybersecurity Report https://learn.cisecurity.org/2025-k12-cybersecurity-report-download PowerSchool Summary Report https://www.powerschool.com/security/sis-incident/ MS-ISAC Loses Federal Support https://statescoop.com/ms-isac-loses-federal-support/ 00:00:00-Introduction 00:00:32-Post-Security Symposium Reflections 00:05:17-MS-ISAC Cybersecurity Report Overview 00:10:16-Tariffs Impacting K-12 Technology 00:25:15-We still use fax machines??? 00:32:30-Understanding Recent MS-ISAC Funding Cuts -------------------- Classlink Managed Methods VIZOR Extreme Networks Fortinet -------------------- Email us at k12techtalk@gmail.com OR info@k12techtalkpodcast.com Call us at 314-329-0363 Join the K12TechPro Community Buy some swag X @k12techtalkpod Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine's annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. Selected Reading US communications regulator to create council to counter China technology threats (Financial Times) ‘People Are Scared': Inside CISA as It Reels From Trump's Purge (WIRED) CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts (The Record) Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program (Democracy Docket) China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days (SecurityWeek) Chinese cyberspies backdoor Juniper routers for stealthy access (Bleeping Computer) At Ukraine's major cyber conference, Europe takes center stage over US (The Record) Facebook discloses FreeType 2 flaw exploited in attacks (Bleeping Computer) New North Korean Android spyware slips onto Google Play (Bleeping Computer) NHS Trust IT head: ‘Our attack surface was much bigger than we thought' (Computing) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Andy goes solo this week, providing some initial updates relating to the ISAC community and last week's Security Sprint focus on government transition and related concerns, then diving into a quick rundown of enduring threats and issuessecurity leaders may want to think about as part of their broader security and resilience efforts. · Crypto ISAC! FBI PSA - North Korea Responsible for $1.5 Billion Bybit Hack· Insider Threats: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say· US – Russia Cyber Operations:· CISA on X: “CISA's mission is to defend against all cyber threats to U.S. Critical Infrastructure, including from Russia. There has been no change in our posture. Any reporting to the contrary is fake and undermines our national security.”· Exclusive: Hegseth orders Cyber Command tostand down on Russia planning· Trump administration retreats in fight against Russian cyber threats· Risky Bulletin: Trump administration stops treating Russian hackers as a threat· Ranking Member Thompson: Trump Weakens National Security and Puts Our Critical Infrastructure at Risk as He Capitulates to Russia Main Topics The Physical and Cyber Supply chain!Manmade Threats Terrorismo Minneapolis Man Arrested for Attempting toProvide Material Support to ISISo One dead after car drives into crowd in German city of Mannheimo Tajik National Arrested in Brooklyn for Conspiring to Provide Material Support to ISISProtests, Anger, Targeted Threatso Tesla Takedown and other political protestso Police Investigate Shooting at InsuranceCEO's Oregon Home: Reportso State Accident Insurance Fund CEO targeted interrifying attack by hooded gunman at his Oregon homeo Chairmen Gimenez, Green Introduce Bill To Address Vehicular Terrorism As Threat Grows Weather, Climate & Environmento Hurricane Season is coming, and the USG may be less prepared and less able to respondo Wildfires scorch the Carolinas, SC Governor McMaster declares state of emergencyo Wildfires Break Out in the Carolinas, Prompting Evacuationso Carolina Fire Maps Show Where Blazes Burning in North, South Carolina Health preparednesso Texas measles outbreak rises to 146 caseso Texas Official Warns Against ‘MeaslesParties' Amid Growing Outbreako RFK Jr. urges people to get vaccinated amiddeadly Texas outbreako NewsGuard: Vaccines Falsely Blamed for Measles Outbreak Cyber Threats:o BEC & ransomwareo Blended Threats: Modat - Doors Wide Open: hundreds of thousands of employees exposed & related: Over 49,000 misconfigured building access systems exposed online.o Critical dependencieso Info Ops: Russian propaganda may be flooding AI models Quick Hits Take9!!! A Disney Worker Downloaded an AI Tool. It Ledto a Hack That Ruined His Life
Juniornyheterna om att Donald Trump sprider AI-video som verkar visa vad han vill göra i Gaza. Vi ska snacka med elever som lär sig hur man gör om man trillar genom isen... genom att trilla genom isen. Och sist om Isac som satt upp en egen älg-skylt. Lyssna på alla avsnitt i Sveriges Radio Play.
In the 100th episode of the Security Sprint, Dave and Andy covered the following topics:Warm Open:· H2OSecCon 2025 Call for Presentations Now Open Main Topic: DOGE, the Private Sector. Insider Threats & Info Sharing· DOGE Now Has Access to the Top US Cybersecurity Agency· DOGE employee Edward Coristine lands at CISAwith DHS email· ISAC chief on CISA security rollbacks: ‘The sky isn't falling, yet.'· The Gate 15 Interview EP 55. Allan Liska, Ransomware Sommelier. Threats, mental health, comic books and Diet Dr. Pepper· Trump 2.0 Brings Cuts to Cyber, Consumer Protections· DOGE will use AI to assess the responsesof federal workers who were told to justify their jobs via email· PERSPECTIVE: Current U.S. GovernmentAdministration and the Risk of Increased Insider Threat· Opinion: DOGE's US worker purge has created aspike in insider risk Quick Hits:· Bybit Hack: Crypto exchange Bybit says it was hacked andlost around $1.4Bo Risky Bulletin: North Korean hackers steal $1.5 billion from Bybito Big Day for Crypto Goes South in a Hurry After a Giant Hacko Ethereum Developer Counters Idea Of Blockchain Rollback Amid Bybit Hacko Bybit's Phantom Hacker Becomes Ethereum's Shadow Whale by Fragmenting Fortune Across 54 Walletso Bybit Hack Funds Funneled Through Meme Coins, Onchain Sleuth Reportso Crisis Management in $1.4 Billion Hack Sets New Industry Standard, Bybit Officials Sayo What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection· Stablecoin Bank Infini Earn Latest Hack Victim, Sees $49.5M USDC Flow Out to Attackers· Apple is removing iCloud end-to-encryption features from the UK after government compelled it to add backdoors· CISA and Partners Release Advisory on Ghost (Cring) Ransomware· Risky Bulletin: BlackBasta implodes, internal chats leak online· Salt Typhoon hackers exploited stolen credentials and a 7-year-old software flaw in Cisco systems· Terror Thwarted: Man Threatening Violent Attacks On New York Shuls Arrested In Lincoln Tunnel On Friday Evening· Early data show homicides dropped 16% in 2024
Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the Automotive Information Sharing and Analysis Center, otherwise known as Auto-ISAC. Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the global automotive industry, including light- and heavy-duty vehicle OEMs, suppliers and the commercial vehicle sector. To learn more, visit https://automotiveisac.com. See the full list of associations at https://cybersecurityventures.com/cybersecurity-associations.
Pour le 300e épisode de l'émission, on voulait faire quelque chose de gros, de grand. On a donc organisé un concert regroupant une vingtaine d'artistes de la scène locale à venir performer au Quai des Brumes! Le tout a été enregistré en direct et mixé par les soins de Figure8. La soirée a été organisée par Lumos MTL. Napoleon Da Legend - Pôle Hip-Hop Intro LeDji - Crawford Litige - Aqua Disco Ngoundieu - Essai 31 Hrshie & Koyo Sur La Prod - Pression Isac - SHF #3 Kamilou - Assonance Kamilou - Incendie Neimo - Twap shit, fast life Neimo - Feuille d'or sur le kobe Busy Nasa & DO, The Outcast - Costco On Sunday Busy Nasa & DO, The Outcast - Free The Man Érika Zarya - Bye Érika Zarya - Ice Cold Pres One & Figure8 - Albator Pres One & Figure8 - Claude Crest Freestyle Flower - Louis Cyr Flower - Joseph Armand-Bombardier (feat. KaMa) KaMa - Pasteur Africain KaMa - 45 Scientific (feat. Nawfal) Nawfal - Slat 3la nbi Nawfal & DJ White Socks - Djellaba & Margiela Raccoon & DJ White Socks - Hoodie Officiel Freestyle Raccoon - La fessée Mori$$ Regal & PRO-V - Tree Rivers Borden - Couple Dollars (feat. Mori$$ Regal) Borden - Drug Store Greezy - QTD Greezy - FRIENDS
NERC Senior Vice President and the CEO of the Electricity Information Sharing and Analysis Center (E-ISAC) in conversation with host Francis Bradley about the role of the E-ISAC and what it does to help secure the North American electricity system. They talk about the current and evolving threat environment, the importance of exercises and learning from the GridEx exercises, cyber mutual assistance, the importance of partnerships with governments and the vendor community, and what the future may look like for the E-ISAC. They close the conversation with Manny's two book recommendations to add to the Flux Capacitor Book Club.Manny Cancel at NERC: https://www.nerc.com/AboutNERC/exec/Documents/Manny%20Cancel_execbio.pdf Electricity Information Sharing and Analysis Center (E-ISAC): https://www.eisac.com/s/ GridEx VIII: https://www.eisac.com/s/gridex Manny on LinkedIn: https://www.linkedin.com/in/manny-cancel-19a21325/ Book recommendations:Radical Candor: How to Get What You Want by Saying What You Mean by Kim Scott: https://www.amazon.ca/Radical-Candor-What-Want-Saying/dp/1529038340/ref=sr_1_1?crid=25BO26N4V04P2&dib=eyJ2IjoiMSJ9.rzT_MgYPxAPYNJWJXa69AKgRaz53BUxsc_0CpmHLSiPedkpHB2t9O6KCMAtEipRQ80KU5z_EIWuw4XtlD3QcDjugyv8A6NX_gOJa6umqQUI-7lki7_c2lDaVisZnnHAyzYGCG7NbO9FZnbGsOgEpwLBON-b50PUeklHcbAuI_zo4lURoF1HcSSaiJpq4JFxfXDH6ryIm8DsMFdWtc1pes4H-4F6tamcKeRhg62JBFB0WJoC5vPYWHinc16tNKtSTJDrovPReyOl_LZWYPkwKNaUxAx8TFSs6RYc56lC4JEc.MIsLJjLwijLSOFsQ17aMSxRV0QrgeD3BGpVEGW04sbg&dib_tag=se&keywords=radical+candor+kim+scott&qid=1733682068&sprefix=radical+candor+kim+scott%2Caps%2C244&sr=8-1Demon Copperhead by Barbara Kingsolver: https://www.goodreads.com/book/show/60194162-demon-copperhead
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Angela Haun. Angela is the Executive Director with the Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC). Appointed as ONE-ISAC Executive Director in September 2018, Angela is a retired FBI Special Agent with extensive experience in cybersecurity and protecting critical assets. Since joining the ONE-ISAC, she has expanded the ONE-ISAC's membership with a Strategic Partnership Pilot Program, bringing new organizations, expertise, resources and funding to support the ISAC's efforts. In addition, Angela has been a subject matter expert speaker, organizer and participant in numerous energy-related conferences, briefings, exercises, meetings, webinars and other events. Ms. Haun is actively pursuing upgraded technologies and additional benefits for ONE-ISAC member analysts and executives. Prior to her work in support of ONE-ISAC, Angela served over twenty years at the FBI. Learn more about Angela on LinkedIn. “Potential gets me so excited!” In the discussion Angela and Andy discuss: Angela's Background. ONG-ISAC background. The new, ONE-ISAC. Private-public partnership. Good intentions, unintended consequences. An increasing appreciation of OT security. Destructive attacks. Building Resilience. We play Three Questions and discuss playing golf course, the U.S. Capitol, and Rick Springfield, Jessie's Girl! Selected links: ONE-ISAC. ONE-ISAC serves as a central point of coordination and communication to aid in the protection of exploration and production, transportation, refining, and delivery systems of the ONE industry, through the analysis and sharing of trusted and timely cyber threat information, including vulnerability and threat activity specific to ICS and SCADA systems. Critical Infrastructure Security and Resilience Month Critical Infrastructure Security and Resilience Month Toolkit The Gate 15 Interview: Jeff Troy, President, Aviation ISAC, on public service, cybersecurity, understanding threats (and... colonizing the ocean?), 23 Aug 2023
Podcast: Cyber Security Weekly Podcast (LS 38 · TOP 2% what is this?)Episode: Episode 416 - OT ISAC - Singapore Operational Technology Information Sharing and Analysis Summit 2024Pub date: 2024-11-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore. As a seasoned expert in operational technology (OT) cybersecurity, Sim shared valuable insights into the importance of information sharing, the growing threat of ransomware, and the transformative role of AI in cybersecurity.Kicking off the podcast, Steven introduced the Executive Committee and its pivotal role in driving OT-ISAC's mission to foster a collaborative community and promote best practices. By providing advisory support and strategic guidance, the committee ensures OT-ISAC stays at the forefront of cybersecurity initiatives.Balancing Information Sharing and ConfidentialityOne of the most pressing challenges in OT cybersecurity is striking the right balance between information sharing and safeguarding sensitive data. He explained that OT-ISAC has implemented robust measures, such as the Traffic Light Protocol and data anonymization techniques, to protect confidentiality while promoting collaboration. The platform also employs protocols like STIX and TAXII to automate the exchange of cyber threat intelligence, enabling members to quickly share and respond to emerging threats.Cross-Jurisdictional CollaborationWith cyber threats spanning borders, cross-jurisdictional collaboration is essential. Sim highlighted that OT-ISAC allows members to share threat intelligence across different regions without breaching data sovereignty regulations by anonymizing the information sources. This approach strengthens global defenses against transnational cyberattacks.The Growing Threat of RansomwareRansomware remains a significant risk to OT environments. Steven urged organizations to avoid paying ransoms, citing the risks and long-term consequences. Instead, he emphasized the importance of investing in strong business continuity and incident response plans. By focusing on resilience and preparedness, organizations can minimize their exposure to future attacks.AI's Role in OT CybersecurityHe also discussed the potential of AI in OT cybersecurity, noting its ability to streamline incident response and improve threat detection. However, he cautioned that while AI offers powerful advantages, it must be implemented with human oversight to manage the risks associated with automated systems.Steven Sim has worked for more than 25 years in the cybersecurity field with large end-user enterprises and critical infrastructures, undertaken global CISO role, driven award-winning CSO50 security governance and management initiatives and headed incident response, security architecture, technology, awareness and operations at local, regional and global levels. He leads cybersecurity across large MNC, heading 8 direct reports at Group Cybersecurity Department as well as indirect reports across regional offices and local business units in 42 countries. He oversees both IT and OT Security Governance, Global Cybersecurity Technology Management and Incident Response as well as Cyber Security Masterplan Office. Always keen to give back to the community, he also volunteers at the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as the President (from 2021 to 2022) and OT-ISAC (since 2021), the second key thrust of the SG's OT Cybersecurity Masterplan 2019, as Chair Executive Committee, as well as member of Geneva Dialogue Technical Community, and holds Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. Recorded 5th Sept 2.30pm. Singapore Operational Technology Information Sharing and Analysis Summit 2024#otcybersecurity #mysecuritytv #cybersecurity #singaporecybersecurityThe podcast and artwork embedded on this page are from MySecurity Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
WELCOME BACK TO THE TREND OR TRUTH? PODCAST.In this episode, Zorn, Chris, and Isac go over how to live a life of Godly discipline. Join us for service every Sunday evening at 7:00 PM.The AMP Station is a college ministry for young adults in association with Rogers State University in Claremore, Oklahoma.To learn more about the AMP Station and the Trend or Truth Podcast go to ampstation.orgFollow us on FACEBOOK: https://www.facebook.com/ampyoselfFollow us on INSTAGRAM: https://www.instagram.com/theampstation/FOLLOW us on THREADS: https://www.threads.net/@theampstation?xmt=AQGzj9gZx7BklxXjhpn_0kCb5ec1tZVPuKSkLm2ufWLaqh4Send us a text
We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore. As a seasoned expert in operational technology (OT) cybersecurity, Sim shared valuable insights into the importance of information sharing, the growing threat of ransomware, and the transformative role of AI in cybersecurity.Kicking off the podcast, Steven introduced the Executive Committee and its pivotal role in driving OT-ISAC's mission to foster a collaborative community and promote best practices. By providing advisory support and strategic guidance, the committee ensures OT-ISAC stays at the forefront of cybersecurity initiatives.Balancing Information Sharing and ConfidentialityOne of the most pressing challenges in OT cybersecurity is striking the right balance between information sharing and safeguarding sensitive data. He explained that OT-ISAC has implemented robust measures, such as the Traffic Light Protocol and data anonymization techniques, to protect confidentiality while promoting collaboration. The platform also employs protocols like STIX and TAXII to automate the exchange of cyber threat intelligence, enabling members to quickly share and respond to emerging threats.Cross-Jurisdictional CollaborationWith cyber threats spanning borders, cross-jurisdictional collaboration is essential. Sim highlighted that OT-ISAC allows members to share threat intelligence across different regions without breaching data sovereignty regulations by anonymizing the information sources. This approach strengthens global defenses against transnational cyberattacks.The Growing Threat of RansomwareRansomware remains a significant risk to OT environments. Steven urged organizations to avoid paying ransoms, citing the risks and long-term consequences. Instead, he emphasized the importance of investing in strong business continuity and incident response plans. By focusing on resilience and preparedness, organizations can minimize their exposure to future attacks.AI's Role in OT CybersecurityHe also discussed the potential of AI in OT cybersecurity, noting its ability to streamline incident response and improve threat detection. However, he cautioned that while AI offers powerful advantages, it must be implemented with human oversight to manage the risks associated with automated systems.Steven Sim has worked for more than 25 years in the cybersecurity field with large end-user enterprises and critical infrastructures, undertaken global CISO role, driven award-winning CSO50 security governance and management initiatives and headed incident response, security architecture, technology, awareness and operations at local, regional and global levels. He leads cybersecurity across large MNC, heading 8 direct reports at Group Cybersecurity Department as well as indirect reports across regional offices and local business units in 42 countries. He oversees both IT and OT Security Governance, Global Cybersecurity Technology Management and Incident Response as well as Cyber Security Masterplan Office. Always keen to give back to the community, he also volunteers at the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as the President (from 2021 to 2022) and OT-ISAC (since 2021), the second key thrust of the SG's OT Cybersecurity Masterplan 2019, as Chair Executive Committee, as well as member of Geneva Dialogue Technical Community, and holds Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. Recorded 5th Sept 2.30pm. Singapore Operational Technology Information Sharing and Analysis Summit 2024#otcybersecurity #mysecuritytv #cybersecurity #singaporecybersecurity
10 - 12 - 24 Isac Lundestrom-ANA-Goal ANA 1 SJ 0 by San Jose Sharks
Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addressing challenges unique to Tribal elections. Speakers: Mackenzie Quick, Cybersecurity Analyst, Suquamish Tribe Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference
The final training camp interviews are here as we approach the Anaheim Ducks season! Alexis Downie is joined by Mason McTavish (2:30), Lukáš Dostál (7:33) and Isac Lundestrom (15:23) to talk about their summers, preparing for the season and the new uniforms.
In this episode of The Gate 15 Interview, we're mixing things up! Andy Jabbour recorded this session onsite at TribalNet 2024 with TribalHub's Senior Marketing & Communications Manager, Michelle Bouschor, who took over as moderator. They were joined by Adam Gruscynski, IT Director, Potawatomi Casino Hotel and Tribal-ISAC Steering Committee member and Drew Ludwick, Director of IT Operations, Muckleshoot Casino Resort, to discuss ideas around cybersecurity and organizational culture.In the discussion the group discusses: Organizational culture and what makes a cyber strong organizational culture. Tribal-ISAC! What it is, how it's like other ISACs, what makes it special. How to build a strong organizational culture and the importance of leadership buy-in and taking things in “chewable bites.” Why we love TribalNet! Some of our favorite concert experiences – some we shared as we talked from Linkin Park to Snoop. And more, of course! Selected Links: TribalNet Conference 2024 Tribal-ISAC Michelle Bouschor. With 15 years of experience in tribal casino marketing, tribal government public relations, media, and community relations, I've honed my skills in navigating the unique landscape of indigenous communities. For the past 5 years, I've proudly contributed to TribalHub, leveraging my expertise to empower tribal entities through innovative solutions and strategic partnerships. Passionate about fostering collaboration and growth within tribal communities, I'm dedicated to driving positive change and sustainable development.· Michelle on LinkedIn Adam Gruscynski. Responsible for the day-to-day operations of the IT Department for Potawatomi Casino Hotel while ensuring all of the technology needs, whether current or future, of the organization are met. Adam joined Potawatomi Casino Hotel in 2008. During his time at PCH, Adam has gained an abundance of experience by taking on various roles including IT Security Manager, Senior Cybersecurity Engineer, Lead Network Administrator, Network Administrator, and Application Administrator. Prior to PCH, Adam was Network Engineer at the Milwaukee Journal Sentinel where he began his career as Help Desk Intern.· Adam on LinkedIn Drew Ludwick. A seasoned IT executive with over 25 years of progressive leadership experience in technology management, specializing in cybersecurity, strategic planning, and technology governance. Known for shaping and executing technology strategies aligned with business goals, leading diverse technology teams, and fostering innovation.· Drew on LinkedIn
Constellations, a New Space and Satellite Innovation Podcast
On today's podcast, hear from Erin Miller, Executive Director, Space ISAC, and Ernest Campos, Co-chair of the Space Innovations Test Bed (SITB) for Space ISAC and Senior Account Executive for Space Programs at AMERICAN SYSTEMS Corporation. They will talk about the commercial industry facing an onslaught of cyber-attacks and other threats and ways that the Space ISAC is enabling a resource that can help. Learn about examples of how you test vulnerabilities as they walk through specific scenarios. Hear about the responsibilities of public disclosure and why it is important, especially with the rise of threats and sophisticated attacks.
Fredagsfesten är här! Isac Calmroth VS Emilia Rehnberg i en battle fylld av trams och skoj. Fira in helgen med oss! Lyssna på alla avsnitt i Sveriges Radio Play.
The Preseason Games Are Over!That means each team is cutting down their rosters and football is around the corner! The guys are excited, and kick off this episode with some first alcoholic beverage convo (happy birthday Isac!) and some college football hype. Then an unexpected development: Schif missed out on some ATL music classics. How? Then on to football. League updates are hot off the press with some injuries, roster movement and a bizarre elevator story that may or may not have been part of an evil genius plan hatched by Jim Harbaugh. The guys tackle tough questions like why are the Chiefs so hard to hate, why America loves to hate winners, why it's easy for the world to hate America and why Daron Bland's injury is actually Kyle Shanahan's fault. Only on SveNFL. Then the guys make perfect predictions the 2024 Awards. Listen in to hear who they think will be COTY, Defensive ROTY, Offensive ROTY, Defensive POTY, Offensive POTY and League MVP. Music: Nils Landgren Funk Unit - Get Serious, Get A JobSupport this podcast at www.patreon.com/svenfl Hosted on Acast. See acast.com/privacy for more information.
@PermissionToStanPodcast on Instagram (DM us here) & TikTok!NEW Podcast Episodes every THURSDAY! Please support us by 'Following' & 'Subscribing' for more K-POP talk!August comebacksMusic Video recapsSEVENTEEN US Tour Dates & CitiesMalaysia does not allow fans to use EPIK HIGH lightstickLollapalooza: IVE shows off live vocals & SKZ FELIX goes Thunder Down UnderBLACKPINK 8th Anniversary Weverse LiveJENNIE publicly posting her dating her creative director JAEMIN for OddatelierISAC: KPOP Olympics - BOYNEXTDOOR arrives super late & NMIXX SULLYOON called out by "fans" for hanging with male idolsNMIXX HAEWON hosts ISAC & also guests as a weather newscasterJAY PARK drops his new lightstick and it is so cute!GIDLE SOYEON issues apology after freestyle at concert worries fans about their contractZEROBASEONE 4th mini album concept teaserIs there a trend for KPOP themes?BOYNEXTDOOR guests in Karaoke ETRIKE in L.A.NEWJEANS performs at Seoul World Cup in cute Futbol/Soccer outfitsBTS SUGA found drunk on the floor after riding e-scooter and gets DUIJIN the global ambassador for GucciSTRAY KIDS joins Chef Esther Choi on her show Heat Eaters: Eats spicy Korean bar foodSupport this podcast at — https://redcircle.com/permission-to-stan-podcast-kpop-multistans-andamp-weebs/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In episode 94 of Cybersecurity Where You Are, Tony Sager is joined by the following guests from the Center for Internet Security® (CIS®):Carlos Kizzee, SVP of Multi-State Information Sharing and Analysis Center® (MS-ISAC®) Strategy & PlansKaren Sorady, VP of MS-ISAC Strategy & PlansGreta Noble, Director of Community EngagementTogether, they discuss how the ISAC Annual Meeting supports the 24x7x365 community defense efforts of the MS-ISAC and Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®).Here are some highlights from our episode:02:30. Background information on ISACs in general and the role of the MS-ISAC04:17. Why it's an annual meeting and not a conference06:40. What made the 2024 ISAC Annual Meeting the largest of its kind so far08:43. How the human dimension drives our yearly meeting15:44. The role of the MS- and EI-ISACs in CIS's broader strategy19:42. How our yearly meeting improves what CIS does29:57. What's next for the ISAC Annual MeetingResourcesMS-ISAC: 20 Years as Your Trusted Cyber Defense CommunityEpisode 76: The Role of Thought Leadership in CybersecurityReasonable Cybersecurity GuideCybersecurity at Scale: Piercing the Fog of MoreIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Isac är orolig inför skolstarten. För färdtjänstens nya system gör att skolskjutsen ibland inte har plats för Isacs rullstol. Då kan han inte åka med. Klartext handlar också om extremvärmen i Europa. Lyssna på alla avsnitt i Sveriges Radio Play.
Since 1986 Mr. Vasquez has been the founder of industry changing companies in the United States. A software developer by training, after spending 6 years with AT&T Corporate, Vasquez founded ISAC, a computer consulting firm in 1986. Vasquez wrote the software that automated Ladies Home Journal Magazine in 1987. Until then, the magazine was done on typewriters. Mr. Vasquez merged ISAC into PACE Health Management which developed the first electronic medical record system to go public on NASDAQ that used expert systems and artificial intelligence neural networks to develop clinical pathways that supported clinicians taking patients from admission to discharge. The company was later sold to 3M Healthcare. Mr. Vasquez founded CareMedic Systems – the first real time processing system for hospital Medicare Part A claims. In 2000, the Mayo Clinic Foundation purchased 5% of the company and by 2004, CareMedic software was serving 1,500+ hospitals in America. The company was sold in 2005 to United Healthcare and continues today as a product of Optum. Mr. Vasquez and his wife founded St Gregory Retreat Centers for people suffering from substance abuse. St Gregory developed a proprietary cognitive behavioral therapy (CBT) program and served 10,000+ addicted patients with 25% of those patients addicted to heroin or prescription painkillers. Unique to St Gregory, Mr. Vasquez worked with research physicians to understand, develop, and deliver an intravenous body chemistry solution to reduce or eliminate cravings for opioids. Delivered to over 2,000 patients by 14,000 treatments with almost no adverse effects, the result was 84% of patients were still alive, sober and working after 48 months. To complement this solution, Mr. Vasquez also developed and built a complex mass-spectrometer laboratory with unique panels that could identify metabolites of opioids as recovering patients required undeniable oversite. The company was sold to a venture capital roll-up, Summit BHC in September 2018.After interviewing hundreds of opiate and heroin addicted patients, Vasquez saw a constant theme where patients had become dependent due to prescriptions provided for acute or chronic pain, primarily orthopedic in nature. In an effort to reduce opioid prescribing, Vasquez founded Harbor View Medical, which provided orthopedic stem cell procedures developed by Regenexx© as a non-invasive alternative for people who were facing orthopedic surgery and potential long-term opioid prescriptions. Mr. Vasquez was successful in getting local self-insured health plans to include coverage for these procedures. Harbor View Medical was merged into Regenexx© in 2017.In January 2018, Opioid Clinical Management, Inc was founded by Mr. Vasquez in response to the dramatic opioid epidemic and the national need for a solution. OPCM has developed proprietary software algorithms (patent pending) and integrated provider management to allow large self-insured employers to identify physicians who are over-prescribing opioids and employees that are struggling from resulting opioid abuse. There are 1,700 employer health plans that use OPCM software. In 2000 Mr Vasquez was named Ernst & Young “Entrepreneur of the Year” and inducted into the Entrepreneur of the Year “Hall of Fame'' He received his Executive Health Management Certificate, Harvard School of Public Health and attended the U.S. Air Force Academy and Drake University.Topics covered in this episode:Opioid Addiction Treatment StrategiesEarly Intervention Opioid Addiction DevelopmentDefinitions of AddictionWithdrawal Symptoms Treatment ApproachesPersonal Motivation and JourneyRole of Faith in RecoveryReferenced in the episode:The Lindsey Elmore Show Ep 276 | Why Drug Prices Keep Rising: Pharmacists Perspectives | Patrick DevereuxThe Lindsey Elmore Show Ep 174 | Overcoming Political Influence on Healthcare | John AbramsonTo learn more about Michael Vasquez and his work, head over to www.michael-vasquez.com__________________________________________________________In Michael Vasquez's books, he allows readers to explore the complex challenge that is posed by the opioid crisis in the United States. We talk everything from healthcare innovation to drug treatments, border control policies, and how we can be more innovative with tools like artificial intelligence to determine if drugs are being abused.Helping prevent just one more opiate related death in the United States is enough. If you would like to learn more about what you can do in your daily life, to help prevent the opioid crisis from getting worse, head to lindseyelmore.com/opioid to purchase Michael's book, The Untold Story of the Opioid Crisis in American Healthcare and The New Era of Prevention Through AI.__________________________________________________________We hope you enjoyed this episode. If you would like to be a supporter of the show, head to www.lindseyelmore.com/supporter Your contribution helps us to bring the best guests into our interview chair. Thank you for listening. Come check us out at www.spreaker.com/show/the-lindsey-elmore-showBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-lindsey-elmore-show--5952903/support.
In this episode Kara and Jordan discuss animals in ancient Egyptian society. What does the archaeological evidence tell us about the ancient Egyptians' attitudes and practices towards non-human members of their society? Show notesHerodotus Book II, 65-66There are many household animals; and there would be many more, were it not for what happens to the cats. When the females have kittened they will not consort with the males; and these seek them but cannot get their will of them; so their device is to steal and carry off and kill the kittens (but they do not eat what they have killed). The mothers, deprived of their young and desiring to have more will then consort with the males; for they are creatures that love offspring. And when a fire breaks out very strange things happen to the cats. The Egyptians stand round in a broken line, thinking more of the cats than of quenching the burning; but the cats slip through or leap over the men and spring into the fire. When this happens, there is great mourning in Egypt. Dwellers in a house where a cat has died a natural death shave their eyebrows and no more; where a dog has so died, the head and the whole body are shaven.Oracular amuletic decree (ISAC, Chicago, Illinois)Veterinary Papyrus Janssen, “Commodity Prices from the Ramesside Period” including animals The Temple Cats of Philae Island Organization Facebook and Instagram Get full access to Ancient/Now at ancientnow.substack.com/subscribe
Alt-rock band Thrower drops their studio debut album, entitled Blink, via Pavement Entertainment. Seamlessly blending echoes of ‘90s and ‘70s influences with innovative flair, this album brings heavy alt-rock to a new frontier and offers an immersive journey for listeners.The new album not only captures the essence of today's tumultuous world but also resonates with the unspoken hopes and fears of a generation on the brink of discovery. Delving into its lyrical depths, the raw realities of the human condition step out, illuminated by the pulsating energy of abrasive yet iconic riffs.Each track on Blink hints at a tapestry of meanings waiting to be unveiled, inviting listeners on an exploration beyond the surface of sound.Become a supporter of this podcast: https://www.spreaker.com/podcast/arroe-collins-unplugged-totally-uncut--994165/support.
IntelBroker claims to have breached a Europol online platform. The U.S. and China are set to discuss AI security. U.S. agencies warn against BlackBasta ransomware operators. A claimed Russian group attacks British local newspapers. Cinterion cellular modems are vulnerable to malicious SMS attacks. A UK IT contractor allegedly failed to report a major data breach for months. Generative AI is a double edged sword for CISOs. Reality Defender wins the RSA Conference's Innovation Sandbox competition. Our guest is Chris Betz, CISO of AWS, discussing how to build a strong culture of security. Solar storms delay the planting of corn. Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Chris Betz, CISO of AWS, discussing how to build a strong culture of security. In his blog, Chris writes about how AWS's security culture starts at the top, and it extends through every part of the organization. Selected Reading Europol confirms web portal breach, says no operational data stolen (Bleeping Computer) US and China to Hold Discussions on AI Risks and Security (BankInfo Security) CISA, FBI, HHS, MS-ISAC warn critical infrastructure sector of Black Basta hacker group; provide mitigations (Industrial Cyber) 'Russian' hackers deface potentially hundreds of local British news sites (The Record) Cinterion IoT Cellular Modules Vulnerable to SMS Compromise (GovInfo Security) MoD hack: IT contractor concealed major hack for months (Computing) AI's rapid growth puts pressure on CISOs to adapt to new security risks (Help Net Security) Reality Defender Wins RSAC Innovation Sandbox Competition (Dark Reading) Solar Storms are disrupting farmer GPS systems during critical planting time (The Verge) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Alt-rock band Thrower drops their studio debut album, entitled Blink, via Pavement Entertainment. Seamlessly blending echoes of ‘90s and ‘70s influences with innovative flair, this album brings heavy alt-rock to a new frontier and offers an immersive journey for listeners.The new album not only captures the essence of today's tumultuous world but also resonates with the unspoken hopes and fears of a generation on the brink of discovery. Delving into its lyrical depths, the raw realities of the human condition step out, illuminated by the pulsating energy of abrasive yet iconic riffs.Each track on Blink hints at a tapestry of meanings waiting to be unveiled, inviting listeners on an exploration beyond the surface of sound.Become a supporter of this podcast: https://www.spreaker.com/podcast/arroe-collins-like-it-s-live--4113802/support.
In this podcast, Denise Anderson, the President and CEO of the Health Information Sharing and Analysis Center (Health-ISAC) delves into the latest emerging threats within the health sector, providing insightful analysis and practical strategies to mitigate risks. Tune in as she discusses the dynamic landscape of cybersecurity in healthcare, how it translates to tribal health care facilities, all while offering invaluable insights for professionals navigating this rapidly evolving field. Follow the Health-ISAC on LinkedIn or on their website.
Guests: Erin Miller, Executive Director, Space ISAC [@SpaceISAC]On LinkedIn | https://www.linkedin.com/in/erinmarlenemiller/Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin takes a journey into the fascinating realm of space security with Erin Miller, the executive director of the Space-ISAC, alongside Marco Ciappelli, a fervent space enthusiast who also helms the Redefining Society Podcast. They navigate the multifaceted landscape of space information sharing and analysis centers (ISACs), emphasizing the critical role these entities play in bolstering our global security posture against vulnerabilities, incidents, and threats within the space industry.Erin Miller sheds light on key milestones and initiatives propelling the Space-ISAC forward, including its inception at the behest of the U.S. White House in 2019, to address the unprotected attack surfaces of the burgeoning commercial space sector. The episode illuminates the importance of private-public partnerships and international collaboration, highlighting engagements with space agencies worldwide to enhance threat intelligence sharing.The conversation traverses the importance of making threat intelligence actionable and accessible, eschewing spreadsheets for alerts that are immediate and practical. Further, the dialogue touches on the upcoming phase two of the Space ISAC's operational watch center, poised to expand its threat scenario coverage. The episode punctuates with Erin Miller extending an invitation to Sean Martin and Marco Ciappelli to visit the Space-ISAC watch center in Colorado Springs, foregrounding the ongoing endeavors and successes in the domain of space security.Listeners are invited to explore this episode's rich discussions, not only as a beacon of knowledge on space security but also as a conduit for understanding the synergies between cybersecurity, space exploration, and societal impacts.Key Topics CoveredHow space security impacts global cybersecurity postureWhat is the role of Space ISAC in space securityHow public-private partnerships and international collaboration enhance space security___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
The food and agriculture industry is a critical sector that represents nearly a fifth of US economic activity. Businesses in this sector also rely on other important industries such as water, transportation, and energy. In this episode, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry, as well as the various services offered through the ISAC. Resources: Food and Agriculture ISAC website: https://www.foodandag-isac.org/ Cybersecurity Guide for Food and Ag Small and Medium Enterprises: https://www.foodandag-isac.org/resources CISA publication on Chinese-manufactured UAS: https://www.cisa.gov/resources-tools/resources/cybersecurity-guidance-chinese-manufactured-uas
Guest: Sidney Pearl, Executive Director at AI-ISACOn Linkedin | https://www.linkedin.com/in/sidney-pearl/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesWelcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.Key Insights Provided:What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode of The Security Detail, we explore the complex domain of election cybersecurity with Marci Andino, senior director of the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). From international interference threats to localized phishing attacks, discover the varied challenges election offices face and the strategies deployed to safeguard the integrity of electoral processes. Resources: EI-ISAC Resources: https://www.cisecurity.org/ei-isac Marci Andino Bio: https://safeelections.org/marci-andino/ EI-ISAC's Essential Guide to Election Security: https://essentialguide.docs.cisecurity.org/en/latest/index.html How Investigators Solved the Biden Deepfake Robocall Mystery (Bloomberg): https://www.bloomberg.com/news/newsletters/2024-02-07/how-investigators-solved-the-biden-deepfake-robocall-mystery Splunk research on generative AI spear phishing email translation: https://www.splunk.com/en_us/blog/security/old-school-vs-new-school.html
On aika startata uusi Taakka -vuosi, tervetuloa mukaan! Ensimmäiseen jaksoon saadaan penkkiin nuori mies maamme pop-taivaan huipulta. Yhtäkkiä, Isac Elliotin uraa on takana jo yli kymmenen vuotta, vaikka tuntuu, että vasta äsken puhuttiin kansainvälistä mainetta niittävästä ”lapsitähdestä”. Tänä päivänä, suomenkielisellä tuotannollaan listakärjessä viihtyvä Isac tuntee olevansa viimein ”kotonaan” musiikissaan ja uran ratti on tiukasti omissa käsissä. Tällä tarinalla on hyvä aloittaa vuosi.
In this week's Security Sprint, Dave and Andy covered the following topics. ISAC Exciting Announcements! Tribal-ISAC joins National Council of ISACS for cyber security, information sharing Japanese Auto-ISAC and Auto-ISAC Formalize Agreement to Enhance Vehicle Cybersecurity Severe Weather Awareness Iowa Caucus Impacts Texas "Freeze" Buffalo Bills great stadium dig-out Main Topics School Data Base Leak. https://www.wired.com/story/us-school-shooter-emergency-plans-leak/ SEC X Compromise. SEC account hack renews spotlight on X's security concerns US SEC says breach of its X account did not lead to breach of broader SEC systems A Hacker's Perspective: Social Media Account Takeover Prevention Guide Scams. https://news.trendmicro.com/2024/01/12/fake-apple-and-capital-one-notifications-top-scams-of-the-week/ Physical Threats. Malicious Actors Threaten U.S. Synagogues, Schools, Hospitals, and Other Institutions With Bomb Threats, 12 Jan. “Since 8 December 2023, the FBI has opened investigations on more than 100 separate threats targeting more than 1,000 institutions in 42 states and the District of Columbia." New FB-ISAO Newsletter! FB-ISAO Newsletter, v6, Issue 1. US, UK launch retaliatory strikes against Houthis in Yemen Protests erupt outside Yemen Mission in NYC to condemn US attacks on Houthi rebels — some protesters attacking couple holding Israeli flag: ‘Long live Hamas, you piece of s–t!' Joint Statement from the Governments of Australia, Bahrain, Canada, Denmark, Germany, Netherlands, New Zealand, Republic of Korea, United Kingdom, and the United States Statement from President Joe Biden on Coalition Strikes in Houthi-Controlled Areas in Yemen Statement by Secretary of Defense Lloyd J. Austin III on Coalition Strikes in Houthi-Controlled Areas of Yemen Background Press Call by Senior Administration Officials and Senior Military Official on Developments in the Middle East Houthi rebels say US will pay a ‘heavy price' for strikes that killed 5, injured Lulzsec Hacktivists Leak American Bank Logins in Protest Against Yemen Airstrikes Moscow Blasts U.S.-British Strikes in Yemen Who Are the Houthis and Why Did the US and UK Launch Strikes on Them? Quick Hits FBI arrests Florida man accused of threatening ‘mass casualty event' American intel officials warn of risk of Hezbollah attacking U.S. Ivanti Vulnerabilities. Ivanti Blog Post: Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN CISA Adds Two Known Exploited Vulnerabilities to Catalog CERT-NZ: Vulnerabilities in Ivanti Connect gateways actively exploited Canadian Centre for Cyber Security Ivanti security advisory (AV24-020) Ivanti warns of Connect Secure zero-days exploited in attacks Ivanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Canadian Centre for Cyber Security Ivanti Connect Secure and Ivanti Policy Secure gateways zero-day vulnerabilities Risky Biz News: Chinese APT exploits two Pulse Secure zero-days Ivanti Zero-Day Vulnerabilities (CVE-2023-46805 and CVE-2024-21887) State-backed hackers are exploiting new Ivanti VPN zero-days — but no patches yet Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent CLINKSINK Drainer Campaigns The vulnerability forecast for 2024 WEF: Global Cybersecurity Outlook 2024 Joint Report on the Implementation of the Cybersecurity Information Sharing Act of 2015
In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by John Scrimsher, chief information security officer (CISO) at Kontoor Brands, Inc., and Marcel Bucsescu, senior director of credentialing and strategic engagement at NACD, to expand upon the NACD Accelerate program. Then Ian Furr, security integration engineer at RH-ISAC, talks about his volunteer work with the Information Technology Disaster Resource Center (ITDRC) and the Fairfax County Fire and Rescue Department. Finally, Luke chats with Bidemi (Bid) Ologunde, intelligence analyst at Expedia Group, about his own podcast, The Bid Picture, background, and the trajectory of cybersecurity. Thank you to Fortinet for their sponsorship of the Retail & Hospitality ISAC podcast.
In this episode of The Gate 15 Interview, Andy Jabbour welcomes Tom Stockmeyer, Cyware's Director, Enterprise East, ISAC's and Federal. Cyber security leader with experience in helping threat sharing communities such as ISACs and ISAOs and their Member companies improve the fidelity of their intel and accelerate threat intel sharing amongst Members. Tom served in the Marine Corps from 1979 to 1983. He has an MBA from the Michael Coles School of Business, Kennesaw University. Tom has held several executive positions, has served on numerous technology Boards. Tom on LinkedIn. In the discussion we address: Tom's background from the Marine Corps to technology, entrepreneurship, to Cyware. Information Sharing successes and challenges, ISACs, ISAOs and Cyware helping to secure organizations across the Fortune 1000 and more. Challenges to effective info sharing. A shoutout to the good work being done at Aviation ISAC. Cyware, continuous innovation and automated collective defense. Long weekends and holiday threats. We play Three Questions and talk microwave food, the Marines, classic rock, classic movies and more! A few references mentioned in or relevant to our discussion include: Cyware Intelligence Sharing is Caring: Collective Defense for a Safer Nation, an article in HS Today by Cyware CEO Anuj Gul, 13 Dec 2023 Cyware Intel Exchange (CTIX) Cyware Collaborate (CSAP) Cyware Solutions for ISACs, ISAOs, and CERTs The Gate 15 Interview: Jeff Troy, President, Aviation ISAC, on public service, cybersecurity, understanding threats (and… colonizing the ocean?)
Our enemies cooperate, and so must we. Aurelio Blanquet walks us through the activities of the European Energy ISAC, with a focus on building the trust that is essential to enabling the cooperation that we need to work together. Aurelio Blanquet - EE-ISAC Nov 21
Our enemies cooperate, and so must we. Aurelio Blanquet walks us through the activities of the European Energy ISAC, with a focus on building the trust that is essential to enabling the cooperation that we need to work together. Aurelio Blanquet - EE-ISAC Nov 21
Executive Director Erin Miller shares insights about the Space ISAC National Cybersecurity Center's partnerships and missions
Errol Weiss, Chief Security Officer at Health ISAC dives into cybersecurity, privacy, and data protection discussing the role of CISOs and their responsibilities. We also discuss ransomware attacks and data backup strategies, cybersecurity talent shortages, and internship programs for those aspiring to enter the cybersecurity industry.
The Forever Mighty Podcast Podcast returns! Stephen and Eddy are back to for an update show on what has been a surprisingly active month of August for the Anaheim Ducks. The boys discuss Troy Terry's extension, Isac Lundestrom's achilles injury and Ilya Lybushkin being traded to the Anaheim Ducks. All that and MORE on the latest episode of the Forever Mighty Podcast: Your Anaheim Ducks Podcast Destination. Head over to https://www.forevermighty.com/ to find all the ways to listen, how to support the show, and so much more. Check out our live Twitch streams for Anaheim Ducks Post Game Podcast coverage: https://www.twitch.tv/forevermighty If you liked the show drop a review on Apple Podcasts - https://podcasts.apple.com/us/podcast/forever-mighty-podcast-your-anaheim-ducks-podcast/id1354832504 Learn more about your ad choices. Visit podcastchoices.com/adchoices
CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization's defenses against this ransomware operation. AA23-165A Alert, Technical Details, and Mitigations Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts. See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 for information on strengthening an organization's cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best. See the CIS Community Defense Model 2.0 (CDM 2.0) for the effectiveness of the CIS Controls against the most prevalent types of attacks and how CDM 2.0 can be used to design, prioritize, implement, and improve an organization's cybersecurity program. See Blueprint for Ransomware Defense for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls. No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center's DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.