POPULARITY
Categories
In episode 179 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their discussion of 2026 cybersecurity predictions from seven CIS experts, as shared on the CIS website.Here are some highlights from our episode:01:09. How threat actors' adoption of Agentic AI is reshaping the defender's dilemma06:28. Public confidence: The primary focus for attackers seeking to undermine U.S. elections10:43. The surge in threat actors targeting operational technology and critical infrastructure12:29. Responsibility and the cost of fixing flawed things instead of secure by design16:29. Secure by design: An invitation to rethink architecture and plan for future adaptability17:24. Meeting cloud service prioritization with a foundation of defense for all things25:44. Supporting state and local cybersecurity maturity with both competence and character41:00. Feedback: The key to adapting security controls to evolving threats and technology use50:23. Embedding security into the heart of a businessResourcesEpisode 169: 2026 Cybersecurity Predictions from CIS — Pt 1Episode 174: 2026 Cybersecurity Predictions from CIS — Pt 2Multi-State Information Sharing and Analysis Center®CIS Critical Security Controls®How to Defend Against Iran's Cyber Retaliation PlaybookEpisode 178: Appropriate Defense to Iranian Threat ActivitySecure by DesignCollective SLTT Cyber DefenseEpisode 144: Carrying on the MS-ISAC's Character and CultureMonitoring and Support During the CrowdStrike Falcon OutageEpisode 110: How Security Culture and Corporate Culture MeshIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Insider Threat: AI-equipped Employees - Gate 15 - 04 Mar 2026 • Communication and Collaboration Key Themes in GridEx VIII Lessons Learned Report • Health-ISAC Annual Report 2025 Shows Surge in Threat Intel and Tabletop Drills, Putting Resilience in Focus • The Gate 15 Special Edition: Iran, ISACs, & insomnia: What's happening, and not happening, in information sharing — Gate 15 | 06 Mar 2026• White House Unveils President Trump's Cyber Strategy for America — The White House | 06 Mar 2026o Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House o Ranking Member Thompson Statement on Trump's 3-Page Cyber Strategy — Democrats on the House Homeland Security Committee, 06 Mar 2026 • Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House | 06 Mar 2026Main Topics:Operation Epic Fury & Related: • White House blocks intelligence report warning of rising US homeland terror threat linked to Iran war • Iran may be activating sleeper cells in the United States, officials warn • Cyber threat bulletin: Iranian cyber threat response to US–Israel strikes February 2026, Canadian Centre for Cyber Security, 03 Mar 2026• Alert: NCSC advises UK organisations to take action following conflict in the Middle East, NCSC, 02 Mar 2026• U.S. threat intelligence units identify hacktivists as prime cyber vector in Iran conflict • Iran-linked hacktivists could target US state and local targets, experts warn • Trump Says ‘I Guess' Americans Should Worry About Iran Attacks Cyber Reports• NCC Group Annual Threat Monitor Review of 2025 NCC Group, 05 Mar 2026• Patch, track, repeat: The 2025 CVE retrospective — Cisco Talos, 05 Mar 2026• Look What You Made Us Patch: 2025 Zero-Days in Review Google Cloud Blog, 05 Mar 2026• Coalition report finds sharp rise in ransomware demands as most businesses refuse to pay — Reinsurance News | 07 Mar 2026• INC Ransom Affiliate Model Enabling Targeting of Critical Networks Australian Cyber Security Centre, 05 Mar 2026Quick Hits:• Top 10 artificial intelligence security actions: A primer Canadian Centre for Cyber Security, 05 Mar 2026• Artificial Intelligence and Machine Learning Supply Chain Risks and Mitigations Australian Signals Directorate, 04 Mar 2026• How AI Assistants Are Moving the Security Goalposts — Krebs on Security | 07 Mar 2026• Preparation hardening destructive attacks — Google Cloud Threat Intelligence | 08 Mar 2026• Tornadoes kill 6 people in Michigan and Oklahoma as powerful storms hit nation's midsection
VEM: Isac CalmrothYRKE: Skådespelare/manusförfattareAVSNITT: 722OM: Premiären av Doktor Glas. Att vinna filmpris. Oro och katastroftankar. Bromance med Christian Fandango. Hur han inte vill få starta ett telefonsamtal. Genombrottet i Ondskan. Och en hel del snabbkaffe (som håller honom vaken i 16 manusskrivande timmar).SAMTALSLEDARE: Kristoffer TriumfPRODUCENT: Mattias ÅsénKONTAKT: varvet@triumf.se och Instagram Hosted on Acast. See acast.com/privacy for more information.
Threat intelligence too often arrives as a steady stream of alerts that don't translate into clear, timely decisions. This episode explores how public-sector intel flows today through channels like CISA, MS-ISAC, and CIS—and why changes in funding and distribution can reshape what organizations actually receive and when. We also imagine an all-in state approach, where states take a bigger role in getting actionable cyber intel to local businesses and organizations. From a higher-ed security leadership lens, we connect student data privacy and regulatory realities to the broader public–private challenge—and highlight community-driven efforts like the Redwood Project that strengthen trust-based, peer-to-peer intelligence sharing. This segment is sponsored by Arctic Wolf. Visit https://cisostoriespodcast.com/arcticwolf to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-222
VEM: Isac CalmrothYRKE: Skådespelare/manusförfattareAVSNITT: 722OM: Premiären av Doktor Glas. Att vinna filmpris. Oro och katastroftankar. Bromance med Christian Fandango. Tiktok-lansering. Hur han inte vill få ett telefonsamtal. Genombrottet i Ondskan. Och en hel del snabbkaffe (som håller honom vaken i 16 manusskrivande timmar).SAMTALSLEDARE: Kristoffer TriumfPRODUCENT: Mattias ÅsénNY FORM: Martin Löfqvist (Untitled services)VINJETTKOMPOSITION: K Triumf.VINJETTPRODUKTION: K Triumf, P Svensson och Albin Myers.VINJETTANPASSNING: Paul Wettermark.KONTAKT: varvet@triumf.se och Instagram. Hosted on Acast. See acast.com/privacy for more information.
Wise Yourself Up is back!!We're starting off the season with three incredible guests, Natasha Gold, Una O'Brien and Carly MacDonald, the founders of Youth Untroubled, to talk about something that so many families experience but very few people talk about honestly.Across the UK, more and more young people are entering care, psychiatric units or the justice system. Yet behind these statistics are families who were often asking for help years before things reached crisis point.Parents who felt overwhelmed, children who were struggling with trauma, and systems that simply did not have the capacity to respond in the way that was needed.Youth Untroubled was created to challenge that reality.Natasha, Una and Carly have developed the ISAC model, an intensive systemic approach that works with the whole family instead of placing the responsibility for change solely on the child.By working closely with parents, understanding the context around behaviour, and supporting families consistently over a longer period of time, they are seeing outcomes that are genuinely life changing.In this episode, they explore how trauma can show up as challenging behaviour in young people, why many parents feel blamed or overwhelmed by conflicting advice, and how real repair can begin when shame is replaced with understanding.The conversation also opens up rarely discussed topics such as sibling sexual abuse and harmful sexual behaviour, and why accountability and rehabilitation are essential if we want to break cycles of harm rather than simply punish them.Trigger warning: This episode includes discussion of child sexual abuse and sibling harm. Please listen with care.Timestamps00:00 Welcome to the podcast03:44 Meet the founders of Youth Untroubled06:37 How Natasha, Una and Carly first met and their journey into this work12:16 How the ISAC model was created to support families in a different way14:15 What out of home placements are and why young people end up there19:23 Understanding trauma and the behaviours that often follow26:50 Navigating blame, shame and repair within families32:39 Discussing sibling sexual abuse and the complexity families face44:38 The results of the Youth Untroubled model and plans for wider rolloutA huge thank you to Natasha, Una and Carly for the important work they are doing to support young people and families and for sharing their knowledge in this episode.Please consider sharing the episode if you enjoyed it, as spreading awareness about these topics is one of the most powerful ways we can support change.Connect with Carla:Instagram: @CarlaMcGreevy1Work with Carla: Carla McGreevyJoin Carla's mailing list: Stay ConnectedConnect with Youth Untroubled:Youth Untroubled Website: https://www.youthuntroubled.co.uk/ISTAC Website: https://www.istac.co.uk/
Idag gästar Isak Estemyr som är VD på spelföretaget Mana Brigade där han också gör game design och programmering. De har på kort tid släppt två spel - VR-spelet Black Forge och co-op-fiskeskräcken Dreadline.Vi pratar om hur Black Forge, en fantasy blacksmithing simulator i VR, växte fram ur ett experiment med Marching Cubes-algoritmen och hur de säkrade både funding och en publishing-deal med Fast Travel Games genom att bygga relationer över tid.Nästa spel blev Dreadline - ett co-op-fiskespel inspirerat av Lethal Company och Dredge - där de valde att self-publisha och göra all marknadsföring själva.Trevlig lyssning!Har du tankar om Spelskaparna, känner dig sugen på att delta i ett avsnitt eller kanske vill visa upp ett spel som du jobbar på - kom in på Spelskaparnas discord. Där har mysig stämning skapats och ett gäng utvecklare chattar om stort och smått. Hyser du starka aversioner mot Discord går det även bra att höra av sig på info@spelskaparna.se, @ollandin eller @saikyun.LänkarMana Brigade[Black Forge]://www.manabrigade.com/blackforge/)Dreadline på SteamFast Travel GamesKeymailerLurkitGameportLethal CompanyContent WarningDredgeOvercooked
Programledare: Jesper HofmannPanel: Fabian Ahlstrand & Robin BerglundGäster: Myggan, Bartosz Grzelak & Isac Calmroth------Prova på Expressen +Allt för halva priset i första månaden och se gruppspelet i Svenska cupen. Ingen bindningstid och erbjudandet gäller endast nya kunder. Ta del av erbjudandet här: http://www.expressen.se/fotbollsmorgon------Redaktion: Oliver Tommos Jernberg, Carl Hultin, Victor Enberg & William Åberg Hosted on Acast. See acast.com/privacy for more information.
Specialavsnitt med både skaparna och skådespelarna bakom den nya svenska thriller filmen Doktor Glas!Vi pratar om allt från inspelningsprocessen till favoritfilmer!Doktor Glas har premiär den 27 februari över hela Sverige – missa den inte!Glöm inte att följa oss på Instagram och TikTok: @filmsnacket, samt på alla plattformar där ni lyssnar på poddar!
Isac ska sluta med amfetamin och ta sig ur ett tungt beroende. Men om han lyckas, kommer han någonsin kunna fota igen? Lyssna på alla avsnitt i Sveriges Radios app. Reporter och ljuddesign: Jonatan LoxdalProducent: Gustav AsplundSlutmix: Astrid AnkarcronaVerkligheten görs av produktionsbolaget Filt.
Almost every 6G-related keynote speech at scientific conferences focuses on ISAC: Integrated sensing and communications. In this episode, Erik G. Larsson and Emil Björnson discuss how sensing and communication technologies have been developed separately in the past but are built on similar yet distinctly different principles. The conversation covers different integration levels, beamforming implementations, fundamental tradeoffs, alternative waveforms, and the most important question: What would ISAC be used for if it becomes widely available in 6G networks? Music: On the Verge by Joseph McDade. Visit Erik's website https://liu.se/en/employee/erila39 and Emil's website https://ebjornson.com/
Anshel Sag hosts episode 242 of the rebranded 6G Podcast and introduces new co-host Mike Dano (Ookla), noting the industry's “5G lull” and a shift toward 6G discussions. They discuss 5G Americas shutting down operations after years as a spectrum- and standards-focused trade association, framing the closure as a sign of cooling 5G interest and flat-to-negative RAN sales. Anshel covers Samsung and KT achieving a 3 Gbps downlink in 7 GHz using Keysight 6G test equipment and X-MIMO, noting the unclear bandwidth used and emphasizing that 6G progress is still largely experimental with mixed commercialization timelines (2028–2030). They debate 7 GHz as a key 6G band, propagation challenges (referencing Wi‑Fi 6E/7), the fading focus on terahertz bands, China's earlier stance on 6 GHz, and potential limited initial 6G deployments. Mike highlights an Ookla report on 5G standalone showing improved battery life versus NSA (EE +22%, O2 +11%) and argues operators under-market SA benefits. Anshel explains T-Mobile's John Saw concept of “kinetic tokens” for low-latency AI in motion (physical AI) across device/edge/cloud, tying it to use cases like real-time translation (5G Advanced, 50 languages) and ISAC for tracking and supporting drones, plus discussion of NVIDIA-based AI-RAN strategies and skepticism about cost and monetization of GPUs in base stations. Mike raises broader concerns about the AI data center boom, citing a projected $710B hyperscaler investment in 2026, power constraints (natural gas, gas turbines/jet engines), private high-bandwidth inter-data-center traffic, and questions about whether telecoms can capture AI value versus hyperscalers, while noting sovereign AI opportunities in countries with fewer data centers. They close with Microsoft and Ericsson integrating Ericsson Advanced Enterprise Mobility into Windows 11 (piloted on Surface 5G) to simplify secure enterprise 5G laptop management with Intune and eSIM provisioning, and discuss why cellular laptops haven't broadly taken off (cost, plans, coverage) and how Apple's modems and multi-carrier services might change adoption.00:00 Welcome & New Co-Host Mike Dano Joins the 6G Podcast01:10 Why the Rebrand Now: 5G Lull, MWC & Samsung Unpacked Tease02:03 5G Americas Shuts Down: What It Says About the Market Cycle05:41 Samsung + KT Hit 3 Gbps in 7 GHz: Early 6G Trial Reality Check07:32 Where 6G Spectrum Lands: 7 GHz, Propagation, and Terahertz Hype Fades12:58 Ookla Report Spotlight: 5G Standalone Boosts Battery Life (and Why It Matters)17:54 Kinetic Tokens & Physical AI: T-Mobile's Vision for Low-Latency 6G22:51 Is T-Mobile's “GPU in Every Base Station” Plan Actually Viable?24:16 The Edge Compute Case: Double-Dipping GPUs for AI + XR Graphics26:29 AI Wearables, AR Glasses, and Why 6G Timing Could Favor T-Mobile28:27 The $710B Data Center Boom: What Hyperscaler Spend Means for Telecom30:36 Powering AI: Natural Gas, Turbines, and the Nuclear Buildout Debate31:25 Neo-Clouds & AI Transport: Private Backbone Links, Akamai GPU Rentals, and Wall Street Doubts37:40 Microsoft + Ericsson Bring Enterprise 5G Management Natively to Windows 1140:00 Why 5G Laptops Still Haven't Taken Off (Cost, Plans, Battery, Coverage)41:41 What Changes in 6G: Apple Modems, Multi-Carrier Service, and the Road Ahead (Wrap-Up)
Bob McElligott talks Olympic hockey, the Blue Jackets return to practice and meet CBJ forward, Issac Lundestrom (11:40-33:11).
Tre unga killar skjuts ihjäl när de är hos frisören för att fixa håret inför Valborg. Nu står fem personer inför rätta men motivet till trippelmordet är fortfarande oklart. Lyssna på alla avsnitt i Sveriges Radios app. – Hela livet har förändrats, vi kunde inte stanna kvar efter att vi begravde honom. Vi flyttade in på hotell tills vi fick en ny lägenhet. Jag har inte varit vid den gamla lägenheten sedan han blev begravd, det berättar Aihams mamma Sanabel. Dagen före Valborg kallas Kvalborg i studentstaden Uppsala. Det är uppladdningen inför den stora festen och mycket folk i rörelse. 15-årige Aiham har bokat klipptid, och väntar inne på salongen som ligger vid Vaksala torg, centralt i stan. Plötsligt händer saker på torget, en maskerad man börjar skjuta mot personer som står utanför salongen. En av de beskjutna söker skydd inne på salongen och gömmer sig på toaletten. Skytten följer efter och Aiham och två andra unga killar hamnar i skottlinjen. De skjuts till döds. Polisens utredning har inte kunnat slå fast motivet till trippelmordet eller vem som var måltavlan. 15-årige Aiham hade ingen koppling till kriminalitet och var varken känd av polisen eller socialtjänsten. – En person som inte alls har valt den här livsstilen men som ändå drabbas av det här gängvåldet, det ger en känsla av att det kan drabba vem som helst och det är fruktansvärt. Sen tycker jag inte att någon ung människa förtjänar det här ödet, ingen ska behöva skjutas när man går till frisören, säger polisens utredningsledare Johan Segerholm.Den 18 februari inleds rättegången, fem personer står åtalade för inblandning i trippelmordet – en av dem är den 21-årige skytten, som nekar till brott. – Jag kommer att vara där. Jag kommer att kolla de ögonen. Jag har inget att skämmas över. Det är deras familjer och dom som ska skämmas, säger Aiman, Aihams pappa.I avsnittet hör du, förutom föräldrarna och polisens utredningsledare, även Aihams vän Isac och vittnet Adam. Programledare: Petra Berggren och Linus Lindahl Reporter: Josefin LodenmoProducent: Jenny HellströmLjud: Fanny Hedenmo och Johan Hörnqvist Kontakt: p3krim@sverigesradio.seTipstelefon: 0734-61 29 15 (samma på Signal)
The Maroon has the top stories from the week. The Institute for the Study of Ancient Cultures (ISAC) launched a new data research center that uses artificial intelligence to aid researchers. A South Side legal aid clinic for immigrants is adapting amid heightened ICE presence; reporter Celeste Alcalay discusses how organizers say their work has changed. Featuring: Aubrey Barb, Amber Lin, and Celeste Alcalay Edited by: Aubrey Barb
The Maroon has the top stories from the week. The Institute for the Study of Ancient Cultures (ISAC) launched a new data research center that uses artificial intelligence to aid researchers. A South Side legal aid clinic for immigrants is adapting amid heightened ICE presence; reporter Celeste Alcalay discusses how organizers say their work has changed. Featuring: Aubrey Barb, Amber Lin, and Celeste Alcalay Edited by: Aubrey Barb
In Episode 169 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager begin their discussion of 2026 cybersecurity predictions from seven experts at the Center for Internet Security® (CIS®), as shared on the CIS website.Here are some highlights from our episode:01:05. The impact and promise of artificial intelligence on cyber defense05:37. Collective action as an answer to the constraints facing the "cyber-underserved"12:52. Zero trust and security best practices as functions of managing cycles of time21:22. How tailored threat intelligence can help to frame cybersecurity around mission31:18. The convergence of cybersecurity and privacy as a necessity for governanceResourcesAn Introduction to Artificial IntelligenceCybersecurity for Critical InfrastructureEpisode 144: Carrying on the MS-ISAC's Character and CultureEpisode 142: SLTTs and Their Nuanced Cybersecurity NeedsCollective SLTT Cyber DefenseGuide to Implementation Groups (IG): CIS Critical Security Controls v8.1Episode 90: Migrating to the Cloud with Control ContinuityBuild a Zero Trust Roadmap for FinServ with CIS SecureSuiteSecure by Design: A Guide to Assessing Software Security PracticesEpisode 110: How Security Culture and Corporate Culture MeshEpisode 147: Actualizing Threat Intel for Effective DefenseLaw EnforcementReasonable Cybersecurity GuideNIST SP 800-207: Zero Trust ArchitectureEpisode 74: The Nexus of Cybersecurity & Privacy LegislationMapping and Compliance with the CIS ControlsMapping and Compliance with the CIS BenchmarksIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
GMOサイバーセキュリティ byイエラエ株式会社は12月12日、「Japan Space ISAC」 に11月1日に加盟したと発表した。
What would happen if a coordinated cyber and physical attack disrupted the systems that power daily life—not just power plants, but data centers, pipelines, and communications? Cyber and physical threats to the electric grid are growing more advanced, more frequent, and harder to detect. The impacts can ripple far beyond the energy sector, affecting communities, public safety, and the broader economy. From sophisticated phishing to copper theft from power plants, competitive power suppliers, grid operators, and utilities must stay prepared. In this episode of Energy Solutions, EPSA President and CEO Todd Snitchler sits down with one of the nation's top grid security leaders to unpack today's threat landscape and what it takes to strengthen the power system. Michael Ball is Senior Vice President of the North American Electric Reliability Corporation (NERC) and CEO of the Electricity Information Sharing and Analysis Center (E-ISAC). They discuss the rising role of AI in cyberattacks, how adversaries target industrial control systems, and why information sharing across the energy sector is essential. They also cover insights from the recent national GridEx VIII exercise—as well as a new “Grid-Ex-in-a-Box" drill EPSA customized for member companies this November in Houston—and explore how competitive power suppliers can get prepared before a real crisis hits. Topics include: How cyber threats have become constant and increasingly sophisticated, The rise of almost autonomous AI-enabled cyberattacks, Physical security risks including vandalism, copper theft, and drone activity at power plants, How adversaries target industrial control systems with advanced toolkits, The critical role of information sharing across competitive power suppliers, utilities, and government partners, What the E-ISAC does and how it supports industry-wide situational awareness, Key insights from GridEx VIII, The importance of resilient communications strategies and updated playbooks, And what competitive power suppliers and utilities should focus on heading into 2026. Host: Todd Snitchler, President and CEO, EPSA Guest: Michael Ball, senior vice president, NERC, CEO, E-ISAC Liked this episode? Share it on X @EPSANews or LinkedIn at Electric Power Supply Association. Want more competitive power updates? Sign up for our monthly Power Moves newsletter.
John F. Banghart, Senior Director for Cybersecurity Services, Venable LLP, speaks with Errol S. Weiss, Chief Security Officer, Health-ISAC, Inc., about the unique challenges associated with information sharing in the health care sector. They discuss what an ISAC is; what information sharing means in the context of the health care sector and why it is important; legal, regulatory, and compliance risks; risk mitigation strategies; the impact of the Cybersecurity Information Sharing Act of 2015; and how to facilitate cooperation in information sharing among various stakeholders. Sponsored by Venable.Watch this episode: https://www.youtube.com/watch?v=2sRx96w1U70Learn more about Venable: https://www.venable.com/ Essential Legal Updates, Now in Audio AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast. Stay At the Forefront of Health Legal Education Learn more about AHLA and the educational resources available to the health law community at https://www.americanhealthlaw.org/.
In this episode of The Gate 15 Interview, Andy Jabbour speaks with leaders from the Information Sharing and Analysis Center (ISAC) community on the Cybersecurity Information Sharing Act, the government shutdown, the role and future of ISACs and what to look forward to in 2026. Experts include:Errol Weiss, CSO, Health-ISACAdam Gruszcynski, IT Director at Potawatomi Casino Hotel & Tribal-ISAC Steering Committee MemberKimberly Denbow, Vice President, Security and Operations, AGA & Executive Director, DNG-ISACChris Anderson, Principal Advisor, National Security and Emergency Preparedness at LumenIn the discussion the panel covers:The Cybersecurity Information Sharing Act of 2015 (CISA 2015), it's recent and potential lapse and how it impacted cyber threat information sharing and collaboration.The recent and potentially upcoming federal government shutdown and how the ISACs operated and were impacted.From the TribalNet Cybersecurity Summit to the Natural Gas Exercise 2026 (NGX-2026), operationalizing AI, and growing critical global partnerships – the group discusses some of the many things that they're excited about heading into 2026.Plus! The team plays one question! Warren G: Regulators! And more!Selected links:Health-ISACTribal-ISACDNG-ISACCongress extends CISA 2015, but path to long-term reauthorization remains murky
Seth Cabezas, a McMaster University baseball pitcher and Indigenous Student Athlete Council co-president, joined Andrew Damelin on this Sportsline Podcast. Cabezas is all about connection -- to his teammates and community. They talk about the mental battle between pitcher and batter, inspiring the high school he coaches, and the successes he's experienced as a result of ISAC.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Matt Duncan, Vice President of Security Operations and Intelligence at the North American Electric Reliability Corporation's E-ISAC, to explore the cyber threats targeting the North American power grid. Matt breaks down why the grid remains resilient despite increasing pressure from nation-states, cybercriminals, and hacktivists, how AI is lowering the barrier of entry for attackers, and why OT systems and interconnected devices present unique risks. He also highlights real success stories, the value of large-scale grid exercises, and how strong collaboration and a focus on foundational security practices help defenders keep power flowing safely and reliably. In this episode you'll learn: How severe weather events trigger heightened cyber-readiness across utilities What motivates hacktivist groups and how their tactics differ from other threat actors Why outdated equipment and legacy systems remain such attractive targets Some questions we ask: Are you seeing more educated and capable OT-focused adversaries now? How do you work with policymakers to help them understand these threats? If you could eliminate one misconception about securing the grid, what would it be? Resources: View Matt Duncan on LinkedIn View Sherrod DeGrippo on LinkedIn Learn more about E-ISAC Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.
For this special edition of the podcast we partner with Cohere Technologies to explore a number of areas of wireless innovation. The main segment is recorded at Cohere's stand at the FYUZ industry gathering in Dublin, featuring Cohere's CEO Ray Dolan, Brad Stimpson of Bell Canada and Paco Pignatelli of Vodafone. They discuss radio innovation, the FYUZ event, recent Cohere announcements, the road to 6G and much more, with some valuable insights from the operators. This pod then moves to a purely audio segment recorded the previous day from the Stag's Head pub in Dublin, featuring Ray and US defense industry insider Tom Rondeau, and exploring the emerging field of integrated sensing and communication..
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC. Main Topics:Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time. Hackers are attacking Britain's drinking water suppliers(TLP:CLEAR) Threat Analysis for the Water and Wastewater Sector, October 2025 – Executive SummaryThreat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here. 2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.Quick Hits:• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica• ‘Tremendous unprecedented devastation' in Jamaica from Hurricane Melissa, UN coordinator says• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says
Idag gästas Nick av Isac, en person som jobbat med att skapa innehåll om svensk basket i över tio år. Isac pratar om sin start med Brahe Basket, åren på Rig Sanda, hur han hamnade på förbundet, jobbet han gör för FIBA under stora internationella turneringar, och, framför allt, hans nya podd som ska lanseras inom kort.
In episode 159 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf, Sr. Cyber Threat Intelligence Analyst at the Center for Internet Security® (CIS®), and Randy Rose, Vice President of Security Operations & Intelligence at CIS. Together, they dive into the scariest malware of 2025 in this special Halloween edition.The conversation explores what makes today's malware truly terrifying, from stealthy threats that hide in plain sight to modular malware that evolves faster than defenses can adapt. The trio also discusses the corporatization of cybercrime, the rise of Malware as a Service, and how generative artificial intelligence (GenAI) is lowering the barrier to entry for cybercriminals.Here are some highlights from our episode:00:42. Introductions to Josh and Randy02:21. What makes the scariest malware of 2025 truly "scary"05:42. Evolution of malware: people, process, and technology09:33. How the corporatization of malware helps to democratize cybercrime11:25. The most "terrifying" malware strains of 202515:49. Malware reincarnation: Old threats with new masks17:20. GenAI as the great equalizer for cybercriminals, especially social engineers23:32. Defense-in-depth and threat-informed strategies24:45. Why incident response playbooks must evolve and become living documents27:02. What incident response looks like for cloud assets in the Fourth Industrial Revolution29:27. Naming malware after horror movie iconsResourcesMulti-State Information Sharing and Analysis Center®Episode 144: Carrying on the MS-ISAC's Character and CultureEpisode 126: A Day in the Life of a CTI AnalystA Short Guide for Spotting Phishing AttemptsThe CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturityEpisode 157: How a Modern, Mission-Driven CIRT OperatesLiving Off the Land: Scheduled TasksCyber defenders sound the alarm as F5 hack exposes broad risksEpisode 134: How GenAI Lowers Bar for Cyber Threat ActorsActive Lumma Stealer Campaign Impacting U.S. SLTTsMS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaSClickFix: An Adaptive Social Engineering TechniqueTop 10 Malware Q1 2025CTAs Leveraging Fake Browser Updates in Malware CampaignsItalian police freeze cash from AI-voice scam that targeted business leadersCornCon Cybersecurity ConferenceIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
On this week's Security Sprint, Dave and Andy covered the following topics:Warm Open• H2OSecCon 2026 Call for Presentations• Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC.• CISA's international, industry and academic partnerships slashed. The cuts “create a dangerous void,” said Errol Weiss, chief security officer for the Health Information Sharing and Analysis Center. “The health sector is one of the most targeted and vulnerable, and this is exactly the wrong time to be pulling back federal support.• Kristi Noem pledged to boost the nation's cybersecurity. She gutted it instead• Trump Administration Cuts Cyberdefense Even as Threats Grow• U.S. Cyberspace Solarium Commission Annual Assessment: America's Cyber Resiliency in 2025: Lessons from the Fifth CSC 2.0 Annual Assessment & US ‘slipping' on cybersecurity, annual Cyberspace Solarium Commission report concludes Main Topics:Ransomware recovery perils: 40% of paying victims still lose their data. Paying the ransom is no guarantee of a smooth or even successful recovery of data. But that isn't even the only issue security leaders will face under fire. Preparation is key.• UK Government: Supply chain resilience against ransomware • JLR hack is costliest cyber attack in UK history, say analystsMelissa becomes third Category 5 hurricane of the extraordinary 2025 season• NHC issuing advisories for the Atlantic on Hurricane Melissa• Key messages regarding Hurricane Melissa (en Español: Mensajes Claves)• Melissa leaps from tropical storm to Category 4 hurricane in 18 hours• Category 5 Hurricane Melissa's eye is nearing Jamaica and conditions are worseningQuick Hits:• Palo Alto Networks: Why Threat Actors Succeed• LA Metro digital signs taken over by hackers• Chatbots Are Pushing Sanctioned Russian Propaganda
In this episode, Michelle Bouschor sits down with Tribal-ISAC Steering Committee Members Toni Pepper, Adam Gruszcynski to discuss THE PULSE, The State of Cybersecurity Within Tribal Nations Cyber Report, the new tabletop exercise grant program available for ISAC members, and their session at TribalNet. They also share what they've been hearing from attendees about current cybersecurity challenges and—bonus—find out what Adam might be doing if he weren't crushing it as an IT professional! Links: Tribal-ISAC webpage The Pulse Report Table Top Grant Application
OpenAI's ChatGPT will soon allow *adult* AI conversations. What happens next? For now, we get Sora 2 updates and Google ussing AI for actual science, making progress towards cancer cures. Google *also* has Gemini 3 on deck for what seems like a pretty big jump in AI capabilities. Oh and they happen to be working on fusion as well. But for us, they've update their AI video model VEO to 3.1 and we take it for a test run. IT'S A WHOLE NEW WORLD. DON'T YOU DARE CLOSE YOUR EYES. #ai #ainews #openai Get notified when AndThen launches: https://andthen.chat/ Come to our Discord to try our Secret Project: https://discord.gg/muD2TYgC8f Join our Patreon: https://www.patreon.com/AIForHumansShow AI For Humans Newsletter: https://aiforhumans.beehiiv.com/ Follow us for more on X @AIForHumansShow Join our TikTok @aiforhumansshow To book us for speaking, please visit our website: https://www.aiforhumans.show/ // Show Links // Sam Altman Says ChatGPT Gets Erotica Soon https://www.cnbc.com/2025/10/15/erotica-coming-to-chatgpt-this-year-says-openai-ceo-sam-altman.html Sam's Tweet & Second Response https://x.com/sama/status/1978539332215681076 Mark Cuban = Pro Sora 2, Anti-ChatGPT Erotica https://www.axios.com/2025/10/15/mark-cuban-openai-chatgpt-porn-erotica Big Sora 2 Updates https://x.com/OpenAI/status/1978661828419822066 OpenAI Growth In Revenue https://x.com/EpochAIResearch/status/1978496866624176507 But… it's losing money like A LOT https://x.com/ecommerceshares/status/1978392637682876551 Meanwhile, Google is doing *ACTUAL* New Science https://x.com/sundarpichai/status/1978507110477332582 New Potential Cancer Therapy Cell2Sentence 27B https://blog.google/technology/ai/google-gemma-ai-cancer-therapy-discovery/ Oh, also just working on Fusion as well… https://deepmind.google/discover/blog/bringing-ai-to-the-next-generation-of-fusion-energy/ Google Gemini 3.0 Checkpoint Previews https://x.com/search?q=gemini%203.0&src=typed_query GAME CLONES Zelda Clone: https://x.com/sawlygg/status/1978806712095195242 Binding of Isac: https://x.com/Lentils80/status/1978637501410459867 PS2 SIM: https://x.com/chetaslua/status/1978580801324212366 Gameboy: https://x.com/chetaslua/status/1978487570083291525 VEO 3.1 Update https://x.com/GoogleDeepMind/status/1978491999029219364 Will Smith Eating Spaghetti https://x.com/demishassabis/status/1978644313824534954 Details on “Better Textures” (videos from Google team) https://x.com/GeminiApp/status/1978869121832910953 Claude 4.5 Haiku Launches https://x.com/claudeai/status/1978505436358697052 Share of Articles Written By AI Surpasses Humans https://x.com/SteveRattner/status/1978103106874310972 Anduril's Eagle Eye Partnership Military Technology https://x.com/anduriltech/status/1977725937807466713 Interactive Sora 2 https://x.com/mattshumer_/status/1978848940083839162 Boston Dynamics (SPOT) Tire Stacking https://x.com/itsmaksX/status/1978134727727976533 LKcampbell's Cool Way To See Who Is A Content Violation https://x.com/gavinpurcell/status/1977061015176270285
A través del Pastor: Fernando HuancaFecha: 30 de Septiembre del 2025Desde la Iglesia : Tabernáculo de SalvaciónLugar: Desde Cochabamba- Bolivia hasta el lugar donde usted está.Comunícate y conéctate con nosotros a través de Facebook y la página webBolivia pequeña entre las naciones de ti saldrá la "Luz a las Naciones"facebook.com/tabernaculodesalvacionfacebook.com/escueladecristoenboliviaApp de Radio: Red Pentecostés Online:Para Android: https://play.google.com/store/apps/details?id=com.fexred.redpentecostesPara ios (iphone): https://apps.apple.com/es/app/id6473747619www.edcnaciones.org
En orolig Isac Calmroth gör comeback i Vardagsfilosofiska rummet och inleder med att uttrycka sin oro för att råka svara fel och framstå som pe**o. Papegojan som varit sur i 43 år. Johan-Mathias Sommarström om Israel och Hamas tecknade fredsplan. Lyssna på alla avsnitt i Sveriges Radio Play. Programledare: Christopher Garplind och Hanna Hellquist
Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group's extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective's claimed breach of some of Red Hat GitLab's repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). PLUS! An exciting announcement about our partnership with Material Security for their Security Theater event in NYC!
Episode 233 discusses the newest tensions between AI and schools: teenagers using AI companions and alarming incidents tied to platforms like Character.ai that have drawn federal attention. Josh talks about his student MFA pilot using Clever, how onboarding works (and how MFA can be network-aware to reduce classroom friction), and using student-led help desks to test the rollout. The guys discuss a post from Jay on K12TechPro asking about IT leadership background (educators and non‑educators in K12 tech dept roles). The episode's guest is Peter Kaplan from Fortinet, an E‑Rate expert. He breaks down why E‑Rate matters, outlines the FCC's cybersecurity pilot (challenges with procurement, reporting, and evaluating success), and discusses gaps left by potential MS‑ISAC funding changes. He also highlights CISA's K12 resources and Fortinet's no‑cost cybersecurity awareness materials for schools. Our new Swag Store is OPEN - Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! -------------------- NTP Managed Methods Arista VIZOR Fortinet -------------------- Join the K12TechPro Community (exclusively for K12 Tech professionals) Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! Email us at k12techtalk@gmail.com OR our "professional" email addy is info@k12techtalkpodcast.com Call us at 314-329-0363 X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Justine Bone, Executive Director, Crypto ISAC. She has worked at the intersection of technology, governance, and investment for over twenty years from her start in the intelligence community with the New Zealand GCSB and the U.S. NSA, and has since spanned CEO roles, multinational board appointments, and global advisory positions. Today she serves as Executive Director of the Crypto ISAC, leading global collaboration at the nexus of digital assets, cybersecurity, and governance, and working with public and private stakeholders to build trust and resilience in international markets. She has also held leadership roles at Dow Jones, Bloomberg, and MedSec, and worked with public–private collaborations alongside the FDA, DHS, and DOD. Learn more about Justine on LinkedIn.In the discussion Justine and Andy cover:Justine's background.Crypto ISAC's mission and community.Threats to the blockchain and crypto industry, including the threat from North Korea.Personal and organizational crypto security considerations.What's ahead in 2026.Resilience and the power of information sharing.We play 3 Questions!“there's a lot that's the same, but there's a lot that's different”Selected links:Crypto ISAC(TLP:CLEAR) North Korea IT Worker Threat Report: Threat Overview and Mitigation. This report is a collaboration that incorporates analysis from several leading Information Sharing and Analysis Centers (ISACs), including Crypto ISAC, Oil and Natural Energy ISAC (ONE-ISAC), Real Estate ISAC, Tribal ISAC, WaterISAC, the Faith-Based Information Sharing and Analysis Organization (ISAO), and Gate 15
In episode 152 of Cybersecurity Where You Are, Sean Atkinson is joined by Cliff Moten, Manager, Cybersecurity Solutions Engineering at the Center for Internet Security® (CIS®); and Richard Vargas, Security Operations Center Manager at CIS. Together, they discuss how the 24x7x365 CIS Security Operations Center (SOC) and CIS Managed Detection and Response™ (CIS MDR™) work together to accelerate response time while enriching telemetry. Here are some highlights from our episode:01:40. Demystifying SOCs and MDR as cybersecurity concepts02:52. How the CIS SOC works to provide information, context, and next steps for an event05:04. Artificial intelligence and automation as ways to accelerate response time10:20. Real-world instances where a fast response time made a difference13:10. What it means to support underfunded organizations with the resources they need17:22. The role of contextual cyber threat intelligence in accelerating response times19:01. The value of security orchestration, automation, and response (SOAR) in helping defenders move quickly27:33. Lessons that organizations can use to cut down on their incident response timesResourcesThe CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturityEpisode 148: How MDR Helps Shine a Light on Zero-Day AttacksEpisode 144: Carrying on the MS-ISAC's Character and CultureEpisode 137: National Cybersecurity Through SLTT ResilienceCombatting RansomwareEstablishing Essential Cyber HygieneCIS Community Defense Model 2.0If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft's new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endpoint security platform. Google confirms a data breach involving one of its Salesforce databases. A lack of MFA leaves a Canadian city on the hook for ransomware recovery costs. Nvidia's CSO denies the need for backdoors or kill switches in the company's GPUs. CISA flags multiple critical vulnerabilities in Tigo Energy's Cloud Connect Advanced (CCA) platform. DHS grants funding cuts off the MS-ISAC. Helicopter parenting officially hits the footwear aisle. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Sarah Powazek from UC Berkeley's Center for Long-Term Cybersecurity (CLTC) discussing her proposed nationwide roadmap to scale cyber defense for community organizations. Black Hat Women on the street Live from Black Hat USA 2025, it's a special “Women on the Street” segment with Halcyon's Cynthia Kaiser, SVP Ransomware Research Center, and CISO Stacey Cameron. Hear what's happening on the ground and what's top of mind in cybersecurity this year. Selected Reading Two Arrested in the US for Illegally Exporting Microchips Used in AI Applications to China (TechNadu) Microsoft's plan to fix the web with AI has already hit an embarrassing security flaw (The Verge) ReVault flaws let hackers bypass Windows login on Dell laptops (Bleeping Computer) Trend Micro warns of Apex One zero-day exploited in attacks (Bleeping Computer) Google says hackers stole its customers' data in a breach of its Salesforce database (TechCrunch) Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied (CP24) Nvidia rejects US demand for backdoors in AI chips (The Verge) Critical vulnerabilities reported in Tigo Energy Cloud connect advanced solar management platform (Beyond Machines) New state, local cyber grant rules prohibit spending on MS-ISAC (StateScoop) Skechers skewered for adding secret Apple AirTag compartment to kids' sneakers — have we reached peak obsessive parenting? (NY Post) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In episode 146 of Cybersecurity Where You Are, Tony Sager is joined by Angelo Marcotullio, Chief Information Officer at the Center for Internet Security®(CIS®); and Stephanie Gass, Sr. Director of Information Security at CIS. Together, they look back on periods of transition at CIS to discuss what security looks like for a security company. Here are some highlights from our episode:00:58. Introductions with Angelo and Stephanie02:07. A pro and a con of IT consulting work04:12. The importance of soft skills in bringing the Multi-State Information Sharing and Analysis Center® into CIS06:12. Looking at security from a corporate perspective with the CIS Critical Security Controls07:08. How IT and IT security are essential to corporate strategy07:45. The use of governance to support merging three business units into an integrated security company12:04. The value of security champions in adapting to regulatory and business changes15:15. What IT and Security teams can accomplish when they work as partners17:18. The use of data to inform Board decisions and conversations around risk20:38. How getting a seat at the table helps with understanding a Board's risk appetite and communicating that out to teams25:01. How infrastructure built for growth, not the smallest business case, produced a smooth transition to work from home in March 202029:30. Advice for folks starting out in security31.28. The importance of collaboration and culture in implementing security as an organizationResourcesEpisode 144: Carrying on the MS-ISAC's Character and CultureThe CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturityGuide to Implementation Groups (IG): CIS Critical Security Controls v8.1CIS Controls v8.1 Mapping to ISO/IEC 27001:2022CIS Controls v8.1 Mapping to SOC2CIS Controls v8.1 Mapping to NIST SP 800-171 Rev 3Reasonable CybersecurityEpisode 110: How Security Culture and Corporate Culture MeshIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
In episode 144 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Carlos Kizzee, Senior Vice President of Multi-State Information Sharing and Analysis Center® (MS-ISAC®) at the Center for Internet Security®(CIS®). Together, they discuss how the MS-ISAC's new funding model helps to carry on the character and culture of this collaborative cyber defense community. Here are some highlights from our episode:01:11. The unique mission, history, and value of building community at the MS-ISAC05:36. A new fee-based model to preserve services and support amid federal funding changes07:08. Service continuity as a commitment to U.S. State, Local, Tribal, and Territorial entities09:45. Initial feedback and considerations heard at the 2025 ISAC Annual Meeting11:40. The new membership funding model and how it preserves SLTT collaboration15:25. A cost-effective approach to securing the "cyber-underserved"19:31. The range of U.S. SLTT government organizations who can enroll as members now21:59. The illusion of "free" in helping U.S. SLTTs to strengthen their cyber defenses22:55. Why U.S. SLTTs need to enroll in paid MS-ISAC membership before October 1, 202528:03. Scale as the key to making MS-ISAC activities as cost-effective as possible30:05. The essential need for U.S. SLTT government organizations to invest in the MS-ISACResourcesMulti-State Information Sharing and Analysis Center®Episode 142: SLTTs and Their Nuanced Cybersecurity NeedsEpisode 137: National Cybersecurity Through SLTT ResilienceISAC Annual MeetingMS-ISAC Membership ResourcesBecome an MS-ISAC MemberEpisode 30: Solving Cybersecurity at Scale with NonprofitsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Steven Sim on OT-ISAC and the State of Information SharingPub date: 2025-06-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSteven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organizations contribute and participate in discussions and events that level up the maturity of cybersecurity practices within OT asset-heavy enterprises. Listen to the Nexus Podcast on your favorite podcast platform.The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organizations contribute and participate in discussions and events that level up the maturity of cybersecurity practices within OT asset-heavy enterprises. Listen to the Nexus Podcast on your favorite podcast platform.
On this week's episode, hosts Josh, Chris, and Mark discuss the Dept of Education's proposed budget and what the cuts could mean for K-12 education. Many of the programs may seem distant from our world but the trickle-down effects could be felt immediately for many districts. We also dive into some additional changes at the FCC as well as MS-ISAC, as districts are learning that some services will now have an annual fee. Our main topic this week is the RFP process - the good, the bad, and the ugly side of RFPs as well as how you can improve your RFPs with 5 simple tips. We break down our recommendations for your next RFP into this simple template that you can use to create a proposal that your vendors will want to respond to! https://docs.google.com/document/d/11435vbxeVSTWntTGFxTkzWlBatyEHlCfYEcmlgE6V4w/edit?usp=sharing 00:00:00-Introduction 00:11:30-More changes in the FCC and MS-ISAC 00:15:24-Dept of Ed's proposed budget 00:28:07-Writing a GOOD RFP -------------------- Eaton - What does an IT pro do? A children's book. K12 IT pros like you have been sharing Eaton's What does an IT pro do? children's book with their school's teachers and libraries. Inspire tiny IT pros interest in STEM with Eaton's first children's tale where Honey, the badger, teaches her classmates how an IT pro can be like a doctor, a detective, a teacher and so much more! Grab your free copy at https://forms.office.com/r/JPaKdQptjU. Fortinet Prey - They are offering a 15% discount on the first year for customers referred by K12 Tech Talk! Visit https://preyproject.com/. NTP ManagedMethods -------------------- Email us at k12techtalk@gmail.com OR info@k12techtalkpodcast.com Call us at 314-329-0363 Join the K12TechPro Community Buy some swag X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the Health Information Sharing and Analysis Center. The Health-ISAC is a go-to source of timely, actionable and relevant information that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day. To learn more, visit https://health-isac.org.
In episode 137 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Terry Loftus, Assistant Superintendent (Chief Information Officer) of Integrated Technology Services at the San Diego County Office of Education (SDCOE); and Netta Squires, President of Government Affairs, Cybersecurity, & Resilience at Open District Solutions (ODS). Together, they discuss how the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) functions as a space for U.S. State, Local, Tribal, and Territorial (SLTT) entities to collectively strengthen their cyber resilience in support of U.S. national cybersecurity. Here are some highlights from our episode:01:15. A study to understand the cybersecurity perspectives of the MS-ISAC community03:24. The need for sustained cyber defense accelerators to drive U.S. SLTT resilience07:31. How surveys and focus groups uncovered U.S. SLTT cybersecurity funding, staffing, and governance challenges13:06. The superpower of cyber threat intelligence driven, tailored, and provided via community17:41. Trust as a foundation for building relationships among MS-ISAC members and partners21:26. How the MS-ISAC moved community cyber defense from conversational to operational22:22. The role of trust in making membership affordable and solutions at scale possible25:00. Opportunities for relationship building, training, and access to services in the MS-ISAC30:00. Examples of MS-ISAC success stories and the need to share them33:40. The MS-ISAC as a space to craft a strategic path for national cybersecurity36:29. Closing thoughts on how members value and can get involved in the MS-ISACResourcesStrengthening Critical Infrastructure: SLTT Progress & PrioritiesMalicious Domain Blocking and Reporting (MDBR)Episode 126: A Day in the Life of a CTI AnalystWhy Whole-of-State Cybersecurity Is the Way ForwardMS-ISAC: Defending America's Critical InfrastructureIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
In the latest episode of "The Brand Called You" podcast, we dive into the fascinating world of eco-conscious entrepreneurship with Yanni Ching, Co-founder and Chief Commercial Officer of Entomal Biotech. This blog post offers a glimpse into Yanni's journey and the revolutionary work her company is doing with Black Soldier Fly larvae to tackle food waste and contribute to sustainable food systems.00:00:08 - Yanni's Introduction and Early InspirationsYanni's journey into sustainability was sparked at 16 by Al Gore's "An Inconvenient Truth."Early eco-consciousness focused on energy and resource use.University involvement with ISAC and exposure to Sustainable Development Goals (SDGs).Engineering background is driven by a desire to create meaningful change.
In this week's episode, Chris and Mark delve into a recent massive data breach that has had significant repercussions for hundreds of thousands of educators in Pennsylvania. They explore the startling details of the breach, discussing its implications and the timeline of the response. The episode features an interview with Terry Loftus, the CIO of San Diego County and chair of the MS-ISAC Executive Committee. Loftus provides insight into the recent funding cuts to MS-ISAC, explaining the potential impacts on education technology and the broader context of these changes. Additionally, the guys address the latest news on tech tariffs, examining how these tariffs are beginning to affect K-12 district budgets and procurement processes via K12TechPro survey. 00:00:00-Intro 00:03:25-Pennsylvania Data Breach 00:09:20-Tariff Survey Results 00:17:11-Interview with Terry Loftus -------------------- NTP CTL Classlink Lightspeed Fortinet -------------------- Email us at k12techtalk@gmail.com OR info@k12techtalkpodcast.com Call us at 314-329-0363 Join the K12TechPro Community Buy some swag X @k12techtalkpod Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
2Drex discuss CSA's decision to cut $10 million in funding to the Center for Internet Security's management of MS-ISAC and EI-ISAC programs, which coordinate critical threat information for state, local, and election infrastructure. Meanwhile, a new ransomware gang called Mora 0 0 1 is targeting 49 firewalls by exploiting known vulnerabilities to gain initial network access. The FBI and CISA have also issued warnings about the Medusa ransomware-as-a-service, which has attacked over 300 victims across multiple industries including healthcare since February.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
In this episode of the K12 Tech Talk podcast, hosts Josh, Chris, and Mark delve into the recent challenges facing K-12 technology in light of new tariffs and significant budget cuts. They discuss the potential impact of these economic and political changes on school services, with a specific focus on the technology and cybersecurity landscapes. A key highlight of this episode is an in-depth analysis of the MS-ISAC funding cuts announced this week. As a member of the MS-ISAC Executive Committee, Josh shares insights on the repercussions these cuts could have on cybersecurity measures and services provided to schools. The hosts also explore the broader impact of tariffs on technology purchases, from student devices to school infrastructure, and discuss alternative strategies that schools may need to adopt. They consider the potential domino effects on construction, transportation, and food services within schools due to tariffs on imports from Canada, Mexico, and China. Throughout the episode, there's also a segment about the enduring presence of fax machines in schools, reflecting on how some traditional technologies remain integral despite advancements. MS-ISAC Cybersecurity Report https://learn.cisecurity.org/2025-k12-cybersecurity-report-download PowerSchool Summary Report https://www.powerschool.com/security/sis-incident/ MS-ISAC Loses Federal Support https://statescoop.com/ms-isac-loses-federal-support/ 00:00:00-Introduction 00:00:32-Post-Security Symposium Reflections 00:05:17-MS-ISAC Cybersecurity Report Overview 00:10:16-Tariffs Impacting K-12 Technology 00:25:15-We still use fax machines??? 00:32:30-Understanding Recent MS-ISAC Funding Cuts -------------------- Classlink Managed Methods VIZOR Extreme Networks Fortinet -------------------- Email us at k12techtalk@gmail.com OR info@k12techtalkpodcast.com Call us at 314-329-0363 Join the K12TechPro Community Buy some swag X @k12techtalkpod Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine's annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. Selected Reading US communications regulator to create council to counter China technology threats (Financial Times) ‘People Are Scared': Inside CISA as It Reels From Trump's Purge (WIRED) CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts (The Record) Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program (Democracy Docket) China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days (SecurityWeek) Chinese cyberspies backdoor Juniper routers for stealthy access (Bleeping Computer) At Ukraine's major cyber conference, Europe takes center stage over US (The Record) Facebook discloses FreeType 2 flaw exploited in attacks (Bleeping Computer) New North Korean Android spyware slips onto Google Play (Bleeping Computer) NHS Trust IT head: ‘Our attack surface was much bigger than we thought' (Computing) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Looking to network in the cybersecurity world? Fortunately, there's no shortage of industry associations to choose from. Today, we're putting the spotlight on the Automotive Information Sharing and Analysis Center, otherwise known as Auto-ISAC. Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the global automotive industry, including light- and heavy-duty vehicle OEMs, suppliers and the commercial vehicle sector. To learn more, visit https://automotiveisac.com. See the full list of associations at https://cybersecurityventures.com/cybersecurity-associations.