Podcasts about it security

The protection of computer systems from theft or damage

  • 468PODCASTS
  • 1,778EPISODES
  • 31mAVG DURATION
  • 1DAILY NEW EPISODE
  • Apr 11, 2025LATEST
it security

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about it security

Show all podcasts related to it security

Latest podcast episodes about it security

Het Digitale Front
#44: Samenwerken met de FBI tegen illegale datahandelaren en witwassende oligarchen

Het Digitale Front

Play Episode Listen Later Apr 11, 2025 45:57


Cybercriminaliteit overstijgt de landsgrenzen - dat blijkt deze week opnieuw bij de ontmanteling van de kindermisbruiksite Kidflix. Een samenwerkingsverband van maar liefst 30 landen, dat leidde tot 79 arrestaties wereldwijd.Hoe pak je als politie zulke enorme cyberoperaties aan? Dave en Harm stellen die vraag aan Ruben van Well, die leiding gaf aan het Nederlandse cyberteam tijdens ‘Operatie Cookiemonster'. Hij vertelt over de ‘klapdag', de onwetendheid van sommige daders en wat nu precies de Nederlandse specialiteit is in deze cybermissies.Dave haakt in met het ongelofelijke verhaal van ‘Operation Destabilise' en laat daarmee zien hoe cybercriminaliteit tegenwoordig in alle aspecten van onze samenleving verweven is. Jeroen de Wit van KPMG schuift aan om te bespreken hoe wij als Nederland onze cyberskills het beste kunnen overbrengen aan onze bondgenoten.In de nieuwsronde:The Guardian - ‘How the Atlantic's Jeffrey Goldberg got added to the White House Signal group chat'NOS - ‘Klanten verruilen Amerikaanse techbedrijven voor Europese alternatieven'De cybertips van deze week:Podcast: Veroordeeld - aflevering 2The Record - ‘Inside Operation Destabilise'Boek: ‘Warfare Reimagined: Embracing AI In The Military' - Igor van GemertBoek: ‘Ghost In The Wires' - Kevin MitnickDocumentaire: ‘Intercepted'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

„ANGRIFFSLUSTIG – IT-Sicherheit für DEIN Unternehmen“
#139 ANGRIFFSLUSTIG - TPM - Trusted Plattform Module

„ANGRIFFSLUSTIG – IT-Sicherheit für DEIN Unternehmen“

Play Episode Listen Later Apr 10, 2025 21:01


Wer beachtet schon die “Serienmässige Ausstattung”? Seit vielen Jahren bietet praktisch jeder PC und jedes Notebook einen TPM-Chip. Kaum jemand nahm davon Notiz und noch viel weniger wusste jemand was das ist. TPM steht für Trusted Plattform Module. Es darf sich wie eine im PC fix verbaute Smart Card vorgestellt werden. Für Windows 11 schreibt Microsoft neu einen TPM 2.0 Chip vor. Das gab einen grossen Aufschrei und plötzlich kennen vielen den Begriff. Was es ist, wissen aber immer noch die wenigsten. Andreas und Sandro wollen das ändern und sprechen in dieser Podcastfolge über TPM.

Het Digitale Front
#43: Signal-gate: kantelpunt in de inlichtingenrelatie met de V.S.?

Het Digitale Front

Play Episode Listen Later Apr 5, 2025 42:07


Na ‘Signal-gate' rijst de vraag: kunnen we in Nederland nog wel blind vertrouwen op Amerikaanse inlichtingen?Dave en Harm duiken in de gevolgen van een mogelijke vertrouwensbreuk met de VS. Wat betekent dat voor onze veiligheid – en voor de digitale samenwerking tussen bondgenoten? Te gast is Willemijn Aerdts, expert op het gebied van inlichtingen- en veiligheidsdiensten én Eerste Kamerlid voor D66.Daarnaast schuift reserve-officier Pascal Hogenboom aan. Hij legt uit hoe KPMG in actie komt als Nederland wordt getroffen door een ramp die onze samenleving kan ontwrichten.De cybertips van deze week:De Volkskrant - ‘AIVD speelde sleutelrol in geheime operatie met CIA in Oekraïne'Serie ‘Adolescence'PimEyesHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Digital Insurance Podcast
Der digitale Versicherungs-Wettbewerb

Digital Insurance Podcast

Play Episode Listen Later Apr 2, 2025 39:27


In dieser Podcast-Folge spreche ich mit Dr. Arne Barinka von der Rheinland Versicherung. Wir sitzen im Rheinlandhaus in Neuss und blicken auf den Hafen. Arne und ich diskutieren die Herausforderungen und Chancen für kleine, mittlere und große Versicherer im Zeitalter von KI und Automatisierung. Hier sind 5 Highlights aus unserem Gespräch: Skaleneffekte in der Versicherungsbranche: Arne erklärt, dass die Definition von "klein", "mittel" und "groß" schwierig ist und eher an der Mitarbeiterzahl als an der Bestandsgröße festgemacht werden sollte. Er betont, dass die Einführung von IT-Systemen oft sprungfixe Kosten verursacht, die unabhängig von der Unternehmensgröße sind. Größere Unternehmen profitieren jedoch von Skaleneffekten bei der Komplexität und dem Ressourcenmanagement. KI und Automatisierung: Wir diskutieren die Herausforderungen und Chancen von KI und Automatisierung, insbesondere im Kontext der Regulatorik (z.B. Dora/Vet). Arne schildert, wie die Einführung neuer Systeme in einem mittelständischen Unternehmen wie der Rheinland Versicherung (ca. 900 Mitarbeiter) abläuft und welche Herausforderungen dabei zu bewältigen sind. Die Fokussierung auf wenige, strategisch wichtige Projekte ist entscheidend. IT-Security: Wir befassen uns mit den IT-Security-Risiken und wie kleine und mittelständische Unternehmen damit umgehen. Arne vertritt den Standpunkt, dass die meisten Bedrohungsvektoren nicht gezielt auf einzelne Unternehmen ausgerichtet sind, sondern eher allgemeine Schwachstellen in Software ausnutzen. Die Balance zwischen IT-Security und Produktivität ist eine große Herausforderung. KI im Kundenservice: Arne sieht großes Potenzial für KI im Kundenservice, insbesondere im Bereich der Datenverarbeitung und der Automatisierung von Kundengesprächen (Chatbots, Voicebots). Die Möglichkeit, Daten aus verschiedenen Kanälen zu kombinieren und den Mitarbeitern relevante Informationen zur Verfügung zu stellen, bietet enorme Vorteile. Er ist jedoch skeptisch gegenüber der automatisierten Emotionserkennung. Zukunft der Versicherungsbranche: Wir sprechen über die Konsolidierung im Versicherungsmarkt und die Frage, ob kleine und mittlere Versicherer langfristig bestehen können. Arne glaubt, dass die Branche weiterhin vielfältig bleiben wird, aber die Konsolidierung wird zunehmen. Kleine und mittlere Versicherer müssen sich auf ihre Stärken, wie Fokussierung und Pragmatismus, konzentrieren, um wettbewerbsfähig zu bleiben. Links in dieser Ausgabe Zur Homepage von Jonas Piela Zum LinkedIn-Profil von Jonas Piela Zum LinkedIn-Profil von Dr. Arne Barinka Der Liferay Trendreport Wie digital sind die Customer Journeys? Wie schätzen sich Versicherer ein, was erwarten Kunden? Welche Maßnahmen sind geplant? Ladet euch den Trend-Report von Liferay und den Versicherungsforen herunter: Trendreport herunterladen Das QAware Whitepaper KI-Experte QAware zeigt Versicherern, wie sie mit Hilfe von KI eine automatisierte Schadenbearbeitung, effizientere Prozesse und personalisierte Angebote realisieren können. Ladet euch jetzt das aktuelle QAware-Whitepaper herunter: Whitepaper herunterladen

Business and Technology in Tennessee with Josh Davis

In this episode of Cyber Ops Unmasked, InfoSystem's Keith Hales sits down with Mackenzie Brown from Blackpoint Cyber to discuss cyber security posture management and how business can best prepare themselves for the storm. How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be? Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-/ INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

preparing it security mackenzie brown infosystems
Digital Pacemaker
#67 Ist IT-Sicherheit nur ein Management-Thema? mit Linus Neumann (Security Research Labs)

Digital Pacemaker

Play Episode Listen Later Mar 31, 2025 61:20


In Folge 67 diskutieren Uli und Markus mit Linus Neumann, Head of Security Strategy bei Security Research Labs, über die Frage, ob IT-Sicherheit ein reines Managementthema ist. Linus berät als IT-Sicherheitsexperte Unternehmen und Betreiber kritischer Infrastrukturen in Fragen der IT-Sicherheit. Seit 2012 ist er zudem einer der Sprecher des Chaos Computer Clubs, Europas größter Hackervereinigung. Linus räumt mit dem verbreiteten Irrglauben auf, IT-Sicherheit sei in erster Linie ein technisches Thema. Tatsächlich, so seine Erfahrung, liegen die Ursachen für Sicherheitslücken fast immer im Organisatorischen: fehlende Verantwortlichkeiten, zu viel Komplexität und mangelnde Priorisierung. Warum reichen Backups nicht aus? Warum versagen viele Sicherheitsprodukte in der Praxis? Und was kann eine sogenannte "Human Firewall" wirklich leisten? Gemeinsam mit Linus beleuchten Uli und Markus, wie IT-Sicherheit effektiv gestaltet werden kann – jenseits von Buzzwords und technischer Kosmetik. Besonders spannend ist der Blick auf die Rolle von Management und Regulierung: Sollen Softwarehersteller für ihre Sicherheitslücken haften? Eine klarsichtige und überraschend praxisnahe Folge über Verantwortung, die richtigen Fragen in der IT-Sicherheit – und warum echte Resilienz weniger mit Firewalls als mit Psychologie und Führungswillen zu tun hat. Wer mehr wissen möchte, findet hier weitere Informationen: - Website der Security Research Labs: https://www.srlabs.de - Website von Linus Neumann: https://linus-neumann.de - Website des Podcast Logbuch:Netzpolitik: https://logbuch-netzpolitik.de Euer Feedback zur Folge und Vorschläge für Themen und Gäst:innen sind sehr willkommen! Vernetzt Euch und diskutiert mit: - Linus Neumann: https://www.linkedin.com/in/linus-neumann/ - Ulrich Irnich: https://www.linkedin.com/in/ulrichirnich/ - Markus Kuckertz: https://www.linkedin.com/in/markuskuckertz/ Mitwirkende - Hosts: Ulrich Irnich & Markus Kuckertz // Redaktion: Marcus Pawlik © Digital Pacemaker Podcast 2025

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Het Digitale Front
#42: Lone wolfs, pubers of de Russen? - hoe ziet de wereld van hacken eruit?

Het Digitale Front

Play Episode Listen Later Mar 28, 2025 46:15


In aanloop naar de NAVO-top in Den Haag scherpt de overheid de straffen voor digitale spionage aan. Dat roept de vraag op: wie zijn er eigenlijk uit op het achterhalen van onze staatsgeheimen of het binnendringen van vitale infrastructuur zoals het stroomnet, internet of stoplichten? En waarom? Dat leggen Dave en Harm, vergezeld door Jordi van den Breekel (ethisch hacker bij KPMG) je in deze aflevering uit door in de huid van een hacker te kruipen. De cybertips van deze week: Hack The BoxWired - ‘SolarWinds: The Untold Story of the Boldest Supply-Chain Hack Ever'Boek: ‘Careless People: A story of where I used to work' - Sarah Wynn-Williams Het Digitale Front wordt mede mogelijk gemaakt door KPMG. Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

„ANGRIFFSLUSTIG – IT-Sicherheit für DEIN Unternehmen“
#138 ANGRIFFSLUSTIG - Top Schwachstellen

„ANGRIFFSLUSTIG – IT-Sicherheit für DEIN Unternehmen“

Play Episode Listen Later Mar 27, 2025 18:15


Jährlich wird von der Cybersecurity and Infrastructure Security Agency (kurz CISA) die Liste der Top Sicherheitsschwachstellen veröffentlicht. Hat sich dabei die Situation gross verändert? Oder sind die bekannten Schwachstellen wieder auf den Top-Plätzen. Darüber diskutieren Andreas Wisler und Sandro Müller.

Joey Pinz Discipline Conversations
#575 ITExpo Joshua Liberman:

Joey Pinz Discipline Conversations

Play Episode Listen Later Mar 26, 2025 34:44 Transcription Available


Send us a textIn this high-energy conversation, Joey Pinz chats with Joshua Liberman, a cybersecurity expert, adventurer, and polyglot with a fascinating life story. From hitchhiking across Africa and Asia to mastering martial arts and leading in cybersecurity, Joshua shares how resilience, adaptability, and quick decision-making have shaped his success.

HRM-Podcast
Cybersecurity ist Chefsache: IT für Anfänger: So erklärt man Cybersecurity, Cloud & Co. endlich einfach!

HRM-Podcast

Play Episode Listen Later Mar 24, 2025 23:10


Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!In dieser Sonderfolge von Cybersecurity ist Chefsache sprechen wir über das Buch „IT für Anfänger“ – ein Gemeinschaftsprojekt mit über 9 Autor:innen, die komplexe IT-Themen einfach, greifbar und oft mit einer Prise Humor erklären.Zu Gast sind einige der Mitwirkenden:

Cybersecurity ist Chefsache - Der Podcast!
IT für Anfänger: So erklärt man Cybersecurity, Cloud & Co. endlich einfach!

Cybersecurity ist Chefsache - Der Podcast!

Play Episode Listen Later Mar 24, 2025 23:10


Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!In dieser Sonderfolge von Cybersecurity ist Chefsache sprechen wir über das Buch „IT für Anfänger“ – ein Gemeinschaftsprojekt mit über 9 Autor:innen, die komplexe IT-Themen einfach, greifbar und oft mit einer Prise Humor erklären.Zu Gast sind einige der Mitwirkenden:

HRM-Podcast
Cybersecurity ist Chefsache: IT für Anfänger: So erklärt man Cybersecurity, Cloud & Co. endlich einfach!

HRM-Podcast

Play Episode Listen Later Mar 24, 2025 23:10


Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!In dieser Sonderfolge von Cybersecurity ist Chefsache sprechen wir über das Buch „IT für Anfänger“ – ein Gemeinschaftsprojekt mit über 9 Autor:innen, die komplexe IT-Themen einfach, greifbar und oft mit einer Prise Humor erklären.Zu Gast sind einige der Mitwirkenden:

Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation missing person malware cyberbullying justice system defamation community support true crime podcasts personality disorders blackmail court cases encryption emotional abuse risk assessment taser data protection crime scene extortion media coverage emotional resilience social engineering narcissistic abuse private investigators criminal justice reform personal freedom emergency preparedness trauma recovery background checks healing from trauma situational awareness cyber threats emergency response spyware peeping toms mental resilience revenge porn forensic science criminal charges post traumatic stress legal action security policies restraining orders whistleblowing home security data breaches surveillance state it security federal laws security cameras digital literacy forensic psychology security breach mental health resources psychological warfare victim blaming doxxing criminal defense internet safety threat intelligence personal boundaries pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection public records digital security news coverage ethical hacking crisis hotline cyberstalking legal protection cyber defense digital rights emotional manipulation threat assessment security tips online harassment emotional distress public awareness internet privacy personal security mobile security gps tracking protective services email security online fraud crime scene investigations criminal behavior identity fraud identity protection forensic investigations onlinepredators behavioral analysis victim support privacy settings emotional recovery local law enforcement detective work legal advocacy criminal profiling criminal intent aggressive behavior security awareness training crime reporting protective gear police reports personal rights digital evidence home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing technology safety cyber investigations
Het Digitale Front
#41: Sabotage van diepzeekabels: de Noordzee als oorlogsfront

Het Digitale Front

Play Episode Listen Later Mar 21, 2025 44:36


Het wordt steeds duidelijker dat Rusland de hybride oorlog op het Westen heeft geopend. Niet alleen via satelliet-sabotage (waar Nederland deze week samen met 7 andere landen een officiële VN-klacht tegen indiende), maar ook op zee.Schimmige spionage schepen en schade aan diepzeekabels, wat betekent dat voor ons? Samen met commandeur buiten dienst Michiel Hijmans kijken Dave en Harm deze week wat er allemaal op onze eigen Noordzee gebeurt. Als oud-leider van het NAVO-vlootverband weet Michiel als geen ander hoe belangrijk maritieme stabiliteit is om onze samenleving draaiende te houden.In de nieuwsronde bespreken Dave en Harm:De Telegraaf - ‘Hoeveel last heeft Nederland van Russische satelliet-sabotage?'De Volkskrant - ‘Tweede Kamer wil een ‘rijkscloud' om los te komen van Amerikaanse big tech'Rapport Europol - ‘EU Serious and Organised Crime Threat Assessment'De cybertips van deze week:Podcast Pointer - ‘Spionnen op de Noordzee'De Volkskrant - ‘Sabotage onder water: de Russische schaduwoorlog legt kwetsbaarheid van het Westen bloot'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#40: Hoe AI onverwacht deel uitmaakt van ons dagelijks leven

Het Digitale Front

Play Episode Listen Later Mar 14, 2025 47:51


Nederland dreigt zijn sterke positie in AI te verliezen, waarschuwt Google. Terwijl andere landen volop investeren en hun AI-ondernemingen laten uitgroeien tot wereldspelers, blijft Nederland twijfelen.In deze aflevering onderzoeken Dave en Harm samen met AI-ondernemer Maarten Sukel hoe kunstmatige intelligentie al onverwacht verweven is met ons dagelijks leven. Van slimme assistenten tot onzichtbare algoritmes—AI is dichterbij dan je denkt. En waarom lijkt Nederland achter te blijven in deze technologische revolutie?Ook schuift Frank van Praat (KPMG) aan: hij deed onderzoek naar hoe we écht over AI denken.In de nieuwsronde bespreken Dave en Harm:VRT - ‘Hoe Rusland ook in ons land mensen online ronselt voor sabotage en spionage'De nieuwe Chinese AI-agent ManusDe cybertips van deze week:De Nationale AI cursusDocumentaire VRT - ‘Einde van oorlog in Oekraïne zal geen einde maken aan hybride oorlog'The Verge - ‘How to stop the AI you're using from training with your data'Het boek van Maarten: De AI-revolutieHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#39: Trump stopt cyberaanvallen op Rusland: wat zijn de gevolgen voor ons?

Het Digitale Front

Play Episode Listen Later Mar 7, 2025 39:52


Nadat Trump zich recentelijk al vaker verrassend positief over Rusland uitliet, verrast hij deze week opnieuw: hij kondigt aan dat de VS Rusland niet langer als cyberdreiging zien en hun digitale offensief zal gaan afbouwen. Wat is er precies aan de hand? Ontstaat hier een ondenkbaar samenwerkingsverband tussen de twee landen die decennialang lijnrecht tegenover elkaar stonden? En worden de pijlen dan nu op Europa gericht?Door het veranderende wereldtoneel vragen Harm en Dave zich af of het tijd is om minder afhankelijk van Amerika te worden. Welke opties hebben we dan? De mannen lopen er een paar met je door.Vind de gehele lijst voor Europese tech-alternatieven op https://european-alternatives.eu/.En in het geval dat we daadwerkelijk meer cyberaanvallen in Europa gaan ondervinden, dan hebben we gelukkig de kennis van incident responder Lars Jacobs van KPMG. Hij vertelt hoe hij te werk gaat wanneer een aanval een datalek of sabotage van een productieproces veroorzaakt.In de nieuwsronde bespreken Dave en Harm:De Telegraaf - ‘Niet 48 maar 72 uur zelfredzaam bij nood'The Record - ‘North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit'En de cybertips van deze week:Boek: Sandworm, A New Era Of Cyberwar and the Hunt for Kremlin's Most Dangerous Hackers - Andy GreenbergBoek: The Heat of the Moment - Sabrina Cohen-HattonPodcast Dutch DragonsThe New York Times - ‘Drones Now Rule the Battlefield in the Ukraine-Russia War'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#38: Cyberoorlog in de lucht: hoe piloten GPS-jamming ervaren

Het Digitale Front

Play Episode Listen Later Feb 28, 2025 41:32


We horen vaak dat het vliegtuig technisch gezien het veiligste vervoersmiddel is van allemaal, maar heb je er weleens bij stilgestaan dat je - nog vóórdat je op je stoel zit - al van tientallen digitale systemen gebruik gemaakt hebt? En ook in de lucht worden besturingssystemen steeds geavanceerder en digitaler. Die kunnen, bijvoorbeeld door GPS-jamming, door kwaadwillenden worden verstoord. Welke gevaren brengt dit met zich mee? Dave en Harm bespreken het met Serge Christiaans, piloot en aviation cybersecurity expert. Ook schuift Henrik Smit van KPMG weer aan. De cybertips van deze week: Harm: Artikel over airplane crashes + album DioDave: Deep research ChatGPT + tweestapsverificatie op WhatsappZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Autonomous IT
Product Talk – Inside Automox's Approach to Third-Party Software Updates, E14

Autonomous IT

Play Episode Listen Later Feb 25, 2025 23:25


Peter Pflaster and Ben Glass team up in this episode of Product Talk to tackle the ins and outs of third-party application patching with Automox. They break down what third-party software means, where IT teams often struggle with patching, and why a centralized approach can make all the difference. With a relaxed yet informative style, the two cover everything from cross-platform patching for Windows, Mac, and Linux to the process behind counting supported titles and taking customer requests. They also touch on unique solutions like Automox Worklets™ for managing custom software and share how Automox simplifies patching for IT teams of all sizes.

ITSPmagazine | Technology. Cybersecurity. Society
Strengthening Cybersecurity Through Zero Trust | A Conversation with Adam Fuller at Zero Trust World 2025 | A Zero Trust World 2025 On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 22, 2025 11:16


Zero Trust World 2025: Strengthening Cybersecurity Through Zero TrustZero Trust World 2025 has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by ThreatLocker, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.A Deep Dive into Windows Security and Zero Trust

Het Digitale Front
#37: 3 jaar (cyber)oorlog in Oekraïne: een blauwdruk voor de toekomst?

Het Digitale Front

Play Episode Listen Later Feb 21, 2025 50:50


Het is op 24 februari drie jaar geleden dat Rusland Oekraïne binnenviel. Opnieuw oorlog in Europa. Hoewel dit niet de eerste oorlog is waar cyber een rol speelt, is het wél de eerste keer dat cyber zo'n invloed heeft op het verloop van een conflict. Op welke manier heeft dat oorlogsvoering veranderd? Dave en Harm horen het van correspondent Chris Colijn, vanuit Kyiv. Ook schuift cyberexpert Meret Keeris van KPMG aan, zij vertelt dat Nederlandse bedrijven het risico van cyberspionage door vijandige regimes onderschatten. Daar wordt nu iets aan gedaan met de NIS2-richtlijn. De cybertips van deze week: Meret: Meer lezen over NIS2? Chris: Innovation in isolationDave: Isolatiemodus op iPhone Harm: Artikel over Musk: & artikel van Ilyaz Nasrullah Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Everyday Tech
Everyday Tech | Cleverce LLC with Trent Lyght

Everyday Tech

Play Episode Listen Later Feb 19, 2025 52:11


Host(s): Abram Nanney, Shane Chism, and Sabir Abdul-Haqq (www.yourebs.biz)Topic: On this episode, we sit down and interview Trent Lyght, Fractional Sales Executive at Cleverce LLC, about the services some of the companies he represents provide like Cyber Insurance and IT Security.Concierge Cyber video link: https://www.youtube.com/watch?v=5_dLzkEOTsY Open Source Intelligence video link: https://www.youtube.com/watch?v=1_LQl0XaPz8Email your tech questions and opinions to: everydaytech@mpbonline.org Hosted on Acast. See acast.com/privacy for more information.

ITSPmagazine | Technology. Cybersecurity. Society
Building a Community and a Culture of Security Education and Operations | A Zero Trust World Pre-Event Kick-Off | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 18, 2025 6:13


Zero Trust World 2025 is officially underway, and the conversation centers around what it means to build a culture of security. Hosted by ThreatLocker, this event brings together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.Defining Zero Trust in PracticeSean Martin and Marco Ciappelli set the stage with a key takeaway: Zero Trust is not a one-size-fits-all solution. Each organization must define its own approach based on its unique environment, leadership structure, and operational needs. It is not about a single tool or quick fix but about establishing a continuous process of verification and risk management.A Focus on Security OperationsSecurity operations and incident response are among the core themes of this year's discussions. Speakers and panelists examine how organizations can implement Zero Trust principles effectively while maintaining business agility. Artificial intelligence, its intersection with cybersecurity, and its potential to both strengthen and challenge security frameworks are also on the agenda.Learning Through EngagementOne of the standout aspects of Zero Trust World is its emphasis on education. From hands-on training and certification opportunities to interactive challenges—such as hacking a device to win it—attendees gain practical experience in real-world security scenarios. The event fosters a culture of learning, with participation from help desk professionals, CIOs, CTOs, and cybersecurity practitioners alike.The Power of CommunityBeyond the technical discussions, the event underscores the importance of community. Conferences like these are not just about discovering new technologies or solutions; they are about forging connections, sharing knowledge, and strengthening the collective approach to security.Zero Trust World 2025 is just getting started, and there's much more to come. Stay tuned as Sean and Marco continue to bring insights from the conference floor, capturing the voices that are shaping the future of cybersecurity.Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Speaking of Mol Bio
With knowledge comes great responsibility

Speaking of Mol Bio

Play Episode Listen Later Feb 12, 2025 35:37


Topics and terms such as biosafety, biosecurity, containment, and contamination are things most of us have heard of and think about at some level, but with the pace of molecular biology moving faster than ever, these are topics with implications that are reaching farther than ever. We're joined by Dr. Ryan Burnette and Dr. Lauren Richardson from Merrick and company for this episode, and they're ace communicators that help walk us through the expanding horizon and implications of these topics.This conversation starts on the basic topics, like what biocontainment is and what's needed for each of the four levels of biosafety labs, but it quickly moves beyond, shining a light on the security and containment needs for more than just the organisms. We hear about how the data and methods used to do modern molecular biology, as well as the data generated in the experiments, are equally precious and in need of protection and containment. With public health and safety on the line, and an acknowledgement that the pace of science moves faster than that of policy, we get into the idea of who really owns responsibility for protecting data. Your role might be more important than you know, so don't miss this conversation that will make you pause and think! Subscribe to get future episodes as they drop and if you like what you're hearing we hope you'll share a review or recommend the series to a colleague.  Visit the Invitrogen School of Molecular Biology to access helpful molecular biology resources and educational content, and please share this resource with anyone you know working in molecular biology. For Research Use Only. Not for use in diagnostic procedures.

ITSPmagazine | Technology. Cybersecurity. Society
From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story with Chase Doelling

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 11, 2025 43:12


IT and security teams are under constant pressure to streamline operations while maintaining strong security and compliance. In this Brand Story episode, Chase Doelling, Principal Strategist at JumpCloud, shares insights from the company's latest SME IT Trends Report. The discussion highlights key trends, challenges, and opportunities that IT teams face, particularly in small and medium-sized businesses (SMBs).The Role of IT in Business OperationsDoelling emphasizes the increasing responsibility placed on IT teams. Historically seen as cost centers, IT and security functions are now recognized as critical to business success. More organizations are merging IT and security efforts, ensuring that security considerations are built into every decision rather than being addressed reactively.A major takeaway from the report is the shift toward decentralization in IT decision-making. Departments are increasingly adopting tools independently, leading to an explosion of software-as-a-service (SaaS) applications. While this autonomy can boost efficiency, it also creates risks. Shadow IT—where employees use unauthorized tools—has become a top concern, with 88% of organizations identifying it as a risk.AI, Security, and IT InvestmentThe report also reveals a growing divide in AI adoption. Organizations are either moving aggressively into AI initiatives or staying completely on the sidelines. Those embracing AI often integrate it into security and IT operations, balancing innovation with risk management.Budget trends indicate that IT spending is rising, with security tools accounting for a significant portion. The need for robust cybersecurity measures has pushed organizations to prioritize visibility, access management, and compliance. A notable shift is occurring in remote and hybrid work models. While remote work surged in previous years, only 9% of organizations now report being fully remote. This return to office environments introduces new IT challenges, particularly in managing networks and devices across hybrid workplaces.How JumpCloud Supports IT TeamsJumpCloud's platform simplifies IT and security operations by unifying identity and access management, device management, and security policies. One key challenge IT teams face is visibility—knowing who has access to what systems and ensuring compliance with security policies. JumpCloud's approach allows organizations to manage users and devices from a single platform, reducing complexity and improving security posture.An example of JumpCloud's impact is its ability to detect and manage SaaS usage. If an employee tries to use an unauthorized tool, JumpCloud can guide them toward an approved alternative, preventing security risks without stifling productivity. This balance between security and efficiency is essential, particularly for SMBs that lack dedicated security teams.Looking Ahead: IT and Security ConvergenceDoelling teases upcoming research that will explore the relationship between IT and security teams. With these functions blending more than ever, organizations need insights into how to align strategies, resources, and budgets effectively.For IT and security professionals navigating a landscape of increased threats, shifting work environments, and AI-driven innovation, the insights from JumpCloud's research provide a valuable benchmark. To gain a deeper understanding of these trends and their implications, listen to the full episode and explore the latest SME IT Trends Report.Note: This story contains promotional content. Learn more. Guest: Chase Doelling, Principal Strategist, JumpCloud [@JumpCloud], On LinkedIn | https://www.linkedin.com/in/chasedoelling/ResourcesLearn more about JumpCloud and their offering: https://itspm.ag/jumpcloud-pg7zTo download the SME IT Trends Report: https://itspm.ag/jumpcljqywCatch more stories from JumpCloud at https://www.itspmagazine.com/directory/jumpcloudAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 7, 2025 23:34


Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 7, 2025 23:34


Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Autonomous IT
CISO IT – The CISO Blueprint pt. 1: Why There Are No 'Nos' in IT with Rich Casselberry, E15

Autonomous IT

Play Episode Listen Later Jan 16, 2025 9:26


In this episode of Automox's CISO IT podcast, host Jason Kikta welcomes back Rich Casselberry, VP of IT security at AT&I, to discuss key insights from the CISO Blueprint. The conversation emphasizes the importance of a positive approach to security, the role of automation in IT practices, and the necessity of delegation to enhance efficiency. Rich shares real-world examples illustrating how a solution-oriented mindset can lead to better security outcomes and how automation can free up valuable time for IT professionals.

Aprende SecTY podcast
EP4.48 ¿Cuál es el mejor marco de referencia para tu negocio?

Aprende SecTY podcast

Play Episode Listen Later Dec 24, 2024 25:03


¡APRENDE SecTY Podcast! EP4.48 ¿Cuál es el mejor marco de referencia para tu negocio? Cuando quieres poner en orden la ciberseguridad en tu negocio a veces necesitas una base de controles que te guíen, pero ¿cuál es el mejor marco de referencia para tu negocio? Pues te lo cuento en este episodio presentado por Aeronet. Te explico los pasos que necesitas para hacer tu análisis de impacto de tu negocio Este episodio es presentado por AeroNet. Empresa de tecnología 100% puertorriqueña, líder en soluciones de conectividad para negocios y residencias en Puerto Rico. Go Faster, Go Save. AeroNet Wireless - Reliable High Speed Internet (aeronetpr.com) ¡Escucha el video sobre este tema en el canal de YOUTUBE de Aprende SecTY y suscríbete! https://www.youtube.com/@aprendesecty/?sub_confirmation=1    Recuerda: Síguenos en Facebook, Instagram, X y LinkedIN como: @SecTYCS Envíame tus preguntas o recomendaciones a: aprende@sectycs.com Video recomendado: ¿Qué Cambió en el Cybersecurity Framework del NIST?:https://youtu.be/dpvZTUzgDIA   #ciberseguridad #SecurityAwareness #InformtaionTechnology #ITSecurity #Empoderamiento #Confianza #NIST #COBIT #ISACA #CIS #PCI #ISO27001 #marcosdereferencia #cybersecurityframework

The PowerShell Podcast
Miriam Wiesner on Identity Hygiene, Security Tools, and Finding Balance

The PowerShell Podcast

Play Episode Listen Later Dec 16, 2024 40:42


In this episode of the PowerShell Podcast, we sit down with Miriam Wiesner, a Senior Security Research Program Manager at Microsoft, to dive into the fascinating world of security and identity hygiene. Miriam shares her expertise on the GraphAPI and the critical importance of maintaining proper identity hygiene in today's digital landscape. We explore the day-to-day life of a security researcher and discuss how tools like script block logging can provide invaluable insights. Miriam also highlights the power of Kusto for analyzing data and solving complex challenges in the security space. In addition to technical insights, Miriam opens up about the challenges of maintaining a healthy work-life balance, offering a candid look at the human side of working in a demanding and impactful field. Guest Bio and links: Miriam C. Wiesner is a Sr. Security Research Program Manager at Microsoft with over 15 years of experience in IT and IT Security. She has held various positions, including Administrator/System Engineer, Software Developer, Premier Field Engineer, Program Manager, and Security Consultant and Pentester. She is also a renowned creator of open-source tools based in PowerShell, including EventList and JEAnalyzer. She was invited multiple times to present her research behind her tools at many international conferences like Black Hat (USA, Europe & Asia), PSConf EU, MITRE ATT&CK workshop, and more. Miriam is the author of the book "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers." Outside of work, Miriam is a dedicated wife and mother, residing with her family near Nuremberg, Germany. Previous episode with Miriam - https://www.youtube.com/watch?v=0Csw8YYGyCg&pp=ygUObWlyaWFtIHdpZXNuZXI%3D Practical PowerShell Empowerment For Protectors - https://www.youtube.com/watch?v=JgqbR-7O7TI&pp=ygUObWlyaWFtIHdpZXNuZXI%3D Echoes of Intrusion: Demystifying commonly used MS Graph API Attacks - https://www.youtube.com/watch?v=YDK5xYx1rKg&t=677s&pp=ygUObWlyaWFtIHdpZXNuZXI%3D PowerShell ❤️ the Blue Team - https://devblogs.microsoft.com/powershell/powershell-the-blue-team/ https://techcommunity.microsoft.com/blog/microsoftsentinelblog/the-power-of-data-collection-rules-detect-disabling-windows-defender-real-time-p/4236540 PowerShell Podcast Home page: https://www.pdq.com/resources/the-powershell-podcast/ Listen to the PowerShell Podcast: https://powershellpodcast.podbean.com/