Podcasts about jcdc

  • 24PODCASTS
  • 47EPISODES
  • 45mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Dec 11, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about jcdc

Latest podcast episodes about jcdc

The Gate 15 Podcast Channel
The Gate 15 Interview EP 53. CISA's JCDC, plus! Love for Boston, love for potatoes, love for cats, and love for cyber.

The Gate 15 Podcast Channel

Play Episode Listen Later Dec 11, 2024 51:40


In this episode of The Gate 15 Interview, Andy Jabbour speaks with Jeri Rogish and Mitchell Freddura, both with the Cybersecurity and Infrastructure Security Agency (CISA) and CISA's Joint Cyber Defense Collaborative (JCDC). Jeri serves as Deputy Chief of JCDC's Product Development Section and Mitch serves in the Partnerships Office. Jeri on LinkedIn. Mitch on LinkedIn. For further information about participating, email cisa.jcdc@cisa.dhs.gov. Discussed in the podcast: Jeri & Mitch's Backgrounds. JCDC background. How the JCDC is “uniting the global cyber community.” Best practices to support a “coordinated defensive cyber posture.” “Implementing comprehensive, whole-of-nation cyber defense plans” to address risks, coordinate action, and build national resilience. Building a joint understanding of challenges and opportunities for our nation's cyber defense. Networks of networks & private-public partnership  The NCIRP Public Comment period coming soon! We play Three Questions and talk moments from high school, favorite foods, big hearts and sports teams no one wants to hear about… Selected links: Joint Cyber Defense Collaborative (JCDC) CISA Launches New Joint Cyber Defense Collaborative (05 Aug 2021) JCDC Success Stories | CISA JCDC Artificial Intelligence Cyber Tabletop Exercise Series Shaping the legacy of partnership between government and private sector globally: JCDC Cybersecurity Resources for High-Risk Communities JCDC Builds Foundation for Pipelines Cyber Defense Planning Effort Additional resources: 2024 JCDC Priorities Enhanced Visibility and Hardening Guidance for Communications Infrastructure PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure Living off the Land (LoTL) Guidance Cybersecurity Resources for High-Risk Communities | CISA Securing Open Source Software in Operational Technology | CISA Improving Security of Open Source Software in Operational Technology and Industrial Control Systems

Cybercrime Magazine Podcast
Security Nudge. Assessing AI-Powered Threats. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 17, 2024 1:33


Generative AI is everywhere in today's businesses – and that includes the large criminal enterprises targeting you and your company with increasingly well-written, effective malware and phishing campaigns. Responding to these attacks requires a different approach to cybersecurity – and that is likely to vary from one business to another. Authorities at the US Joint Cyber Defense Collaborative, or JCDC, recently ran the first tabletop exercises to understand what threats AI poses – and with more than 50 experts involved, they found that many companies haven't fully thought through how they would identify an AI-driven attack, respond to it, or even who within the company has the appropriate AI expertise. If you're involved with cybersecurity at your company, make sure you're considering the unique threats that generative AI poses – including AI poisoning, automated development of malicious code, highly personalized phishing attacks, rapidly scaling attacks, and more. By developing actionable responses now, you can save your business a whole lot of issues down the track. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

@BEERISAC: CPS/ICS Security Podcast Playlist
Building Cybersecurity Robustness in Pipeline Operations Podcast

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 1, 2024 17:56


Podcast: Emerson Automation Experts (LS 23 · TOP 10% what is this?)Episode: Building Cybersecurity Robustness in Pipeline Operations PodcastPub date: 2024-07-25Manufacturers and producers across all industries know the challenges in keeping their operations cyber-secure. Industries such as pipeline transportation and electrical & gas distribution networks face additional challenges in the wide geographic spread of their operations and the need for reliance on public communications networks. In this podcast, I'm joined by Emerson cybersecurity expert Steve Hill to discuss these additional challenges and ways the companies in these industries, suppliers, and federal regulators are collaborating to develop and implement best practices for strong cyber resiliency. Give the podcast a listen and visit the SCADA Solutions & Software for Energy Logistics on Emerson.com and the AspenTech Digital Grid Management page for methods and solutions to improve your cybersecurity defenses and ongoing programs. Transcript Jim: Hi, everyone. This is Jim Cahill with another “Emerson Automation Experts” podcast. Pipelines cover a wide geographic area and require continuous monitoring for safe, efficient, and reliable operations. Today, I’m joined by Steve Hill to discuss the challenges pipeline operators face in keeping their pipeline networks cybersecure. Welcome to the podcast, Steve. Steve: Thanks, Jim. Pleasure to be here. Jim: Well, it’s great to have you. I guess, let’s get started by asking you to share your background and path to your current role here with us at Emerson. Steve: Thanks, yeah. I’ve been in the automation and SCADA industry for about 40 years, started on the hardware design and communications that then moved over to software. And it’s nearly 20 years I’ve been with Emerson. I joined as part of the Bristol Babcock acquisition. My main focus now is working in wide-area SCADA as the director of SCADA Solutions for Emerson, and most of that’s working in the oil and gas industry, working with Emerson sales and the engineering teams and our customers as they design systems and products for the industry. And also, alongside that, for the last few years, I’ve been collaborating with CISA. That’s the U.S. government Cybersecurity and Infrastructure Security Agency as part of the Joint Cyber Defense Collaborative. Jim: Okay. That’s a nice, varied background. That’s really good for our discussion. So, what exactly do you mean by wide-area SCADA? Steve: That’s a great question. There’s a SCADA system where the software is monitoring equipment across a very wide area. It might be a very large geographic area, like a pipeline or gas, or water distribution network, or perhaps a well field. I mean, some of the systems, for example, I was speaking to a customer last week who is monitoring an entire pipeline across Peru, and yet, their control centers are actually in Mexico. So, to do that kind of thing, the equipment is usually connected via public networks. You know, private networks don’t extend that far, and even the control centers may be widely distributed. And as part of that, compared to in-plant control, there’s an assumption that your communications are clearly not gonna be 100% perfect. You’re gonna lose communications either momentarily, like with cellular networks, and when, for example, like we’ve got in Texas this week, with natural events like hurricanes can cut communications for hours. But because these systems are all critical infrastructure, such as pipelines or electrical distribution, the actual operations, the process, must never be interrupted. Today, we’re talking about cybersecurity, and that same sensitivity is why these systems are now the target to some of the most sophisticated cyberattacks. Jim: Okay, that gives a picture of the breadth of these types of SCADA systems, and you had mentioned you’d work with CISA, the cybersecurity infrastructure defense agency, and the Joint Cyber Defense Collaborative, which I’ll just call JCDC for short. Can you give some more examples on that work? Steve: Yeah. Really, I could give you a bit of background. Probably many of our listeners know that there’s been several successful cyberattacks against critical infrastructure over the last few years. Probably the most famous in the pipeline industry was an attack that’s referred to as the Colonial Pipeline attack. That was actually a criminal ransomware attack that resulted in gasoline and jet fuel shortage across the Eastern U.S. for several days, and that was criminals basically trying to get money. And it was almost a random attack, it wasn’t targeted. However, there have been actual state-sponsored attacks, and probably the one that was most successful was prior to the Russian military attack against Ukraine. They actually instituted several successful cyberattacks against the Ukrainian power grid. And very concerning is, in recent months, the U.S. infrastructure, including pipelines, have been successfully infiltrated by a group that are called Volt Typhoon, who are thought to be from the People’s Republic of China. So JCDC and CISA are working hard to really counter and protect against these threats. Jim: Wow. Well, that’s clearly a huge concern. What is the JCDC doing to address these challenges? Steve: Well, in 2023, so last year, JCDC facilitated the development of something called the Pipeline Reference Architecture. Basically, Emerson, alongside other industry vendors and also pipeline operators, participated in the development of this Pipeline Reference Architecture, which I’ll refer to as the PRA. It’s a fairly short document that outlines the design and operating principles for SCADA systems in the pipeline industry. And one thing the government is keen to point out, it’s not a regulatory document, but it does set out the best principles and is intended as guidance for the industry. Really, they want to work with the industry to come up with best practices. Jim: Well, it sounds like this PRA is another set of standards to address cybersecurity. Why is another document needed in the industry where a bunch of standards exist now? Steve: Yeah, that’s a question I and other members get asked quite a lot. The main reason is that wide-area SCADA represents a very different set of challenges to traditional SCADA, which we refer to as inside the wire. So for example, a refinery or a manufacturing plant, everything is in one location. But as I mentioned before, wide-area SCADA has got a very wide displacement, physically. It also actually has a lot of remote field workers. There may be folks working on that system hundreds of miles from base, and you’re also using communications networks that are not even owned or operated by the owners of the pipeline. Though this PRA is really intended for the pipeline industry, clearly, it’s applicable to almost any wide-area SCADA, that’s water or electrical industry as well. Jim: Okay, that makes sense. So those are definitely challenges that don’t exist for more automation systems, as you say, inside the wire. Tell us more about how the PRA addresses these. Steve: Well, the big thing is segmentation, basically, taking the network and splitting it into different levels that represent different areas of the operation. For example, the internet would be what’s referred to as level zero, and moving all the way down to the bottom of the network, that’s level nine. And the levels in between that represent different levels of trust. Now, those who are familiar with cybersecurity and SCADA are probably familiar with something that is called the Purdue model, which I think first came out in the late 1980s, and that also splits up SCADA and control networks and actually business networks into different levels. However, when that came out, the internet was in its infancy. No one would ever have used the internet or even really public IP networks for their connectivity. So it doesn’t really take into account many of the things we take for granted today in these systems. So the PRA is intended to expand and take into account the reality that, for example, some of this critical data will actually be transiting across a public network, right? And in order to achieve that with this segmentation, we’re using a concept called Defense in Depth, right? And as you go down the different levels of the network, the assumption is you can trust each item on that network better. So, for example, on the internet, you don’t trust anything, but when you get down, let’s say, to the communications between an RTU [remote terminal unit] and a gas chromatograph on a local serial link, you might completely trust that. Now, it’s interesting, although that’s part of the PRA model, that does actually conflict with a security concept called Zero Trust, which is something that Emerson has really based our products on. But both zero trust and defense in depth are valid. Jim: Now, you had mentioned a couple of concepts I’d like to explore a little bit more in there, and let’s start with zero trust. Can you explain that concept to us? Steve: Oh, yeah. Yeah. Zero trust is a concept where any piece of equipment or software should trust nothing. Don’t trust anything else on the network, don’t trust the network to be safe, and it should not rely on anything else for protection. And historically, SCADA was protected, for example, by firewalls. You would use insecure products that were known to not be secure because they were developed perhaps 20 or 30 years ago and hide them behind firewalls, and that’s really how we’ve handled security today. But there’s a realization you can’t do that. So we now need to design products so that they don’t trust anything. But the reality is many of our customers, Emerson’s customers and pipeline operators, have devices that were installed perhaps 30 years ago. That’s the typical lifespan of some RTUs and controllers in this industry. So as a result, when you get down to the lower levels of the network, zero trust doesn’t work. So you do have to have levels of additional protection. So for example, if you had a Modbus link, which is basically insecure almost by design, that should be protected by additional levels of firewalls and so on. But if you’re designing a modern product, it should be designed so it doesn’t rely on anything else. And that’s the concept of zero trust. Jim: Okay, got it. So don’t trust anything. Everything must be proven out. And the other concept you talked about was defense in depth. So, what does that mean? Steve: Well, the phrase is most commonly used where we’re talking about a network with multiple levels in. So when you come from, for example, the internet into your business network, you would have a set of firewalls and what’s called the demilitarized zone. And then when you go from your business network down to your controls network, you’d have another set of firewalls. So it’s multiple levels of protection. However, that same concept should be used actually within products as well. And, in fact, Emerson takes that very seriously with our secure development lifecycle certifications, IEC 62443, and how we design those products. Jim: Well, that’s good. As you get those two and as you put in more modern technology, that it complies and has that cybersecurity built into mind there. So, can you give us an example of how it’s built in? Steve: Yeah. That great one. If I take, for example, the Emerson FB3000 RTU, that’s a flow computer and a controller device that’s designed specifically for the oil and gas industry, especially for pipelines, an obvious concern is that that may be attacked externally to modify the firmware. Now, at the first level, the RTU itself has secure protocols. It uses something called DNP3, which would, in theory, provide access to the device. But then the firmware, when we issue new firmware, we put it on a website so we have protection of the website, we also publish a hash, which is basically a unique key that the customer downloading the firmware can check. It hasn’t been modified by anyone attacking the website. But then, when they actually put it into the RTU, so they’re updating firmware, the RTU will check that that firmware was developed by Emerson and was intended for that device. It does that by certifying certificates on the load. Now, once it’s in the device and it’s running in the field, you might say, “Well, the task is done,” but there’s an additional level of protection. It will continually and on boot, check that firmware, make sure the certificate still matches, it’s not being changed. And if it has been changed, it will actually revert to a known good factory firmware that’s basically embedded in the device. So you can see that there’s really five or six different things all checking and ensuring that firmware in that device was not compromised. So basically, multiple levels within the device, and in addition, there’s multiple levels on the network. So the bad guys have to get through a lot of different levels to damage or compromise the device. And we’re trying to do that with everything we design today. Jim: Yeah. And with modern cryptography and making any change completely will change that hash and everything and make it impossible to slip something in without it being noticed. So that’s really a nice thing. Steve: Yeah. And the fact that even if it detects it, it then goes back to factory firmware, which may be a slightly older version, but your operation will keep running. It will keep controlling, which is a very nice feature. Jim: Yeah, that’s a great example there. I guess, going back to the PRA, what else does it include other than the segmentation that you discussed? Steve: There’s about 10 high-level principles that cover aspects of the design and operation of the SCADA system. And for each of these, there’s various examples and guidance on how to actually follow the principle in a real-world system. So, for example, there was a whole section on how to manage third-party devices in the contractors, because on a pipeline system, you’re almost certainly gonna have, for example, engineers from Emerson coming in from third parties. So it gives examples on the real-world aspects of operating the system. Jim: Are there other examples from it you can share? Steve: Yeah. One important one is when you’re designing the system, you should identify and document all of the different data flows that occur. And that’s, when I say data flow, communications or conversation between different pieces of equipment. So, for example, this RTU may communicate with that SCADA platform on this particular machine and may communicate with a measurement system on another machine, document all of those data flows, and then deny all other data flows by default. Then, after the system is running, continually monitor it passively. And if you see an additional communication, say, between two pieces of equipment that normally never communicated or didn’t communicate on a particular IP socket, flag that immediately, because it may be something that’s going on that was unexpected. It certainly was outside the original design of the system. Jim: This has been very educational. Thank you so much, Steve. Where can our listeners go to learn more? Steve: Well, really a couple of places. If you go to the CISA blog, which is at www.cisa.gov/news-events, there’s details there. The actual PRA was published on March the 26th of this year. And also, if you want to discover more about Emerson’s involvement in wide-area SCADA and the cybersecurity associated with it, if you go to Emerson.com/SCADAforEnergy, you’ll find some information there. Jim: Okay, great. And I’ll add some links to that and to some of the other things we discussed in the transcript. Well, thank you so much for joining us today, Steve. Steve: Not a problem. It’s a pleasure. -End of transcript-The podcast and artwork embedded on this page are from Emerson Team, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 69. Summer Scams & CISA is BIG TIME! Terror Alarms, NTAS Bulletins and FUD! Living on the Edge! Hurricane Season!

The Gate 15 Podcast Channel

Play Episode Listen Later Jun 18, 2024 34:43


In the Weekly Security Sprint, Andy and Jen covered the following topics. Opening. TLP:CLEAR | FB-ISAO Newsletter H2OSecCon Spring 2024: A Resounding Success in Water and Wastewater Sector Security.   Security Awareness/Scams/PSA | Vacation Planning and Travel Scamming Protect Yourself from Summer Vacation Scams: Stay Cyber Aware During Your Vacation Phone Scammers Impersonating CISA Employees CISA - National Internet Safety Month: This June, Take 4 Easy Steps to Stay Safe Online Other Notables – I love when big orgs put money where their mouth is… America's rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that   Summer Scams & CISA is BIG TIME! Protect Yourself from Summer Vacation Scams: Stay Cyber Aware During Your Vacation Phone Scammers Impersonating CISA Employees CISA - National Internet Safety Month: This June, Take 4 Easy Steps to Stay Safe Online.    Terror Alarms, NTAS Bulletins and FUD! 8 people with suspected ties to ISIS arrested in Philly, NYC and LA: Sources Feds arrest 8 Tajik nationals in US after surveillance abroad found potential ties to terrorism, sources say Pressure mounts on Biden admin to issue national terrorism alert after arrest of suspected ISIS-tied border crossers.  Related Reminder: DHS Continues to See High Risk of Foreign and Domestic Terrorism in 2024 Homeland Threat Assessment. Turner says US is at ‘highest level of a possible terrorist threat' New York Threat 'Extremely Serious,' Official Warns, as ISIS Crosses Border Dr. Paul Leads Letter Requesting Hearing on Threat of Terrorists Exploiting Southern Border Threats of terrorism in the U.S. are ‘more diverse and difficult to counter.' Recorded Future: Israel-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024 Fort Worth Man Charged With Threatening Federal Agent: ‘Guns Will Come Out.' Arizona Man Charged with Selling Guns for Use in Mass Shooting Man arrested in New York City with a gun, 8 loaded magazines, an NYPD vest and other weapons   Vulnerability Management: Living on the Edge! Edge Devices: The New Frontier for Mass Exploitation Attacks2024 Attack Intelligence Report   Hurricane Season! CSU: Forecast for 2024 Hurricane Activity   AI/Preparedness/Resilience CISA, JCDC, Government and Industry Partners Conduct AI Tabletop Exercise Joint Cyber Defense Collaborative (JCDC) Artificial Intelligence Cyber Tabletop ExerciseRoadmap for AI Scenario Document | Joint Cyber Defense Collaborative Artificial Intelligence Cyber Tabletop Exercise   Quick Hits Executive Order on White House Council on Supply Chain Resilience Alleged Boss of ‘Scattered Spider' Hacking Group Arrested How Email Scammers Hit Arlington, Mass., Covered Their Tracks Europol: Announcement of two major actions targeting terrorist propaganda online on a global scale Major takedown of critical online infrastructure to disrupt terrorist communications and propaganda Attorney General Merrick B. Garland Statement on FBI's Quarterly Uniform Crime Report FBI Releases 2024 Quarterly Crime Report and Use-of-Force Data Update IIJ REMVE Initiative: Addressing the Threat of REMVE Radicalization to Violence in the Americas Terrorist Designations of Nordic Resistance Movement and Three Leaders Global leader of ISIS targeted and possibly killed in U.S. airstrike Joint U.S.-Türkiye Designations of an ISIS Smuggling Network Teenager's chilling five-word warning as he plotted suicide bomb attack on synagogue 'Neo Nazi' knifeman attacks two children, leaving 12-year-old seriously wounded at Finnish shopping centre Catoosa County man charged with terroristic threats after posting videos online Nashville school shooter's violent rant REVEALED at last: Audrey Hale wrote about her 'torture' as a trans girl and how she would 'kill' to get puberty blockers Aghan teen arrested for knife attack on women in Germany ISIS tells Americans they'll 'drink their blood' in terrifying promise to attack  

The CyberWire
CISA's calls for a JCDC makeover.

The CyberWire

Play Episode Listen Later Jun 6, 2024 29:38


CSAC recommends key changes to the  Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers to deploy crypto miners. Our guest is Danny Allen, Snyk's CTO, discussing how in the rush to implement GenAI, some companies are bypassing best practices and security policies. Club Penguin fans stumble upon a cache of secrets in the house of mouse. Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest is Danny Allen, Snyk's CTO, discussing how in the rush to implement GenAI, companies bypass best practices and security policies. This highlights a clear gap between those in leadership looking to adopt AI tools and the teams who are utilizing them. Learn more in Snyk Organizational AI Readiness Report.  Selected Reading CISA advisors urge changes to JCDC's goals, operations, membership criteria (The Record) CISA says 'patch now' to 7-year-old Oracle WebLogic bug (The Register) Snowflake says users with single-factor authentication targeted in attack (SC Media) Advance Auto Parts stolen data for sale after Snowflake attack (Bleeping Computer) Major Publishers Sue Google Over Ads for Pirated Ebooks (Publishing Perspectives) FBI unveils 7,000 decryption keys to aid LockBit victims (Silicon Republic)  Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit (GB Hackers) Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers (Trend Micro) Club Penguin fans breached Disney Confluence server, stole 2.5GB of data (Bleeping Computer)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Appalachian Imagination
Jim Bryant- Veteran's Memorial

Appalachian Imagination

Play Episode Listen Later Mar 30, 2024 69:49


First off we want to thank all the men and women who have served or are serving in the United States Military! They have all put their life on the line to protect our freedom and we are forever grateful for each and every one. Jim sat down with Jason and shared his story of life in the United States Army. He has lived in several other countries while serving and also fought in the Vietnam War. Jim along with some other veterans a few years back set out to get a Veterans Memorial built and established in Jackson County, Kentucky. Their efforts were a huge success! The Jackson County Veteran's Monument and Memorial is in memory of and to honor the men and women of Jackson County that have served this great nation to preserve the freedom we enjoy today. The pentagram shaped memorial's 5 sides represent all branches of our military. Army, Navy, Coast Guard, Air Force, and Marines. The Jackson County Veterans Memorial is located at- 20 McCammon Ridge Road-McKee, Kentucky 40447 GPS:37.41898,-83.96929 Thank you to the JCDC and all the inmates who maintain the beautiful park! When you visit, please be kind and respectful. Toward the end of this episode Jim gives us a couple of wonderful stories as a bonus! The first is a more detailed Storie of The Pigg cemetery. Three Brothers are buried there side by side that died within six months of each other from an STD they picked up in New Orleans during the Civil War. The second story is of a lady that Jim's grandfather found who had passed away while traversing through, what is now part of the Daniel Boone National Forest. Her name was Matilda Hurst (Tildy Hump). She was of a drifter type nature and the story goes that, her husband had left her years before, taking their young daughter with him. After that Tildy spent her life, waking through Eastern Kentucky in search of her husband and child. We thank God for each and every story that we are able to preserve! We thank You for listening and your ongoing support! We also thank our sponsors-The Jackson County Sun, WWAG Wagon Country, The Jackson County Extension Office, Spokeless Wheel Farm, Living Stone Outreach, John Caywood. Website appalachianimagination.com for more pictures and stories YouTube https://www.youtube.com/@appalachianimagination2023 Facebook https://m.facebook.com/groups/611983497073260/?ref=share&mibextid=S66gvF If you would like to contact us for any reason email appalachianimagination@gmail.com Stay Awesome Appalachia! --- Send in a voice message: https://podcasters.spotify.com/pod/show/robert-bowman42/message Support this podcast: https://podcasters.spotify.com/pod/show/robert-bowman42/support

The CyberWire
When it rains, it pours.

The CyberWire

Play Episode Listen Later Mar 22, 2024 33:35


Advanced wiper malware hits Ukraine. Nemesis gets dismantled. Apple deals with an unpatchable vulnerability. FortiGuard rises to the rescue. CISA and FBI join forces against DDoS attacks. US airlines data security and privacy policies are under review. Hackers hit thousands in Jacksonville Beach. Geoffrey Mattson, CEO of Xage Security  sits down to discuss CISA's 2024 JCDC priorities. And Hotel keycard locks can't be that hard to crack. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Geoffrey Mattson, CEO of Xage Security, joins us to discuss CISA's 2024 JCDC priorities. You can connect with Geoff on LinkedIn and learn more about Xage Security on their website and read about the JCDC 2024 Priorities here.  Geoff's interview first appeared on March 21st's episode of T-Minus Space Daily. Check out T-Minus here.  Selected Reading Sandworm-linked group likely knocked down Ukrainian internet providers (The Record)  AcidPour wiper suspected to be used against Ukrainian telecom networks (SC Media) Never-before-seen data wiper may have been used by Russia against Ukraine (Ars Technica) AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine (SentinelOne) F5, ScreenConnect vulnerabilities leveraged in global Chinese cyberattacks (SC Media) Nemesis darknet marketplace raided in Germany-led operation (The Record) Unpatchable vulnerability in Apple chip leaks secret encryption keys (Ars Technica) Exploit Released For Critical Fortinet RCE Flaw: Patch Soon! (GBHackers on Security)  CISA & FBI Released Guide to Respond for DDoS Attacks (Cyber Security News)  CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques (CISA)  US airlines' data security, privacy policies to be under federal review (SC Media)  Jacksonville Beach and other US municipalities report data breaches following cyberattacks (The Record)  Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds (WIRED)   Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

T-Minus Space Daily
In this ever changin' world, you've got to live and let fly.

T-Minus Space Daily

Play Episode Listen Later Mar 21, 2024 32:01


Rocket Lab launches the NROL-123 satellite for the National Reconnaissance Office, from the Mid-Atlantic Regional Spaceport within NASA Wallops in Virginia. Varda Space has released results from its first orbital drug manufacturing mission called Winnebago-1. Roscosmos aborts the Soyuz MS25 mission 20 seconds ahead of liftoff, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Geoffrey Mattson, CEO of Xage Security. You can connect with Geoff on LinkedIn and learn more about Xage Security on their website and read about the JCDC 2024 Priorities here. Selected Reading Rocket Lab Successfully Launches Fifth National Security Mission for NRO Live coverage: Dragon flights return to Cape Canaveral's pad 40 with SpaceX's 30th cargo mission to the Space Station – Spaceflight Now Return of the Ritonavir: A Study on the Stability of Pharmaceuticals Processed in Orbit | Biological and Medicinal Chemistry | ChemRxiv | Cambridge Open Engage Advanced Space Demonstrates Artificial Intelligence for Spacecraft Autonomy at the Moon NanoAvionics selects Neuraspace for Enhanced Safety and Sustainability in Space Operations Sidus Space Establishes Two-Way Communications with State-of-the-Art Hybrid 3D-Printed LS-1 Satellite- Business Wire TTTech Aerospace and Réaltra collaborate on compact TTEthernet switch solution for space applications ReOrbit Signs MoU with SatSure and KaleidEO to Offer Comprehensive Space Infrastructure Solution China launches relay satellite Queqiao-2 for Earth-moon communication - CGTN Soyuz MS-25 set to launch to the International Space Station with crew from Russia, Belarus, and NASA - NASASpaceFlight.com Four Veteran Space Industry Leaders Join Astrobotic as the Company Builds Griffin-1 Russia warns US against using SpaceX for spying Space Force hosts annual Guardian Field Forum- United States Space Force  High School Students Contribute to Exoplanet Discovery T-Minus Crew Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
DOJ strikes justice.

The CyberWire

Play Episode Listen Later Feb 12, 2024 36:31


The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coordination with CISA and the JCDC. Wired looks at the effect of cyberattacks on inequality. Our guest is Manny Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking cyber career opportunities for young people. And this thumb drive will self-destruct in five seconds. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Manuel "Manny" Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking career opportunities for young people who are interested in cyber and emergent technology. US Cyber Initiative grew out of AZ Cyber. Learn more about AZ Cyber here.  Selected Reading DOJ shuts down ‘Warzone' malware vendor and charges two in connection (The Record) Ransomware attack forces 18 Romanian hospitals to go offline (BleepingComputer) Decryptor for Rhysida ransomware is available (Help Net Security) Canada moves to ban the Flipper Zero amid rising auto theft concerns (TECHSPOT) China's Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage (SentinelOne) ‘Doxxing' laws to be brought forward after Jewish WhatsApp leak  (The Sydney Morning Herald) Exclusive: Duke Energy to remove Chinese battery giant CATL from Marine Corps Base (Reuters) Federal IT officials call on CISA for tougher standards, more coordination (FedScoop) Priorities of the Joint Cyber Defense Collaborative for 2024 (CISA) The Hidden Injustice of Cyberattacks (WIRED) Ovrdrive USB stick with data-hiding and overheating self-destruct features nears crowdfunding goal (TechSpot) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
Thu Feb-8-2024: Google Unveils Gemini Ultra and Revamps AI Strategy, Automation Nation, JCDC Turmoil

Business of Tech

Play Episode Listen Later Feb 8, 2024 10:14


In this episode of the Business of Tech podcast, Dave Sobel discusses three important developments in the tech industry. First, Google revamps its AI strategy and introduces Gemini Ultra, its most advanced language model. Google also launches a new Google One tier with enhanced features. Next, ConnectWise unveils advanced RPA and AI capabilities at Automation Nation 2024 in Tampa. Finally, the podcast delves into the setbacks faced by JCDC in their cybersecurity efforts, including conservative scrutiny and internal issues. Three things to know today00:00 Google Revamps AI Strategy: Unveils Gemini Ultra and Launches New Google One Tier with Enhanced Features05:45 Automation Nation 2024: ConnectWise Unveils Advanced RPA and AI Capabilities in Tampa06:58 JCDC's Setback: How Conservative Scrutiny and Internal Issues Challenge Cybersecurity Efforts  Supported by:  https://coreview.com/msp/    Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftech

The CyberWire
Taking a bite out of Apple.

The CyberWire

Play Episode Listen Later Feb 7, 2024 37:49


A security researcher has been charged in an alleged multi-million dollar theft scheme targeting Apple. A House committee hearing explores OT security. Fortinet withdraws accidental CVEs. 2023 saw record highs in ransomware payments. A youtuber finds a cheap and easy bypass for Bitlocker encryption. Political pressure proves challenging for the JCDC. New Hampshire tracks down those fake Biden robocalls. European security agencies bolster warnings about Ivanti devices. HHS fines a New York medical center millions over an identity theft ring. On our sponsored Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, shares some practical examples of healthcare organizations transitioning to the cloud. Giving that toothbrush story the brushoff. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some practical examples in healthcare. Selected Reading A Security Researcher Allegedly Scammed Apple (404 Media) US House Homeland Security subcommittee addresses OT threats, CISA's role in securing OT - Industrial Cyber (Industrial Cyber) Operational Technology disruptions: An eye on the water sector. Robert M. Lee's opening statement to before the U.S. Congressional Subcommittee on Cybersecurity and Infrastructure Protection. (Control Loop podcast) Securing Operational Technology: A Deep Dive into the Water Sector (Homeland Security Events YouTube) Fortinet Patches Critical Vulnerabilities in FortiSIEM (SecurityWeek) Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error (Bleeping Computer) Ransomware hackers raked in $1 billion last year from victims (NBC News) BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPM (Tom's Hardware) The far right is scaring away Washington's private hacker army (POLITICO) N.H. attorney general says he found source of fake Biden robocalls (NBC News) European security agencies publish joint statement on Ivanti Connect Secure, Policy Secure vulnerabilities (Industrial Cyber) Medical Center Fined $4.75M in Insider ID Theft Incident (GovInfoSecurity) Surprising 3 Million Hacked Toothbrushes Story Goes Viral—Is It True? (Forbes) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
joint cyber defense collaborative (JCDC) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Oct 3, 2023 7:25


A cyber information-sharing U.S. Government organization designed to foster the public-private partnership. CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao

Word Notes
joint cyber defense collaborative (JCDC) (noun)

Word Notes

Play Episode Listen Later Oct 3, 2023 7:25


A cyber information-sharing U.S. Government organization designed to foster the public-private partnership. CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao Learn more about your ad choices. Visit megaphone.fm/adchoices

CyberCast
Season 5 Episode 18 - JCDC Strengthens U.S. Cyber Posture Through Global Partnerships

CyberCast

Play Episode Listen Later Sep 20, 2023 36:04


JCDC Partnerships International, which sits within CISA's cybersecurity division, works with 150 partners worldwide with the goal of sharing and exchanging critical information allowing the U.S. to respond to cyber threats faster, protect the country's critical infrastructure more effectively and relay that information to its international counterparts to do the same. Patricia Soler, Section Chief for JCDC Partnerships International at CISA, discusses the mechanisms that a fast-growing organization like CISA needs to have in place to process large volumes of information that can be shared with public and private sectors and its international partners. She also talks about CISA's ransomware notifications that alert organizations of a ransomware attack before the damage occurs.

@BEERISAC: CPS/ICS Security Podcast Playlist
Asset inventory: Part of ICS network visibility and monitoring.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 5, 2023 46:28


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 33 · TOP 5% what is this?)Episode: Asset inventory: Part of ICS network visibility and monitoring.Pub date: 2023-05-03Hacktivists versus irrigation. Maritime cybersecurity. JCDC and pre-ransomware notification. Ransomware at Fincantieri Marinette Marine. NSA warns of Russian ransomware disrupting supply chains. Guest Mike Hoffman is Technical Leader Global Services at Dragos & a SANS instructor. Mike will be discussing IT/OT misalignment.. In the Learning Lab, Dragos' Mark Urban is joined by Dragos's Senior Product Manager Jordan Wilkerson to dig into ICS network visibility and monitoring, which is the third of the SANS Institute's 5 ICS Cybersecurity Critical Controls. Control Loop News Brief.Hacktivists versus irrigation. Irrigation Systems in Israel Hit with Cyber Attack that Temporarily Disabled Farm Equipment (CPO Magazine)Maritime cybersecurity. Full Steam Ahead: Enhancing Maritime Cybersecurity (CSC 2.0)Cyber experts call for CISA to establish maritime equipment test bed (FedScoop)JCDC and pre-ransomware notification. JCDC Cultivates Pre-Ransomware Notification Capability. (CISA)Ransomware at Fincantieri Marinette Marine.Ransomware Attack Hits Marinette Marine Shipyard, Results in Short-Term Delay of Frigate, Freedom LCS Construction (USNI News)Russian ransomware operations aim at disrupting supply chains into Ukraine.NSA sees ‘significant' Russian intel gathering on European, U.S. supply chain entities (CyberScoop)ETHOS: a new private-sector OT risk information-sharing platform.OT Cybersecurity Leaders to Deliver First Open-Source Information Sharing for Collective Early Warning in Critical Infrastructure (Globe Newswire)Control Loop Interview.The interview is with Mike Hoffman, Technical Leader Global Services at Dragos & SANS instructor, discussing the IT/OT misalignment that often occurs when IT counterparts take on the responsibility of carrying out vulnerability management in the OT space.Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos Senior Product Manager Jordan Wilkerson to discuss the third of the SANS Institute's 5 ICS Cybersecurity Critical Controls: ICS network visibility and monitoring.Background link: The Five ICS Cybersecurity Critical ControlsControl Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control Loop: The OT Cybersecurity Podcast
Asset inventory: Part of ICS network visibility and monitoring.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later May 3, 2023 46:28


Hacktivists versus irrigation. Maritime cybersecurity. JCDC and pre-ransomware notification. Ransomware at Fincantieri Marinette Marine. NSA warns of Russian ransomware disrupting supply chains. Guest Mike Hoffman is Technical Leader Global Services at Dragos & a SANS instructor. Mike will be discussing IT/OT misalignment.. In the Learning Lab, Dragos' Mark Urban is joined by Dragos's Senior Product Manager Jordan Wilkerson to dig into ICS network visibility and monitoring, which is the third of the SANS Institute's 5 ICS Cybersecurity Critical Controls.  Control Loop News Brief. Hacktivists versus irrigation.  Irrigation Systems in Israel Hit with Cyber Attack that Temporarily Disabled Farm Equipment (CPO Magazine) Maritime cybersecurity.  Full Steam Ahead: Enhancing Maritime Cybersecurity (CSC 2.0) Cyber experts call for CISA to establish maritime equipment test bed (FedScoop) JCDC and pre-ransomware notification.  JCDC Cultivates Pre-Ransomware Notification Capability. (CISA) Ransomware at Fincantieri Marinette Marine. Ransomware Attack Hits Marinette Marine Shipyard, Results in Short-Term Delay of Frigate, Freedom LCS Construction (USNI News) Russian ransomware operations aim at disrupting supply chains into Ukraine. NSA sees ‘significant' Russian intel gathering on European, U.S. supply chain entities (CyberScoop) ETHOS: a new private-sector OT risk information-sharing platform. OT Cybersecurity Leaders to Deliver First Open-Source Information Sharing for Collective Early Warning in Critical Infrastructure (Globe Newswire) Control Loop Interview. The interview is with Mike Hoffman, Technical Leader Global Services at Dragos & SANS instructor, discussing the IT/OT misalignment that often occurs when IT counterparts take on the responsibility of carrying out vulnerability management in the OT space. Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos Senior Product Manager Jordan Wilkerson to discuss the third of the SANS Institute's 5 ICS Cybersecurity Critical Controls: ICS network visibility and monitoring. Background link:  The Five ICS Cybersecurity Critical Controls Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

@BEERISAC: CPS/ICS Security Podcast Playlist
The challenges of carrying out vulnerability management.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 8, 2023 34:47


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 33 · TOP 5% what is this?)Episode: The challenges of carrying out vulnerability management.Pub date: 2023-04-05The Vulkan Papers. The Cyberspace Solarium Commission recommends that CISA set up a test bed to improve maritime cybersecurity. Dragos CEO on critical infrastructure cybersecurity. The JCDC's pre-ransomware notification efforts. Guest Mike Hoffman, Technical Leader Global Services at Dragos & a SANS instructor, discusses challenges carrying out vulnerability management. In the Learning Lab, Dragos' VP Product & Industry Market Strategy Mark Urban concludes his two-part discussion about industrial cyber threat intel & collective intelligence with Seth Lacy, Principal Threat Hunter at Dragos.Control Loop News Brief.The Vulkan Papers. A Look Inside Putin's Secret Plans for Cyber-Warfare (Der Spiegel)Secret trove offers rare look into Russian cyberwar ambitions (The Washington Post)Maritime cybersecurity.Full Steam Ahead: Enhancing Maritime Cybersecurity (Cyberspace Solarium Commission 2.0)Cyber experts call for CISA to establish maritime equipment test bed (FedScoop)Dragos CEO on critical infrastructure cybersecurity.Full Committee Hearing to Examine Cybersecurity Vulnerabilities to the United States' Energy Infrastructure (Senate Committee on Energy and Natural Resources)JCDC and pre-ransomware notification.JCDC Cultivates Pre-Ransomware Notification Capability (CISA)Getting Ahead of the Ransomware Epidemic: CISA's Pre-Ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs (CISA)Control Loop Interview.The interview is with Mike Hoffman, Technical Leader Global Services at Dragos & SANS instructor, discussing challenges carrying vulnerability management.Control Loop Learning Lab.In Part 2 of 2, Dragos' VP Product & Industry Market Strategy Mark Urban speaks with Seth Lacy, Principal Threat Hunter at Dragos, about industrial cyber threat intel & collective intelligence. Industrial Cyber Threat Intel & Collective Intelligence links: Neighborhood Keeper in the Broader Context of Cyber Threat Intelligence Using Trend Analysis to Operationalize OT Threat Intelligence with Neighborhood Keeper Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control Loop: The OT Cybersecurity Podcast
The challenges of carrying out vulnerability management.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Apr 5, 2023 34:47


The Vulkan Papers. The Cyberspace Solarium Commission recommends that CISA set up a test bed to improve maritime cybersecurity. Dragos CEO on critical infrastructure cybersecurity. The JCDC's pre-ransomware notification efforts. Guest Mike Hoffman, Technical Leader Global Services at Dragos & a SANS instructor, discusses challenges carrying out vulnerability management. In the Learning Lab, Dragos' VP Product & Industry Market Strategy Mark Urban concludes his two-part discussion about industrial cyber threat intel & collective intelligence with Seth Lacy, Principal Threat Hunter at Dragos. Control Loop News Brief. The Vulkan Papers. A Look Inside Putin's Secret Plans for Cyber-Warfare (Der Spiegel) Secret trove offers rare look into Russian cyberwar ambitions (The Washington Post) Maritime cybersecurity. Full Steam Ahead: Enhancing Maritime Cybersecurity (Cyberspace Solarium Commission 2.0) Cyber experts call for CISA to establish maritime equipment test bed (FedScoop) Dragos CEO on critical infrastructure cybersecurity. Full Committee Hearing to Examine Cybersecurity Vulnerabilities to the United States' Energy Infrastructure (Senate Committee on Energy and Natural Resources) JCDC and pre-ransomware notification. JCDC Cultivates Pre-Ransomware Notification Capability (CISA) Getting Ahead of the Ransomware Epidemic: CISA's Pre-Ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs (CISA) Control Loop Interview. The interview is with Mike Hoffman, Technical Leader Global Services at Dragos & SANS instructor, discussing challenges carrying vulnerability management. Control Loop Learning Lab. In Part 2 of 2, Dragos' VP Product & Industry Market Strategy Mark Urban speaks with Seth Lacy, Principal Threat Hunter at Dragos, about industrial cyber threat intel & collective intelligence.  Industrial Cyber Threat Intel & Collective Intelligence links: Neighborhood Keeper in the Broader Context of Cyber Threat Intelligence Using Trend Analysis to Operationalize OT Threat Intelligence with Neighborhood Keeper Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Appalachian Imagination
Quentin Smith- Big Q

Appalachian Imagination

Play Episode Listen Later Apr 1, 2023 82:51


This interview with Quentin was recorded in the Jackson County Detention Center. He tells us his story of life, the mistakes he has made,and his goal of a better life after his time is served. He comes from a holler in Leslie County Ky, and now calls Jackson County home "even when he gets out of jail " We thank the JCDC for allowing us to interview and record on location with Q! We thank God for the wonderful world of Appalachia and it's people! We thank our sponsors Living Stone Outreach and WWAG wagoncountry.com We thank you for taking the time to listen, and telling your friends and neighbors about the podcast! A big thank you to Amy Bowman and Elizabeth Harrison for all of their work on the social media pages! If you would like to sponsor an episode or become an advertiser email us at appalachianimagination@gmail.com or call/text Jason at 606-975-1743. Remember to stay humble, be kind, and no matter what, Stay AWESOME APPALACHIA!!!! --- Send in a voice message: https://podcasters.spotify.com/pod/show/robert-bowman42/message Support this podcast: https://podcasters.spotify.com/pod/show/robert-bowman42/support

The CyberWire
Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.

The CyberWire

Play Episode Listen Later Mar 24, 2023 29:13


A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the National Cybersecurity strategy from our special guests, Adam Isles, Principal at the Chertoff Group and Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology with the National Security Council. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/57 Selected reading. JCDC Cultivates Pre-Ransomware Notification Capability (Cybersecurity and Infrastructure Security Agency CISA) US cyber officials make urgent push to warn businesses about vulnerabilities to hackers (CNN) Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA) New CISA tool detects hacking activity in Microsoft cloud services (BleepingComputer) CISA Releases Six Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) The Microsoft Reply Attack (Avanan) More victims emerge from Fortra GoAnywhere zero-day attacks (Security |  More Clop GoAnywhere attack victims emerge (SC Media)  Mass-Ransomware Attack on GoAnywhere File Transfer Tool Exposes Companies Worldwide (Medium)  City of Toronto confirms data theft, Clop claims responsibility (BleepingComputer)  Canadian movie chain Cineplex among the victims of GoAnywhere MFT hack (Financial Post)  Personal data of Rio Tinto's Aussie staff may have been hacked - memo (Reuters)  Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy (Heimdal Security Blog)  Using Starlink Paints a Target on Ukrainian Troops (Defense One) As CISA chief notes lack of Russian cyberattacks against US, experts focus on enhancing nuclear reactor security (Utility Dive) Using Deception to Learn About Russian Threat Actors (Security Boulevard)

CyberCast
Season 5 Episode 3 - Cyber Defenders, Assemble! New Initiatives Address Cyber Risk

CyberCast

Play Episode Listen Later Feb 8, 2023 27:26


CISA's Joint Cyber Defense Collaborative (JCDC) announced a 2023 planning agenda to stay ahead of persistent cybersecurity threats to federal agencies, such as supply chain risk and open-source software. Learn why these threats are so high profile and how federal agencies across defense, health and civilian sectors are working together to share critical information about cybersecurity risks and incidents. Don't miss a fascinating tangent where we decide which superhero represents which federal agency.

Perspectives with Condace Pressley
Perspectives S34/Ep 46 What's with the rise in antisemitism in the US?

Perspectives with Condace Pressley

Play Episode Listen Later Dec 5, 2022 25:00


During the holidays each year, the Jewish Christian Discovery Center (JCDC) distributes wooden Jewish Star of David Christmas Tree ornaments at metro Atlantad churches for parishioners to hang on their Christmas Trees. JCDC says it is a way to share Jesus' Jewish upbringing with Christians and to show respect for each others' faith. Given the recent rise in antisemitism. we talk with Rabbi Albert Slomovitz, a professor at Kennesaw State University about the JCDC project and get his perspective on antisemitism in the news.

The CyberWire
OpenSSL indeed patched. CISA is confident of election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. BEC and gift cards. And that's one sweet ride.

The CyberWire

Play Episode Listen Later Nov 2, 2022 24:48


OpenSSL patches two vulnerabilities. CISA and election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. Business email compromise and gift cards. Tim Starks from the Washington Posts' Cybersecurity 202 has the latest on election security. A visit to the CyberWire's Women in Cyber Security event. And consequences for Raccoon Stealer from the war in Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/211 Selected reading. OpenSSL patched today. (CyberWire) OpenSSL Releases Security Update (CISA)  OpenSSL releases fixes for two ‘high' severity vulnerabilities (The Record by Recorded Future) OpenSSL patches are out – CRITICAL bug downgraded to HIGH, but patch anyway! (Naked Security) Threat Advisory: High Severity OpenSSL Vulnerabilities (Cisco Talos Blog) OpenSSL Vulnerability Patch Released (Sectigo® Official) Clearing the Fog Over the New OpenSSL Vulnerabilities (Rezilion) OpenSSL vulnerability CVE-2022-3602 (Remote Code Execution) and CVE-2022-3786 (Denial of Service) Check Point Research Update (Check Point Software) Undisclosed OpenSSL vulnerability: Free scripts for target scoping (Lightspin) Discussions of CISA's part in elections and the JCDC. (CyberWire) U.S. Treasury thwarted attack by Russian hacker group last month-official (Reuters)  XDR data reveals threat trends. (CyberWire) What happens to a gift card given to a scammer? (CyberWire) How Russia's war in Ukraine helped the FBI crack one of the biggest cybercrime cases in years (MarketWatch)

Homegrown With G Cole
Homegrown with G Cole. Episode 112: No Festival Song Competition for Jamaica's Diamond Jubilee. Jamaica and The Diaspora responds.

Homegrown With G Cole

Play Episode Listen Later Jun 18, 2022 102:48


Minister Olivia "Babsy" Grange announced that there will be no Festival Song Competition for Jamaica's Diamond Jubilee. Jamaica and The Diaspora responds to her and the JCDC. G Cole discusses this and takes a few phone calls live. Check out the album Ocho Rios: https://music.apple.com/us/album/ocho-rios/732105437 Please Subscribe to our YouTube Channel  https://youtube.com/c/GregoryColeHomegrownWithGCole

Homegrown With G Cole
Homegrown with G Cole. Episode 113: Richard Blackford Speaks on the Jamaica Festival Song Competition Fiasco.

Homegrown With G Cole

Play Episode Listen Later Jun 18, 2022 137:49


The JCDC and Minister Olivia "Babsy" Grange held a press conference and invited the media to discuss the cancelling of the Jamaica Festival Song competition, blaming inferior quality submissions. Richard Blackford who was present for the zoom conference speaks candidly on the Jamaica Festival Song Competition Fiasco. Check out the album Ocho Rios: https://music.apple.com/us/album/ocho-rios/732105437 Please Subscribe to our YouTube Channel  https://youtube.com/c/GregoryColeHomegrownWithGCole  

Inside Cyber Diplomacy
Cybersecurity from the Hill: A Discussion with Congressman Langevin

Inside Cyber Diplomacy

Play Episode Listen Later Jun 3, 2022 55:08


In the first episode of season two, co-hosts Jim Lewis and Chris Painter talk with Congressman Jim Langevin on his cybersecurity work in congress and what he envisions for the future of cyber diplomacy. They discuss domestic cybersecurity efforts, such as creating a Joint Collaborative Environment (JCE) within CISA's JCDC, institutionalizing cyber diplomacy in the State Department, Russia, international norms in cyberspace, and more.

Entertainment Trail Spotlight
111, performing arts entries are open for all JCDC competition's, reggae month 2022 and an interview with Krysten Laing

Entertainment Trail Spotlight

Play Episode Listen Later Feb 23, 2022 59:06


On this episode, as we travel through reggae month 2022, we spoke to the public relation coordinator of The Jamaica Cultural Development Commission in Kingston. She spoke to us about the various competitions that are open and where interesting individuals can go to put in their entries. Also we talk briefly about the reggae month events and where people can find information on the activities. music came from Stanly and the turbines, Sanchez, Erick Donnellson , Beres, and much more. Please follow us on Instagram @entertainmenttrailradioshow Facebook @EntertainmentTrail Email us at entertainmenttrailja@gmail.com --- Send in a voice message: https://anchor.fm/shabba-muskeno/message

Government Matters
JCDC cyber initiative, DIU Space Portfolio, Reforming political appointment system – August 12, 2021

Government Matters

Play Episode Listen Later Aug 13, 2021 23:11


Implementing cyber defense action at federal agencies Brig. Gen. Gregory Touhill, director of the CERT Division at the Software Engineering Institute, discusses how the new Joint Cyber Defense Collaborative will allow the government and private sector to proactively address cyber threats The importance of the Space Portfolio to DIU operations Steve Butow, director of the Space Portfolio at the Defense Innovation Unit, discusses space as a service and deployment of commercial technology into military services to improve readiness Streamlining and reforming political appointment system Max Stier, president and chief executive officer of the Partnership for Public Service, discusses shortcomings in the system for nominating and confirming major positions in government

DrZeroTrust
Cyber news and Zero Trust insights for 8/11/2021

DrZeroTrust

Play Episode Listen Later Aug 11, 2021 29:43


Was Blackhat worth the trip, no. What happens when you ransom a tractor? How big is the ZT market? Another hospital is shut down due to an attack, did patients die? What about JCDC?

The Shared Security Show
CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

The Shared Security Show

Play Episode Listen Later Aug 9, 2021 23:11


CISA announces the new Joint Cyber Defense Collaborative (JCDC), the controversy over Apple scanning devices for child sexual abuse material, and Amazon offers you a $10 credit if you enroll your biometric data in their palm print recognition system. ** Links mentioned on the show ** CISA to partner with Amazon, Google, Microsoft, Verizon, AT&T […] The post CISA JCDC Announcement, Apple's Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data appeared first on The Shared Security Show.

Mike’s Moment Of...
Mike's Moment Of... Proverbially Speaking EP 032

Mike’s Moment Of...

Play Episode Listen Later Sep 21, 2020 78:25


Joan Andrea Hutchinson @glademmache joins me on Ep 32 of #MikesMomentOf . We explore some Jamaican proverbs amidst stories of her inspiring journey so far. @aelsean BIO  Joan Andrea Hutchinson ____________________________________   Most people know her as an author and performer whose work focuses on the promotion and preservation of Jamaican language and culture, but there is so much more to this amazing woman.   Joan Andrea is a communications specialist, a public speaking coach, a motivational speaker and a behavior change communication consultant who has conceptualized and executed HIV anti stigma and discrimination campaigns for the Ministry of Health.   She has taught communications related courses at most universities in Jamaica and taught English as a second language while living in Tunisia, Holland and Spain, and also to foreigners in Jamaica.     She participated in several  conferences on Caribbean language in the UK and has a strong following among diaspora based Jamaicans. Recognizing the increased confidence adults have once they become literate, as a volunteer she taught adult literacy at Operation Restoration in Trench Town and at Mary’s Child, a home  for pregnant teens and juvenile mothers, run by the Missionaries for the Poor.   Joan is the self published author of three books on Jamaican culture and seven CD, to of which are dedicated to  Jamaican Proverbs.  Her poems and dramatic monologues are heavily used by participants int he annual JCDC speech competition, and she  has been the subject of study for many students for the CSEC SBA in English Literature.    A close friend of  Louise Bennett, (Miss Lou), she  produced Miss Lou's last CD ' Lawd Di Ridim Sweet.    Joan Andrea is the recipient  of the Order of Distinction from the Government of Jamaica, the Language Ambassador Award, from the City College of Birmingham in the UK, the Sir Shridath Ramphall Award for Cultural Excellence and the Caribbean Hall of Fame Award for Excellence in the Performing Arts.   She is a Justice of the Peace.     Links in Bio Apple Podcasts Links to Podcast, Book and Website Folkbeats & Blipspeak Single: “All Forgiven” www.michaelseanharris.com   The Book: Mike’s Pocket Performance Pointers on Audible Mike’s Pocket Performance Pointers on Amazon Mike's Pocket Performance Pointers on iTunes   To Support what I do: BuyMeACoffee Cash App: $aelsean2 Patreon   Equipment I use to create the podcast: Shure SM 58 Microphone Zoom H6 Audio Technica AT2020 Condenser Mic Arturia AudioFuse (I use the 2 channel version)

The Fix Productions
Ep. 100 - "Column Inna Dis"

The Fix Productions

Play Episode Listen Later Jul 30, 2020 69:11


The Fix crew marks a century of episodes with a celebration, while also reflecting on the journey to get there. User-generated topics are discussed such as the death of juggling, if Dancehall fans are the biggest downfall of the genre and more. They also share their thoughts on the virtual stagging of Reggae Sumfest 2020, Buju Banton winning the 2020 JCDC festival song competition, Koffee's 'Lockdown' music video and Aidonia's recent Instagram live calling for unity in the culture. Buss Di Utes songs of the week: Ari: Kxng Izem - Wildfire: https://bit.ly/3jOxHmp Javi: Khemikal 45 - Anyweh Di Money: https://bit.ly/2DlygmI Naro: Valiant - Unruly Vibes: https://bit.ly/3gdzvTR

Mike’s Moment Of...
Mike's Moment Of... Tech: Stage Tech EP 008

Mike’s Moment Of...

Play Episode Listen Later Apr 6, 2020 40:29


My very special guest for Episode 8 of Mike’s Moment Of… Tech: Stage Tech is my very dear friend, Mijanne. Join us as we talk about  her beginnings in theatre and her present situation. @aelsean @mijjymijj #MikesMomentOf #Jamaican #Theatre #SouthFlorida Find me on IG and Twitter: @aelsean Facebook.com/MichaelSeanHarris Youtube.com/aelsean For my gratitude posts: #MikesGratitudePost For my moments of cheer: #MikesMomentOfCheer   Mijanne has been a part of Jamaican theatre since 1998. Working with the country’s premier directors and producers, she has been both cast and crew in most of the top productions emerging from the creative industry and Stage Manager for notable events such as JCDC’s Grand Gala, Mello Go Round and ITI’s Actor Boy Awards. Mijanne has toured with several productions and has done several stints in New York which includes “Alphabet City” put on by the Metropolitan Playhouse and “Welcome To America” by Braata Productions. In 2006, while studying performance violin at the Edna Manley College of the Visual and Performing Arts School of Music and preparing for her ABRSM Grade 6 exam, Mijanne was called to go on tour with Jah Cure, Diana King and several other top musicians from Jamaica and spent the next ten years touring the world, playing reggae inspired fusion music. An adept violinist, song writer and producer, Mijanne has written and produced several songs for several Jamaican artists. When she is not on tour playing violin for Diana King, she works as stage crew for productions in Florida, including the Christian Dior Fall Fashion Show and the Super Bowl as well a Violin instructor at Sam Ash.  Mijanne can be found on Twitter and IG @mijjymijj

Just Chips Dot Com
056 Plot Twist

Just Chips Dot Com

Play Episode Listen Later Nov 20, 2018 29:19


Plot twists!!!! Re-birth!!! Oogie!! Vegan Rob or Joe???? We dive into some formative movie plot twists, dobbie facts (yeah, that's a plot twist people), worst condiments to have on your face, and what exactly a potato lunch is...Stick around until the end of the episode to hear our friend Chris Hannant do his very own chip rap inspired by JCDC. Quite honestly the best content we've heard in ever? Tune in!! See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
050 Re-Run Oil vs. Oil with best friend Iain and DJ Doug Pound

Just Chips Dot Com

Play Episode Listen Later Dec 12, 2017 36:18


It's our 50th episode!!!!!!!!!!!!!!!!!!! Can't believe we made it this far. In this episode, we talk about what we've been up to this week and it's huge news. SPOILER: WE WENT TO MEDIEVAL TIMES AND LOVED IT. We chit chat about our experience in the castle, reflect back on our year with JCDC and replay one of our favourite episodes this year all about OIL. Dragaloon best friend Iain joins us in studio while we call and talk oils and oily things with Doug Lussenhop aka DJ Doug on the line. See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
043 Re-Run: Cocktail Hour 6 à 9

Just Chips Dot Com

Play Episode Listen Later Oct 24, 2017 29:14


"Give me my caesar and get out." This is a re-run of one of more raucous episodes and happens to be our friend Tobi's fave episode. To re-introduce this episode, we talked to Tobi about his favourite JCDC episodes, and what he's getting up to on a wild Friday night. Prohibition? Vernissages? Mixology? The perfect cocktail hour? The origin of the drinking hour? We cover all these topics in the context of two alcohol-centered chips. Enter if you dare. The code words? The fat cow rides at midnight. See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
040 Behind the Chip Music

Just Chips Dot Com

Play Episode Listen Later Oct 3, 2017 26:59


We sit down with Fez, creator of JCDC's theme song to talk chip tunes, theme songs, sea monkeys, lobsters and more. We figure out the theme songs that suit each of us individually. Shout out to Scott Joplin! You know who you are. We get two callers to try and make us a theme songs on the spot, all while eating some delightfully disgusting chips. See acast.com/privacy for privacy and opt-out information.

fez scott joplin jcdc chipmusic
Just Chips Dot Com
032 Re-Run: Meat Lovers Special

Just Chips Dot Com

Play Episode Listen Later Aug 8, 2017 32:29


We're back again with the Dragaloon Best Friend Trio! This time we call up our dear old friend Iain to catch up, we reveal some behind-the-scenes elements of our friendship, and we also find out what his favourite episode of JCDC is thus far: Meat Lovers Special. Dig in, chiplets! See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
028 Re-Run: Havin' a Time with Alan Doyle

Just Chips Dot Com

Play Episode Listen Later Jul 11, 2017 32:19


Happy Summer, all you chipheads! This week we're checking in with one of our favourite people, Nina, alias Sophia's mom. She's going to break down for you what the show is all about, and then we'll replay one of her favourite JCDC episodes featuring Alan Doyle. Bunker down for another storm -- of chips, that is! See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
008 The Cult of Uncle Ray's

Just Chips Dot Com

Play Episode Listen Later Feb 21, 2017 17:40


Here's another goody from the JCDC vault: Who would have thought the day would come when we met a chip we couldn’t master? We taste a chip brand that has a powerfully persuasive leader. You know what they say: if you can’t beat ‘em, join ‘em. Enter the cult of Uncle Ray. See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
002 Extreme Chips

Just Chips Dot Com

Play Episode Listen Later Jan 24, 2017 18:38


Have you ever thought to yourself, "Ow, this chip is too hard?" or "Wow, I love extreme sports!" or "What is Zoë's connection to Michael Jackson?" or maybe even "What are the Swedish royals up to these days anyway?" Us too. This episode we munch on Hardbite chips and talk to Atle, our extreme friend from the Swedish military, to sort through some of these key issues. Like what you’re hearing? Take a moment to subscribe, rate, and – you guessed it – review JCDC! It would really mean an extreme lot to us. You might say we'd be extremely grateful. See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
003 Pizza Rodeo

Just Chips Dot Com

Play Episode Listen Later Jan 24, 2017 23:06


Relive your teenage years and join us in Meme Nation for a saucy pizza round-up of memage du jour. We taste-test two wacky pizza chips, one of which took the red-eye from Greenland! It’s not a party if it’s not Pizza Rodeo. Like what you’re hearing? Take a second to subscribe, rate, and review JCDC! If you do, the chip fairy will visit you soon. See acast.com/privacy for privacy and opt-out information.

Just Chips Dot Com
004 That's Doctor Chip to You

Just Chips Dot Com

Play Episode Listen Later Jan 24, 2017 21:39


If you are an OG JCDC’er, you’ll have heard this one before. Doctor Z knows what ails ya. The wackiest doc in town she is, but a certifiable web MD at least. They say a chip a day keeps the doctor away, so in fact it really makes no sense that this doctor and her resident could love chips so much. Hop into our virtual waiting room and figure things out for yourself. If you like the show, if you like chips, or if you just want some good karma, help us out by subscribing, rating, and reviewing JCDC! Thanks friends. See acast.com/privacy for privacy and opt-out information.

Caribbean Radio Show Crs Radio
Live:Tete Man Levi(Spain)Futureman(UK) VYTAL (Jamaica)

Caribbean Radio Show Crs Radio

Play Episode Listen Later Mar 15, 2013 181:00


Live:Tete Man Levi(Spain)Futureman(UK) VYTAL (Jamaica) TeteMan began in 1993 as a singer with his first band  "Rasta philosophy" in southern Spain in the city of Malaga Playing their music in the biggest Reggae festivals around the country as U-Zona Reggae Festival Rubi,Torrello (BCN) Reggae on the Just by the age of 19 years opening for Jamaican artists very famous as FREDDIE MC GREGOR MAX ROMEO  MICHAEL ROSE CHUKKI STAR  EARL SIXTEEN  VIVIAN JONES  MICHAEL PROFHET  SISTER AISHA   DUB JUDAH MAD PROFESSOR THE ROBOTIKS BAND etc Jamaican Zemroy Dwayne Thomas, Da Fuchaman was raised in Middle Buxton, St Ann, Jamaica, the birthplace of Bob Marley, Marcus Garvy and many great peolpe. Da Fuchaman started singing at school, home and in church as soon as he could talk. Influenced by the rich diversity of the Jamaican music scene, he started writing his own songs aged 12, and performed at a wide range of street dances and singing competitions as a teenager, winning more than he lost. Stenneth Waugh, a.k.a, Vytal, was born on July 12, 1972, in Cumberland, Manchester.Currently, Vytal is doing a remake of “Sad Ending” along with several other tracks with OneSleeveMusic. He hopes this time “Sad Ending” will get off the ground along with his music career. Vytal also has an entry in the 2011and2012 JCDC song competition. Vytal enjoys listening to Buju Banton, Dennis Brown, Busta Rhymes, Snoop Dogg and many other artistes. email;swvytal1@hotmail.com youtube;vytal 100 bookings;#1876-8530673

Caribbean Radio Show Crs Radio
Live International Reggae Artist JHAYTEA, Sky-I and Vytal

Caribbean Radio Show Crs Radio

Play Episode Listen Later Jul 21, 2012 191:00


JHAYTEA born  on the ISLAND OF ROATAN IN THE CENTRAL CARRIBEAN. History has been told that Roatan is THE ISLAND OF THE AFRO ANGLO ANTILLEANS. ROATAN ISLAND is and ex British island that is now governor by Honduras. Grown up in Flowers Bay on the island of Roatan music was all ways part of the ROATANEANS culture, at the age of 8 years old I began singing in church. I was introduce to LOVERS ROCK and DANCEHALL music in Flowers Bay in the early 90s. My inspirations came from artist such as the Rockies, Lucky Dube, R Kelly, Tupac Shakur and Capelton. At 12 I began performing in ROATAN ISLAND. CLOSER BABY now a hit in Roatan  and the Cayman island.  347-653-8629 or Visit. www.rbirecords.com    Vytal first became interested in music at age 19 in the church. He song on the church choir and at various church concerts. He began to take music serious when he got the opportunity to visit Zion Yard studio in his community. He did his first song “Sad Ending” at Zion Yard studio, but it did not get off the ground. Currently, Vytal is doing a remake of “Sad Ending” along with several other tracks with OneSleeveMusic. He hopes this time “Sad Ending” will get off the ground along with his music career. Vytal also has an entry in the 2011 JCDC song competition. The song is entitled “Jamaica Top the List” and produce by OneSleeveMusic. Vytal enjoys listening to Buju Banton, Dennis Brown, Busta Rhymes, Snoop Dogg and many other artistes.   Sky-I was born Emilien-Xavier Deschamps, in Sacramento, CA to a French father a West Indian mother. His upbringing was spent traveling and living in various different places from northern California to the Caribbean, and Canada. SKY-I 's songs blends French, Creole and English a refreshing mix of lyrical diversity. His music is heavily influenced by West Indies sounds seasoned with a conscious hip hop delivery

Last Night People
happy Birthday JCDC

Last Night People

Play Episode Listen Later Dec 17, 2010 0:39


Anniversaire de JCDC (Jean Charles de Castelbajac)