POPULARITY
In this episode, Mark Ledlow is joined by Kevin Palacios, a leader in the security industry. They discuss various aspects of security in Mexico and Latin America, focusing on the impact of political changes, drug cartels, and executive protection needs. Kevin shares his unique background, highlighting his work as a university professor before transitioning to executive protection. They also discuss the need for better data-driven decision-making and the integration of AI in security operations. The conversation touches on the differences in executive protection practices between the US and other countries, and the challenges of running a successful security business.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSKevin Palacios is recognized as a rising star in the security industry, particularly in Mexico and Latin America. Discussions center around the complex security challenges in Latin America, influenced by political and criminal activities. Kevin Palacios highlights the need for EP (Executive Protection) to adopt more data-driven decision-making. The differences between U.S. and Latin American EP practices are explored, including regulatory and cultural variations. Technological advancements, such as AI and data integration, are deemed crucial for the future of EP.QUOTES"Money corrupts, power corrupts." "EP needs more data-driven decision making." "Business owners are supposed to work on the business, not in the business." "AI is the future of EP for sure."Get to know more about Kevin Palacios through the link below.https://www.linkedin.com/in/coachseguridad/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
OPSEC stands for Operational Security. In simple terms, it means keeping your mouth shut, your profile low, and your plans private. It's a concept borrowed from the military, but it's just as essential in the prepping world. Because no matter how many supplies you've stockpiled or how many skills you've learned—if everyone knows about it, you just became a target.
OPSEC stands for Operational Security. In simple terms, it means keeping your mouth shut, your profile low, and your plans private. It's a concept borrowed from the military, but it's just as essential in the prepping world. Because no matter how many supplies you've stockpiled or how many skills you've learned—if everyone knows about it, you just became a target. "Shut Up and Survive: OPSEC for Preppers | Episode 395." The post Shut Up and Survive: OPSEC for Preppers | Episode 395 appeared first on Survivalpunk.
I almost feel stupid talking about the idiocy of Signalgate.We are going to be discussing the US Navy Vs. the Houthis, why the US strategy won't work, and we'll start with the massive Operational Security debacle that is called Signalgate, and what we can learn from it. Yes, Pete Hegseth our stalwart secretary of defense, is a complete idiot. We're also going to be talking about how the US just deployed a wing of US stealth bombers to the Diego Garcia Airbase in the Indian Ocean - escalation or show of force?
Corbin Fraser is the new CEO of Bitcoin.com. In this episode, he talks about the Scaling Wars, his perspective as a BCH advocate, and the lessons the market taught him over the years. Also, he explains why the news section of Bitcoin.com improved. Introducing Corbin Fraser (00:00:50) Bitcoin.com's Evolution (00:01:52) Support for Multiple Cryptocurrencies (00:03:05) Challenges of Tribalism in Crypto (00:06:51) Origins of Bitcoin Cash (00:09:07) The Scaling Wars (00:12:14) Misconceptions About BCH Leadership (00:15:23) The Meme Warfare (00:18:31) Promoting Token Swaps (00:20:09) Bitcoin.com News and Geopolitics (00:21:16) Respect for Peter Schiff (00:22:01) Occupy Wall Street Insights (00:22:12) Bitcoin Cash vs Bitcoin Debate (00:24:25) Vitalik's Perspective on Forks (00:25:04) Nomenclature and Propaganda (00:26:17) Cola Wars Analogy (00:28:31) Future of Bitcoin Block Size (00:29:56) Lightning Network Adoption Challenges (00:30:04) Alternative Layer 2 Solutions (00:31:27) Lightning Network's Technical Limits (00:32:33) Bitcoin SV and Centralization Concerns (00:33:42) Impact of Community Divisions (00:34:44) Chaos of Forks in 2017 (00:36:58) Bitcoin.com's Business Approach (00:40:04) Lightning Network Whitepaper Block Size (00:41:06) Discussion on AI and Block Size (00:42:39) Satoshi's Misjudgments (00:43:46) Censorship and Community Chaos (00:45:34) Personal Losses During the Block Size Wars (00:47:08) Bitcoin Cash's Price Surge to $3000 (00:47:38) Miner Hesitation (00:48:30) Current Features of BCH (00:51:55) Emergence of Cash Tokens & Failure of SLP (00:56:02) Building on UTXO (01:00:18) Ethereum's Rise Post-Scaling Wars (01:02:10) SushiSwap & DeFi Summer (01:03:53) Vampire Liquidity Attack (01:05:08) Speculation Around Chef Nomi (01:06:27) Development of Aave & Compound (01:07:30) Community Dynamics in BCH (01:08:32) Debate on Development Tax (01:09:43) Amaury Sechet's Influence and Community Split (01:10:14) Forking and Community Fragmentation (01:12:12) Transition to Ethereum and DeFi (01:14:39) The Role of Multi-Chain Strategies (01:19:12) Privacy and Zano (01:20:41) Operational Security and Privacy in Crypto (01:23:09) Government Regulation and Crypto Development (01:24:31) Zano's Hybrid PoW/PoS Consensus (01:25:56) Fact-Checking from Bitcoin Cash Podcast (01:27:13) Bitcoin Cash Upgrade Schedule (01:28:14) Twitter Spaces Collaboration (01:28:47) Privacy Solutions in BCH (01:29:29) Mike Hearn's Prediction on Forks (01:30:05) Misleading Media Influence (01:30:57) Dollar Cost Averaging Strategy (01:31:50) Self-Custody Solutions (01:32:02) Ownership of Bitcoin.com (01:33:54) Roger Ver's Contributions (01:34:22) Support for Roger Ver (01:36:25) Government's Stance on Crypto (01:38:47) Reading Roger's Defense (01:39:59) Misinterpretations of Roger's Position (01:41:08) Evolution of Roger Ver's Views (01:42:31) Market Humbling Experiences (01:42:54) Elon Musk's Influence (01:43:37) Current Crypto Market Sentiment (01:45:01) Celebrity Influence on Crypto (01:46:05) Kanye West's Coin Speculation (01:47:01) Kanye's Meme Coin Ventures (01:48:05) The Decline of Meme Coin Interest (01:49:16) Overvaluation in Crypto Projects (01:50:50) Block Size Wars Reflection (01:51:48) State Actors and Bitcoin's Challenges (01:52:51) Blockstream's Business Struggles (01:54:41) Developer Commitment and Innovation (01:56:34) Stablecoins vs. Bitcoin Adoption (02:00:05) Future of Stablecoins and CBDCs (02:01:33) Block Size Debate and Social Consensus (02:04:08) George Hotz's Perspective on Innovation (02:06:48) Ethereum's Rapid Development (02:09:07) Ethereum's Challenges (02:11:29) Bitcoin's Cautious Approach (02:12:05) Testing Protocols (02:13:15) User Education on Risks (02:15:35) Brock Pierce's Influence (02:16:21) Community Engagement (02:18:17) Listing Criteria for New Coin on Bitcoin dot com Wallet (02:20:34) Integration of Privacy Coins (02:22:58) Zano's Potential (02:24:01) User Confusion with Bitcoin Domains (02:28:21) BSV Integration Decision (02:30:36) Balanced News Coverage (02:32:04) Introduction to New Developments (02:33:07) Embracing a Broader Crypto Perspective (02:34:05) Closing Remarks (02:34:46) Final Thoughts and Future Plans (02:35:03)
Launched on January 3rd 2019, a whole decade after Bitcoin, Beam is the first MimbleWimble implementation to hit the markets. Unlike its smiley cousin Grin, Beam is organized more like a start-up, was more efficient in raising VC funding, and appears to focus more on smart contracts and interoperability with other chains. In this episode, Beam CTO Alex Romanov explains everything about the network: what it is, how it works, and what it aims to accomplish with the MimbleWimble technology. Time stamps: Introducing Alex Romanov (00:00:24) Beam's Launch and MimbleWimble (00:00:50) Alex's Journey to Beam (00:03:01) Beam vs. Monero vs. Zcash (00:04:25) Technical Aspects of Mimblewimble (00:07:12) Unique Properties of Beam Transactions (00:09:31) Blockchain Analysis and Pruning (00:12:15) Misconceptions About Mimblewimble (00:13:12) Responding to Criticism (00:14:21) The Impact of the Ivan Bogatyy Incident (00:18:01) Discussion on UTXO Attacks (00:20:21) Dandelion Protocol and Transaction Origin Obfuscation (00:21:28) Decoy Inputs in Beam (00:22:42) Integration of Lelantus-based Solutions (00:23:46) Overview of Beam Wallet Features (00:24:42) Introduction to Beam's Smart Contracts (00:28:20) Confidential Stablecoin: Nephrite (00:30:59) Comparison of Privacy Protocols (00:33:35) User Experience and Usability in Privacy Coins (00:38:23) DAO Voting System (00:39:26) Staking and Layer 2 Development (00:40:00) Popularity of Privacy Coins (00:40:41) The Evolution of Privacy in Blockchain (00:43:24) Beam vs. Ethereum (00:46:20) User Need for Privacy (00:48:17) Social Shift Towards Privacy (00:50:13) Comparison of Beam and Grin (00:51:19) Decentralized GitHub on Beam (00:52:11) Beam's Smart Contracts vs. Ethereum (00:55:14) Beam Wallet Interface (00:55:46) Atomic Swaps & Asset Swaps Explained (00:56:22) Native Swapping with Bitcoin (00:57:51) Decentralization Concerns (00:59:01) Messaging Layer in Beam Wallet (01:00:50) Beam's Messaging System (01:03:53) Maximum Anonymity Set Feature (01:10:47) Exchange Withdrawal Addresses (01:13:33) Long Addresses in Beam (01:14:29) Roadmap Features (01:16:28) Confidential DeFi Article (01:18:33) Mining Beam with GPUs (01:22:01) Community and Mining Pools (01:23:01) Proof of Work vs. Proof of Stake (01:24:10) Investment Pitch for Beam (01:25:12) Funding Challenges in Privacy Projects (01:26:11) Collaboration in Privacy Space (01:27:20) Confusion Over Beam Tickers (01:29:30) Final Thoughts on Beam's Development (01:33:36) The Importance of Feedback (01:36:44) Beam and Monero Bridge Collaboration (01:37:08) Why not Build on Bitcoin (01:38:06) Pruning the Blockchain (01:38:40) Mimblewimble's Harry Potter References (01:39:51) Marketing Challenges in Crypto (01:43:20) Price Action and Exchange Listings (01:44:10) Need for Deeper Analysis (01:46:27) The Scams Narrative (01:46:37) Innovation through Competition (01:50:08) Usability Challenges in Crypto (01:52:50) Positive Features of Beam Wallet (01:54:05) Local First Design in Beam (01:54:27) Ethereum Wallets and Features (01:55:21) Local Application Architecture (01:55:53) Hardware Wallet Integration (01:56:20) Decentralization Goals (01:56:56) Privacy vs. Usability Trade-off (01:57:08)
Let's talk OpSec! In practice - we share five indispensable things you shuold adopt today - if you haven't - to ensure you are following proper operational security approaches when dealing with customer data, connectivity, and work in general. Also, Tobi asks Jussi an unexpected question.(00:00) - Intro and catching up.(04:20) - Show content starts.Show links- Windows LAPS overview | Microsoft Learn - Tailscale- Ctrl+Alt+Azure | Episode #235: Understanding Entra SSE- Ctrl+Alt+Azure | Episode #036: All things Security with Sami Laiho- Give us feedback!
Our interview series about practical tactics to keep yourself and your community safe from the rising tide of fascism continues this week as Josh talks with maia arson crimew (it/she), a hacktivist and past guest on the show. Topics include: The mechanics of how corporations and governments identify and track you across virtual and real-world spaces Common ways that your devices give away information without your knowledge and how to disable those features What encryption is and why it matters, especially when it comes to law enforcement Tools that you can use to anonymize your usage online USEFUL LINKS THAT YOU SHOULD CLICK: Get Surveillance Self-Defense basics and tool guides from the Electronic Frontier Foundation (EFF) Get uBlock Origin for Chrome, Firefox, Edge, and Opera Download Tor Browser for Windows, macOS, Linux, and Android Download Signal Messenger for Android, iPhone, Windows, macOS, and Linux Get Mullvad VPN and download Mullvad Browser Send maia a donation via ko-fi
Ytterligare ett av centralbegreppen inom prepping, att inte avslöja vad vi håller på med. Vi pratar om op-sec i vardagen, hur vi bör tänka på arbetsplatsen och fritiden men också vilka aspekter inom op-sec som blir aktuella i en faktiskt kris. Vi diskuterar också en lyssnarfundering kring beredskapspremie. Shownotes och länkar på https://www.hemberedskap.se/avsnitt359 Stötta oss och lyssna på extra bonusavsnitt på https://www.patreon.com/hemberedskap
In this episode, Lisa welcomes Kara Frederick, director of tech policy at the Heritage Foundation, to discuss pressing issues. They delve into the assassination attempt on Donald Trump, cyber attacks linked to the Chinese government, and Mark Zuckerberg's letter revealing government pressure on Facebook to censor content. Frederick provides expert insights on encrypted accounts, the nature of cyber threats, and the implications of Section 230 for big tech. The Truth with Lisa Boothe is part of the Clay Travis & Buck Sexton Podcast Network - new episodes debut every Monday & Thursday.See omnystudio.com/listener for privacy information.
In this week's Security Sprint, Dave and Andy covered the following topics: DHS Announces $18.2 Million In First-Ever Tribal Cybersecurity Grant Program Awards. “For far too long, Tribal Nations have faced digital and cybersecurity threats without the resources necessary to build resilience,” said Secretary of Homeland Security Alejandro N. Mayorkas. Main Topics: Beryl!! & Hurricane Preparedness. Port of Corpus Christi announcement. https://portofcc.com/hurricane-beryl-impact-to-the-port-fully-transitioned-to-post-storm-recovery/ Airline impacts. https://www.cbsnews.com/news/hurricane-beryl-houston-texas-travel-flights-airlines/ Ransomware Ransomware Attack Demands Reach a Staggering $5.2m in 2024 Risky Biz News: Ransomware attacks increase hospital mortality rates Risky Biz News: A ransomware attack is putting lives at risk across South Africa Halcyon Whitepaper: What CFOs Should Know about Ransomware FBI Helps Public to Recognize Signs of Concerning Behavior https://www.fbi.gov/news/stories/behavioral-analysis-unit-asks-public-to-talk-to-someone-you-trust-if-you-notice-concerning-behaviors Microsoft: Combatting AI Deepfakes: Our Participation in the 2024 Political Conventions CDC Reports Fourth Human Case of H5 Bird Flu Tied to Dairy Cow Outbreak Quick Hits: Another far right group marches through downtown Nashville Pa. Capitol evacuated over emailed bomb threat 'Local Residents' Terrorizing City Council Meetings Were Actually Overseas, Feds Allege Europol: Taking action against antisemitism – close to 2 000 pieces of content flagged for removal Fifty violent attacks shock France ahead of crunch vote A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too Europol coordinates global action against criminal abuse of Cobalt Strike CISA: Guide to Operational Security for Election Officials
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT RiskCiting Attacks On Small Utilities, Dragos Launches Community Defense ProgramFBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries
Ritu Gill is back! A return guest who first appeared on episode 20, Ritu (also known as OSINT Techniques) is back to talk about Operational Security, about how to create and curate sock puppets, how to keep the integrity of an investigation and to tell us about Forensic OSINT, a Chrome extension that can easily help with investigations! This episode is brought to you by Compass Cyber Guard. To find out more about Cyber Guard's social engineering or pentesting services, contact info@layer8podcast.org
Explore the cutting-edge concepts of Software Bill of Materials (SBOM) and the newly coined Workflow Bill of Materials (WBOM) in our latest newsletter article, where we unravel how these strategies can revolutionize operational transparency and business security.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
Explore the cutting-edge concepts of Software Bill of Materials (SBOM) and the newly coined Workflow Bill of Materials (WBOM) in our latest newsletter article, where we unravel how these strategies can revolutionize operational transparency and business security.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
The Prepper Website Podcast: Audio for The Prepared Life! Podcast
In this episode, we will discuss operational security and prepping. This is a highly debated topic and one that many preppers have strong opinions about. We touch on the fact if OPSEC or operational security is truly something to be concerned about and how you can build a network of others who prep without giving your prepping profile away! Episode Specific Links Download the 25 Articles PDF Article - OPSEC (Operations Security) – Paranoia or Just Common Sense? Check Out the RYF Amazon Store Of Interest Get the Blackout Checklist Support Ready Your Future - CLICK HERE. Audio Preps Top Preparedness Articles Buy Me Coffee - Top Preparedness Articles Merch and Items of Interest: Join the Exclusive Ready Your Future Email Group Is Preparedness Biblical? – Small Group Video Bible Study Grab a Prepper Website t-shirt! (Amazon Link) Get “My Prep Journal” Buy Me a Coffee: https://www.buymeacoffee.com/prepperwebsiteSee omnystudio.com/listener for privacy information.
This week PFC Irvine makes his product selection for CSNS, and Talks about Operational Security when traveling by air.... Join Whatnot as a buyer Make your first purchase and receive $10 in credit towards a second purchase by using this link--> Click Here ! to Join Whatnot as a seller use this link--> Click Here To Follow PFC Irvines Whatnot Auction Streams Click Here (By joining Whatnot through the provided links it will support the show) To Shop the Enhancing Your Collection Items: EYCC Store If you wish to support the show and PFC Irvine's Journey you can find his Ebay store here----> PFC NETWORK Like our Facebook Page: Learning To Deal Podcast Join the FB Group Students of the Learning to Deal Podcast
Hello and welcome to the new episode of the Risk Management Show brought to you by Global Risk Community. We spoke with Scott McCrady, CEO of SolCyber, a company that offers a modern Managed Security Service or MSSP. We discussed the following questions among others. What is Managed Security Service and how is it related to Risk Management? What are the business cases that your solution solves the best in the eyes of your customers? Where do you think that MSSP as a whole is heading with some tips and action points. and more... If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.
Picture this: You're a high-ranking Air Force official overseeing research and development of new, top-secret aircraft. Your job is Operational Security, which is to say, keeping it secret. Then one day, a civilian who's an expert on radio waves, as well as a bit of a photography buff, comes to you with a massive collection of pictures and data related to the top-secret aircraft you're supposed to be keeping secret. Not ideal, right? But then this civilian explains that he's pretty sure what he has is evidence of an alien invasion. So you look him in the eye and you tell him he's onto something. He's definitely discovered aliens zipping around your military base. Then the fun begins. This is the story of Paul Bennewitz, a man subjected to what some might describe as a intimate, one-on-one psy-op. After stumbling upon government secrets, he is led into a crazy world involving a variety of aliens and rumors of a secret underground base where these aliens live and work. And Brandon updates us on current events surrounding Armenia, Azerbaijan, and the CTSO. https://www.reuters.com/world/asia-pacific/why-are-armenia-azerbaijan-fighting-again-why-does-it-matter-2022-09-13/ https://www.livescience.com/ukraine-ufo-uap-report https://arxiv.org/pdf/2208.11215.pdf https://www.snopes.com/news/2022/09/14/ufos-over-kyiv/ http://www.greatdreams.com/Falcon-Richard-Doty.htm https://supernaturalmagazine.com/articles/the-strange-saga-of-paul-bennewitz-and-the-undergruond-alien-base-at-dulce https://www.openminds.tv/william-moore-ufo-opportunist-agent-disinformation/29056 Mirage Men Documentary
How many hardware wallets do you know of that are fully open-source and made in the USA? Thanks to Boston-based Foundation Devices, Bitcoiners now have access to a new tool for their arsenal. For those who want to take self-custody to new heights, the Passport is a hardware wallet not to be overlooked. I had… The post Not Your Keys, Not Your Coins – The Foundation of Operational Security appeared first on The Crypto Vigilante.
Today's update features:Military losses of Russia and Ukraine analyzedPMC Wagner Group actively recruiting prison convictsForced conscription in occupied Luhansk is crippling coal minesRussian troops doing some probing on the Luhansk-Donetsk administrative borderNo changes near Soledar and BakhmutHas the Russian offensive west of Donetsk city fizzled outRussia keeps targeting civilians and civilian infrastructure in KharkivAntonovsky Bridge damage assessedWhat is Operational Security, and why is OPSEC importantAmmo depot in Novooleksiivka destroyed - 150 km from the line of conflictThe United States provides another $1 billion in arms to UkraineWhy yes, Ukraine does have AGM-88 HARM missiles, and the Mig-29 can launch them tooSpecial forces from Canada operating inside of UkraineShow trials loom in MariupolSouth Africa feels bullied by the West when it comes to Ukraine and RussiaThe first grain shipment from Ukraine is rejectedRussia and Ukraine sign an agreement establishing a Marine Humanitarian CorridorPatreons get more! You can access our daily Situation Report for as little as $5 a month, providing additional insights, backlinks, references, maps, and videos.Become a Patreon today!You can use our other resources to track the Russia-Ukraine WarRussia-Ukraine War News CenterRussia Ukraine War Map - updated multiple times a dayFollow Malcontent News in the Google News AppMalcontent News on TikTokReal-time updates on TwitterSupport the show
Operational Security Solutions with CEO Scott Solomon today on Blunt Business with Jorge Hermida only on The Cannabis Radio. During our MJBiz conference coverage, you may remember we were introduced to a company called Operational Security Solutions there a premier provider of full-spectrum Risk Management Services with a specialization in Secure management cash management and logistics compliance services security Consulting and facility hardening for high-risk Industries such as cannabis. Scott Solomon, MBA, MSE, is the Chief Executive Officer and Director of Compliance for Operational Security Solutions (OSS) and OSS East. In this role, Mr. Solomon leads corporate operations, staff and contractors, and the establishment of new OSS franchises throughout the country. Mr. Solomon coordinates the efforts of the C-Suite staff to achieve the strategic direction established by the OSS Board of Directors. Previously, he was Chief Operating Officer with a specific focus on compliance operations that included a comprehensive internal AML/BSA program, field audit support for financial institutions, and other programs to maximize compliance operations across their portfolio of clients while aligning staff and capital resources to best support market expansion.Support this podcast at — https://redcircle.com/blunt-business1131/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
The International Risk Podcast is a weekly podcast for senior executives, board members and risk advisors. In these podcasts, we speak with risk management specialists, people exposed to risk, and other exciting guests from around the world.In his episode Dominic Bowen speaks to Abby Stoddard, a humanitarian policy analyst and a founding partner of Humanitarian Outcomes, where she conducts research and provides analysis and advice to governments and international aid agencies.Abby discusses her research on operational security for aid workers, as well as the idea of "necessary risk" in the context of humanitarian help.The International Risk Podcast – Reducing risk by increasing knowledgeFollow us on Facebook, Twitter, Instagram, and LinkedIn for all our great updates.
Correctly managing security is one of the best way to ensure that cannabis companies remain sustainable. Cannabis companies will have continue to have limited banking options until federal laws are changed. Abundance of cash created a very dangerous environment for both customers and employees. Scott Solomon the CEO of Operational Security Solutions (OSS) joins Dan Humiston to talk about being uniquely positioned to assess, manage and mitigate risks that threaten the sustainability of businesses across the industry supply chain. He explains how OSS solutions and services address the full spectrum of risks that these businesses must manage.Produced by PodConx MJBulls - https://podconx.com/podcasts/raising-cannabis-capitalDan Humiston - https://podconx.com/guests/dan-humistonScott Solomon - https://podconx.com/guests/scott-solomonOperational Security Solutions (OSS) - https://opsecsolutions.us/
Operational security, situational awareness and intelligence gathering they not the subjects that you typically think about when you think prepping, but they are just as important as any of the supplies or gear we buy. We can have a large amount of food stored, water filters, solar panels, bug out bags and first aid supplies, but if we can't protect it, we could end up with nothing. Protecting your supplies doesn't necessarily mean by force, it could mean staying out of situations that require force. Things we do daily that we don't give a second thought to, Not paying attention to what's going on locally and globally, and not holding our cards close to our vest can all put us at risk. In the context of what we are talking about in today's show, which is keeping yourself safe and informed before during and after a disaster, all of these are subjects are intertwined. This is the stuff you can't buy to become better prepared but is just as important…if not more.
Operational security, situational awareness and intelligence gathering they not the subjects that you typically think about when you think prepping, but they are just as important as any of the supplies or gear we buy. We can have a large amount of food stored, water filters, solar panels, bug out bags and first aid supplies, but if we can't protect it, we could end up with nothing. Protecting your supplies doesn't necessarily mean by force, it could mean staying out of situations that require force. Things we do daily that we don't give a second thought to, Not paying attention to what's going on locally and globally, and not holding our cards close to our vest can all put us at risk. In the context of what we are talking about in today's show, which is keeping yourself safe and informed before during and after a disaster, all of these are subjects are intertwined. This is the stuff you can't buy to become better prepared but is just as important…if not more. --- Support this podcast: https://anchor.fm/contra-radio-network/support
You hear about OPSEC often in the military, but what actually is it? Is it that important? What are the rules? We try to answer some of these questions in this episode. There's alot of grey area, but we hope this helps. Be safe everyone! https://www.shopseatoseawithlove.com/
This episode gives advice for ways family members can safeguard operational security while still bragging about their Soldier.
This week's episode focuses on OPSEC, aka Operational Security, and what the heck that actually means. If you listen to this episode, you'll learn the history of OPSEC, how it shows up in your every day life, and how you can combat it both in the role of Soldier and in the role of a family member. It is important to note that critical information is something that should never be shared, and this is something that you'll really come to understand in this episode. Plus, it's the end of January which means it's time to hear about Traveling Soldier from the Fort Hood Sentinel.SUBMIT: FortHoodPAO@gmail.comFACEBOOK: /usagforthoodINSTAGRAM: @usagforthoodTWITTER: @usagforthoodAll music obtained, royalty free, through Filter by Songtradr: "Gun Metal Grey" - Delicious Allstars; "Learning By Doing" - Niklas OlovsoThis podcast is a production of U.S. Army Garrison Fort Hood and Fort Hood Public Affairs.
Die Verbesserung der Cybersicherheit ist auch in kleinen und mittelständischen Unternehmen zunehmend wichtiger. Viele Unternehmer mussten das in den letzten Jahren schmerzlich lernen, die meisten können aber noch vorsorgen. Heiko Gossen geht in dieser Episode gemeinsam mit seinem Gast Dr. Ralf Stodt – Head of Security Operations bei MAGELLAN Netzwerken – der Frage nach, wie können KMU ihre Cybersicherheit auch bei kleinem Budget sinnvoll verbessern. Unternehmen aller Größenordnungen haben Schwachstellen. Gegenüber großen Unternehmen stehen IT-Verantwortliche in kleinen und mittelständischen Unternehmen oft vor der Herausforderung, vom ohnehin engen Budget auch einen angemessenen Security Betrieb sicherstellen zu können. Daher gehen Heiko Gossen und Dr. Ralf Stodt das Thema mal speziell für Betriebe mit limitiertem Security-Budget an. Neben der Frage, wie und wo man sich über die Bedrohungslage informieren kann, geht es auch um Aufgaben die man teilweise intern lösen kann und wie man Angriffe früh erkennen kann. Die Aufnahme erfolgte bereits im Dezember 2021. Kapitel: ▪ 00:00:00.000 Willkommen ▪ 00:00:20.001 Begrüßung und Vorstellung Dr. Ralf Stodt ▪ 00:02:44.569 Herangehensweise zur Bewertung der Bedrohungslage ▪ 00:07:20.524 Informationsquellen ▪ 00:11:43.663 Laufende Überwachung - auch von smarten Komponenten ▪ 00:16:11.753 Zwischensumme ▪ 00:17:23.099 Operational Security ▪ 00:19:31.248 Zwei Komponenten des Sicherheitskonzepts ▪ 00:22:19.301 Alarme einstellen ▪ 00:28:17.895 Erste Schritte zur Umsetzung ▪ 00:37:53.863 Angriffsziele ▪ 00:41:37.034 Zusammenfassung ▪ 00:45:01.075 Externer Support ▪ 00:47:55.136 Kostenlose Tools ▪ 00:49:38.448 Verabschiedung Anfang Februar folgt der zweite Teil dieser Reihe, in der die beiden sich auf eine Cybersecurity Krise vorbereiten.
The Prepper Website Podcast: Audio for The Prepared Life! Podcast
Thanks for listening to this Prepvotional. We release full length episodes every Sunday evening. Mentioned in this Episode Sunday Message - https://pod.co/focus-church/check-when-you-want-to-walk-in-the-will-of-god Connect with Me Sign-Up for the List and Get the FREE PDF – 25 Handpicked Preparedness Articles You Should Read! Buy Me Coffee Merch and Items of Interest: Join the Exclusive Prepper Website Email Group Is Preparedness Biblical? – Small Group Video Bible Study No Regrets – t-shirt by PW Designs Grab a Prepper Website t-shirt!(Amazon Affiliate Link) Get “My Prep Journal” Legacy Longterm Food Storage(Affiliate) Checkout the Kit Link Bomb for Advice on Building Your Various Kits! Remember, there is a HUGE selection of great preparedness content at Prepper Website! Buy Me a Coffee: https://www.buymeacoffee.com/prepperwebsite See omnystudio.com/listener for privacy information.
With 2021 in the rearview mirror, we look back at our predictions heading into last year. We also have a few predictions for the year ahead. Will inflation continue to rise? Will there be a military conflict? Find out our thoughts tonight. We'll also be covering OPSEC (Operational Security) for preppers. What we do today […]
This week, we don't have a new interview for you but we do have a bunch of rad announcements, some of which are time-sensitive. If you're a Coffee with Comrades Patron (or you've ever considered becoming one,) this is definitely a 13 min. episode you don't wanna miss! · Support Coffee with Comrades on Patreon, follow us on Twitter and Instagram, and visit our website. · Pick up a Coffee with Comrades shirt or coffee mug at our official merch store. · Coffee with Comrades is a proud member of the Channel Zero Network. · Coffee with Comrades is an affiliate of the Firestorm Books & Café. Check out our reading recommendations! · Our logo was designed by Nathanael Whale. Transcript: Hey there, comrades! I hope this episode of Coffee with Comrades finds you better than me. I'll admit, it may be a touch dramatic to say this past week I've felt like Death itself, but that's not far from the mark. Earlier this week, we had a COVID-19 scare at our house and we went and got everyone tested. There was good news and bad news. The good news? We didn't have COVID. The bad news? We were all still sick as hell. If I still sound hoarse and sick, that's because I'm still recovering. Fortunately, I am on the mend! Anyway, to make a long story short, I ended up postponing a scheduled interview and, as a result, don't have a full-fledged episode for you today. That said, there are a few exciting announcements that I wanted to make—some of which are time-sensitive—so I didn't want to wait until next week. So, let's dive right in. As always, longtime listeners of Coffee with Comrades are well aware by now, we are a proud part of the Channel Zero Network. Check out this jingle to find out a little more about the network… …Alright, first big announcement: it brings me great pleasure to announce that we finally have merch! We've got t-shirts. We've got crewnecks. And, by popular demand, we've got coffee mugs. You can find it all by visiting the hyperlink in our show-notes. We're so psyched to finally see this stuff out in the wild. If you ordered something, be sure to tag us in it on social media. Now that spoopy season is officially behind us, it's time to celebrate the winter solstice. To mark the occasion, we are doing our first Coffee with Comrades Yule Tide Gift Exchange! I know, I know. I can hear it already. “Exchanging gifts!? That's capitalist.” Settle down, y'all. Quite the opposite, gifts have a long, treasured history of being about community, ways of binding us closer to one another. What makes the holidays a capitalist nightmare is the commodification and profit motive, not the euphoric joy of seeing someone's face light up when you exchange gifts. To quote the indigenous scientist Robin Wall Kimmerer, “Gifts from the earth or from each other establish a particular relationship, an obligation of sorts to give, to receive, and to reciprocate…It's funny how the nature of an object is so changed by the way it comes into your hands—as a gift or as a commodity.” Gifts spark kinship. They cultivate relationality. The Marxist theory of alienation suggests that commodities, on the other hand, alienate us from one another and from the larger biome we all inhabit together. So, here's how it's all gonna work: 1) Over the next two weeks, we're gonna collect names. In order to sign-up for the Yule Tide Gift Exchange, you'll need to be a Coffee with Comrades Patreon subscriber. That's not to be exclusionary, it's just that it's one of the only ways to really facilitate this sorta process safely. We'll finish the sign-up process November 16th, so be sure to sign-up before then! To sign up, just private message me on Discord and I will put you name on a list for my eyes only! 2) On November 16th, we'll draw names in the Coffee with Comrades Discord sever. We're gonna be using a random generator appropriately called “Draw Names,” which I'll enter everyone's names into beforehand. 3) Once names have been drawn, I will privately message you the name and address of the person whose name you drew. This will mean that the only people who will ever have your address are me and the person who's going to be giving you a gift! Of course, I already have your address on Patreon. But, if you haven't put your address on there yet and want to participate in the Gift Exchange, be sure to put one down ASAP! 4) Finally, the goal is to mail out gifts for each other. I'd encourage everyone to try to make something by-hand. Write a poem, draw a painting, take a polaroid photograph of something pretty and design a cute frame. I dunno, go wild! If you'd prefer to pick something up, try to stay under a $20 limit. 5) Let's aim to have our gifts in the mail by Dec. 16th so that folks will have a full month to create and/or shop for the secret gifts! The goal here is to use this opportunity to build up community. Even if we are disconnected from one another, my hope is that through a gift exchange like this and our ongoing monthly book club we can continue to cultivate meaningful friendships and genuine camaraderie. I know a lot of folks have hang-ups around Operational Security and the good news is if you don't feel comfortable, you certainly don't have to participate! But we'd love to have you and, hopefully, maybe make this an annual tradition. Making this program is a labor of love, but it's a ton of hard work. Coffee with Comrades is a show made by a worker for workers. If you dig this program, it would mean the world if you chose to support us by going to www.patreon.com/coffeewithcomrades. Starting at just a $1/month, you can unlock awesome perks like access to our Patreon only Discord server, you can come hang out at our book club, and enjoy exclusive first access to new episodes of the show and behind-the-scenes looks at the making of this podcast. Any monthly contribution is enormously appreciated, no matter the amount you choose to give. Our Patrons are incredible folks who help keep radical, independent media alive and we are stupendously grateful for their ongoing support. If you don't have a dollar a month handy but still wanna support Coffee with Comrades, the good news is there are a bunch of ways you can help our show continue to grow! If you fuck with this program, follow us on Twitter and Instagram. Like, RT, and share new episodes every Tuesday when they go live. If you listen to shows on Apple Podcasts, you can review our episodes. Be sure to smash that subscribe button so you never miss an episode. But, most importantly, if you enjoy Coffee with Comrades, tell your friends about this program today. Alright, I think that's pretty much all I've got for y'all today. Like I said, no new interview this week. But, if you're keen on horror, you can check out the latest edition of Macabre Media podcast, the other show I do with my friends Kaleb and Jorge. The three of us are celebrating our 50th episode by talking about 2001's Jason X, arguably the greatest motion picture of all time. Although…I'm not entirely sure who would actually argue that. Peace!
Isaac Botkin fields questions on Operational Security and Personnel Security. He might answer some. He might not. It depends on clearance.Video Link: https://youtu.be/y3dd0e77hhIStay connected to us here: trex-arms.com/subscribe/
The Prepper Website Podcast: Audio for The Prepared Life! Podcast
On the top of many Prepper's wish lists is the desire to find a prepper group or a MAG, which stands for Mutual Assistance Group. But because of Operational Security and prepping supplies being limited, many Preppers don't make it public that they prep. This can lead to isolation and even loneliness as preppers don't have someone they can talk to, share ideas or even find encouragement. Finding a prepper group or other preppers can be an important benefit to those who are wanting to truly get prepared. It might be helpful to think outside of the box. Ep. 705 – Finding a Prepper Group – Website Link Sign-Up for the PWEEG Preview Sign-Up for The Five Day Find Your Own Prepper Group Challenge Mentioned in this Episode: Join the Exclusive Prepper Website Email Group Is Preparedness Biblical? – Small Group Video Bible Study Sign-Up for the List and Get the FREE PDF – 25 Handpicked Preparedness Articles You Should Read! Buy Me Coffee – Top 10 on Prepper Website Sent to Your Email! Items of Interest: Join The 5 Day Build Your Own Prepper Group Challenge Food Storage eCourse No Regrets – t-shirt by PW Designs Get the eBook – Getting Started in Long Term Food Storage – Only $3 Grab a Prepper Website t-shirt! (Amazon Affiliate Link) Get “My Prep Journal” Legacy Longterm Food Storage (Affiliate) Checkout the Kit Link Bomb for Advice on Building Your Various Kits! Remember, there is a HUGE selection of great preparedness content at Prepper Website! See omnystudio.com/listener for privacy information.
WBSRocks: Business Growth with ERP and Digital Transformation
With IIOT devices on the shop floor capable of altering the state of machines through exposed endpoints for hackers, operational security is vital for manufacturers or distributors. While security issues could be frightening, and you might opt to take the approach of not connecting your shop floor with the internet, you might be missing out on the benefits that industry 4.0 machines and devices offer. With careful planning and processes, operational security is manageable.In today's episode, we have our guest, Denrich Sananda, who discusses how operational security is vital to ensure that your plant is always available and operational without any danger to the lives inside the plant. He also describes the difference between operational and cybersecurity and how to plan for the security of your facilities. Finally, he describes various concepts related to operational security, such as the interplay of networks, machines, and touchpoints and where you may have security holes in your premises.For more information on growth strategies for SMBs using ERP and digital transformation, visit our community at wbs.rocks or elevatiq.com. To ensure that you never miss an episode of the WBS podcast, subscribe on your favorite podcasting platform.
This week looks a little different from our regular show as we take an internal conversation around securing Operational Technology from the Thunder Dome (AKA the Set Solutions slack channel) to the podcast. Listen in as VP of Engineering Jonathan Townsend and Senior Solutions Architect Jarrod Cunningham discuss the underutilized practice of OT security and why your organization should consider the investment. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This episode is brought to you by "Practical Prepping For Everyday People - A Common Sense Guide On Preparing For Life's Emergencies " Available on Amazon and wherever books are sold. Episode # 44. LET'S TALK OPSECOperational Security or Operations Security is really just risk managementGeneral OpsecParticularly important for survival communities and mutual assistance groups.OPSEC should be exercised with family bug out location & activities as well as in daily life.General opsec includes making your house less attractive to thugs, thieves, and looters using outside lighting, video cameras, cutting back bushes cut and reducing hiding places aroung the house. We talk a bit about situational awareness and being the gray man, or woman, and blending in.Mission Opsec(the fun, spy craft type stuff)Radio Communications:Remember, everything can be monitored.For the purposes of this discussion we'll use the Baofeng radio.They are dual band, dual watch radios can operate "split" which helps with the security of communications.Codes can be developed for use after SHTF, or even in exercises or daily use, and we discuss examples of codes.We discuss keeping your transmissions short, triangulation, and rotating your transmitting locations.Just for fun we discuss verbal runners, dead drops, and signals.Please click the subscribe button on your podcast provider, so that you never miss an episode.Please consider supporting the podcast by buying us a cup of coffe. You can do that by going to www.buymeacoffee.com/practicalprepWe invite you to drop us an email at info@practicalprepping.infoYou can find us on Facebook at Practical PreppingWe have a number of articles for your prepper learning at www.practicalprepping.infoJoin us on Mondays, Wednesdays, and Fridays for more episodes of Practical Prepping Podcast.
Operational security & risk assessment come down to three basic principals. What do you have to protect, what are you protecting it from, and what are you protecting it with. Today in the show Duff & Dale have Ed Clark on to talk about risk assessment, your risk profile, as well as some of his […]
Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments. Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams. The research can be found here: PoetRAT: Malware targeting public and private sector in Azerbaijan evolves
Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments. Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams. The research can be found here: PoetRAT: Malware targeting public and private sector in Azerbaijan evolves
Operational security, or OPSEC, has had a renewed focus recently given the secretary of defense's mandated OPSEC training for all Department of Defense employees. A few episodes ago, (E17) if you want to go check it out, we talked about the importance of protecting critical information, and the new DoD CUI standard for marking and safeguarding other than classified information. In this episode we have a conversation with Sean Crone to dig a little deeper into information protection. Sean is the industrial security lead and an OPSEC signature manager for the Air Force Life Cycle Management Center. During our discussion he defines operational security for us in both textbook terms, and in terms we can understand and apply in our day-to-day lives. He then explains why it's critically important to safeguard our other than classified information, and he provides us with insights on potential vulnerabilities we might not consider as we go about our daily lives. For more information on all things related to AFLCMC visit our website at: https://www.aflcmc.af.mil. Follow and like us on our social media channels for the latest information and news from programs across the center. LinkedIn: https://linkedin.com/company/aflcmcofficial Twitter: @AFLCMCofficial Facebook: https://www.facebook.com/AFLCMCofficial Instagram: @aflcmcofficial YouTube: https://www.youtube.com/channel/UCzpbkmBDlq05aBqPYvcze3A History Office Twitter: @airpowercradle
Operational Security is just 1 part of a good preparedness plan, but it is one of the most important things we can do to keep everything we have and love safe. Operational security is only one part of the security puzzle. The others include Cyber security, information security and physical security. In the show this […]
Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic. Joe Carrigan weighs in on the Thunderspy vulnerability. Our guest is James Dawson with insights on DMARK threats and why it’s worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/9/98
Al Kingsley hosts our Digitial Strategy podcast on behalf of NetSupport and Opportunity Peterborough. The podcast will cover the latest trends and strategies in IT Management and security, and we’ll be hearing from 5 industry experts discussing a range of topics. Nathan Allison – Talks about Operational Security and utilising frameworks.Colin Jeffs – Discussed Global Digitial Business and Planning for the futureDavid Davies – Talks about IT Resilience and the shifting culture of IT useAl Kingsley – shares ideas on creating a Digitial Strategy around IT ManagementRavi Pathak – explains about Business Continuity planning and what to consider.We also discuss with Tom Hennessey, CEO of our partner, Opportunity Peterborough, about how they support local businesses to grow and attract new companies to set up in Peterborough.
Mark Wales knows first-hand what happens when a Special Ops combat veteran designs a leather jacket. And also, how to find love on a reality TV show! He's a Special Operations Combat veteran. Boxer. CrossFit Regionals athlete. Ivy League MBA graduate. McKinsey consultant. Fashion designer. Entrepreneur. Model. Reality TV star. Father. Husband. Mark Wales has fit a whole bunch of titles to his name, and he certainly doesn't appear to be slowing down. In this episode, the conversation ranges from the tragic (losing a mate in combat) to the absurd (an inappropriately long discussion on bringing back leather pants). It takes us from Newman to New York; and provides insights working with McKinsey to redesign a cheese packet; and finding love on reality TV. But also, what traits Mark hopes to pass onto his son. An absolute must-listen episode with an individual who continues to go – always – a little further. Intelligence Summary (INTSUM) 2:42 One of these kids is not like the others….. Ben and Mark talk CrossFit Regionals. Tim (having never been to Regionals) is unable to contribute meaningfully. 5:35 Mark's right of reply to being killed off during our Zombie Apocalypse episode with Mick Neven 6:33 Mark's early years in rural Western Australia 8:10 Ben recalls the pinnacle of his military career – getting a ‘black jibber' for academics as a cadet at the Australian Defence Force Academy 8:30 Mark's first field exercise at the Royal Military College Duntroon – in which he accidentally attacks his own troops 9:35 Posted to the 2nd Battalion of the Royal Australian Regiment, in Townsville, Queensland prior to successfully completing SAS selection 10:55 Mark's strategy to get off the selection course without shame 12:20 Mark's time in SASR 15:15 Losing a mate in combat – and getting on with leadership while dealing with the impacts 19:15 Ramp ceremonies – farewelling a mate 22:50 Back to the Royal Military College – as an instructor 25:04 The motivation to get out of the Army and do an MBA – at Wharton! 30:40 The genesis of Kill Kapture – tough luxury! 31:40 Cost of goods: $1500. Sale price: $1000. Not the endorsed Wharton pricing strategy 31:55 Coming up with the name “Kill Kapture” 33:40 Building the first jacket in New York's garment district 35:20 Tough luxury – and taking inspiration from military uniforms 35:55 Out of Wharton and into McKinsey & Co 37:45 Taking on Australian Survivor 38:45 Reality TV – putting military Operational Security to shame! 40:40 Tim throws out some more spurious ‘facts' (which turn out to be true – John Lapaglia is a medical doctor) 42:35 Celebrity models – former SecDef Jim Matthis in KillKapture 44:45 Seeing (now wife) Samantha Gash for the first time 47:20 Coming off the island – and catching back up with Sam 48:05 Now - and to the future. Corporate speaking roles and a new product launch 50:10 Tim and Ben reflect on their very brief period as watch brand ambassadors 50:55 The future of Kill Kapture 52:55 ….which may or may not include leather pants….. 53:40 Mark on leadership, resilience, PTSD – and opening up a little through his corporate speaking roles 56:05 Mark's daily routine – doing the basics well 57:15 On fatherhood 1:01:20 Quick Question / Quick Answers – on luck, fashion, power songs and Mark's coolest Army moments 1:05:45 The Cormack McCarthy quote Mark refers to: ‘“War was always here. Before man was, war waited for him. The ultimate trade awaiting its ultimate practitioner” (from Blood Meridian) Links KillKapture Mark's Corporate Speaking profile Mark's Survivor page Contact Us email: debrief@unforgiving60.com website: www.unforgiving60.com Music By: The Externals …. Available on Spotify
On today’s show, “OPSEC,” Operational Security, I go over a multitude of tips to help you protect your base of operations, AKA, your home.https://www.facebook.com/groups/Sensibleliving/
These days we have the convenience of turning on a stove or grill and cooking a nice juicy steak, or turning on the oven at the flip of a switch and baking fresh bread for the family, but what would you do if that wasn’t an option? Or worse yet, what would you do if […] The post Emergency Cooking Ideas and Operational Security appeared first on Survivalist Prepper.
Please go to https://tantrapunk.com for more info!
In this episode I’m joined again by the illustrious Vin Armani for an instructive session on operational security for cryptocurrency users. We outline and cover the basics and address advanced concepts in a down to earth and accessible way. There are gems of wisdom that will educate and empower beginners and advanced users alike. Please visit Vin’s website at http://vinarmani.com/ About Vin: Vin Armani is a philosopher, serial tech entrepreneur, and CryptoSavage. He is the host of The Vin Armani Show on Activist Post. In addition to being an author and speaker, he has made his living as a television star, film producer, high-end male escort, software developer, art gallerist, pirate radio station operator, DJ, music producer, and motorcycle courier. He studied Philosophy at Howard University.
How to stay vigilant with cyber security.
Description: How to stay vigilant with cyber security.
How to stay vigilant with cyber security.
The Naval Meteorology and Oceanography provide "Just in Time" training.
How to stay vigilant with cyber security.
How to stay vigilant with cyber security.
Protect your personal information by watching what you post on social media.
Talking today about keeping our OPSEC in mind at all times. Your phone can compromise this, your daily conversations and wanderings. Being aware at all times of the things and people around you.
In this episode, we are focusing on protecting the information you put online. Operational and personal security threats can be very dangerous and could lead to mission degradation or personal harm. We also cover some great tips everyone should follow to ensure they keep themselves and their unit’s mission safe on the Internet. Please subscribe to PACAF180 by visiting http://www.pacaf.af.mil. You can find us on Facebook and Twitter by searching for PACAF!
Thank you listening to the show. Patriot Day, Operational Security, the importance of it, guns in the city, thinking tactically and practically. Go get some ammo. short episode - extra: Bones Hooks sings God's Going to Cut'em Down- (cover) http://patreon.com/blackmanwithagun http://blackmanwithagun.com Please leave a five star review on Amazon.com under the Black Man With A Gun: Reloaded
To: Cell Q From: Andrea Subject: A Night at the Opera (attachment: Cyrano de Bergerac) STATUS: PARROT reports breach of GREEN BOX 224, hereafter DESIGNATE as PACKAGE at 0246 hours Jan 4th. DESIGNATE “Zookeeper” CONFIRMS at 0815 Jan. 5th. A-Cell BLIND on the ground due to weather. Q-cell ABORT current OBJECTIVE. New mission LOAD-OUT found in TRANSPORT with one FRIENDLY Pvt. W. MISSION PRIORITIES: CONTAINMENT of PACKAGE is highest priority. Agents should take all care to maintain OPERATIONAL SECURITY. TARGET ONE: Establish CONTACT with “Zookeeper.” CHALLENGE: “Would you like to go to the zoo?” AUTHENTICATE: “Yes, but only if I can stay outside.” TARGET TWO: Establish HOME PLATE at “Zookeeper's” office and move to ASSESS PACKAGE. TARGET THREE: TRANSPORT PACKAGE to HOME PLATE. TARGET FOUR: Split into two units UNIT ALPHA: PLAY ZEPPO. GO SECURE using hardline modem at HOME PLATE and INVENTORY PACKAGE. Warning: minimum intelligence encouraged. Beware TOME ROT UNIT BETA: INVESTIGATE surrounding area for signs of NORWEIGIAN contamination. TARGET FIVE: A-Cell will DECLARE THREATS from BOX 224. Units REGROUP and REASSESS with new intelligence. TARGET SIX: If HOSTILES present, Q-Cell CLEARED HOT for 48 hours until ALPHABET SOUP DEPLOYMENT. ELIMINATE THE VECTOR MISSION SUCCESS: PACKAGE SECURED and OPERATIONAL SECURITY maintained until DUCK SOUP specialist arrives. MISSION FAILURE: If no NEW PICTURE established via HOME PLATE hardline by 0500 Jan. 8th, CYCLOPS will place BLUE/BLUE BIRDS in the air and SEPPPUKU PROTOCOL will be in effect for Q-cell and all relatives.
Pulling Geraldo Rivera out of the desert during Operation Iraqi Freedom and balancing the American people's right to know against operational security during combat situations with United States Marine Corps Major Danny Chung. 00:56 — Why Danny Chung decided to enlist in Marines. 02:07 – What it was about the Marine Corps versus the… The post Balancing Freedom of Information against Operational Security appeared first on Eric Schwartzman.
Operational Security Solutions with Chief Sales Officer Ryan R. Hale today on Grassroots Marketing only on Cannabis Radio. Ryan is the Chief Sales Officer and a Founding Partner for Operational Security Solutions (OSS). Mr. Hale leads all revenue operations, business development, marketing, strategic alliances, product/service development, and implementation. Mr. Hale began with OSS as the Chief Technical Officer, and still maintains executive oversight of overall IT and systems-related items delivering a secure and robust integration between OSS and our Financial Institution clients and their members. As the sales leader for OSS, he has successfully led the expansion of OSS across the legal markets across the United States. OSS has recently expanded into New York, New Jersey, and Pennsylvania to increase market share dominance on the East Coast alongside the launch of their new website.