POPULARITY
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Tribal-ISAC and WaterISAC events!• Check out our newest webpage and our new blog post, kicking off this new Gate 15 blog series!• AI Threat Landscape: Fact vs. Fiction As We Start 2026• AI Threats Resilience, a new Gate 15 service page outlines a suite of AI threat informed workshops and tabletop exercises designed to help organizations understand AI driven risks, clarify ownership of AI exposure and rehearse response to AI enabled incidents. • TLP: CLEAR – WaterISAC Top Actions to Enhance Your Utility's Cybersecurity • (TLP:CLEAR) WaterISAC – TOP ACTIONS to Enhance Your Utility's Physical Security • Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) – Cybersecurity and Infrastructure Security Agency – 18 Feb 2026: CISA posted an update stating that due to a lapse in DHS appropriations it may be unable to hold scheduled CIRCIA Town Halls and will not conduct meetings during any lapse in appropriations. Main Topics:Cyber Resilience: An Incident Doesn't Have to Be a Crisis Binary Defense, 19 Feb 2026. This blog reframes security operations around limiting business impact instead of chasing security perfection, noting that incidents are inevitable in complex enterprises and that the true differentiator is whether they escalate into crises. • The ENISA Cybersecurity Exercise Methodology ENISA | 16 Feb 2026 & ENISA publishes Cybersecurity Exercise Methodology to guide and standardize EU cybersecurity exercises) • Information Sharing – U.S. Legal and Regulatory Guidance – Health ISAC – 18 Feb 2026• Businesses urged to ‘lock the door' on cyber criminals as new government campaign launches – UK Government, 19 Feb 2026Violence & Extremism • Man Targets DHS Building With Stolen Ambulance In Attempted Arson Attack Source: The Daily Wire, 19 Feb 2026 • Armed man shot and killed after "unauthorized entry" into Mar-a-Lago perimeter, Secret Service says — CBS News, 22 Feb 2026• Mar-a-Lago Gunman Was Reportedly ‘Fixated' on Epstein Files and Believed There Was a Trump Government Cover-Up • USCP Officers Stop & Arrest Man with Loaded Shotgun Outside the U.S. Capitol — United States Capitol Police — 17 Feb 2026• FBI Albany, in Coordination with Nevada and New York Law Enforcement Partners, Investigating Vehicle Ramming at Electrical Substation in Nevada — FBI, 20 Feb 2026Quick Hits:• Launched: 9th Annual Dragos OT Cybersecurity Year in Review Dragos — 17 Feb 2026 • Significant Rise in Ransomware Attacks Targeting Industrial Organizations)• 3 Threat Groups Started Targeting ICS/OT in 2025: Dragos • CISA: Recently patched RoundCube flaws now exploited in attacks — BleepingComputer, 23 Feb 2026• CISA Adds Two Known Exploited Vulnerabilities to Catalog (RoundCube)• Government of Canada Alerts & Advisories: Roundcube security advisory (AV25-309) - Update 1 • CISA: BeyondTrust RCE flaw now exploited in ransomware attacks — Bleeping Computer, 20 Feb 2026 • 90% of Ransomware Incidents Exploit Firewalls • Ransomware Groups Shift Targets Mid-Sized Businesses Enterprise Defenses Harden, Research Shows • Searchlight Cyber Report: Ransomware Groups Claimed Record Number of Victims in 2025 with 30% Annual Increase — Searchlight Cyber — 17 Feb 2026• Securin 2025 Ransomware Report Finds AI Accelerating, Not Replacing, Human-Led Attacks • Record Number of Ransomware Victims and Groups in 2025 • Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware Arctic Wolf | 17 Feb 2026 • 2026 Unit 42 Global Incident Response Report — Attacks Now 4x Faster Palo Alto Networks | 17 Feb 2026 • Blizzard slams Northeast with heavy snow and powerful winds • East Coast Blizzard Halts Travel, Cancels 8,000 Flights • El Nino is brewing: Here's what it means for U.S. weather in 2026
With Romain Bordenave, a physical security expert with years of experience operating in high-risk environments including Colombia and Mexico. We discuss why crypto entrepreneurs are increasingly being targeted — and what practical steps individuals can take to reduce risk. - Why crypto founders are becoming high-value targets - Why criminals believe crypto is anonymous (and why they're wrong) - The role of social media and "showing wealth" in victim selection - Why kidnappings are often underreported globally - How kidnapping tactics differ across regions (France vs Latin America) - What to do if someone is kidnapped - Why contacting law enforcement is often the right move - How to think about personal security as crypto goes mainstream This podcast is sponsored by BRON Learn more through the link: https://go.bron.org/henriarslanian09
In this episode of Unspoken Security, host AJ Nash sits down with Bob Fabien “BZ” Zinga, a cybersecurity executive and Naval Information Warfare Commander in the U.S. Navy Reserve. They explore how performative leadership shows up in security teams, and why values on a wall fail when pressure hits.BZ argues that optics without accountability kills trust. When leaders bend with politics or budgets, engaged employees go quiet. That silence hides risk. He shares how breaches often trace back to human choices, including a W-2 phishing scam that exposed employees' data and changed his own life. He also pushes blameless postmortems and clear escalation paths.From there, the conversation moves to AI. BZ warns that teams can automate bias and outsource judgment. He calls for guardrails, regulation, and human oversight, especially in high-stakes decisions. He closes with a simple standard: speak up for fairness, even when silence would feel safer.Send a textSupport the show
Manish Mehta sits down with Wayman Cummings, Chief Information Security Officer at Ochsner Health, to explore what cyber-physical security convergence really looks like in practice. Wayman shares how his unconventional path into cybersecurity shaped his leadership style and his perspective on risk in high-stakes environments like healthcare. The conversation dives into insider risk, the role of AI as augmented intelligence, and why most physical threats today begin with digital reconnaissance. Wayman also challenges the idea that convergence is a myth, offering real-world examples of how teams, technology, and trust must come together to make it work. You'll learn: Why convergence fails without people and process alignment Why AI should augment human judgment, not replace it, in security operations How leaders can build credibility, break down silos, and scale security impact in high-risk environments If you're enjoying this episode, please take a moment to rate and review the show.
Education across the physical security industry is lack-luster at best. In this episode Baer not only breaks down why it's important that independently created education is necessary to the industry but reminds you he is also contributing through bethebettertech.com. Like Follow Subscribe please.... please, for heaven's sake please.ChitChat: https://www.aljazeera.com/news/2025/12/31/german-thieves-steal-up-to-105m-in-oceans-eleven-heist-what-we-know Product Highlight: https://www.youtube.com/watch?v=3Hwl61DIS5E https://www.clintonelectronics.com/products/mounting/camera-mounts/indoor-dome-camera-mounts/ce-ctmp-5/ Meat: bethebettertech.com S/O: @ignite.strategic on IG
Hardware security is not a new problem, but it is rapidly expanding in both consumer and medical domains due to hyperconnectivity. Medical devices and counterfeit medicines represent a fundamental security challenge. In particular, although counterfeit medicines are not a new issue,the problem continues to worsen as counterfeiting practices become increasingly sophisticated. The counterfeiting of biomedical products poses a serious threat to patient safety, public health, and economic stability in both developed and developing countries, and many current countermeasures remain vulnerable because they provide limited security. In this talk, we will share our work on biomedical hardware security with a focus on pharmaceutical products. We present cyber-physical biomedical security technologies that encode dosage information and authentication into edible biomaterials, enabling serialization, track-and-trace, and authentication at the dosage level. This approach empowers patients to play an active role in combating counterfeit medicines. About the speaker: Young Kim is a professor in the Weldon School of Biomedical Engineering and holds the titles of University Faculty Scholar and Showalter Faculty Scholar at Purdue University. His research centers on co-creating hardware(devices) and software (models) for large-scale societal and healthcare applications. His lab develops hybrid machine learning by combining data analytics with models grounded in optical spectroscopy and light-matter interactions to move beyond big-data, compute-intensive AI and leverage engineers' domain expertise. His work spans optical imaging and spectroscopy, mesoscopic physics, meta materials, cancer research, hardware security, and global health,unified by machine learning and data analytics. His research has been funded by a diverse range of agencies, including NIH, CDC, VA, AFOSR, USAID and Gates Foundation. His primary applications are in global health and rural community health, which address large-scale societal and healthcare challenges in mutually reinforcing ways.
In this episode of Unspoken Security, host AJ Nash sits down with Eric Yunag, EVP of Product and Services at Convergint. They explore how security integration is changing as organizations face a fast-moving threat landscape and rising expectations from leaders and regulators. Eric explains why today's environment demands a new approach—one that connects hardware, software, and services in a more dynamic, real-time ecosystem.Eric shares how integrators help companies navigate not just the technical, but also the legal and operational complexity of modern security. He describes how shifting to cloud platforms, unifying physical and digital identities, and balancing privacy with business outcomes all add new layers of challenge. The conversation highlights the growing use of AI and “visual intelligence”—using camera data for both security and business insight—as organizations look to do more with their investments.Throughout the discussion, Eric makes the case for trusted, neutral advisors who help organizations build smarter, more connected security systems. He shows how today's integrators are positioned to guide clients through tough choices, benchmark best practices, and unlock value that goes far beyond traditional security.Send us a textSupport the show
Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7: Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point. The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster
Kristian McCann sits down with John Ringis, Director of Physical Security, and Salik Makda, Director of Network Engineering at New Era Technologies, to unpack one of today's most urgent workplace challenges: how to bring employees back to the office—and keep them there.With hybrid work now the norm, John and Salik break down why workplace readiness matters more than ever, what “good” looks like, and how organizations can rebuild trust in the physical office through safer environments, smarter technology, and seamless user experiences.What does it take to create an office employees want to return to? In this conversation, New Era Technologies' experts explore the intersection of physical security, network performance, and space optimization—and how each contributes to productivity, satisfaction, and long-term RTO success.Key discussion points include:Workplace readiness defined: Why safety, reliable technology, and cultural clarity form the “three pillars” of a successful return-to-office strategy.Room, network, and space readiness: How everything from wireless density to huddle-room availability impacts daily employee experience.Hybrid challenges: The gap between modern at-home technology and outdated in-office infrastructure—and why network readiness is now non-negotiable.Best practices for scaling RTO: Standardizing security across locations, adopting mobile credentials, and using analytics to guide space planning.If you're planning or refining your RTO strategy:Conduct a full workplace and technology assessment.Evaluate your network's readiness for high-density, cloud-first collaboration.Explore modern physical security tools, especially mobile credentials and cloud-managed systems.Visit New Era Technologies to see how their solutions can make your RTO strategy a success
Podcast: ICS Arabia PodcastEpisode: From Physical Security to OT Cybersecurity (Arabic) | 45Pub date: 2026-01-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin us in this new episode of the ICS Arabia Podcast as we sit down with Bassem Ben Amor, a seasoned Physical Security Manager from Tunisia with over 12 years of experience.Bassem shares his journey from managing physical security and BMS systems to transitioning into the world of OT cybersecurity.We discuss his work as a security integrator, his passion for writing articles, and exciting projects he's currently involved in.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this episode of the Crazy Wisdom podcast, host Stewart Alsop sits down with Daniel Bar, co-founder of Space Computer, a satellite-based secure compute protocol that creates a "root of trust in space" using tamper-resistant hardware for cryptographic applications. The conversation explores the fascinating intersection of space technology, blockchain infrastructure, and trusted execution environments (TEEs), touching on everything from cosmic radiation-powered random number generators to the future of space-based data centers and Daniel's journey from quantum computing research to building what they envision as the next evolution beyond Ethereum's "world computer" concept. For more information about Space Computer, visit spacecomputer.io, and check out their new podcast "Frontier Pod" on the Space Computer YouTube channel.Timestamps00:00 Introduction to Space Computer02:45 Understanding Layer 1 and Layer 2 in Space Computing06:04 Trusted Execution Environments in Space08:45 The Evolution of Trusted Execution Environments11:59 The Role of Blockchain in Space Computing14:54 Incentivizing Satellite Deployment17:48 The Future of Space Computing and Its Applications20:58 Radiation Hardening and Space Environment Challenges23:45 Kardashev Civilizations and the Future of Energy26:34 Quantum Computing and Its Implications29:49 The Intersection of Quantum and Crypto32:26 The Future of Space Computer and Its VisionKey Insights1. Space-based data centers solve the physical security problem for Trusted Execution Environments (TEEs). While TEEs provide secure compute through physical isolation, they remain vulnerable to attacks requiring physical access - like electron microscope forensics to extract secrets from chips. By placing TEEs in space, these attack vectors become practically impossible, creating the highest possible security guarantees for cryptographic applications.2. The space computer architecture uses a hybrid layer approach with space-based settlement and earth-based compute. The layer 1 blockchain operates in space as a settlement layer and smart contract platform, while layer 2 solutions on earth provide high-performance compute. This design leverages space's security advantages while compensating for the bandwidth and compute constraints of orbital infrastructure through terrestrial augmentation.3. True randomness generation becomes possible through cosmic radiation harvesting. Unlike pseudo-random number generators used in most blockchain applications today, space-based systems can harvest cosmic radiation as a genuinely stochastic process. This provides pure randomness critical for cryptographic applications like block producer selection, eliminating the predictability issues that compromise security in earth-based random number generation.4. Space compute migration is inevitable as humanity advances toward Kardashev Type 1 civilization. The progression toward planetary-scale energy control requires space-based infrastructure including solar collection, orbital cities, and distributed compute networks. This technological evolution makes space-based data centers not just viable but necessary for supporting the scale of computation required for advanced civilization development.5. The optimal use case for space compute is high-security applications rather than general data processing. While space-based data centers face significant constraints including 40kg of peripheral infrastructure per kg of compute, maintenance impossibility, and 5-year operational lifespans, these limitations become acceptable when the application requires maximum security guarantees that only space-based isolation can provide.6. Space computer will evolve from centralized early-stage operation to a decentralized satellite constellation. Similar to early Ethereum's foundation-operated nodes, space computer currently runs trusted operations but aims to enable public participation through satellite ownership stakes. Future participants could fractionally own satellites providing secure compute services, creating economic incentives similar to Bitcoin mining pools or Ethereum staking.7. Blockchain represents a unique compute platform that meshes hardware, software, and free market activity. Unlike traditional computers with discrete inputs and outputs, blockchain creates an organism where market participants provide inputs through trading, lending, and other economic activities, while the distributed network processes and returns value through the same market mechanisms, creating a cyborg-like integration of technology and economics.
In this episode of Unspoken Security, host AJ Nash sits down with Danielle Jablanski from STV to break down the hard truths of operational technology (OT) security. Danielle explains why critical infrastructure - from water and transportation to manufacturing - remains vulnerable, tracing the challenge back to legacy systems, vendor complexity, and the lack of clear, industry-wide standards. She argues that many organizations have poor visibility into their assets and often rely on outdated assumptions about risk and business impact.Danielle calls out the pitfalls of flashy security solutions and emphasizes the need for basic, proven practices like network segmentation and clear asset management. She highlights the disconnect between IT and OT, showing how real-world safety and business operations depend on bridging this gap with honest communication and practical controls. Rather than chasing after hype, Danielle urges leaders to focus on building resilience: knowing what matters, assessing real risks, and strengthening what you can control.Throughout the conversation, Danielle offers a grounded perspective on why OT security demands more than checklists and compliance. She points to the need for shared data, better early warning systems, and a broader base of professionals willing to dig into the complexities - before an incident forces everyone's hand.Send us a textSupport the show
In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show
DailyCyber The Truth About Cyber Security with Brandon Krieger
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world's first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.But with innovation comes new questions: does adding connectivity make a safe less secure?Do people still need safes in a world that uses less cash?And how do you build trust in a product designed to protect what matters most?This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk.
In this episode of Unspoken Security, host AJ Nash sits down with Zoë Rose, SecOps Manager at Canon EMEA. They explore the real-world barriers to building effective incident response programs and discuss why so many organizations struggle to move beyond reactive firefighting.Zoë shares her perspective from both consulting and in-house roles, pointing out that most incident response teams are overwhelmed, under-resourced, and stuck dealing with basics that never get fixed. She explains why expensive tools and new technology often miss the mark when organizations skip foundational work—like asset inventories, clear policies, and tuned alerts. Zoë urges listeners to focus on practical steps, such as documenting processes, improving communication, and building trust between technical teams and business leaders.Throughout the conversation, Zoë breaks down how real change happens: by investing in people, closing skills gaps, and fostering a culture where mistakes drive learning instead of blame. The episode ends with a reminder that effective security is not about quick fixes or flashy tools, but about honest assessment, teamwork, and steady improvement.Send us a textSupport the show
In this episode of Unspoken Security, host AJ Nash sits down with CharlotteGuiney, Cyber Threat Intelligence Manager at Toyota Financial Services. Theyexplore what it takes to build threat intelligence programs that work for bothsecurity teams and the wider business. Charlotte cuts through the noise,stressing that buy-in is step one—and that it's often the hardest step. Sheshares how understanding internal customers and their priorities leads toearly wins, which are key to building trust and showing the value ofintelligence.Charlotte explains that not every organization needs the same level ofmaturity. Small companies might only need basic monitoring, while largerenterprises face more complex challenges. She notes that successfulprograms link intelligence to business needs, not just security threats. Thisapproach helps teams prioritize what matters most and communicate risk inways business leaders understand.The conversation also dives into the future of threat intelligence. Charlottesees a growing role for automation and AI, especially for basic tasks, butbelieves people are still needed to bridge gaps and build relationships acrossthe business. She closes with a reminder to keep things in perspective,echoing a lesson from her childhood at clown camp: sometimes you need tostep back and find humor, even in serious work.Send us a textSupport the show
Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field. TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions. TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you." Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve
In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show
Steve Lindsey, CTO and Co-Founder of LVT, shares his insights regarding the future of AI in physical security.
What does it take to grow from hands-on project work to leading teams and shaping strategy? In this episode, Second Vice Chair President on IFMA's Global Board of Directors, Wayne Whitzell, interviews Trena Ellis, Vice President of Facilities and Physical Security at Safe Credit Union, who shares her career journey across local builds in Northern California to international projects in Bangalore, India.Trena opens up about the shift from being a doer to becoming a delegator, the power of networking and strong vendor partnerships, and how involvement with organizations like IFMA has expanded her perspective. Along the way, she offers valuable insights for both seasoned leaders and professionals just starting their FM careers.Sponsor:This episode is sponsored by ODP Business Solutions!Time stamps:00:00 Introduction and Career Beginnings00:11 Welcome to Connected FM01:30 Guest Introduction: Trena Ellis02:39 Early Career and IFMA Involvement04:04 Memorable Moments and Lessons Learned08:04 Major Projects and Challenges12:24 International Experience in India20:01 The Importance of Networking and Vendor Relationships27:55 Leadership and Delegation33:19 Advice for Aspiring Facility Managers34:55 Conclusion and Farewell Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org
In this episode of Unspoken Security, host A.J. Nash sits down with LaurenZabierek, Senior Vice President for the Future of Digital Security at theInstitute for Security and Technology. Together, they examine how thetraditional view of national security often overlooks the people it seeks toprotect. Lauren shares why national security must move beyond militaryand government, and instead focus on the everyday risks that affecteveryone—whether that's cybersecurity, healthcare, or even climate safety.Lauren makes a strong case for widening the lens on security. She explainswhy protecting people requires new thinking and fresh policies, not justmore funding for defense. She also describes the need for face-to-faceconnections and open dialogue to rebuild trust and unity in a fracturedworld.The conversation turns to software and the Secure by Design movement.Lauren outlines how changing incentives for software companies can leadto safer products. She draws on lessons from automotive and aviationsafety to show paths forward, and encourages listeners to help drivedemand for secure technology across all industries.Send us a textSupport the show
In this timely episode, John Byrne sits down with security experts Mark Freedman and Rick Mercuri to explore the evolving landscape of physical security in corporate and financial institutions. From the rise in workplace violence and executive targeting to the challenges of securing facilities against active shooters and ATM attacks, the conversation dives deep into the realities of 2025's threat environment. Drawing on decades of experience and recent case studies, Mark and Rick discuss how organizations must move beyond reactive measures and embrace holistic, intelligence-driven security programs. They also highlight the role of AI, the importance of tailored threat assessments, and the need for specialized talent in building resilient security infrastructures.
In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year awards. David shares his experiences at SECTOR, Canada's largest cybersecurity conference, discussing the importance of security awareness training and the risks of irresponsible tech journalism on public perception. The panel also delves into the resurgence of the Clop ransomware group, their shift to data extortion, and their exploitation of vulnerabilities in Oracle EBS applications. Laura highlights a concerning case of insider threats at RBC, emphasizing the importance of process-driven controls. The episode also touches on the human side of cybersecurity, particularly the impact of romance scams and the growing violence in cybercrime. The panelists underscore the need for improved security awareness and the role of AI in identifying scams. Tammy, Laura, and David conclude by discussing the role of insider threats and the ethical boundaries in cybercrime, sharing insights from recent real-world cases. 00:00 Introduction and Panelist Introductions 00:43 Cybersecurity Month Initiatives 02:46 Security Awareness and Phishing Training 04:03 Impact of Irresponsible Tech Journalism 08:27 AI and Cybersecurity: Hype vs. Reality 10:43 Conference Experiences and Networking 18:33 Clop Ransomware and Data Extortion 23:45 Tammy's Insights on Clop's Tactics 24:58 Scattered Lasus and Cyber Warfare 26:32 Media Savvy Cybercriminals 31:36 Human Impact of Cyber Scams 37:17 Insider Threats and Security Awareness 43:21 Physical Security and Cyber Threats 48:33 Cybercrime Targeting Children 50:58 Conclusion and Upcoming Topics
Welcome to this explosive, fact-finding edition of Light ‘Em Up!We're very pleased you decided to join us!With the nation abuzz with the shooting of Charlie Kirk — his shooting recalls a disturbing pattern: Even the champions of “pro-gun” politics are not immune to America's epidemic of gun violence.We've been flooded with requests from our clients to address in-depth Special Event Contingency Planning for Public Safety Agencies — and that's exactly what we are going to do.In an era where public discourse is increasingly polarized and high-profile events carry heightened risk; the shooting of Charlie Kirk raises urgent questions about how we protect both speakers and attendees.This episode explores the intersection of Special Event Contingency Planning and political symbolism, unpacking how public safety agencies can—and must—design protocols that anticipate threats without compromising civil liberties.We examine the anatomy of a well-executed safety plan, the psychological dynamics of radicalized environments, and the strategic blind spots that can turn a rally into a crisis. Whether you're a public safety professional, a communications strategist, or simply someone concerned with the fragile balance between free speech and public harm—this conversation is for you.This episode will provide essential guidance for event planners, speakers and ticket holders/(spectators). This episode is an in-depth, thorough examination of how to keep events like Charlie Kirk's safe, for all involved.Physical Security is the focus of Rizzo's Protective Group, Ltd.As education is always a key pillar of Light ‘Em Up, by the end of this episode if we achieve our learning objectives in full, you will:Understand clearly and be able to:Define what qualifies an event as being “special” and— Identify for your own edification and knowledge what a special event contingency planning team consists of and looks like.— You'll be guided in conducting a hazard analysis for a special event.— You'll hear how the incident command system (ICS) can be used in response to an incident at a special event.— We'll give examples of special events (providing clear direction on how you must prepare for them as a provider and spectator).Mark my words, clearly, security measures are going to change and change drastically following this incident.Special Event Contingency planning involves creating a formal document with detailed procedures, responsibilities, and actions to address potential emergencies or hazards during a public gathering, such as at a festival, concert, or sporting event.A few of the main aspects, goals and strategies when conducting a thorough hazard analysis are to:— identify risks,— develop a response strategy,— establish a command structure with assigned roles,— and define communication protocols for both internal and external stakeholders, including attendees and emergency services.— The primary goal is to prevent injury, suffering, or death by ensuring the event is safe and successful despite unforeseen circumstances.Don't move a muscle!Tune out the world and tune-in to Light ‘Em Up. Right here and right now!You can listen to us: on-the-go, at work, home or when resting.Remember that we are here for you and because of you!In a time of uncertainty, facts provide clarity … even if they upset you!This episode is rated “E” for EVERYONE!Tune in and follow our sponsors Newsly and Feedspot!We want to hear from you!
In this episode of Unspoken Security, host A.J. Nash sits down with Marley Salveter, Director of Marketing at Unspoken Security. They explore how digital privacy and security awareness look different for younger generations who have grown up in a world where sharing personal data is routine, not a choice. Marley shares her perspective on adapting to life online, where building a personal brand and protecting personal information often overlap for today's professionals.Marley explains how her generation views data privacy as an accepted tradeoff, not a conscious decision, and why traditional corporate security training rarely feels relevant. She discusses the real risks of living in public—how threats feel less urgent until they get personal and why the rapid response of tech platforms can mask the lasting impact of breaches. She and A.J. dig into the challenge of communicating security risks to a connected generation that rarely sees tangible consequences.Together, they reflect on how open conversations bridge generational gaps and why storytelling and relatable dialogue help people internalize security lessons. Marley argues that making security personal is key to lasting change—especially for those building their careers and brands in the public eye.Send us a textSupport the show
Former Boston Police Commissioner Edward Davis joins Forhad to discuss his career, transition to the private sector and the work that his firm has been doing with private sector clients. He shares his perspective on risk management and implementing comprehensive strategies to protect organizations and individuals.Learn more about The Edward Davis Company at https://eddavisllc.com/.Connect with Ed on Linkedin at https://www.linkedin.com/in/edward-davis-9b26b485/Send your comments and/or questions to info@integrasintel.com. We want to hear from you.Please subscribe to our podcast and follow us on social media: LinkedIn: https://www.linkedin.com/company/integras-intelligence-inc.Facebook: https://www.facebook.com/integrasintelInstagram: https://www.instagram.com/integras_intel/Twitter: https://twitter.com/integrasintelYoutube: https://www.youtube.com/channel/UCIBx0BlZB_u1qolio6LPbsA#security #integrasintelligence #duediligence #privateinvestigators #investigationinsiders #podcast#privateinvestigations #backgroundchecks #litigationsupport #employmentscreening #riskmanagement#executiveprotection #securityassessment
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• TribalNet: Casino-systems suppliers protecting operations from cyberattacks • TribalNet: AI main focus of tribal technology conference• TribalNet 2025: Cybersecurity Is Central to IT Modernization for Tribes• The Gate 15 Interview EP 62: Justine Bone, Executive Director, Crypto ISACMain Topics:U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area. The U.S. Secret Service dismantled a network of electronic devices located throughout the New York tristate area that were used to conduct multiple telecommunications-related threats directed towards senior U.S. government officials, which represented an imminent threat to the agency's protective operations. This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites. In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises. While forensic examination of these devices is ongoing, early analysis indicates cellular communications between nation-state threat actors and individuals that are known to federal law enforcement.Ransomware!• EU cyber agency says airport software held to ransom by criminals • A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster • Rising cyberattacks on K-12 schools prompt concern as Uvalde CISD grapples with ransomwareCyber threat information law hurtles toward expiration, with poor prospects for renewal• Rand Paul's last-minute demands push key cybersecurity law to the brink• Peters Urges Senate to Quickly Extend Critical Cybersecurity Protections That Expire on October 1st• Health-ISAC CSO: A Looming Deadline: The Cybersecurity Information Sharing Act of 2015• RER and Coalition Urges TRIA Reauthorization• Commentary: Shrinking cyber budgets and rising threats: Why public-private partnerships are now mission-criticalUS threats and violence• MN man threatened people via email as retaliation for Charlie Kirk's death: Charges• NH Man Arrested for Allegedly Plotting to Kill Republican Governor Kelly Ayotte With Pipe Bombs• NCTC Supports U.S. Law Enforcement, First Responders by Sharing Intel Product Aimed at Deterring Attacks by Al-Qa'ida• ISIS calls for slaughter of Christians and Jews in UK attacks – 'shoot, stab, and ram' Quick Hits:• FBI PSA: Threat Actors Spoofing the FBI IC3 Website for Possible Malicious Activity• NHC issuing advisories for the Atlantic on Hurricane Gabrielle• UK NPSA: Vehicle Security Barriers at Event Venues • TikTok: Statement from ByteDanceo Deal to Keep TikTok in U.S. Is Near. These Are the Details.o Trump expected to approve TikTok deal via executive order later this week, WSJ reports• OpenAI admits AI hallucinations are mathematically inevitable, not just engineering flaws
In this episode of Unspoken Security, host AJ Nash welcomes Ivan Novikov, CEO of Wallarm, to discuss the fundamental shifts in API security. They explore how APIs have evolved from internal tools to the public-facing backbone of mobile apps, IoT, and AI. This change has dramatically expanded the threat surface, making traditional security methods obsolete.Ivan explains why older approaches, like signature-based detection and RegEx, fail against modern attacks. He details Wallarm's unique solution: a real-time decompiler that analyzes the actual payload of API requests. This technique allows for deep inspection of complex and nested data formats, identifying malicious code that standard tools miss.The conversation also looks to the future, examining the security risks posed by the rapid adoption of AI agents. Ivan concludes with a stark comparison between physical and cyber threats. In the digital world, attacks are constant and aggressive. Success depends less on the tools you have and more on who you are and how you use them.Send us a textSupport the show
As agencies navigate hybrid work, evolving threats, and return-to-office mandates, physical security is no longer just about locks and badges. It's about real-time data and rethinking who gets in and why. Here to share how access control is becoming mission-critical, and what agencies need to do now to stay secure is the Director of Compliance and Security at Sign In Solutions, Jason Mordeno.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
My guest today is Alena Vránová, entrepreneur, author, and builder of freedom tech who has spent over a decade pioneering tools that defend both digital and physical sovereignty. She co-founded SatoshiLabs (Trezor's mother company), which launched the world's first commercially available hardware wallet, joined the Casa Node team to make running Bitcoin and Lightning easy, and co-authored The Little Bitcoin Book, a global bestseller introducing why Bitcoin matters for freedom and finance. Today, she is building GLOK, a project dedicated to protecting Bitcoiners against kidnapping, extortion, and physical threats. In this episode, Alena shares her journey from legacy finance into Bitcoin, recounting how she helped establish an entirely new market for hardware wallets. We discuss the ongoing attempts to co-opt Bitcoin through regulation and confiscation, the dangers of KYC and data leaks, and why physical security is the next frontier for Bitcoiners worldwide. Alena also reflects on the role of women in Bitcoin, the growth of a truly global community, and why she believes building tools for self-defense—digital and physical—is essential for human freedom► If you got value, please like, comment, share, follow and support my work. Thank you!-- SPONSORS & AFFILIATES --→ Get your TREZOR wallet & accessories, with a 5% discount, using my code at checkout (get my discount code from the episode - yep, you'll have to watch it): https://affil.trezor.io/SHUn → Shield your bitcoin with time-delayed transactions over multisig with BitVault: https://www.bitvault.sv/ → Get 10% off on Augmented NAC, with the code YCXKQDK2 via this link: https://store.augmentednac.com/?via=efrat (Note, this is not medical advice and you should consult your MD)→ Watch “New Totalitarian Order” conference with Prof. Mattias Desmet & Efrat - code EFRAT for 10% off: https://efenigson.gumroad.com/l/desmet_efrat → Get a second citizenship and a plan B to relocate to another country with Expat Money, leave your details for a follow up: https://expatmoney.com/efrat → Join me in any of these upcoming events: https://www.efrat.blog/p/upcoming-events -- LINKS –Alena's Twitter: https://x.com/alenasatoshi Alena's Nostr: https://bit.ly/4msttRb Glok's Website: https://glok.me/ Efrat's Twitter: https://twitter.com/efenigsonEfrat's Channels: https://linktr.ee/efenigson Watch/listen on all platforms: https://linktr.ee/yourethevoiceSupport Efrat's work: https://www.buymeacoffee.com/efenigson Support Efrat with Bitcoin: https://geyser.fund/project/efenigson-- CHAPTERS –00:00 - Coming Up01:40 - Intro to Alena & Her Background08:27 - Alena's Journey Into Bitcoin11:08 - Building Trezor: Pioneering Hardware Wallets & Their Importance19:17 - Bitcoin Nodes: From Fringe to Mainstream22:37 - The Little Bitcoin Book29:08 - The Inevitable Evolution of Bitcoin: Regulation, Co-opting, Confiscation36:27 - Tech Innovation in Bitcoin40:02 - Kidnapping, Extortion & “Glok” - Alena's New Security Project45:07 - Operational Security Checklist48:07 - Kidnapping Use Case & Glok's Deterrent Solution59:17 - Women's Safety in Europe1:00:17 - Empowering Women Generally & in Bitcoin1:11:27 - A Pronoic Mindset: Alena's Hope for the Future
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is reshaping the future of physical security. In this episode of Today in Tech, host Keith Shaw and guest James Benum explore how AI-powered cameras, drones, and large language models are improving response times, reducing false alarms, and helping security teams work smarter. They also discuss the balance between safety and privacy, the convergence of cyber and physical security, and why humans will always play a vital role in protecting people and property.
Data alone does not persuade. For data-driven leaders, learning totranslate numbers into a compelling narrative is a critical skill. In thisepisode of Unspoken Security, host AJ Nash speaks with Salvatore Manzi, aleadership communications coach, about the strategies technical leaderscan use to create influence. Salvatore explains why leaders must learn tomake meaning over metrics to connect with teams, stakeholders, andcustomers.Salvatore shares practical frameworks to improve communication. Heintroduces the "You then me" principle, which prioritizes acknowledging the other person's view to build rapport. He also shows how using simplemetaphors and a little appreciation can make complex dataunderstandable. These techniques disarm a room before you need tocorrect someone or present a counter-argument, ensuring your message lands effectively.The conversation also covers imposter syndrome and the uniquecommunication hurdles women face in the tech industry. AJ and Salvatorediscuss the power of authenticity and the need for allies who activelyamplify other voices. They explore how simple shifts in body language andmindset can build the confidence needed to overcome these challenges and ensure your voice is heard.Send us a textSupport the show
In this episode of Unspoken Security, host AJ Nash welcomes Mark Freedman, Principal and CEO of Rebel Global Security, to discuss a major shift in the global threat landscape. The primary national security concern has moved from counter-terrorism to interstate strategic competition. This change requires a new security model, especially for the private sector.Mark explains that companies are now players on a geopolitical battlefield, facing sophisticated threats from nation-states. Yet, many organizations operate in silos. Legal teams track sanctions while cybersecurity teams react to technical threats. They often miss the strategic connection between the two, which creates significant vulnerabilities.To close these gaps, AJ and Mark explore the need for an integrated intelligence function within businesses. They discuss how even a single empowered person, tasked with understanding the geopolitical environment, can connect various teams. This strategic view helps companies build a more resilient and proactive defense in a complex world.Send us a textSupport the show
In this episode, Mark Ledlow and Benjamin Whitfield, a seasoned security professional with a military and agency background and a former CIA, delve into the journeys of various figures transitioning from government roles to entrepreneurship, particularly focusing on Mike and Chris's post-CIA careers in the security industry and bourbon production. The conversation touches on the unique skill sets developed within the CIA, the importance of trust and networking among former agents, and the experiences that shaped their professional lives. Benjamin also shares personal anecdotes from his time with the CIA, including his harrowing experience during the terrorist attack on the American Consulate in Jetta, Saudi Arabia. The discussion provides insights into the evolving business and cultural landscape in the Middle East and how these changes impact personal and professional security.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSReinvention is possible at any stage—skills from one career can fuel success in another. Trust and relationships are central in security and intelligence work. Bureaucratic responses can drive talented people to seek impact elsewhere. Cultural adaptation and respect are vital for success in international business. Generational shifts are changing norms in places like Saudi Arabia.QUOTES“Trust is super important in that space.” “I really have found this home in the private sector for 20 plus years now, where I can protect our people, our facilities, our operations in that appropriate way.” “It's all heavily relationship based.” “Reinvention is a skillset that both he and Chris and others have developed over a long career.”Get to know more about Benjamin Whitfield through the links below.https://www.linkedin.com/in/benjaminwhitfield/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode of Unspoken Security, host AJ Nash speaks with Dr. Peter Garraghan, CEO and CTO of Mindgard. They discuss the real-world security risks of artificial intelligence. Peter starts with a simple point: AI is just software, and software is easy to break. He urges businesses using AI to step back and truly understand its vulnerabilities.Peter draws parallels between the current AI boom and past technology cycles like cloud computing. While AI feels revolutionary, the security risks are not new. Threats like data poisoning and prompt injection are modern versions of classic cybersecurity problems. The danger is that AI's human-like interface makes it easy to anthropomorphize, causing users to overlook fundamental security flaws.To manage these risks, Peter advises companies to treat AI like any other software. This means applying the same rigorous security controls, testing protocols, and incident response playbooks. Instead of creating a separate process for AI, organizations should find the gaps in their current security posture and update them. This practical approach helps businesses secure AI systems effectively.Send us a textSupport the show
Dave Selinger is the CEO of Deep Sentinel, an AI-powered video surveillance system. They have raised $38M in funding from Intel Capital, Shasta Ventures, and others. Prior to this, he was the cofounder and CTO of Redfin. And he was also the cofounder of RichRelevance. Dave's favorite books: - The Speed of Trust (Author: Stephen Covey)- Snow Crash (Author: Neal Stephenson)(00:01) – Origin Story: A Near-Miss and the Broken Security Market(04:22) – What Deep Sentinel Does and Why It Works(06:23) – Benefits of Vertical Integration in Security Tech(10:20) – How Deep Sentinel Tackles False Positives with AI(14:06) – Balancing Escalation Risk and Deterrence(17:06) – How Deep Sentinel Processes and Uses Its Data(19:36) – Positioning Deep Sentinel in the Competitive Landscape(21:12) – Go-to-Market Learnings for Hardware-Software Companies(23:39) – Residential vs. Commercial Security: A Comparison(26:41) – Regulation and Public Sentiment Around Security AI(29:03) – Insurance, Security, and Incentive Alignment(31:23) – Company Building and Lessons from 20 Years of Founding(39:26) – The Role of Distillation and LLMs in Deep Sentinel's Future(42:27) – Rapid Fire Round--------Where to find Dave Selinger: LinkedIn: https://www.linkedin.com/in/selly/--------Where to find Prateek Joshi: Newsletter: https://prateekjoshi.substack.com Website: https://prateekj.com LinkedIn: https://www.linkedin.com/in/prateek-joshi-infinite X: https://x.com/prateekvjoshi
In this episode, Mark Ledlow is joined by Benjamin Whitfield, a seasoned security professional with a military and agency background and a former CIA. They discuss Ben's transition from being an executive in Silicon Valley to an independent consultant, and delve into the complexities of the security industry. Key topics include the role of Chief Security Officers, the importance of sales in security, and the need for risk-based assessment. They also explore emerging trends in security, the impact of the new administration, and the importance of continuing education for security professionals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSBuilding relationships is crucial for ensuring security programs are funded and supported. The role of a Chief Security Officer (CSO) involves significant political and sales skills. Proper risk assessments tailored to the company culture are essential for effective security programs. The executive protection industry's future might see growth due to increasing threats and new economic sectors like cryptocurrency. Ongoing education and adaptation to emerging trends and technologies are vital for security professionals.QUOTES"It's all sales... Your job really is to advocate for how do you protect people, facilities, operations as much as possible given what the political climate is in your company." "If you build a program that meets the absolute corporate need, your job isn't going away." "In Silicon Valley, I'll stereotype. I'm just the kid wearing the hoodie. You're the kid wearing the hoodie who's now worth, you know, a billion dollars." "There are multiple ways where a company can provide, can have security for its senior most executives." "The CSO chair is, you're playing politics, you're fighting for budget with everybody else."Get to know more about Benjamin Whitfield through the links below.https://www.linkedin.com/in/benjaminwhitfield/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actual human risk.Ashley presents a better way forward through human risk management. This modern strategy moves beyond simple phishing tests and integrates data from your existing security tools. It provides a full view of employee behavior to identify and address risks proactively. The goal is to make security training engaging and effective, not just another task to ignore.The conversation also covers the nuanced relationship between human risk management and insider threat programs. AJ and Ashley discuss how to empower employees and transform them from a potential liability into an organization's greatest security asset, creating a stronger, more resilient workforce.Send us a textSupport the show
Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle.Robert challenges the common view that "whack-a-mole" tactics are pointless. He believes the key is changing the game from single-player to multiplayer whack-a-mole. By working with domain registrars, hosting providers, and government agencies, defenders can hit criminals at multiple points in their attack chain. This coordinated response makes cyber crime more expensive and less profitable for attackers.The conversation covers everything from traditional phishing to sophisticated pig butchering scams. Robert shares how Netcraft uses AI to engage with scammers and gather intelligence at scale. He also discusses the national security implications of cyber crime and why whole-of-government responses in countries like Australia and the UK show promise for reducing fraud rates.Send us a textSupport the show
In this episode, Mark Ledlow is interviewed by Tommy Pappas of Fearless Protection Insights. They delve into the complexities of personal and physical security in today's unpredictable environment. Mark shares his background in military and law enforcement, his journey into the executive protection industry, and how he founded Ledlow Security Group. They discuss the importance of proactive security measures, conducting risk and threat assessments, and the role of advanced teams in ensuring the safety of high-net-worth individuals. The conversation also touches on the impact of social media, AI-driven threats, and the significance of educating clients to foster trust and security. Additionally, Mark highlights his commitment to supporting veterans and looks forward to expanding his security and media ventures.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSContext and Perspective: Understanding the significance of being vigilant in different environments, both domestic and international. Proactive Measures: Importance of risk assessments, threat assessments, and protective intelligence to mitigate potential dangers proactively. Digital Age Challenges: Awareness of the increased threats due to social media, AI, and the evolving nature of targeted attacks. Value of Expertise: Highlighting the importance of involving experts in security to protect personal, family, and corporate interests. Holistic Security Approach: Emphasis on combining physical security measures with digital intelligence to provide comprehensive protection. Veteran Support: Mark's commitment to empowering veterans through employment opportunities and community support.QUOTES"You don't have to be a Joe Rogan. You don't have to be a top 1% podcaster to tell your story. You just gotta get over your own fear of getting on the podcast." "My job, what I've learned over the years, is to do an investigation, figure out the context of the threat, and often, education is the key." "People want actionable intelligence. That's the key." "Mark's team does X, Y, and Z... showing the value on a risk threat assessment to the decision-makers." "Creating memories that will last a lifetime and embodying a fearless mindset not just in business, but in life."Get to know more about Tommy Pappas through the links below.https://www.linkedin.com/in/tommypappas/https://www.tpgcollective.com/https://www.youtube.com/@TommyPappasFOTo hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Connect with Onramp // Onramp Terminal // Gerry O'Shea on X // HashdexThe Last Trade: a weekly, bitcoin-native podcast covering the intersection of bitcoin, tech, & finance on a macro scale. Hosted by Jackson Mikalic, Michael Tanguma, Brian Cubellis, & Tim Kotzman. Join us as we dive into what bitcoin means for how individuals & institutions save, invest, & propagate their purchasing power through time. It's not just another asset...in the digital age, it's The Last Trade that investors will ever need to make.00:00 - Bitcoin's Bullish Momentum in 202504:35 - Market Sentiment and Price Analysis07:24 - ETF Impact on Bitcoin's Market Structure10:24 - Institutional Adoption and Investor Behavior13:27 - State Policies and Bitcoin Investments16:51 - The Role of Bitcoin in Fiscal Responsibility19:39 - Political Dynamics and Bitcoin's Future44:14 - The Debt Train: A Silver Lining45:34 - Policy Shifts and Bitcoin's Role50:46 - Legislative Landscape: Stablecoins and Market Structure58:17 - Stablecoins: Integration into Traditional Finance01:02:17 - Physical Security and Bitcoin Ownership01:12:22 - The Future of Bitcoin and Market Dynamics01:19:42 - Outro and DisclaimerPlease subscribe to Onramp Media channels and sign up for weekly Research & Analysis to get access to the best content in the ecosystem weekly.
In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights the importance of advocating for yourself while remaining empathetic to others' struggles.Jennifer introduces the concept of "self-energy," emphasizing the need to prioritize what's best for everyone, not just yourself. She also explores the impact of personal trauma on professional life and offers practical advice for building resilience. Jennifer emphasizes the value of self-care, including meditation and affirmations. She shares her personal "courage plan" framework to help listeners overcome obstacles and create a more fulfilling life.This episode challenges listeners to examine their behaviors and create a path toward greater self-awareness and personal growth, both personally and professionally.Send us a textSupport the show
In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They cut through the technical jargon to explain how quantum computing fundamentally differs from classical computing and why its exponential processing power threatens to break current encryption standards."While current quantum computers operate at around 150 qubits, once they reach sufficient power, everything from banking transactions to secure communications could be compromised instantly," warns Robert during the discussion of "Q Day" — the moment when quantum computers become powerful enough to defeat public-key cryptography underpinning internet security.Despite the alarming scenario, the experts offer practical guidance on preparing for this threat. They outline how organizations should begin implementing post-quantum cryptography solutions developed by NIST, emphasizing that proactive preparation, not panic, is the critical response security professionals should adopt today. Listen to the full episode to understand the quantum threat and learn the concrete steps your organization should take now before Q Day arrives.Send us a textSupport the show
In this episode, Mark Ledlow, Bruno Dias, and Matt Talbot discuss the importance of comprehensive threat and risk assessments in corporate and educational environments. They explore the integration of physical security with behavioral threat assessments, emphasizing the crucial role every employee plays in maintaining safety. Additionally, they touch on the psychological aspects of individuals who commit acts of violence, drawing on their own extensive field experiences. Matt shares a powerful story from his time working in a high-risk prison environment, highlighting the importance of building trust and respect with inmates. The episode wraps up with information about their ongoing projects and how listeners can reach out to them for their expert services.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Handling: The importance of dealing with adversity and leveraging experiences to stay fearless is emphasized. Comprehensive Security Approach: Incorporating physical security into behavioral threat assessment provides a unique value. Inclusiveness in Safety: Every employee, regardless of their role, should be viewed as part of the safety and security team. Warning Signs: Identifying and acting on warning behaviors and signs is crucial in preventing violent incidents. Human Side of Inmates: Building respectful relationships with inmates can foster mutual respect and potentially prevent violent outcomes. Impactful Storytelling: Personal stories, such as working with high-risk individuals, can convey powerful lessons in security management. Legacy and Education: The importance of leaving a positive legacy and educating the next generation of security professionals.QUOTES"We really need to think about everybody who is positioned to be able to possibly help." "Humans communicate kind of like dogs shed hair, right? It's just a necessity." "Everybody plays a role... there's something good in everybody and my job was to figure that out." "Sometimes it's about just getting to the human side of somebody." "Treating people with validation and making them feel significant can prevent them from committing violent acts." "Our goal is to leave something original, something impacting on this larger community."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Send us a textUnlocking the Future of Physical Security with PhySaaS – Josh Dickinson's JourneyJoin us for an enlightening episode of The Wireless Way with Josh Dickinson, leader at PhySaaS (Physical Security as a Service). Hear about Josh's entrepreneurial journey, from starting in telecom at 16 to co-founding multiple successful companies. Learn about PhySaaS's unique approach to physical security, incorporating advanced AI and Verkada hardware into a turnkey solution for businesses. Josh details the state of the security industry, the importance of integrating physical security into cybersecurity, and practical advice for partners looking to enhance their offerings. With engaging insights on market trends, customer profiles, and the ROI of security solutions, this episode is a must-watch for tech enthusiasts and business leaders alike. Don't miss out on Josh's unique perspective and invaluable advice!00:00 Introduction and Guest Welcome01:38 Josh Dickinson's Career Journey02:48 Founding PhySaaS04:21 Understanding PhySaaS and Its Offerings06:00 State of the Security Industry10:20 AI Integration in Security Solutions12:24 Event Highlights and Industry Insights15:22 Access Control and Compliance17:13 Innovative Security Solutions: License Plate Reading Cameras17:30 Integrating Access Control Systems with Emerging Technologies18:18 Partner Profiles: How to Sell Security Solutions18:42 Six-Step Process for Simplifying Security Sales21:01 Maximizing ROI and Overcoming Security Challenges24:57 Trends in Security: New Builds vs. Existing Structures29:11 The Importance of Managed Security Solutions30:31 Final Thoughts and EncouragementLearn more about PhySaaS hereLearn more about Josh hereSupport the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.
In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education.Instead of focusing on checkbox exercises once a year, Jayson advocates for building situational awareness—a security mindset that extends beyond the workplace into everyday life. He shares practical strategies for gamifying security training, fostering a culture where employees feel like participants rather than targets, and creating year-round engagement through creative competitions.Through entertaining stories and candid insights from his experience as a simulated adversary for hire, Jayson challenges the industry's approach to security training and offers a refreshing perspective on how to make organizations genuinely more secure.Send us a textSupport the show
#036 – In this next episode, I was joined by Erin Grippo, Senior Manager of Product Operations at Brivo, who brings nearly a decade of experience in the security industry across marketing, business strategy, partnerships, and product operations.Today's conversation explored Erin's career journey and how she navigated major transitions across roles, companies, and countries. We discussed her philosophy about career growth, overcoming early career challenges, and her advice for aspiring professionals. Erin also shared her perspective on leadership development, the value of networking, and why mentorship is important in our careers. I think you'll find this to be an honest and inspiring discussion!After graduating from DePauw University with a degree in Communication, Erin launched her career at Allegion in the U.S. and later relocated to Toronto to lead multifamily and PropTech initiatives for Allegion Canada. She continued to expand her expertise at Latch, managing partnerships and launching new products and programs before joining Brivo in 2023.Erin is active in the security industry's professional community, serving on the Security Industry Association's RISE Steering Committee and previously on the Foundation for Advancing Security Talent (F.A.S.T) board from 2020 to 2024. She was recently named one of the 2024 Women in Security Forum Power 100. Erin is passionate about mentoring early-career professionals and building stronger pathways for the next generation of security leaders—and it was a pleasure having her on the podcast.-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes
In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education.Instead of focusing on checkbox exercises once a year, Jayson advocates for building situational awareness—a security mindset that extends beyond the workplace into everyday life. He shares practical strategies for gamifying security training, fostering a culture where employees feel like participants rather than targets, and creating year-round engagement through creative competitions.Through entertaining stories and candid insights from his experience as a simulated adversary for hire, Jayson challenges the industry's approach to security training and offers a refreshing perspective on how to make organizations genuinely more secure.Send us a textSupport the show
AI Today Podcast: Artificial Intelligence Insights, Experts, and Opinion
In this episode of AI Today hosts Kathleen Walch and Ron Schmelzer discuss various ways that AI is being applied for Physical Security & Safety. Continue reading AI Use Case Series: AI in Physical Security & Safety [AI Today Podcast] at Cognilytica.
Ransomware gangs aren't faceless shadows. Jon DiMaggio knows—he's talked to them. In this episode, A.J. Nash sits down with the Chief Security Strategist at Analyst1 to pull back the curtain on the hidden world of cybercriminals. Jon shares how he builds detailed personas, infiltrates ransomware crews like LockBit, and navigates the psychological toll that comes with living a double life.Jon breaks down the tactics behind covert engagements—how ego, language barriers, and criminal alliances can be used to gain access. He also talks through his storytelling process in The Ransomware Diaries and why long-form, evidence-based intelligence reporting still matters. This isn't just threat research—it's human behavior under a microscope.The conversation also dives into attribution, burnout, and the personal risks Jon has faced. He opens up about being targeted, leaning on mental health support, and using fear as fuel. This is a raw, unfiltered look at cyber threat intelligence from the inside.Send us a textSupport the show