Podcasts about Physical security

  • 209PODCASTS
  • 375EPISODES
  • 38mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 27, 2025LATEST
Physical security

POPULARITY

20172018201920202021202220232024


Best podcasts about Physical security

Latest podcast episodes about Physical security

The Fearless Mindset
Inside the Minds of Violent Offenders: Lessons from the Front Lines

The Fearless Mindset

Play Episode Listen Later May 27, 2025 22:43


In this episode, Mark Ledlow, Bruno Dias, and Matt Talbot discuss the importance of comprehensive threat and risk assessments in corporate and educational environments. They explore the integration of physical security with behavioral threat assessments, emphasizing the crucial role every employee plays in maintaining safety. Additionally, they touch on the psychological aspects of individuals who commit acts of violence, drawing on their own extensive field experiences. Matt shares a powerful story from his time working in a high-risk prison environment, highlighting the importance of building trust and respect with inmates. The episode wraps up with information about their ongoing projects and how listeners can reach out to them for their expert services.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Handling: The importance of dealing with adversity and leveraging experiences to stay fearless is emphasized. Comprehensive Security Approach: Incorporating physical security into behavioral threat assessment provides a unique value. Inclusiveness in Safety: Every employee, regardless of their role, should be viewed as part of the safety and security team. Warning Signs: Identifying and acting on warning behaviors and signs is crucial in preventing violent incidents. Human Side of Inmates: Building respectful relationships with inmates can foster mutual respect and potentially prevent violent outcomes. Impactful Storytelling: Personal stories, such as working with high-risk individuals, can convey powerful lessons in security management. Legacy and Education: The importance of leaving a positive legacy and educating the next generation of security professionals.QUOTES"We really need to think about everybody who is positioned to be able to possibly help." "Humans communicate kind of like dogs shed hair, right? It's just a necessity." "Everybody plays a role... there's something good in everybody and my job was to figure that out." "Sometimes it's about just getting to the human side of somebody." "Treating people with validation and making them feel significant can prevent them from committing violent acts." "Our goal is to leave something original, something impacting on this larger community."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044To hear more episodes of The Fearless Mindset podcast, you can go to  https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Wireless Way, with Chris Whitaker
The Intersection of AI and Physical Security: Josh Dickinson, the Best Dressed Man in the Channel with PhySaaS explains.

The Wireless Way, with Chris Whitaker

Play Episode Listen Later May 24, 2025 32:18 Transcription Available


Send us a textUnlocking the Future of Physical Security with PhySaaS – Josh Dickinson's JourneyJoin us for an enlightening episode of The Wireless Way with Josh Dickinson, leader at PhySaaS (Physical Security as a Service). Hear about Josh's entrepreneurial journey, from starting in telecom at 16 to co-founding multiple successful companies. Learn about PhySaaS's unique approach to physical security, incorporating advanced AI and Verkada hardware into a turnkey solution for businesses. Josh details the state of the security industry, the importance of integrating physical security into cybersecurity, and practical advice for partners looking to enhance their offerings. With engaging insights on market trends, customer profiles, and the ROI of security solutions, this episode is a must-watch for tech enthusiasts and business leaders alike. Don't miss out on Josh's unique perspective and invaluable advice!00:00 Introduction and Guest Welcome01:38 Josh Dickinson's Career Journey02:48 Founding PhySaaS04:21 Understanding PhySaaS and Its Offerings06:00 State of the Security Industry10:20 AI Integration in Security Solutions12:24 Event Highlights and Industry Insights15:22 Access Control and Compliance17:13 Innovative Security Solutions: License Plate Reading Cameras17:30 Integrating Access Control Systems with Emerging Technologies18:18 Partner Profiles: How to Sell Security Solutions18:42 Six-Step Process for Simplifying Security Sales21:01 Maximizing ROI and Overcoming Security Challenges24:57 Trends in Security: New Builds vs. Existing Structures29:11 The Importance of Managed Security Solutions30:31 Final Thoughts and EncouragementLearn more about PhySaaS hereLearn more about Josh hereSupport the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.

Unspoken Security
Security Awareness Training Sucks! Focus on Situational Awareness (Part 2)

Unspoken Security

Play Episode Listen Later May 15, 2025 44:05


In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education.Instead of focusing on checkbox exercises once a year, Jayson advocates for building situational awareness—a security mindset that extends beyond the workplace into everyday life. He shares practical strategies for gamifying security training, fostering a culture where employees feel like participants rather than targets, and creating year-round engagement through creative competitions.Through entertaining stories and candid insights from his experience as a simulated adversary for hire, Jayson challenges the industry's approach to security training and offers a refreshing perspective on how to make organizations genuinely more secure.Send us a textSupport the show

ASIAL Security Insider
Ep 134 - Managing a Converged Security Model

ASIAL Security Insider

Play Episode Listen Later May 9, 2025 37:54


In this episode of the ASIAL Security Insider podcast, we are discussing Converged security, specifically how to successfully develop, deliver, and manage an organisation-wide model for converged security. To help us with our discussion, we are joined by Penny Clarke. Penny is the Managing Director of Convergence Security Consulting and has 34 years of industry experience across a range of sectors, including the Defence Industry, Government, and the Private sector. Penny's roles have included a wide variety of positions, including Chief Security Officer, Chief Information Security Officer, Protective Security Manager, Cyber Security Manager, Business Continuity Manager, Emergency Management, and more.  Penny's experience, training, and qualifications encompass a broad spectrum of skills, including Governance, Risk, and Assurance, Training, Security Incidents and Investigations, Information Security, Cyber Security, Physical Security, Personnel Security, and investigations, to name but a few. In our discussion, we cover:·     Cultural and Operational Differences?·     Lack of Unified Strategy and Leadership·     Technology Integration Challenges·     Regulatory and Compliance Complexities·     Evolving Threat Landscape and Risk ManagementFor more podcasts like this one, visit www.asial.com.au.

The Security Student Podcast
Shaping Your Role in the Security Industry with Erin Grippo

The Security Student Podcast

Play Episode Listen Later May 8, 2025 61:15


#036 – In this next episode, I was joined by Erin Grippo, Senior Manager of Product Operations at Brivo, who brings nearly a decade of experience in the security industry across marketing, business strategy, partnerships, and product operations.Today's conversation explored Erin's career journey and how she navigated major transitions across roles, companies, and countries. We discussed her philosophy about career growth, overcoming early career challenges, and her advice for aspiring professionals. Erin also shared her perspective on leadership development, the value of networking, and why mentorship is important in our careers. I think you'll find this to be an honest and inspiring discussion!After graduating from DePauw University with a degree in Communication, Erin launched her career at Allegion in the U.S. and later relocated to Toronto to lead multifamily and PropTech initiatives for Allegion Canada. She continued to expand her expertise at Latch, managing partnerships and launching new products and programs before joining Brivo in 2023.Erin is active in the security industry's professional community, serving on the Security Industry Association's RISE Steering Committee and previously on the Foundation for Advancing Security Talent (F.A.S.T) board from 2020 to 2024. She was recently named one of the 2024 Women in Security Forum Power 100. Erin is passionate about mentoring early-career professionals and building stronger pathways for the next generation of security leaders—and it was a pleasure having her on the podcast.-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes

Unspoken Security
Security Awareness Training Sucks! Focus on Situational Awareness (Part 1)

Unspoken Security

Play Episode Listen Later May 1, 2025 42:30


In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education.Instead of focusing on checkbox exercises once a year, Jayson advocates for building situational awareness—a security mindset that extends beyond the workplace into everyday life. He shares practical strategies for gamifying security training, fostering a culture where employees feel like participants rather than targets, and creating year-round engagement through creative competitions.Through entertaining stories and candid insights from his experience as a simulated adversary for hire, Jayson challenges the industry's approach to security training and offers a refreshing perspective on how to make organizations genuinely more secure.Send us a textSupport the show

AI Today Podcast: Artificial Intelligence Insights, Experts, and Opinion
AI Use Case Series: AI in Physical Security & Safety [AI Today Podcast]

AI Today Podcast: Artificial Intelligence Insights, Experts, and Opinion

Play Episode Listen Later Apr 30, 2025 6:42


In this episode of AI Today hosts Kathleen Walch and Ron Schmelzer discuss various ways that AI is being applied for Physical Security & Safety. Continue reading AI Use Case Series: AI in Physical Security & Safety [AI Today Podcast] at Cognilytica.

Unspoken Security
Know Your Enemy, Know Yourself

Unspoken Security

Play Episode Listen Later Apr 17, 2025 61:41 Transcription Available


Ransomware gangs aren't faceless shadows. Jon DiMaggio knows—he's talked to them. In this episode, A.J. Nash sits down with the Chief Security Strategist at Analyst1 to pull back the curtain on the hidden world of cybercriminals. Jon shares how he builds detailed personas, infiltrates ransomware crews like LockBit, and navigates the psychological toll that comes with living a double life.Jon breaks down the tactics behind covert engagements—how ego, language barriers, and criminal alliances can be used to gain access. He also talks through his storytelling process in The Ransomware Diaries and why long-form, evidence-based intelligence reporting still matters. This isn't just threat research—it's human behavior under a microscope.The conversation also dives into attribution, burnout, and the personal risks Jon has faced. He opens up about being targeted, leaning on mental health support, and using fear as fuel. This is a raw, unfiltered look at cyber threat intelligence from the inside.Send us a textSupport the show

The Peel
Building Verkada, the $4.5B Physical Security Company | Filip Kaliszan, Founder and CEO

The Peel

Play Episode Listen Later Apr 10, 2025 102:51


Filip Kaliszan is the Founder & CEO of Verkada, the physical security company.Verkada started in 2016 by building the best camera for physical security teams, and has since evolved into a full suite of security products for buildings. Filip takes us inside Verkada's rapid growth to almost a billion in annual revenue, over 2,000 employees, and raising capital from investors like Sequoia, Meritech, First Round, General Catalyst, and Next47.We get into how AI and LLMs are changing hardware, the power of customer therapy, how Filip iterated on early startup ideas, inside Verkada's very difficult first funding round, how signing their first big customers changed the trajectory of the business, and how to think about adding new products over time.We also talk through Verkada's commitment to in-person work in the summer of 2020, how you should evaluate joining a startup as an employee, Verkada's “software zero” employee bonus policy, and building a rooftop bar for the office.Thanks to Numeral for supporting this episode, the end-to-end platform for sales tax and compliance. Try it here: https://bit.ly/NumeralThePeelTimestamps:(4:20) Verkada, the physical security technology company + Demo!(11:02) Building software powered hardware(12:56) LLM opportunities in cameras(15:49) Filip's lifelong fascination with photography(17:57) Taking one year to come up with the idea for Verkada(22:27) Building his own home security system to learn the $16B market(27:14) Why hardware experimentation is cheaper and easier than you'd think(30:36) The importance of customer therapy(32:37) How to get your first customers, importance of quick time to demo(35:06) Why early fundraising was so hard(40:38) Verkada's first big customer(42:23) How to decide what startup to join(45:45) The opportunity in “smart building tech”(50:34) How to launch new product lines(58:07) Re-architecting the security industry to be software-native(1:02:31) How hiring and managing a team changes as you scale(1:08:55) Why each team at Verkada has its own recruiters(1:14:00) Adding senior leaders to the team as you scale(1:17:06) Evolving from introverted engineer to CEO of multi-thousand person company(1:21:59) Verkada's cool office and focus on in-person work during COVID(1:28:12) Building a rooftop bar on the office(1:32:20) Verkada's Software Zero employee bonus program with 40x ROI(1:36:00) How Filip thinks about IPO vs staying privateReferencedVerkada: https://www.verkada.com/Open roles at Verkada: https://www.verkada.com/careers/Follow FilipLinkedIn: https://www.linkedin.com/in/kaliszan/Follow TurnerTwitter: https://twitter.com/TurnerNovakLinkedIn: https://www.linkedin.com/in/turnernovakSubscribe to my newsletter to get every episode + the transcript in your inbox every week: https://www.thespl.it/

Unspoken Security
Unspoken Security Ep 32: Can We Social Engineer the Bad Guys to Shut Them Down?

Unspoken Security

Play Episode Listen Later Apr 3, 2025 66:54 Transcription Available


In this episode of Unspoken Security, host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show

Unspoken Security
The Growing Movement of Digital Investigations

Unspoken Security

Play Episode Listen Later Mar 20, 2025 60:27 Transcription Available


In this episode of Unspoken Security, host A.J. Nash sits down with Ramesh Rajagopal, Co-Founder and CEO of Authentic8, to discuss the evolving landscape of digital investigations. They explore how modern intelligence teams navigate the deep and dark web, conduct secure open-source research, and protect themselves from exposure. Ramesh shares how his platform, Silo, empowers analysts by providing anonymity, obfuscation, and productivity tools to streamline investigations without compromising security.The conversation dives into the challenges of direct engagement with cybercriminal environments, the risks analysts face when conducting investigations, and how organizations are shifting towards more proactive intelligence programs. A.J. and Ramesh also discuss the growing adoption of digital investigation tools in the commercial sector, spanning industries from financial services to corporate security and brand protection.AI's role in intelligence work also takes center stage, with insights on how automation can assist analysts without replacing human expertise. The episode closes with practical recommendations for organizations looking to strengthen their intelligence operations while balancing security, efficiency, and long-term strategic growth.Send us a textSupport the show

The PowerShell Podcast
Exploring PowerShell for Physical Security and Automation with Cody Paternostro

The PowerShell Podcast

Play Episode Listen Later Mar 17, 2025 37:01


In this episode of the PowerShell Podcast, we welcome Cody Paternostro, a rising star in PowerShell automation, to discuss his unique journey into IT, the power of persistence in learning, and his work on RemotePro, a sophisticated PowerShell-based security camera management tool. Cody shares how he transitioned from food delivery to IT, leveraged PowerShell to streamline operations in physical security, and how asking the right questions helped accelerate his growth. Key topics in this episode include: Cody's unconventional entry into IT – How he discovered PowerShell in a networking and cybersecurity program. The impact of mentorship and community engagement – Learning from the PowerShell community and working with Joshua Hendricks. Building PowerShell tools for security – Using PowerShell to manage security cameras and automate surveillance tasks. From mega scripts to modules – Cody's journey in transitioning from large scripts to structured, reusable PowerShell modules. The importance of troubleshooting and continuous learning – How to push through roadblocks, improve problem-solving skills, and refine PowerShell development practices. Leveraging PowerShell GUI development – The role of runspaces, PSWriteHTML, and WPF in building efficient and user-friendly interfaces. Cody also shares insights on overcoming imposter syndrome, the power of community, and why documenting and sharing knowledge can accelerate career growth. Join the conversation:   Bio and Links: Cody Paternostro enjoys learning about Cybersecurity and PowerShell automation. · Experience: Digital Surveillance Solutions, Inc. · Education: Finger Lakes Community College · Location: Buffalo · 323 connections on LinkedIn. View Cody Paternostro's profile on LinkedIn, a professional community of 1 billion members. Connect with Cody on LinkedIn: https://www.linkedin.com/in/codypaternostro Explore RemotePro on GitHub https://remotepro.dev Join PowerShell Wednesdays every Wednesday at 2 PM EST in the PDQ Discord (discord.gg/pdq) The PowerShell Podcast Hub: https://pdq.com/the-powershell-podcast The Powershell Podcast on YouTube: https://youtu.be/bDjG6hSUIms

CISSP Cyber Training Podcast - CISSP Training Program
CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 11, 2025 38:02 Transcription Available


Send us a textThe traditional boundaries between physical and cyber security are rapidly disappearing, creating both risks and opportunities for organizations of all sizes. This eye-opening conversation with Casey Rash from Secure Passage explores the critical intersection where these two domains meet and the innovative solutions emerging to bridge this gap.Casey brings his fascinating journey from Marine Corps signals intelligence to fintech security to the partner side of cybersecurity, sharing valuable insights about career development along the way. His key advice resonates deeply: build a strong professional network and be open to exploring different security domains before finding your niche.The conversation dives deep into how everyday physical security devices have evolved into sophisticated data collection points. Today's smoke detectors can identify THC in vape smoke and detect distress calls. Modern security cameras perform advanced detection functions like tracking objects, identifying crowd formations, and reading license plates. All this creates valuable security telemetry that remains largely untapped in most organizations.What makes this discussion particularly valuable for security professionals is understanding how Secure Passage's solutions—Haystacks and Truman—map to specific CISSP domains including Security Operations, Security and Risk Management, and Asset Security. Their "Physical Detection and Response" (PDR) approach applies cybersecurity principles to physical security data, creating a more holistic security posture.Perhaps most telling is the organizational disconnect Casey highlights between physical and cyber teams. As he notes, "If you talk to CISOs today, it's a crapshoot who's managing physical security." This division creates significant risk, as threats in one domain frequently impact the other—from terminated employees becoming both physical threats and insider cyber risks to non-human identities outnumbering human identities 10-to-1 in most environments.Ready to rethink your approach to comprehensive security? This conversation provides the perfect starting point for bridging the gap between your physical and cyber security programs. Check out securepassage.com to learn more about their innovative solutions.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Understate: Lawyer X
DETECTIVES | Australia's real life Mindhunter

Understate: Lawyer X

Play Episode Listen Later Mar 9, 2025 53:27


Behavioural threat assessment is a new area of policing and it's been incredibly successful in helping to solve complex crimes. Former NSW Detective Kris Illingsworth trained with the FBI in behavioural threat assessment. In this episode of Crime Insiders | Detectives, Brent Sanders discovers how behavioural threat assessment works and how it can be used to reduce the risk of domestic violence. We also delve into the case of the murder of a health care executive in New York and how profiling helped police arrest the suspect.See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Bridging Digital and Physical Security: Protecting Executives in an Evolving Threat Landscape | A BlackCloak Brand Story with Chris Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 5, 2025 29:36


In an era where personal and professional lives are increasingly intertwined in the digital realm, the security of high-profile individuals extends far beyond corporate firewalls. Executives, board members, and high-net-worth individuals face growing threats not just to their businesses but also to their families and personal lives. The convergence of cybersecurity and physical security has never been more evident, and BlackCloak is at the forefront of addressing this modern challenge.In this episode of ITSPmagazine's Brand Story series, hosts Marco Ciappelli and Sean Martin sit down with Dr. Chris Pierson, CEO and Founder of BlackCloak, to explore the increasing risks posed by cybercriminals, data brokers, and even nation-state actors, all of whom exploit publicly available information to orchestrate real-world threats. With the rise of doxing, swatting, and targeted attacks on corporate leadership, it is clear that safeguarding digital identities is no longer optional—it is essential.Dr. Pierson shares insights on how BlackCloak's concierge approach blends cutting-edge technology with a personalized human touch, ensuring that executives and their families can navigate the digital world securely. From removing personal information from data broker websites to mitigating deep web threats, BlackCloak's unique approach focuses on proactive protection rather than reactive crisis management. The conversation also touches on recent high-profile security breaches and their implications, highlighting the urgent need for businesses to extend cybersecurity measures beyond the enterprise network.As digital and physical threats continue to merge, organizations must rethink their approach to executive security. This episode is a wake-up call for leaders who may underestimate the exposure they and their families face. Tune in to learn why digital executive protection is no longer a luxury but a necessity, and how BlackCloak is setting the standard for safeguarding the modern executive.For those looking to take control of their digital privacy and security, visit BlackCloak.io and connect with Dr. Chris Pierson on LinkedIn. The intersection of cybersecurity and personal safety is here—how prepared are you?Learn more about BlackCloak: https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more. Guest: Chris Pierson, Founder and CEO of BlackCloak | On Linkedin: https://www.linkedin.com/in/drchristopherpierson/ResourcesDownload the Whitepaper | Executive Protection at Home is the Major Gap in Cybersecurity: https://itspm.ag/blackcue74Learn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Unspoken Security
Demystifying the Intelligence Community

Unspoken Security

Play Episode Listen Later Mar 4, 2025 53:09


The intelligence community is often misunderstood, shrouded in secrecy, and clouded by misinformation. In this solo episode, A.J. Nash pulls back the curtain on how intelligence actually works, breaking down the 18 agencies that make up the U.S. intelligence community, their legal limitations, and the oversight that keeps them in check. He explains the different types of intelligence—SIGINT, HUMINT, OSINT, and more—highlighting their roles in national security. A.J. also addresses the myths surrounding intelligence work, including claims of government surveillance, political weaponization, and conspiracy theories. He details how intelligence professionals are trained to be objective, follow strict oversight, and operate within legal frameworks. With firsthand experience, he challenges misconceptions and explains why the reality of intelligence work is far less sinister than the public is often led to believe.Finally, A.J. discusses the impact of political rhetoric on intelligence agencies, emphasizing the importance of separating fact from fiction. He urges listeners to approach claims about intelligence abuse with scrutiny and to recognize the dedication of those working behind the scenes to protect national security.Send us a textSupport the show

Technology for Business
HIPAA Updates 2025

Technology for Business

Play Episode Listen Later Feb 26, 2025 26:11


Understanding the New HIPAA Cybersecurity Regulations: Insights and ImplicationsTodd, the COO and CISO, and Ann, a Quality Assurance Analyst, discuss the upcoming updates to the HIPAA cybersecurity rules. They provide an overview of the proposed changes, address common concerns, and offer practical advice for healthcare organizations, especially smaller practices, to stay compliant. The conversation touches on the anticipated financial impacts, the importance of audits, and actionable steps for improving cybersecurity measures. Additionally, they explore the potential implications for other industries and emphasize the need for continuous education and support in navigating these regulations.Article referenced: https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches00:00 Introduction to HIPAA Cybersecurity Updates00:22 Overview of HIPAA and Proposed Changes01:47 Bipartisan Bill and Its Implications02:21 Anne's First Impressions and Concerns04:39 Discussion on Compliance and Regulations11:05 Implementation and Auditing Challenges14:23 Practical Steps for Small Practices20:43 Physical Security and Final Thoughts21:55 Conclusion and Future Outlook

The Ontic Protective Intelligence Podcast
Strengthening Financial Services Against Evolving Threats: Insights from Bert Oliveira

The Ontic Protective Intelligence Podcast

Play Episode Listen Later Feb 19, 2025 30:32


How do organizations transform isolated security measures into comprehensive insider risk programs? Bert Oliveira, Head of Physical Security and Investigations at Citizens Financial Group, shares 30+ years of insights on tackling insider risk and financial crimes in the evolving landscape of corporate security. Discover how partnerships, proactive forensics, and a strong security culture drive resilience and safeguard businesses against internal and external threats.You'll learn:How insider threats have shifted from targeting malicious actors to mitigating negligence and third-party risksThe role of digital forensics in building a secure foundation for identifying insider riskKey leadership advice for fostering collaboration and shared responsibility in security programsLearn more about Ontic's Incidents, Investigations, and Case Management.

The Security Student Podcast
Insights from a Crime Analysis Leader: Amanda K. Bruner

The Security Student Podcast

Play Episode Listen Later Jan 23, 2025 46:46


#036 — In this episode, I'm joined by Amanda Bruner, a crime analyst and adjunct professor with a rich background in crime analysis, intelligence, and law enforcement. We discuss how crime analysts support their organizations, key skills for success, advice for aspiring practitioners, and more.Amanda currently works at CNA's Center for Justice Research and Innovation, providing training and assistance to nearly two dozen U.S. law enforcement agencies. Previously, she served as the first crime analyst for the Matthews Police Department, implementing the Stratified Policing Model, and as a corporate intelligence specialist for Bank of America.A Michigan State University graduate with criminal justice and law enforcement intelligence degrees, Amanda has contributed to publications, conferences, and podcasts on automation, dashboards, and data analytics. She also leads professional organizations as President of the International Association of Crime Analysts and the Carolinas Crime Analysis Association. Recognized with industry awards, Amanda's impact on the field is significant, and it's an honor to speak with her.--Follow Amanda here: https://www.linkedin.com/in/amandabrunermsu/Carolinas Crime Analysis Association 2025 Annual Training Conference, March 25-28, 2025, Wilmington, North Carolina: https://www.carolinascrimeanalysis.org/page-18075-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes

Meraki Unboxed
Episode 130: Navigating Innovation: George Bentinck on Meraki Physical Security and Leadership

Meraki Unboxed

Play Episode Listen Later Jan 22, 2025 35:28


In our first podcast of 2025, we welcome George Bentinck, Vice President of Product Management – IoT and Edge Intelligence at Cisco Meraki. Join us in exploring George's journey from engineer to product management, his career challenges and triumphs, and his leadership of the MV/MT product lines. Gain insights into the evolution of these technologies and get a sneak peek into what's to come at Cisco Live EMEA.HostSammy Brenner, Virtual Sales Leader, Cisco MerakiGuestGeorge Bentinck is Vice President of Product Management – IoT and Edge Intelligence at Cisco Meraki. He leads the strategic direction and growth of AI-enabled products, including MV smart cameras and MT smart sensors. Since joining Cisco through the 2012 Meraki acquisition, George has been instrumental in developing new product categories and expanding into new markets.    With a background in sales engineering at Avaya and Nortel, George holds a Bachelor's degree in Internet Engineering from the University of Exeter. He lives in San Francisco and enjoys designing sensor systems for optimizing race car performance in his spare time.Meraki Physical Security Solutions pageSmart Cameras Product page

Security Visionaries
A Cyber & Physical Security Playbook, with Ben Morris from World Rugby

Security Visionaries

Play Episode Listen Later Jan 14, 2025 30:27


Security Visionaries is back for 2025, and host Emily Wearmouth is kicking things off with a conversation about the intersection between cyber and physical security when it comes to major events with Ben Morris, Group Head of Cyber Security for World Rugby. In their conversation,  Ben and Emily discuss the unique challenges of safeguarding international sports events, where cybersecurity and physical security intersect. From securing stadiums worldwide to collaborating with governments and navigating evolving threat landscapes, Ben offers fascinating insights into the complexities of modern sports security. Additionally, they also discuss how popular culture portrays security and the future of cybersecurity in global sports.

The Fearless Mindset
Episode 231 - Fearless Conversations: Tim Wenzel on Leadership and the Security Industry

The Fearless Mindset

Play Episode Listen Later Dec 10, 2024 38:56


In this episode of the Fearless Mindset podcast, host Mark Ledlow interviews Tim Wenzel, a top 40 life safety and security thought leader, about his journey in the security industry. Tim shares his experiences transitioning from corporate tech to Kroll, the challenges and accomplishments in becoming a recognized leader, and how he overcame initial fears of public speaking. The conversation sheds light on the significance of creating joyful and respectful environments in a field often marked by fear and conformity. Tim also discusses his philosophy of true leadership and the importance of developing strong, cohesive teams. This episode provides valuable insights for anyone interested in leadership and the security industry.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSTransition to Security Industry: Tim Wenzel shares his journey from corporate tech to becoming a recognized leader at Kroll in the security and life safety field.Overcoming Challenges: He highlights overcoming initial fears of public speaking and navigating the challenges of establishing credibility in a new industry.Leadership Philosophy: Tim emphasizes the importance of creating joyful, respectful environments in a field often marked by fear and conformity.Team Development: He advocates for building strong, cohesive teams as a cornerstone of effective leadership.Valuable Insights: The conversation provides actionable advice for aspiring leaders and professionals in the security industry.QUOTES"Usually, they're throwing you under the bus to make themselves look good because the ego is in the way.""It wasn't a ‘how to,' it was a ‘how to think about it.' And this is what you're responsible for, even if you don't think you're responsible for it.""Man, I was nervous. Sweating profusely. But the coolest thing I did was switch to projection mode and started drawing live during the presentation—it entertained and instructed.""We started this thing called the problem-solving mindset and came back to teach it. The response was overwhelming—people kept returning to learn more.""From an introvert who never dreamed of public speaking, to running workshops with 150 people in the room. It's crazy how far it's come.""Man, I was nervous. Sweating profusely. But the coolest thing I did was switch to projection mode and started drawing live during the presentation—it entertained and instructed."Get to know more about Tim Wenzel:LinkedIn: https://www.linkedin.com/in/relevant-perception/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Defence Connect Podcast
CYBER UNCUT: Securing the future – physical security, SaaS, and Australia's leadership in physical security, with Genetec's Lee Shelford

Defence Connect Podcast

Play Episode Listen Later Nov 25, 2024 36:00


In this episode of the Cyber Uncut podcast, Genetec's Asia-Pacific sales engineering and services manager, Lee Shelford, joins host Liam Garman to discuss the world of physical security and how Genetec's software-as-a-service (SaaS) solution is keeping public and private organisations safe.  The podcast begins analysing the evolution of physical security, from rudimentary alarm systems to today's SaaS-enabled physical control solutions.  Shelford then discusses how this solution keeps businesses safe: from using data analytics to streamline access control to automating endpoint cyber security.  The pair then discuss the myth of the airgap, and the company's expansion into the Australia-New Zealand market, with Australia proving to be a world leader in this technology. They wrap up by discussing how Genetec helps businesses on their journey, whether they want cloud-enabled physical security devices or on-premises capabilities.  Enjoy the podcast, The Cyber Uncut team

The Fearless Mindset
Episode 229 - Workplace Violence and Security Transitions with Martin Culbreth (Part 2)

The Fearless Mindset

Play Episode Listen Later Nov 21, 2024 30:23


In this episode, Mark Ledlow is joined by Martin Culbreth, a former Marine and FBI agent who now holds a leadership role in corporate security at Smithfield Foods. They delve into handling workplace violence and the impact of remote work on security. Martin discusses the decline in workplace incidents due to remote work, transitioning from military and law enforcement to corporate security roles, and the challenges of maintaining security in various industries. The episode also explores the importance of aligning with company culture and the necessity of understanding risk acceptance within the corporate environment. The conversation offers invaluable advice for security professionals and corporate leaders alike.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe conversation emphasizes dealing with adversity and maintaining resilience in various sectors, including security, business, and entertainment.The shift to remote work due to COVID-19 has reportedly decreased instances of workplace violence but introduced new challenges and risks.Effective communication and understanding the company's goals and culture are crucial for security professionals transitioning from military or government roles to corporate environments.The necessity of educating the C-suite on the importance of security and the potential risks associated with being complacent.Security experts should be both knowledgeable advisors and effective communicators to influence company policies and decisions.CSOs need to be adaptable, as corporate roles and environments can vastly differ from government or military positions.QUOTES"Don't get enamored with the process. Make sure you're thoughtful about where you're going to land.""We all love being invited to the prom. But then when the limo shows up, you're like, Ooh, is that really who I wanted to go with?""Be the one telling my boss what the risk is. If my boss decides that they're willing to accept that risk, I can't be so married to my project and to my department that I fight with them.""The biggest thing is to continue to try to educate our C-suite away from the idea that it's not going to happen.”Get to know more about Martin Culbreth:LinkedIn: https://www.linkedin.com/in/martin-culbreth-8930034a/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Unspoken Security
Inside the Data Broker Industry: Privacy Risks and Realities

Unspoken Security

Play Episode Listen Later Nov 12, 2024 54:31 Transcription Available


In this episode of Unspoken Security, host AJ Nash dives into the shadowy world of data brokers with guest Lawrence Gentilello, CEO of Optery. They begin by exploring what data brokers are, revealing how these companies collect, buy, and sell personal information—from dating app details to home addresses—to virtually anyone with a credit card. The conversation sheds light on the breadth of the industry and its impact on individual privacy, especially in the context of emerging technologies.Lawrence discusses the challenges of protecting personal data, detailing common security risks posed by apps, social media, and open web data. The episode emphasizes the need for proactive steps, like using password managers, enabling multi-factor authentication, and reducing one's digital footprint to minimize exposure to these vast data exchanges.In the final segment, AJ and Lawrence address legislative measures around data privacy, including state-level laws and the evolving role of AI in data brokering. Lawrence shares how Optery's automated data removal service helps individuals regain control over their personal information, reducing vulnerabilities and enhancing digital security. This episode is essential listening for anyone looking to better understand data privacy and protect their personal information.Send us a textSupport the show

Software Engineering Radio - The Podcast for Professional Software Developers
SE Radio 640: Jonathan Horvath on Physical Security

Software Engineering Radio - The Podcast for Professional Software Developers

Play Episode Listen Later Oct 30, 2024 59:19


Jonathan Horvath of Z-bit discusses physical access control systems (PACS) with host Jeremy Jung. They start with an overview of PACS components and discuss the proprietary nature of the industry, the slow pace of migration to open standards, and why Windows is commonly used. Jonathan describes the security implications of moving from isolated networks to the cloud, as well as credential vulnerabilities, encryption using symmetric keys versus asymmetric keys, and the risks related to cloning credentials. They also consider several standards, including moving from Wiegand to the Open Supervised Device Protocol (OSDP), as well as the Public Key Open Credential (PKOC) standard, and the open source OSDP implementation that Jonathan authored. Brought to you by IEEE Computer Society and IEEE Software magazine.

The Future of Supply Chain
Episode 83: Supply Chain Security, Scope, and Definitions with SAP's Jay Thoden van Velzen

The Future of Supply Chain

Play Episode Listen Later Oct 30, 2024 27:25 Transcription Available


In today's complex global supply chains, ensuring security across physical, cyber, and software dimensions is critical. This week, our own Jay Thoden van Velzen joins us to discuss the increasing risks of cyber-attacks as supply chains become more digital and interconnected. As we not only dive into the importance of third-party risk management and proactive measures to safeguard against vulnerabilities in software, Jay mentions that for organizations to navigate these challenges, they must prioritize comprehensive security strategies to protect their operations and data integrity. Come join us as we discuss the Future of Supply Chain

Unspoken Security
The Journey from Victim to Advocate

Unspoken Security

Play Episode Listen Later Oct 29, 2024 65:52 Transcription Available


On this episode of Unspoken Security, host AJ Nash welcomes Gary Berman, CEO of Cyberman Security. AJ speaks with Gary about his harrowing journey from successful business owner to victim of a persistent insider threat campaign. What started as financial fraud quickly spiraled into years of cyberstalking orchestrated by a group with suspected ties to a religious cult.Gary's story unveils the devastating impact of insider threats that extend far beyond financial loss. He details the emotional and psychological toll of being relentlessly targeted, both personally and professionally. His experience underscores the often-overlooked connection between cybercrime and extremist organizations.Now a cybersecurity advocate, Gary channels his experience into educating others. He discusses his work with Cyberheroes Comics and his latest venture: a platform designed to make high-level CISO talent accessible to small and medium-sized businesses.Send us a textSupport the show

MacVoices Audio
MacVoices #24261: Glenn Fleishman On Keeping Safe Using Mobile Tech (2)

MacVoices Audio

Play Episode Listen Later Oct 28, 2024 23:50


Glenn Fleishman goes in depth on the title subject of his Keep Safe Using Mobile Tech. We talk about how to secure Apple devices amid all the changes and updates to operating systems, along with features such as car crash detection, fall detection, emergency SOS, and the Check-In function, Glenn emphasizes the need for individuals to understand and customize their device settings for optimal protection from both misadventure as well as theft. (Part 2) This MacVoices is supported by Notion. Try Notion AI for free at notion.com/macvoices. Show Notes: Chapters :00:08 Introduction to Mobile Safety 02:21 Features for Physical Security 06:50 The Check-In Feature Explained 10:29 Addressing Safety Promotion Challenges 15:53 The Risks of Device Theft 21:26 Strategies Against Theft 22:36 Concluding Thoughts on Safety Links: Keeping Safe Using Mobile Tech by Glenn Fleishman Guests: Glenn Fleishman is a Seattle-based technology journalist and two-time winner on Jeopardy. He writes largely about where technology crosses with people's lives, as well as exhaustive technology explanations. At Macworld, he authors the Mac 911 user-help column. He has contributed to the Economist since 2005, including nearly 400 online blog posts and articles, as well as Fast Company, MIT Technology Review, Boing Boing, TidBITS, Six Colors, and others. You can find him on Twitter as @glennf, and check out everything else at his blog. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

The Fearless Mindset
Episode 225 - From Military to Corporate: Martin Culbreth's Journey in Leading Security at Smithfield Foods (Part 1)

The Fearless Mindset

Play Episode Listen Later Oct 22, 2024 27:07


In this episode, Mark Ledlow is joined by Martin Culbreth, a former Marine and FBI agent who now holds a leadership role in corporate security at Smithfield Foods. From Las Vegas, Mark discusses with Martin his journey into corporate security, focusing on physical security challenges, integration of technology, budget management, and the importance of information in security strategies. Martin shares his experiences transitioning into his role, establishing a security department, and handling budget constraints. The conversation delves into the complexity of proving the value of security measures, the necessity of constant communication with the C-suite, and how to maintain security standards across diverse manufacturing facilities. Martin addresses the impact of inflation on corporate budgeting and highlights proactive measures like collaboration with law enforcement and conducting site surveys to enhance security, even during tight budget cycles.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEvent Recap: Mark talks about attending a security practitioner event in Las Vegas and introduces Martin Culbreth, former Marine and FBI agent, now in a security leadership role.Martin's Role: Martin outlines his responsibilities in physical security at Smithfield, including information gathering, setting security standards, and collaborating across departments.Technology in Security: Martin discusses integrating technology like Ontic for information gathering and case management, and the challenges of implementing such technology.Building a Security Program: Martin shares his journey from starting a new security department, handling budgets, and developing a comprehensive strategic security plan.Security Challenges: Both speakers discuss challenges like justifying security expenses to the C-suite, comparing security to revenue-generating functions, and educating the corporate world on the importance of security investment.Proving Security's Value: The difficulty of proving security's ROI with hypothetical "prevented incidents" and the need to constantly communicate security's importance.Budget Negotiations: The process of working with finance and other departments to justify security expenditures and prioritize security projects.Economic Impact: The impact of inflation and corporate budgeting constraints on security investments and strategies to adapt during tight financial periods.Coordination with Law Enforcement: Emphasizing the importance of collaborating with law enforcement for emergency preparedness and crisis response training.QUOTES"We have to understand coming into corporate security that it's a sales, right? They expect everything to have a solid and apparent and immediate return on investment.""Our job is to sell products and make as good a profit as we can while still keeping our prices where we should. So I get that.""In the military, the trick was to make sure you spend what you were budgeted for. Otherwise, your budget dropped to that new level.""You have to be almost like the communications guy. Because you're selling the program. All the time and trying to explain why this is important.""In the military, I always remember, okay, it was set, right? And you had your budget. Whereas here, it's almost a fight year over year to almost reestablish that budget."Get to know more about Martin Culbreth:LinkedIn: https://www.linkedin.com/in/martin-culbreth-8930034a/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Security Student Podcast
Empowering People, Not Plans: Rethinking Business Continuity with Jeff Donaldson, PhD

The Security Student Podcast

Play Episode Listen Later Oct 17, 2024 82:34


#035—In this next episode, I was once again joined by Jeff Donaldson, PhD, to continue the conversation on emergency preparedness, this time discussing it in the context of enterprises and business continuity. This episode starts by looking at the topic from a business perspective. Specifically, we covered a range of ideas, including adaptive business continuity compared to the traditional approach, empowering business leaders to support planning and response, prioritizing people over technology, and so much more.Jeff brings a tremendous amount of experience and education directly relating to preparedness and business continuity to the podcast today, from his experience as a military officer in the Canadian Army (28 years!) leading logistical operations, as the principal researcher at Preparedness Labs Incorporated, and as an Associate Faculty member at Royal Roads University. Plus, he's earned his MA in Disaster and Emergency Management and his doctorate in Public Policy. I'm excited to bring you all his expertise.He even hosts a highly acclaimed podcast on preparedness and leads training sessions where he communicates (as he says), "Non-Apocalyptic evidence-based strategies for rational people with dreams."-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes

Unspoken Security
Foreign Nations are Attacking Our Elections. Now What?

Unspoken Security

Play Episode Listen Later Oct 15, 2024 72:32


In this episode of Unspoken Security, host Aj Nash sits down with Charity Wright, Principal Threat Intelligence Consultant at Recorded Future, to dive into the complexities of foreign influence on U.S. elections. They explore the evolving tactics used by nation-states like Russia and China, focusing on cyber threats, disinformation campaigns, and election interference. Charity highlights the growing concern over foreign actors exploiting vulnerabilities to weaken democracies.A key discussion point is the alarming rise of ransomware as a significant threat to the 2024 election. Charity explains how both nation-state and cybercriminal groups could disrupt critical infrastructure, potentially preventing voters from accessing polls or undermining public trust in the electoral process.The conversation wraps up by addressing how misinformation and disinformation campaigns have evolved, especially with the use of AI. Charity offers insights on how citizens can better identify credible sources and resist manipulative tactics designed to divide and destabilize.Send us a textSupport the show

The Security Podcasts
Proving physical security value across an organization

The Security Podcasts

Play Episode Listen Later Oct 15, 2024 12:52


In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization.

Complacency Kills - A Kontek Podcast
Episode #30 - Physical Security Assessments

Complacency Kills - A Kontek Podcast

Play Episode Listen Later Sep 10, 2024 19:09


In this episode of the Kontek Podcast, we dive into the critical importance of regular physical security assessments. Our expert panel shares actionable insights on evaluating security measures, upgrading systems, and mitigating risks to ensure your facility remains protected. Kontek's Threat & Vulnerability Assessments (TVA) provide a thorough review of your infrastructure, work patterns, and existing security measures. By identifying vulnerabilities, we help you strengthen your defenses with tailored recommendations. In addition, our target hardening solutions reinforce critical areas to resist threats like forced entry and firearms, ensuring your facility remains protected. Learn more about Threat & Vulnerability Assessments: https://www.kontekindustries.com/threat-vulnerability-assessments Explore our Target Hardening solutions: https://www.kontekindustries.com/target-hardening More about Kontek: https://www.kontekindustries.com

Unspoken Security
Is Any Security Marketing NOT Bullshit?

Unspoken Security

Play Episode Listen Later Sep 3, 2024 69:51 Transcription Available


In this episode of Unspoken Security, host AJ Nash sits down with Emily Phelps, Director of Marketing Communications at CYWARE. They dive into the core challenges and strategies in cybersecurity marketing. Emily emphasizes the importance of not just attracting customers but ensuring they are the right fit to prevent churn and frustration. She highlights the need for authenticity in marketing messages, noting that misleading claims can harm both the company's reputation and customer trust.AJ and Emily also discuss the essential goals of marketing within the cybersecurity industry, stressing the need to build and retain a loyal customer base. Emily shares her philosophy on marketing, focusing on creating value and clear, truthful communication rather than succumbing to the pressure of exaggerated claims. She underscores the importance of understanding the audience and articulating the unique value propositions of the company.The conversation delves into the broader role of marketing in supporting the security community. Emily explains how effective marketing can bridge the gap between technical experts and the market, fostering better understanding and collaboration. This episode provides a candid look at the realities of cybersecurity marketing and the principles that drive successful strategies.Send us a textSupport the Show.

Unspoken Security
How Do I Get into Cybersecurity?

Unspoken Security

Play Episode Listen Later Aug 20, 2024 60:15 Transcription Available


In this episode of Unspoken Security, host AJ Nash engages in an insightful conversation with Karla Reffold, Chief Product Officer at Surefire Cyber. The episode dives into the nuances of cybersecurity careers and leadership. Karla shares her journey from a background in recruiting and corporate governance to her current role in cybersecurity, highlighting her expertise in risk assessment and leadership.Karla discusses the importance of confidence and humility in career advancement, recounting stories of successful career transitions and emphasizing the need for clear career goals. She also reflects on the evolving nature of cybersecurity and the critical role of continuous learning and networking.AJ and Karla explore the significance of understanding risk in cybersecurity, with Karla underscoring the value of practical experience and networking over formal certifications. The episode concludes with a discussion on the challenges faced by women in the cybersecurity industry and the importance of resilience and self-belief.Send us a Text Message.Support the Show.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 78. Physical security threats, sabotage, and cyber resilience

The Gate 15 Podcast Channel

Play Episode Listen Later Aug 20, 2024 20:23


In this week's Security Sprint, Dave and Andy covered the following topics: Warm Start: Faith-Based and Israel-Gaza Related Updates: FB-ISAO Newsletter, August 2024. FB-ISAO: Best Practices for Securing Your Donation Sites WaterISAC 2023 Year-In-Review Three Main Topics. Extremism and Physical Security: “Dead society”: Tracing the Online Dimension of a Militant Accelerationist-Inspired Attack in Turkey Man Arrested for Explosives Threats and Attack on Energy Facility Sabotage: UK Sabotage. Countering the Threat of Sabotage Operations to UK Interests and National Security Germany investigates suspected intrusion, sabotage at military base Germany investigates possible sabotage of water supply at military base Poland Says Received German Request To Arrest Suspect In Nord Stream Probe Cyber Resilience: Carbon black supplier Orion loses $60 million in business email compromise scam Attorney General James Secures $4.5 Million from Biotech Company for Failing to Protect New Yorkers' Health Data Enzo Biochem ordered to cough up $4.5 million over lousy security that led to ransomware disaster Quick Hits: Recorded Future: Malign Influence Threats Mount Ahead of US 2024 Elections NCRI - The CCP's Digital Charm Offensive OpenAI: Disrupting a covert Iranian influence operation X Ran Ads On Five Accounts Pushing Lies and Hate During UK Riots Far-right influencers turn against Trump campaign Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online (PDF). Department of Defense Civilian Employee Charged with Taking Classified Documents Hackers may have stolen the Social Security numbers of every American. Here's how to protect yourself Unconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media Frenzy Amid Lawsuit Brian Krebs: NationalPublicData.com Hack Exposes a Nation's Data National Public Data reports highly publicized breach affected a total 1.3 million people The Slow-Burn Nightmare of the National Public Data Breach Google: Iranian backed group steps up phishing campaigns against Israel, U.S. A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says Arizona Man Pleads Guilty for Making Online Threats Against Public Servants Including Federal Officials Suspect identified in break-in at Trump campaign office in Virginia: Sheriff's office Threat of US Civil Unrest Is Low But Rising, Analysis Finds oOne in five voters and a third of Republicans believe the FBI was behind the assassination attempt on Donald Trump Trump's Shooting Rattled QAnon Believers. Then They Doubled Down Comer Seeks Information from Google and Meta on Potential Censorship of President Trump Assassination Attempt Meta warns of troll networks from Russia, Iran ahead of US elections Fake accounts on Meta pushed conservatives to run for office as independents HHS: United States Government's Response to the Clade I Mpox Outbreak in the DemocraticRepublic of the Congo and Other Countries in the Region WHO: WHO Director-General declares mpox outbreak a public health emergency ofinternational concern. Earth just had its warmest July on record; July was the globe's 14th month in a row of record warmth

The Resilient Journey
Episode 147 - Physical Security and Your Business Continuity Program - Mads Paerregaard

The Resilient Journey

Play Episode Listen Later Aug 19, 2024 32:06


From time to time, we all struggle with aspects of our job that are less familiar to us. You may have worked in the resilience industry for a number of years, but never had reason to focus on an adjacent discipline. The Resilient Journey is here to help. Hello everyone and welcome to episode 147 of the Resilient Journey podcast, presented by the Resilience Think Tank. This week, Mark welcomes Mads Paerregaard, CEO of Human Risks.  Mads and Mark are talking about physical security risk and the natural connection it has with resilience. They talk about the value of understanding the business and communicating in clear business language. Mads says that by understanding the criticality of specific facilities, we can establish appropriate security measures and resilience strategies. And…Mads give advice to resilience professionals who don't have a lot of experience with physical security.   Be sure to follow The Resilient Journey!  We sure do appreciate it! Learn more about the Resilience Think Tank here. Want to learn more about Mark? Click here or on LinkedIn or Twitter. Special thanks to Bensound for the music.

ITSPmagazine | Technology. Cybersecurity. Society
Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals | Part 2 of 3 | A Conversation with Kush Sharma | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 5, 2024 45:42


Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario)On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin___________________________Episode NotesIn this part two of the three-part series on The Redefining CyberSecurity Podcast, host Sean Martin is joined by Kush Sharma to discuss the critical topic of building a Chief Information Security Officer (CISO) office from the ground up. Both speakers bring invaluable insights from their extensive experiences, illustrating key points and real-world scenarios to help organizations navigate the complexities of cybersecurity and business transformation.Sean kicks off the conversation by emphasizing the strategic role of the CISO in business transformation. He explains that a successful CISO not only secures what the business wants to create but also contributes to developing a powerful and secure business. He points out that CISOs often have a unique perspective, experience, and data that can significantly impact the way business processes are transformed and managed.Kush expands on this by highlighting the need for adaptability and a mindset of continuous change. He shares that CISOs should view their organization as a business function solely dedicated to protecting assets. He uses examples to demonstrate how missions change every few years due to the rapid evolution of technology and processes, making it essential for security teams to pivot and adjust their strategies accordingly.Kush stresses the importance of collaboration across different teams—from digital to physical—and notes that a key to successful security management is building a culture that is adaptable and aligned with the business's changing objectives. One of the most interesting points brought up is the significance of involving security from the outset of any new project.Sean and Kush discuss the importance of integrating the CISO into discussions around business requirements, system architecture, and technology selection. By being involved early, CISOs can help ensure that the organization makes informed decisions that can save time, reduce risks, and ultimately contribute to a more secure business environment.Another critical aspect discussed is the approach to risk management. Kush describes a structured method where security teams provide options and recommendations rather than outright saying 'no' to business requests. He mentions the use of risk acceptance forms, which require high-level sign-offs, thus ensuring that decision-makers are fully aware of the risks involved and are accountable for them. This transparency fosters a sense of shared responsibility and encourages more informed decision-making.Both Sean and Kush provide a comprehensive look at the evolving role of the CISO. They make it clear that today's CISOs need to be strategic thinkers, skilled negotiators, and effective communicators to successfully lead their organizations through the complexities of modern cybersecurity challenges. The insights shared in this episode are invaluable for anyone looking to understand the multifaceted responsibilities of a CISO and the indispensable contributions they make to business success.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Gate 15 Podcast Channel
Weekly Security Sprint EP 75. North Korea mischief, and physical security matters

The Gate 15 Podcast Channel

Play Episode Listen Later Jul 30, 2024 27:23


In this week's Security Sprint, Dave and Andy covered the following topics. North Korea Cyber Threats to U.S. Businesses: FBI, CISA, and Partners Release Advisory Highlighting North Korean Cyber Espionage Activity.   North Korea State-Sponsored Cyber Group Conducts Global Espionage Campaign to Advance Regime's Military and Nuclear Programs. DOJ: North Korean Government Hacker Charged for Involvement in Ransomware Attacks Targeting U.S. Hospitals and Health Care Providers Microsoft: Onyx Sleet uses array of malware to gather intelligence for North Korea Google: APT45: North Korea's Digital Military Machine.  North Korean hacking group targeted weapons blueprints, nuclear facilities in cyber campaigns KnowBe4: How a North Korean Fake IT Worker Tried to Infiltrate Us   CISA: Resources for Onboarding and Employment Screening Fact Sheet. Resource Materials: Resources for Onboarding and Employment Screening Fact Sheet   Physical Incidents: Understand the Hostile Events Attack Cycle! Two children killed and nine injured in knife attack at dance class in northern England DOJ: Man Pleads Guilty to Making Threats to Arizona Election Office Michigan man kills himself after running over 80-year-old Trump supporter Defendants with Ties to White Supremacy Sentenced in Connection with Plot to Destroy Energy Facilities Army review finds ‘series of failures' in lead-up to mass shooting in Lewiston, Maine   Quick Hits 7 people killed in stampede at a music concert in Congo's capital, authorities report NCTC: First Responders Toolbox - Emerging Technologies and Possible Malign Uses by Terrorists   Olympics:  Man arrested over suspected French railway vandalism French rail lines disrupted by ‘coordinated sabotage' ahead of Paris Olympics opening ceremony Russian chef arrested in Paris over alleged ‘large scale' Olympic Games plot ISIS? Russian sabotage? The biggest security threats at these Olympics. ISIS-K's online recruitment poses security threat to West ahead of Olympic Games Terrorism, Drone Use Among the Security Risks at 2024 Paris Olympics France launches large-scale operation to fight cyber spying ahead of Olympics   CrowdStrike: Remediation And Guidance Hub:
Falcon Content Update For Windows Hosts,   House Homeland Security aims for CrowdStrike hearing in September Preliminary Post Incident Review (PIR): Content Configuration Update Impacting the Falcon Sensor and the Windows Operating System (BSOD) CrowdStrike: Remediation and Guidance Hub: Falcon Content Update for Windows Hosts CrowdStrike says bug in quality control process led to botched update Inside the 78 minutes that took down millions of Windows machines How IT Departments Scrambled to Address the CrowdStrike Chaos Microsoft says EU rules made CrowdStrike outage possible Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure Cyberattacks may follow CrowdStrike outage, warns MS-ISAC   Donald Trump Assassination Attempt: Takeaways from FBI testimony: Trump shooter searched details of JFK assassination and flew drone near rally site FBI: Would-be assassin was fixated on Trump, studied earlier high-profile killing Trump Shooter Used Drone Like a ‘Rearview Mirror' Before Assassination Attempt   Other items that may be of interest: TikTok Collected U.S. Users' Views on Gun Control, Abortion and Religion, U.S. Says Dragos: Intelligence Brief: Impact of FrostyGoop ICS Malware on Connected OT Systems Hackers shut down heating in Ukrainian city with malware, researchers say Novel ICS Malware Sabotaged Water-Heating Services in Ukraine Senators to FTC: Car companies' data privacy practices must be investigated Russian ransomware gangs account for 69% of all ransom proceeds Phishing Landscape 2024: An Annual Study of the Scope and Distribution of Phishing

The Security Student Podcast
A Non-Apocalyptic Intro to Personal Emergency Preparedness with Jeff Donaldson, PhD

The Security Student Podcast

Play Episode Listen Later Jul 29, 2024 89:57


#034 - In this next episode, I was joined by Jeff Donaldson, PhD to kick off a new topic we haven't discussed on the podcast yet — emergency preparedness. This episode starts with a look at the topic from a micro perspective, personal preparedness, and future episodes will touch on the macro, such as corporate or public-level preparedness and resiliency.Jeff brings a tremendous amount of experience directly relating to preparedness to the podcast today, from his experience as a military officer in the Canadian Army (28 years!), as the principal researcher at Preparedness Labs Incorporated, and as an Associate Faculty member at Royal Roads University. Plus, he's earned his MA in Disaster and Emergency Management, along with his doctorate in Public Policy. All that to say, he's a wealth of knowledge for us on the subject.He even hosts a highly acclaimed podcast on preparedness and leads training sessions where he communicates (as he says), "Non-Apocalyptic evidence-based strategies for rational people with dreams."Today's conversation focused on the philosophy of preparedness, the critical role of social capital and how it increases your ability to survive and thrive, personal responsibility, and systematic thinking/planning/considerations for you and I.--- Learn more about Jeff and his projects here ---Preparedness Labs Inc: https://preparednesslabs.ca/Inside My Canoehead (Podcast): https://insidemycanoehead.ca/-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes

Cybercrime Magazine Podcast
Mastering Cyber. Physical Security Tips. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 24, 2024 1:36


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html

Paul's Security Weekly
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396

Paul's Security Weekly

Play Episode Listen Later Jul 9, 2024 34:06


Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-396

Paul's Security Weekly TV
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396

Paul's Security Weekly TV

Play Episode Listen Later Jul 9, 2024 34:11


Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-396

Hack Naked News (Audio)
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396

Hack Naked News (Audio)

Play Episode Listen Later Jul 9, 2024 34:06


Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-396

280+ Podcast
Episode 154: Protect What You Build

280+ Podcast

Play Episode Listen Later Jul 3, 2024 75:24


Check out this week's episode of the 280 + Podcast, where we dive deep into the pressing issues of Digital vs Physical Security with our special guest, Montez Parker, CEO of Parker International Inc.

The Security Student Podcast
An International Perspective on Executive Security Operations with Ben Hosking

The Security Student Podcast

Play Episode Listen Later Jun 12, 2024 64:59


#033 - In this next episode, I was joined by Ben Hosking, executive protection leader, and Business Manager with Panoptic Solutions, who serves as clients' go-to provider in Australia, Asia, and the Pacific. Ben contributed great insights to this episode from his about 2 decades of experience, ranging from serving as a Territory Response Group Operator supporting Dignitary Protection, Tactical Medicine, Search And Rescue, and more. Plus, his experience on the security service provider and business operations side with Panoptic Solutions.Today's conversation focused on Ben's career path, moving from law enforcement and protective services to the private side, his thoughts on what makes one successful in close protection roles, the role of emergency medical training, and so much more.Also, everyone listening is welcome to join Ben and I for a beer at the Executive Security Operations Conference next week at the JW Marriot Indianapolis (June 19-21), tickets are still available.-- Connect with Panoptic Solutions  --Wheels Up Safety and Security Podcast (LinkedIn)Wheels Up Safety and Security Podcast (Apple Podcasts)Wheels Up Newsletter (LinkedIn)-- Get the resources and show notes mentioned in this episode --https://thesecuritystudent.com/shownotes

The Fearless Mindset
Episode 205 - Security Training and the Future of Safety Measures | Adam Corn (Part 2)

The Fearless Mindset

Play Episode Listen Later May 7, 2024 36:29


Mark Ledlow features an in-depth discussion with a security expert, Adam Korn. They dive into the complexities of national security, focusing on nuclear threats, the protection of radiological materials, and the essential practices for securing them against potential terrorists. Discussions extend to the training of SWAT teams and responders to handle radiological threats, emphasizing the critical nature of best practices in security measures. Adam, with a background in criminal justice and international affairs, shares insights from his extensive experience at the National Nuclear administration and his current role as a security consultant. The conversation covers the convergence of physical and cybersecurity, the importance of emotional intelligence in the security industry, and the challenges and opportunities for training in the digital age. The episode also touches on the necessity for impactful onboarding and development programs that go beyond mere compliance, aiming to genuinely empower and prepare employees for safety and security challenges. Furthermore, they discuss upcoming regulations, like California's Senate Bill 553, and the pivotal role of detailed and effective training to meet and exceed such requirements.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe convergence of physical security and cybersecurity is essential in modern security strategies.Emotional intelligence (EQ) is crucial in security roles, aiding in de-escalation and effective communication.Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application.The importance of preparing for emerging threats like AI, which can enhance security measures when embraced effectively.Workplace violence prevention and compliance, as mandated by Senate Bill 553 in California, necessitate proactive training and policy development.QUOTES"The ideal training is in live interaction...My second most favorite is when you're having a live video session, but then again, people start to disengage because they're attached to a computer.""Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Treasury Update Podcast
Coffee Break Session #107: What Is a Surface Area of Attack?

The Treasury Update Podcast

Play Episode Listen Later Apr 4, 2024 6:00


In today's podcast, Christin Cifaldi, Director of Product Development & Analytics, defines the surface area of attack. We discuss digital and physical attack surfaces within organizations, as well as options for minimizing exposure. Listen in to learn more. Get your Payment Security Snapshot: https://strategictreasurer.com/secure/ 

Three Cartoon Avatars
EP 93: Filip Kaliszan (CEO, Verkada) AI Security Cameras to $3.5B Company

Three Cartoon Avatars

Play Episode Listen Later Feb 2, 2024 117:37


(00:00) Intro(00:40) Understanding Verkata and its Growth(02:12) Exploring Verkata's Product Lines(03:29) Filip's Early Fascination with Cameras(05:51) The Genesis of Verkata(06:59) Verkata's Approach to Physical Security(09:21) Privacy and Innovation in Verkata's Products(14:10) The Journey to Verkata's Access Control Product(16:49) The Challenges and Successes of Building Verkada(21:21) The Future of Verkata and its Products(37:51) Empowering Teams to Innovate(38:04) Maintaining Product Consistency Across Teams(39:16) The Importance of Autonomy in Team Structure(40:02) Sales Team Structure and Strategy(40:37) Challenges of Scaling a Diverse Product Portfolio(42:09) The Impact of Internal Sales on Product Success(43:17) The Evolution of Customer Perception and Demand(44:07) The Importance of Integration in Business Systems(44:26) Traits of Successful Product Leaders(45:22) The Role of Passion in Product Development(45:26) The Importance of Passion and Depth in Hiring(47:58) The Role of Sales in a Diversified Product Company(48:38) The Challenges and Rewards of Rapid Company Growth(52:31) Maintaining a Unified Company Culture in a Decentralized Structure(53:08) The Balance Between Conventional Wisdom and First Principles(01:01:17) The Impact of On-Site Work Culture on Company Growth(01:12:25) The Importance of Adaptability in a Rapidly Growing Company(01:15:55) The Role of Leadership Presence in a Growing Company(01:18:23) Building Trust and Early Startup Challenges(01:18:53) The Importance of Hiring the Right People(01:19:02) The Need for a CFO and Strategic Finance(01:20:48) The Value of In-House Counsel(01:23:14) Building Company Culture: The 3-3-3 Program(01:25:01) The Importance of Getting Hiring Right(01:33:27) The Journey of CourseRank and Verkada(01:33:29) Handling a Security Breach(01:50:55) The Early Days and Challenges of Verkada(01:54:45) The Importance of Storytelling in Fundraising Produced: Rashad Assir & Leah ClapperMixed and edited: Justin HrabovskyExecutive Producer: Josh Machiz