POPULARITY
Conversations is bringing you a summer treat — a collection of Sarah's most memorable guests through out the years. Sue Ellen Kusher's father was an ASIO agent, and she and her siblings were taught to memorise number plates, spot unusual behaviour, and keep the family business secret at all costs.Sue-Ellen's parents were ASIO agents living secretly in the Brisbane suburbs at the height of the Cold War.Their mission was to locate and track Soviet agents, and they enlisted their 3 young children to help.Sue-Ellen was taught to memorise numberplates, stake out buildings, and never ever let anyone else know the truth about her family.During the Melbourne Olympics Sue-Ellen's family secretly hosted the Petrovs, Australia's famous Russian defectors… they spent much of their time together in beer gardens at the Gold Coast until Vladimir Petrov nearly gave them all away.This episode of Conversations contains discussion about spies, secret agents, ASIO, cold war, China, Russia, Canberra, Brisbane, Australian history, Australian politics, world history, 20th Century history, family relationships, siblings, security intelligence, national intelligence, national secrets, secret keeping, defence, national security, diplomatic work, undercover, surveillance, Petrovs, the Petrov affair, ASIO files, spy kids, Olympic Games, Brisbane Olympics,
In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by the Australian Independent National Security Legislation Monitor, Jake Blight. We explore a paradigm shift in our understanding of electronic surveillance, whether the moment of interception is still the most the invasive point of interception in a digital era– the current legal basis. Or, if digital tech and AI have changed processing, disclosure and sharing to the extent that the retention, analysis and dissemination of intelligence has greater significance. We explore the implications of the "mosaic effect" on public interest immunity cases – and why it can't extent to criminal law We discuss the sheer complexity and volume of national security laws in Australia, including secrecy offences and law reform. We discuss how powerful–and unique- data disruption, intel gathering and account takeover warrants in the Surveillance Legislation Amendment Identify and Disruption Act 2021 are. We discuss the INSLM review of the definition of terrorism and what it includes, as well as how the offence of preparing to commit terrorism acts have been applied to foreign interference and espionage offences, exploring the subtle distinctions between influence and interference. Tune in for a thought-provoking examination of the intersections between national security law, technology, and intelligence in safeguarding democratic values. Jake Blight is the Independent National Security Legislation Monitor (INSLM). He has practiced in the field of national security law for almost 25 years and has considerable experience in independent oversight and review of intelligence and security agencies. Jake was the Deputy Inspector General of Intelligence and Security and an Associate Professor of Practice at ANU. He is also finishing his PhD at the ANU School of Cybernetics.Resources mentioned in the recording: · INSLM Secrecy Offences – Review of Part 5.6 of the Criminal Code Act 1995, https://www.inslm.gov.au/reviews/secrecy-review· Government response to INSLM Review of Part 5.6 of the Criminal Code Act 1995 tabled in Parliament 27 November 2024, https://www.aph.gov.au/Parliamentary_Business/Tabled_Documents/8473· INSLM Issues paper, Identify, takeover and disrupt – special powers of the AFP and ACIC, https://www.inslm.gov.au/reviews/identify-takeover-and-disrupt-special-powers-afp-and-acic· Miah Hammond-Errey (2024) Big Data, Emerging Technologies and Intelligence: National Security Disrupted, Routledge (30% off code: ADC24)· Alfred Rolington, Strategic Intelligence for the 21st Century. The Mosiac Method, https://global.oup.com/academic/product/strategic-intelligence-for-the-21st-century-9780199654321?cc=tw&lang=en& This podcast was recorded on the lands of the Gadigal people, and we pay our respects to their Elders past, present and emerging. We acknowledge their continuing connection to land, sea and community, and extend that respect to all Aboriginal and Torres Strait Islander people. Thanks to the talents of those involved. Music by Dr Paul Mac and production by Elliott Brennan.
Tonight on The ReidOut, Joy Reid leads with Rudy Giuliani's downfall as he continues to face financial ruin and public humiliation, culminating in an outburst in a New York City courtroom, with no support from Donald Trump—the man he once sacrificed everything for. Meanwhile, Trump and his team are threatening Democratic mayors with arrests and withholding federal funds as mass deportations loom, raising questions about how cities can fight back; one of New York's mayoral candidates will join the discussion. Plus, on the eve of Thanksgiving, Joy has a special message for all the MAGA trolls and their enablers before we pass the plates.
In this episode of the Virtually Speaking Podcast, we're joined by Marc van de Logt, Technical Architect at PQR, to explore the latest advancements in VMware NSX Security. We dive into VMware vDefend, including its integration with NSX Firewalling, NAPP deployment using Avi Loadbalancer, and cutting-edge tools like Security Intelligence, NTA, IDS/IPS, and NDR. Marc also introduces VMware's Project Cypress and shares insights on how VMware vDefend supports organizations in implementing a robust zero trust architecture. Tune in to learn how these technologies can elevate your security strategy.
The Friday Five for November 1, 2024: CMS Updates Enrollment Process for EDE & DE Platforms WPS Data Breach Leads to Issue of New Medicare Beneficiary Identifiers Student Loan Forgiveness Update Apple AirPods Pro Hearing Tools Launch Apple Intelligence iOS 18.1 Features CMS Updates Enrollment Process for EDE & DE Platforms: “CMS Roundup (October. 18, 2024).” CMS.Gov, Centers for Medicare & Medicaid Services, 18 Oct. 2024, www.cms.gov/newsroom/cms-round-up/cms-roundup-october-18-2024. “Direct Enrollment and Enhanced Direct Enrollment.” CMS.Gov, Centers for Medicare & Medicaid Services, www.cms.gov/marketplace/agents-brokers/direct-enrollment-partners. Accessed 31 Oct. 2024. “HealthCare.Gov Contact Information.” HealthCare.Gov, HealthCare.gov, www.healthcare.gov/contact-us/. Accessed 31 Oct. 2024. “HealthSherpa for Agents.” HealthSherpa.Com, HealthSherpa, www.healthsherpa.com/agents/features. Accessed 31 Oct. 2024. WPS Data Breach Leads to Issue of New Medicare Beneficiary Identifiers: Alder, Steve. “CMS Confirms 3.1 Million Individuals Affected by MOVEit Hack on Wisconsin Physicians Service.” Hipaajournal.Com, The HIPAA Journal, 25 Sept. 2024, www.hipaajournal.com/cms-wisconsin-physicians-service-moveit-hack/. “CMS Notifies Additional Individuals Potentially Impacted by MOVEit Data Breach.” CMS.Gov, Centers for Medicare & Medicaid Services, 16 Nov. 2023, www.cms.gov/newsroom/press-releases/cms-notifies-additional-individuals-potentially-impacted-moveit-data-breach. “CMS Notifies Individuals Potentially Impacted by Data Breach.” CMS.Gov, Centers for Medicare & Medicaid Services, 6 Sept. 2024, www.cms.gov/newsroom/press-releases/cms-notifies-individuals-potentially-impacted-data-breach. “CMS Responding to Data Breach at Contractor.” CMS.Gov, Centers for Medicare & Medicaid Services, 28 July 2023, www.cms.gov/newsroom/press-releases/cms-responding-data-breach-contractor. Olsen, Emily. “CMS Says Data Breach at Contractor Could Affect More than 946,000 Medicare Beneficiaries.” Healthcare Dive, Healthcare Dive, 9 Sept. 2024, www.healthcaredive.com/news/cms-wisconsin-physicians-service-insurance-corporation-moveit-data-breach/726416/. Goodin, Dan. “Casualties Keep Growing in This Month's Mass Exploitation of Moveit 0-Day.” Arstechnica.Com, Ars Technica, 27 June 2023, arstechnica.com/security/2023/06/casualties-keep-growing-in-this-months-mass-exploitation-of-moveit-0-day/. “Over 940,000 Medicare Beneficiaries Impacted by Data Breach.” Jdsupra.Com, JD Supra, 24 Oct. 2024, www.jdsupra.com/legalnews/over-940-000-medicare-beneficiaries-1539983/. Reed, Jonathan. “The MOVEIT Breach Impact and Fallout: How Can You Respond?” Securityintelligence.Com, Security Intelligence, 23 Oct. 2024, securityintelligence.com/news/the-moveit-breach-impact-and-fallout-how-can-you-respond/. Student Loan Forgiveness Update: Gibson, Kate. “Biden Administration Extends Repayment Freeze for 8 Million Student Loan Borrowers.” Edited by Alain Sherter, Cbsnews.Com, CBS News, 21 Oct. 2024, www.cbsnews.com/news/student-loan-forgiveness-payment-biden/. Cavanaugh, Lynn. “Biden Freezes Student Loan Repayments for 6 Months for 8M Borrowers.” Benefitspro.Com, BenefitsPro, 22 Oct. 2024, www.benefitspro.com/2024/10/22/biden-freezes-student-loan-repayments-for-6-months-for-8m-borrowers/. “Biden-Harris Administration Releases Proposed Rules to Authorize Debt Relief to Nearly Eight Million Borrowers Experiencing Hardship.” Ed.Gov, U.S. Department of Education, 25 Oct. 2024, www.ed.gov/about/news/press-release/biden-harris-administration-releases-proposed-rules-authorize-debt-relief. Cavanaugh, Lynn. “Biden's New Student Loan Forgiveness Plan: A 3rd Attempt at Debt Cancellation for 8M.” Benefitspro.Com, BenefitsPro, 28 Oct. 2024, www.benefitspro.com/2024/10/28/bidens-new-student-loan-forgiveness-plan-a-3rd-attempt-at-debt-cancellation-for-8m/. Johnston, Courtney. “Biden's New Student Loan Forgiveness Plan Could Offer Debt Relief to 8 Million Borrowers.” Cnet.Com, CNET, 25 Oct. 2024, www.cnet.com/personal-finance/loans/bidens-new-student-loan-forgiveness-plan-could-offer-debt-relief-to-8-million-borrowers/. “Department of Education Updates on Saving on a Valuable Education (SAVE Plan).” Ed.Gov, U.S. Department of Education, 24 Oct. 2024, www.ed.gov/higher-education/manage-your-loans/save-plan. “SAVE Plan Court Actions: Impact on Borrowers.” Studentaid.Gov, Federal Student Aid, 2 Oct. 2024, studentaid.gov/announcements-events/save-court-actions. “Student Debt Relief Hardship.” Ed.Gov, U.S. Department of Education, www.ed.gov/media/document/nprm-hardship-sldr. Accessed 30 Oct. 2024. Zimmer, Evan. “Student Loan Payment Pause Extended for 6 More Months for SAVE Borrowers.” Cnet.Com, CNET, 21 Oct. 2024, www.cnet.com/personal-finance/loans/student-loan-payment-pause-extended-for-6-more-months-for-save-borrowers/. Apple AirPods Pro Hearing Tools Launch: “Airpods Pro 2 - Hearing Health.” Apple, Apple, www.apple.com/airpods-pro/hearing-health/. Accessed 31 Oct. 2024. Welch, Chris. “Apple's Airpods pro Just Got Much Better - No Matter What Port Is on the Case.” Theverge.Com, The Verge, 18 Sept. 2023, www.theverge.com/23878402/apple-airpods-pro-usb-c-adaptive-audio-conversation-awareness-test-review. Steele, Billy. “Apple's Airpods pro Hearing Health Tools Could Normalize Wearing Earbuds Everywhere.” Engadget.Com, Engadget, 29 Oct. 2024, www.engadget.com/audio/headphones/apples-airpods-pro-hearing-health-tools-could-normalize-wearing-earbuds-everywhere-140054858.html. “Apple Introduces Airpods 4 and a Hearing Health Experience with Airpods Pro 2.” Apple.Com, Apple, 29 Oct. 2024, www.apple.com/newsroom/2024/09/apple-introduces-airpods-4-and-a-hearing-health-experience-with-airpods-pro-2/. “How Apple Developed the World's First End-to-End Hearing Health Experience.” Apple.Com, Apple, 30 Oct. 2024, www.apple.com/newsroom/2024/10/how-apple-developed-the-worlds-first-end-to-end-hearing-health-experience/. Welch, Chris. “How to Take the Apple Hearing Test.” Theverge.Com, The Verge, 28 Oct. 2024, www.theverge.com/24278477/apple-hearing-test-how-to. Shastri, Devi. “Apple Airpods Pro's New Hearing Aid Feature Could Help People Face a Problem They'd Rather Ignore.” Apnews.Com, AP News, 28 Oct. 2024, apnews.com/article/hearing-aids-airpods-apple-android-fsa-hsa-e0f243bcaff9b4c5b5068b546012b338. Cadwell, Blake. “How to Use Airpods as Hearing Aids (with Screenshots).” Edited by Amy Sarow, Soundly.Com, Soundly., 28 Oct. 2024, www.soundly.com/blog/airpods-as-hearing-aids. Ulanoff, Lance. “I'm Done Being Rude to People Thanks to Adaptive Audio on Airpods Pro 2.” Techradar.Com, TechRadar, 19 Sept. 2023, www.techradar.com/audio/im-done-being-rude-to-people-thanks-to-adaptive-audio-on-airpods-pro-2. Carey, Bridget. “I Tested the Apple Airpod pro 2 Hearing Aid Software Early. Here's Everything You Need to Know.” Cnet.Com, CNET, 21 Oct. 2024, www.cnet.com/tech/mobile/i-tested-the-apple-airpod-pro-2-hearing-aid-software-early-heres-everything-you-need-to-know/. Apple Intelligence iOS 18.1 Features: Crouse, Megan. “Apple Intelligence Cheat Sheet: A Complete Guide for 2024.” Techrepublic.Com, TechRepublic, 29 Oct. 2024, www.techrepublic.com/article/apple-intelligence-cheat-sheet/. Disotto, John-Anthony. “Apple Intelligence Features Explained - Everything You Need to Know about Apple AI and When You Can Use It.” Techradar.Com, TechRadar, 11 Sept. 2024, www.techradar.com/computing/artificial-intelligence/apple-intelligence-features-explained-everything-you-need-to-know-about-apple-ai-and-when-you-can-use-it. “Apple Intelligence Is Available Today on iPhone, iPad, and Mac.” Apple.Com, Apple Newsroom, 29 Oct. 2024, www.apple.com/newsroom/2024/10/apple-intelligence-is-available-today-on-iphone-ipad-and-mac/. Ortiz, Sabrina. “Can't Find Apple's AI Features after Upgrading to iOS 18.1? Do This.” Zdnet.Com, ZDNET, 29 Oct. 2024, www.zdnet.com/article/cant-find-apples-ai-features-after-upgrading-to-ios-18-1-do-this/. Carlson, Jeff. “If You Want Apple Intelligence on Your iPhone, Here's What You Need to Do.” Cnet.Com, CNET, 29 Oct. 2024, www.cnet.com/tech/services-and-software/if-you-want-apple-intelligence-on-your-iphone-heres-what-you-need-to-do/. Miller, Chance. “iOS 18.2 with New Apple Intelligence Features Coming in December, Apple Confirms.” 9to5mac.Com, 9to5Mac, 28 Oct. 2024, 9to5mac.com/2024/10/28/ios-18-2-release-date/. Michaels, Philip. “iOS 18 Memory Movie Is One of Apple Intelligence's Best Features - Here's How to Use It.” Tomsguide.Com, Tom's Guide, 26 Sept. 2024, www.tomsguide.com/phones/iphones/how-to-create-a-memory-movie-with-apple-intelligence-on-your-iphone. Priday, Richard. “I Tried All New Apple Intelligence Features in IOS 18.1 - Here's the Best (and Worst).” Tomsguide.Com, Tom's Guide, 28 Oct. 2024, www.tomsguide.com/phones/iphones/i-tried-all-new-apple-intelligence-features-in-ios-18-1-heres-the-best-and-worst. Carlson, Jeff. “These 3 Apple Intelligence Features in IOS 18.1 Are the Ones You'll Actually Use.” Cnet.Com, CNET, 30 Oct. 2024, www.cnet.com/tech/services-and-software/these-3-apple-intelligence-features-in-ios-18-1-are-the-ones-youll-actually-use/. Resources: 1 Million New Medicare Beneficiary Identifiers to be Issued After WPS Data Breach: https://ritterim.com/blog/1-million-new-medicare-beneficiary-identifiers-to-be-issued-after-wps-data-breach/ ACA 101: Selling Under-65 Health Insurance: https://link.chtbl.com/ASG6248 CMS Implements Marketplace Security Enhancements for EDE & DE Pathways: https://ritterim.com/blog/cms-implements-marketplace-security-enhancements-for-ede-and-de-pathways/ How Ask Integrity Can Streamline Your Medicare Sales Appointments: https://link.chtbl.com/ASG6255 How to Ask Your Current Clients for Referrals: https://link.chtbl.com/ASG623 How to Stay Compliant During All Medicare Sales: https://link.chtbl.com/ASG628 Key Changes for ACA Open Enrollment 2025 ft. Ross Baker from HealthSherpa: https://link.chtbl.com/ASG2024RossBaker Simplify Marketplace Enrollments with HealthSherpa: https://link.chtbl.com/ASG627 Follow Us on Social! Ritter on Facebook, https://www.facebook.com/RitterIM Instagram, https://www.instagram.com/ritter.insurance.marketing/ LinkedIn, https://www.linkedin.com/company/ritter-insurance-marketing TikTok, https://www.tiktok.com/@ritterim X, https://twitter.com/RitterIM and Youtube, https://www.youtube.com/user/RitterInsurance Sarah on LinkedIn, https://www.linkedin.com/in/sjrueppel/ Instagram, https://www.instagram.com/thesarahjrueppel/ and Threads, https://www.threads.net/@thesarahjrueppel Tina on LinkedIn, https://www.linkedin.com/in/tina-lamoreux-6384b7199/ Contact the Agent Survival Guide Podcast! Email us ASGPodcast@Ritterim.com or call 1-717-562-7211 and leave a voicemail. Not affiliated with or endorsed by Medicare or any government agency.
National security consultant Matthew Pines joins The Good Trouble Show to discuss a wide variety of topics, including Bitcoin, China, the war in Ukraine, whether Putin is bluffing about nuclear war, whether the government could have a UAP / UFO crash retrieval program and more.Matthew Pines is the Director of Intelligence at PinnacleOne, SentinelOne's Strategic Advisory Group, where he leads analysis of geopolitics, emerging technology, and cyber threats. He was previously Director of Security Intelligence at the Krebs Stamos Group. He holds a M.Sc. in Philosophy and Public Policy from the London School of Economics and a B.A. in Physics and Philosophy from Johns Hopkins UniversityThe Good Trouble Show: Linktree: https://linktr.ee/thegoodtroubleshowPatreon: https://www.patreon.com/TheGoodTroubleShow YouTube: https://www.youtube.com/@TheGoodTroubleShow Twitter / X: https://twitter.com/GoodTroubleShow Instagram: @goodtroubleshow TikTok: https://www.tiktok.com/@goodtroubleshow Facebook: https://www.facebook.com/The-Good-Trouble-Show-With-Matt-Ford-106009712211646Threads: @TheGoodTroubleShowBlueSky: @TheGoodTroubleShowBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-good-trouble-show-with-matt-ford--5808897/support.
The US Space Force's X-37B Orbital Test Vehicle is executing a series of novel maneuvers, called aerobraking, to change its orbit around Earth and safely dispose of its service module components. NASA's Low-Cost Optical Terminal ground station transmitted its first laser communications uplink to the TBIRD (TeraByte Infrared Delivery). ispace and the Asteroid Mining Corporation (AMC) have announced an agreement for a space robotics demonstration on a future ispace mission to the lunar surface, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest is Moez Kamel, Threat Management Specialist at IBM Security. You can follow Moez on LinkedIn and his work at IBM's Security Intelligence blog. Selected Reading X-37B begins novel space maneuver NASA Terminal Transmits First Laser Communications Uplink to Space https://x.com/SpaceX/status/1843797123420303789 ispace and Asteroid Mining Corporation Agree to Pursue Future Mission to the Moon UAE Cabinet approves establishment of Supreme Space Council- The National International Spaceports Launch New Strategic Alliance - Via Satellite Billionaire Robinhood co-founder launches Aetherflux, a space-based solar power startup- TechCrunch ViaSat-3 F1 Begins Delivering Service for Government Customers Bridgit Mendler's space startup Northwood passes first test, connecting prototype antenna to Planet satellites What's at Stake for Space in the Presidential Election - Bloomberg Carbon Mapper Releases First Emissions Detections from the Tanager-1 Satellite Varda Announces Participation in the Annual Meetings of the American Association of Pharmaceutical Scientists and the American Institute of Chemical Engineers ESA - Sound of Earth's magnetic flip 41 000 years ago T-Minus Crew Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
A security intelligence analyst says our SIS is becoming increasingly transparent. It's released its second annual Security Threat Environment report. It identifies a person acting alone as our biggest terrorist risk, and expresses concern about the amount of online extremist content that young people are being exposed to. Former Intelligence Consultant for the US Government Paul Buchanan says the report doesn't mince words. He says the document names Russia and China as hostile, illiberal states. Buchanan says the report will probably rile the diplomats and Ministry of Foreign Affairs as they're not being sensitive in their language, but good on them for giving an honest assessment of who is trying to meddle with New Zealand. LISTEN ABOVE See omnystudio.com/listener for privacy information.
In this week's episode we're looking at how IS and al-Qaeda affiliated terrorist groups in Southeast Asia continue to exploit online platforms to disseminate propaganda, even as attacks in the region decline. We explore the history of militant Islamist activities in the region, as well as the key players; Why and how these groups and their supporters focus so much of their energy on online propaganda; And why we should care when terrorist content stays online.A note: we recorded this episode before the announcement by leaders of the Jemaah Islamiyah, or JI, of the group's disbandment. It's one of the main groups we explore in this episode.Archie Macfarlane is joined by Dr. Judith Jacob. She is the director of Geopolitical Risk and Security Intelligence at Forward Global, a corporate intelligence and influence group. She also holds a PhD on Ideology, Terrorism, and Militant Islamism.You can read a transcript of this episode here. If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on X, where you can find resources on this topic. Resources:Dr. Judith Jacob's research at LSE
A security intelligence analyst says the US has got what it needed from Julian Assange. The Wikileaks founder has struck a deal with the US and will soon plead guilty to an espionage charge before being sentenced to time already served. Paul Buchanan told Mike Hosking that Assange has spent the last 14 years in some sort of confinement. He says the US has won its pound of flesh out of him, adding that he's a broken guy and this sounds like a fair way to end the entire thing. Buchanan doubts Assange will get the pardon he is seeking. LISTEN ABOVE See omnystudio.com/listener for privacy information.
Mark Ledlow features an in-depth discussion with a security expert, Adam Korn. They dive into the complexities of national security, focusing on nuclear threats, the protection of radiological materials, and the essential practices for securing them against potential terrorists. Discussions extend to the training of SWAT teams and responders to handle radiological threats, emphasizing the critical nature of best practices in security measures. Adam, with a background in criminal justice and international affairs, shares insights from his extensive experience at the National Nuclear administration and his current role as a security consultant. The conversation covers the convergence of physical and cybersecurity, the importance of emotional intelligence in the security industry, and the challenges and opportunities for training in the digital age. The episode also touches on the necessity for impactful onboarding and development programs that go beyond mere compliance, aiming to genuinely empower and prepare employees for safety and security challenges. Furthermore, they discuss upcoming regulations, like California's Senate Bill 553, and the pivotal role of detailed and effective training to meet and exceed such requirements.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe convergence of physical security and cybersecurity is essential in modern security strategies.Emotional intelligence (EQ) is crucial in security roles, aiding in de-escalation and effective communication.Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application.The importance of preparing for emerging threats like AI, which can enhance security measures when embraced effectively.Workplace violence prevention and compliance, as mandated by Senate Bill 553 in California, necessitate proactive training and policy development.QUOTES"The ideal training is in live interaction...My second most favorite is when you're having a live video session, but then again, people start to disengage because they're attached to a computer.""Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Summary Andrew Hampton joins Andrew (X; LinkedIn) to discuss intelligence in New Zealand. Andrew is the Director General of the New Zealand Security Intelligence Service. What You'll Learn Intelligence The New Zealand Intelligence Community How geography effects national security The lasting impact of the Christchurch Mosque attacks New Zealand's relationship with China Reflections The power of community organization The nuanced nature of global politics And much, much more … Quotes of the Week “I think for a long time there was a view that our geographical isolation protected us from a range of national security threats. But unfortunately, in the current world, geostrategic competition is playing out in our region. Going back to my old role, you're only one click away from a cyber-attack … This and misinformation and violent extremism are permeating the whole world. ” – Andrew Hampton. Resources SURFACE SKIM *SpyCasts* CIA Director, Defense Secretary, Gentleman with Leon Panetta (2024) Australian National Day Special: Intelligence Down Under with John Blaxland (2024) SPY CHIEFS: Director-General of Security Mike Burgess - ASIO, Australia & America (2022) Keeping Secrets/Disclosing Secrets with Spy Chief turned DG of Australia's National Archives David Fricker (2022) *Beginner Resources* What Is The Five Eyes Alliance? K. Haan, Forbes [Short Article] A Brief History of New Zealand, Live and Work New Zealand (2022) [Short article] Why Isn't New Zealand a Part of Australia? History Matters, YouTube (2020) [3 min. video] DEEPER DIVE Books Voyagers: The Settlement of the Pacific, Nicholas Thomas (Basic Books, 2021) Pacific Century: The Emergence of Modern Pacific Asia, Mark Borthwick (Routledge, 2013) The Penguin History of New Zealand, Michael King (Penguin Books, 2003) Primary Sources He Whakaputanga o te Rangatiratanga o Nu Tireni – the Declaration of Independence of the United Tribes of New Zealand (1835) Te Tiriti o Waitangi — the Treaty of Waitangi (1840) New Zealand Security Intelligence Service Act (1969) Intelligence and Security Committee Act (1996) Inspector-General of Intelligence and Security Act (1996) Government Communications Security Bureau Act (2003) Intelligence and Security Act (2017) *Wildcard Resource* The Women's Suffrage Petition - Te Petihana Whakamana Pōti Wahine In 1893, this document gave all women in New Zealand the right to vote in general elections – Making New Zealand the first country in the world to enact universal women's suffrage! Learn more about your ad choices. Visit megaphone.fm/adchoices
Mark Ledlow sits down with security industry expert Adam Corn to delve into the world of intelligence, security, and business. From their experiences in government intelligence agencies to the private sector, Adam shares valuable insights on handling adversity, staying calm in chaotic situations, and the importance of effective communication in security programs. As they discuss the current global landscape and potential threats, Adam provides practical advice for businesses to navigate uncertainty and enhance their safety and security measures.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSMaintaining equanimity and stoic mindset in times of stress is crucial for security professionals to effectively handle adversity and uncertainty.Effective communication and internal training programs are essential for making employees feel safe and secure in the workplace.The proliferation of misinformation and constant inundation of information via technology can contribute to heightened anxiety and uncertainty, necessitating a strategic approach to security and communication.Building robust security programs, including insider threat detection and geofencing, helps mitigate risks and protect companies from potential threats.Businesses must prioritize long-term security strategies and invest in training and relationships with law enforcement agencies to effectively navigate evolving security challenges.QUOTES"Your network is your net worth, especially in the security industry.""In times of uncertainty, maintaining equanimity is key for security professionals to effectively protect and reassure employees.""Words are important in the security industry; alarmist language can erode credibility.""An effective security program not only protects, but also makes employees feel safe and secure.""Building relationships with law enforcement agencies and investing in long-term security strategies are essential for businesses to navigate evolving security challenges."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Russia has charged four men it says attacked a Moscow concert hall and killed at least 137 people. Russia were warned by US Intelligence agencies that an attack was imminent, and even went into detail about what type of attack it would be. So how is this type of intelligence collected? Declan Power, Security and Defense analysist joined Sean to discuss...
Russia has charged four men it says attacked a Moscow concert hall and killed at least 137 people. Russia were warned by US Intelligence agencies that an attack was imminent, and even went into detail about what type of attack it would be. So how is this type of intelligence collected? Declan Power, Security and Defense analysist joined Sean to discuss...
In this episode, we explore Microsoft's partnership with ChatGPT as a cyber ally, analyzing how this collaboration enhances security intelligence and fortifies defenses against sophisticated cyber adversaries. Get on the AI Box Waitlist: https://AIBox.ai/ Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/ Follow me on Twitter: https://twitter.com/jaeden_ai
Danny Yatom is the Former Head of Israel's Mossad. He also served as Chief of Staff and security advisor to Prime Minister Ehud Barak 1999 -2001. He was a top military officer and political officer. Therefore, he is one of the most qualified to talk about Israel's military, intelligence, and security landscape in regard to the war with Palestine.In this episode, Yatom talks about: Israel's technological advancements in the military The failures of October 7th The role of intelligence in the warWhy the Prime Minister should resignThe struggle for peace and a Two-State SolutionSign up for the Some Future Day Newsletter here: https://marcbeckman.substack.com/Book: The Labyrinth of Power: By The Former Director of the Mossad To join the conversation follow Marc here:YoutubeLinkedInTwitterInstagramMarc is a Senior Fellow of Emerging Technologies at NYU, the CEO of DMA United, and is on the New York State Bar Association's Taskforce for Cryptocurrency and Digital Assets.
While ChatGPT and other large language models (LLMs) are making headlines, the federal government and the U.S. military have been leveraging AI for years to support the mission. Host Tammy Haddad interviews Vice Admiral Frank Whitworth, director of the National Geospatial-Intelligence Agency (NGA), who is one of the Pentagon's top leaders in AI. In this episode, VADM Whitworth discusses how NGA uses AI “from the seabed to space” in national security, intelligence, warfare, competition with China, and the promise of advanced AI models that can analyze visual data.
Security/Intelligence risks and leaks, interference in Canadian elections, the two Michaels, and where Canada stands after the explosion in Niagara. Guest: Phil Gurski, President and CEO of Borealis Threat and Risk Consulting. Learn more about your ad choices. Visit megaphone.fm/adchoices
Sirens, Slammers and Service - A podcast for Female First Responders
Welcome back to Sirens, Slammers, and Service. In this episode, we take you behind the scenes with Rebekah Hunt, a Security Intelligence Officer holding her own in the complex environment of the Edmonton Remand Centre.Join us as Rebekah shares her unique perspective on her role with the jail. From navigating the intricacies of prison life to addressing gender dynamics in her profession, this episode sheds light on the day-to-day realities of a woman working in a demanding, high-stakes field and offers a rare glimpse into the day-to-day life of a Security Intelligence Officer. Rebekah takes us on a journey through her experiences, providing valuable insights into the critical role she plays in ensuring the security of both staff and inmates.
Grab a front-row seat as we cross the intersection of AI, cybersecurity, and global regulations with our esteemed guest, Matthew Pines, Director for Security Intelligence at the Krebs demo. We'll navigate the precarious waters of the AI arms race, scrutinize the potential of AI to both automate cyberattacks and detect network anomalies, and explore the thriving criminal market of ransomware-as-a-service. From countries leveraging lax legal frameworks to the emergence of a global regulatory regime around generative AI, Matthew brings us deep insights into the shifting dynamics of cybersecurity.A notable highlight of our conversation is the exploration of the geopolitical tensions between the US and China. Has the looming potential fallout of a Taiwan event got you anxious? Or perhaps the social engineering possibilities through apps like TikTok have piqued your curiosity? We shed light on these aspects along with the proposed Restrict Act by Senator Mark Warner and the concept of US-China decoupling. We also track how key figures like Elon Musk, Jamie Dimon, and Bill Gates are playing their part in stabilizing the US-China relationship.Buckle up, because we are taking a surprising turn into the realm of Unidentified Aerial Phenomena (UAPs). If you've ever wondered about the national security implications of UAPs or how blockchain technology fits into this context, we're right there with you. We make a case for greater transparency, investigation, and even the role of Bitcoin as a potential reserve asset to boost US global economic power. From AI's geoeconomic implications to the strategic competition with China, this episode is a thrilling rollercoaster that bridges the known and the unknown. Join us as we take a deep dive into these fascinating topics and expand your world view in the process.ANTICIPATE STOCK MARKET CRASHES, CORRECTIONS, AND BEAR MARKETS WITH AWARD WINNING RESEARCH. Sign up for The Lead-Lag Report at www.leadlagreport.com and use promo code PODCAST30 for 2 weeks free and 30% off.Nothing on this channel should be considered as personalized financial advice or a solicitation to buy or sell any securities. The content in this program is for informational purposes only. You should not construe any information or other material as investment, financial, tax, or other advice. The views expressed by the participants are solely their own. A participant may have taken or recommended any investment position discussed, but may close such position or alter its recommendation at any time without notice. Nothing contained in this program constitutes a solicitation, recommendation, endorsement, or offer to buy or sell any securities or other financial instruments in any jurisdiction. Please consult your own investment or financial advisor for advice related to all investment decisions.The Canadian Money RoadmapDiscover strategies to save, invest, and grow your money effectively.Listen on: Apple Podcasts SpotifyFoodies unite…with HowUdish!It's social media with a secret sauce: FOOD! The world's first network for food enthusiasts. HowUdish connects foodies across the world!Share kitchen tips and recipe hacks. Discover hidden gem food joints and street food. Find foodies like you, connect, chat and organize meet-ups!HowUdish makes it simple to connect through food anywhere in the world.So, how do YOU dish? Download HowUdish on the Apple App Store today:
Guest post by Rob Allen, who is an IT Professional with almost two decades of experience assisting small and medium enterprises embrace and utilise technology. Worrying trends are emerging in how ransomware is being not just more narrowly targeted, but tailored and sophisticated too According to Security Intelligence, one of the top 10 most costly cyber attacks of 2022, took place in April, where ransomware crippled the US Austin Peay State University. The attack brought the university to a halt just before final exams began, reducing faculty, staff and students to personal devices to access email and other university resources. The university cancelled final exams and closed all computer labs. Ransomware: narrowing the focus for more targeted attacks It was forewarning of later attacks seen in the same sector here at home in 2023. It is becoming easier for ransomware to target specific sectors and individual organizations, with elements of artificial intelligence (AI) and automation being incorporated, adding to developments such as ransomware-as-a-service. It does not have to be the devastating strike it used to be. A combination of policies, controls and layered protections can stop ransomware, minimising damage and ensuring your business can carry on. There is little doubt that ransomware is becoming more prevalent, and more costly. Gartner reports that as many as a third of organisations globally have experienced some kind of ransomware attack. As reported by BCS, while 2022 saw a slight global fall in ransomware incidents, Europe saw a 63% increase. IBM's "Cost of a Data Breach Report" 2022 found that the share of breaches caused by ransomware grew 41% in the period and took 49 days longer than average to identify and contain. Additionally, destructive attacks increased in cost by more than $430,000, making the global average cost of a ransomware attack $4.54 million. The volume and impact of ransomware is further multiplied by technological developments. Ransomware-as-a-service has already been observed and is well documented. Now, cybersecurity experts suspect that AI and machine learning (ML) may be deployed to increase efficacy, and perhaps facilitate automation. Automating significant elements of the ransomware process could mean an even greater acceleration of attacks, argues Mark Driver, a research vice president at Gartner. 'It's not worth their effort if it takes them hours and hours to do it manually, but if they can automate it', Driver reasons, "it's terrifying." While it has not yet been definitively identified in the wild, security expert Mikko Hyppönen has said there may be a few, highly successful ransomware gangs with the resources to hire AI talent and develop the capability. Experts see distinct patterns emerging within ransomware attacks due to these technological developments. TechTarget reports that the three sectors of media/leisure/entertainment, retail, and energy/oil/gas/utilities, accounted for more attacks than any other sectors. These ransomware attacks are increasingly tailored for a specific sector or industry, with utilities, in particular, seeing more narrowly focused methodologies, instead of the 'scatter gun' approach of old. This has led to speculation that if the trends of as-a-service platforms, and sector specific adaptation converge with embedded AI and ML, automation, , then ransomware incidents such as the Colonial Pipeline attack in the US could not only become more common, but more coordinated and effective. If such tactics and tools were to be used by a nation-state, entire sets of critical infrastructure could be at risk of crippling attacks. However, it is important to point out that while ransomware is a growing menace, it is often the final stage of an attack. Gartner's "Anatomy of a Ransomware Attack," it depicts the initial stages as ingress- through the likes of phishing, email, credentials dumps, etc, compromise followed by burrowing and lateral movement - prior to ...
Moez Kamel, Threat Management Specialist at IBM Security, joins us on T-Minus Deep Space for a special edition all about the cybersecurity ecosystem in the New Space industry. You can follow Moez on LinkedIn and his work at IBM's Security Intelligence blog. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on Twitter and LinkedIn. Selected Reading Cybersecurity in the Next-Generation Space Age, Pt. 1: Introduction to New Space Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges Audience Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Moez Kamel, Threat Management Specialist at IBM Security, joins us on T-Minus Deep Space for a special edition all about the cybersecurity ecosystem in the New Space industry. You can follow Moez on LinkedIn and his work at IBM's Security Intelligence blog. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on Twitter and LinkedIn. Selected Reading Cybersecurity in the Next-Generation Space Age, Pt. 1: Introduction to New Space Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges Audience Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Australia's Space Command stands on its own. Landspace's methalox Zhuque-2 sets a date for its orbital flight test. Anti-collision maneuvers by Starlink satellites are growing exponentially. A two-stage student rocket proves launch capabilities at Spaceport Nova Scotia. We discuss New Space cybersecurity with Moez Kamel, Threat Management Security Technical Specialist at IBM Security. And a whole lot more! Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you'll never miss a beat. And be sure to follow T-Minus on Twitter and LinkedIn. T-Minus Guest Moez Kamel, Threat Management Specialist at IBM Security, on the cybersecurity ecosystem in the New Space industry. You can follow Moez on LinkedIn and his work at IBM's Security Intelligence blog. Selected Reading Space Command formally exits the RAAF- Space Connect Saber Astronautics opens new SA state HQ and Spacecraft Design Facility- EX2 for Defence Innovators 'We've Been Doing It Wrong': SPACECOM's Shaw Pushes New View of Operations- Air & Space Forces Magazine China's Landspace set for second methalox rocket launch- SpaceNews Multi-National Crew to Visit FMARS (Canada) for Upgrade Work & Science Mission- The Mars Society Leonardo to develop Nasa's infrared sensors to find habitable planets- Electronics Weekly SpaceX Starlink satellites caused 25,000 near-misses in just 6 months- Space MLS, Space Community Celebrates Debut Student Rocket Launch at Spaceport Nova Scotia- SpaceQ Ecuador Government connects six Galápagos Islands schools to SpaceX St- Tesmanian We must address a key obstacle to our new age of space exploration- New Scientist Building U.S. Space Force Counterspace Capabilities: An Imperative for America's Defense - Mitchell Institute for Aerospace Studies Elon Musk's SpaceX Now Has a ‘De Facto' Monopoly on Rocket Launches- WSJ T-Minus Crew Survey We want to hear from you! Please complete our 4 question survey. It'll help us get better and deliver you the most mission-critical space intel every day. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
JokerSpy afflicts Macs. ThirdEye (not so blind). Mockingjay process injection as proof-of-concept. Switzerland expects Russia to increase cyberespionage as agent networks are disrupted. The fracturing of Conti, and the rise of its successors. The Washington Post's Tim Starks explains the security of undersea cables. Our guest is Brian Johnson of Armorblox to discuss Social Security Administration impersonation scams. And the "UserSec Collective" says it's recruiting hacktivists for the Russian cause. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/123 Selected reading. JokerSpy macOS malware used to attack Japanese crypto exchange (AppleInsider) Prominent cryptocurrency exchange infected with previously unseen Mac malware (Ars Technica) New Fast-Developing ThirdEye Infostealer Pries Open System Information (Fortinet Blog) Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution (Security Joes) New Mockingjay Process Injection Technique Could Let Malware Evade Detection (The Hacker News) New Mockingjay process injection technique evades EDR detection (BleepingComputer) Ukraine war made Switzerland hub for Chinese, Russian spies: Swiss intelligence (South China Morning Post) Swiss intelligence warns of fallout in cyberspace as West clamps down on spies (Record) The rise and fall of the Conti ransomware group (Global Initiative) The Trickbot/Conti Crypters: Where Are They Now? (Security Intelligence) Ukraine at D+489: An influence contest, post-mutiny. (CyberWire)
Sonal talks to the former legal director of intelligence agencies MI5 and MI6, who is now turning his experience to write thrilling spy novels. This fascinating conversation covers his journey into the world of intelligence, some of his most memorable moments with the agencies, and the question we all want to ask: how close to the real world of sleuthing does Hollywood get it. See omnystudio.com/listener for privacy information.
Matt Pines, a cybersecurity and geostrategic intelligence consultant and a National Security Fellow at the Bitcoin Policy Institute, sits down with Josh & Dan to discuss the current geopolitical environment and Bitcoins potential involvement in the friction. WE COVER: China, Russia & current global tensions Dollar and UST vulnerability The role of Bitcoin within today's geopolitical environment Aliens and Unidentified Aerial Phenomena ITEMS MENTIONED Expectation Value by Matt Pines “The Future Geopolitical Order And Bitcoin: An Initial Assessment” by Matt Pines Bitcoin Policy Institute “Spies and Lies” by Alex Joske “The Danger Zone” by Hal Brands & Michael Beckley Bob Lazar on Joe Rogan “Hedging Sanctions Risk: Cryptocurrency in Central Bank Reserves” by Matthew Ferranti SHOW SPONSORS: BITCOIN 2023: promo code “BCB23” for 10% off tickets. May 18-20, 2023. We'll be there! Join us for the world's largest gathering of bitcoiners as we celebrate another year of progress towards hyperbitcoinization. Visit b.tc/conference COINKITE — PROMO CODE “BCB” for discount on ColdCard. Industry leaders in Bitcoin security hardware and fun devices, makers of the COLDCARD and other prominent items including opendime, satscard, tapsigner, the seedplate, coldpower, blockclock mini & blockclock micro. All available at coinkite.com START9 — Sovereign computing. Take back control of your data. Run a Bitcoin & Lightning node. Embassy One: A small uncompromising personal server, capable of running BTC Core. Embassy Pro: The most powerful, secure, and reliable private server in the world. Visit Start9.com SWAN — The place we choose to buy Bitcoin. Dollar cost average daily, weekly or monthly with a company that's Bitcoin only and encourages you to hold your own private keys. Visit Swan.com. For a limited time Swan is offering FREE Swan Premium for 1 year at Swan.com/fire CROWDHEALTH BTC — Use CODE BLUE to get 1st 3 months massively reduced at $99/month. Harness the Power of Bitcoin + Health Care. Join other Bitcoiners on a crowdfunding platform while accumulating Bitcoin in the process. Bitcoin specific crowd joincrowdhealth.com/bitcoin CAPITAL LOGISTICS — Logistics firm specializing in temperature controlled freight. They STACK BITCOIN on their balance sheet! Support Bitcoin Companies! Visit capitallogisticsllc.com. ABOUT MATT PINES: Matthew Pines is the Director for Security Intelligence at the Krebs Stamos Group where he works as a cybersecurity and geostrategic intelligence consultant. Previously he was a government consultant surrounding security and resilience challenges. He has conducted dozens of assessments of national preparedness, emerging technology, and strategic security programs. He strives to apply rigorous analytical methodologies to help policy-makers understand the implications of Bitcoin as an emerging technology for the benefit of the nation. As a National Security Fellow at the Bitcoin Policy Institute, he conducts research and analysis to help policy-makers understand the implications of Bitcoin as an emerging technology. He holds a master's degree in Philosophy and Public Policy (with Distinction) from the London School of Economics and Political Science and a bachelor's degree in Physics and Philosophy (with Honors) from Johns Hopkins University. SUPPORT THE BCB PODCAST: We are live on Podcast 2.0 apps & wallets, including apps like Breez & Fountain for sat streaming. Tips are open strike.me/bcb TWITTER: You can follow us @blue_collarbtc, you can follow Matt Pines @Matthew_Pines EMAIL: Send questions or comments to bluecollarbitcoinpodcast@gmail.com
Welcome to Episode 63 of the Blue Light Leavers Podcast Today's guest is Oliver Laurence, who is a managing partner at ionasia, and an award-winning expert in security, intelligence, investigations and crisis management. In this interview, Oli shares his journey from policing, into the Security, Intelligence and Crisis Management sector. He discusses the skills he gained in frontline roles, predominantly policing remote roles in the Australian outback, that helped him create his own business, the qualifications he took, his first roles outside policing, and how he transitioned into the security sector, and he also provides insights into the Security, Intelligence and Crisis Management Sector as a career path. We talk different roles that are a good fit for cops and how you can position yourself to make that transition into the private sector. Oli is also the host of the Protect and Serve podcast. In this interview, he talks candidly about his journey and shares his wealth of knowledge, successes and experience with us. This episode is sponsored by the brilliant Motor Source Group. Motor Source Group offer genuine new car discounts to serving and retired emergency services personnel, including Police, NHS, Fire and Rescue, and the Prison Service. They're completely independent, offering a full range of makes and models, and are rated excellent by their customers on Trustpilot. To find out more, go to www.bluelightleavers.com/partners Don't forget, you can join the private Facebook Group via www.facebook.com/groups/bluelightleavers The Academy Membership from Blue Light Leavers gives you all the help you need to find your new role or career, including weekly live sessions with Andy and others who've been there and done it along with subject matter experts, talking CVs, LinkedIn, interviews and so much more, so if you're looking for a little more help and support and want to find out more, you can go to www.bluelightleavers.com/academy If you're not sure what roles you can do after the police, check this out: 'What jobs can I do after the Police?' Scorecard (scoreapp.com) You can listen to the podcast on shift, walking the dog, pottering about, and do it on your phone, desktop, laptop, or tablet, anywhere and whenever suits you, pause and play and they're all completely free! Send in a voice message: https://anchor.fm/bluelightleavers/message --- Send in a voice message: https://podcasters.spotify.com/pod/show/bluelightleavers/message
Summary Bryan Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Bryan says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber Weakening cyber adversaries Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Bryan Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Bryan serves as the Assistant Director of the FBI's Cyber Division. What changed in those 20 years to bring Bryan to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber? Tune into this week's SpyCast episode to find out! The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries? And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world. Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017) Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015) DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020) The Evolving Attack Surface (2020) Primary Sources Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021) Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!
Cybersecurity is a buzzing topic these days; the rise of cyber-attacks is clearly evident and makes major organizations consider cybersecurity a high-priority concern. To combat cyberattacks, protect data from unauthorized access, and prevent them by implementing robust security measures, organizations require highly skilled cybersecurity professionals. As a result, we see a rise in cybersecurity jobs in the market, which are expected to increase in the future. In this comprehensive blog, we will see the top trending cybersecurity jobs in 2023. Top Trending Cybersecurity Jobs in 2023 Building your career in the cybersecurity domain is the best option to enhance your career in multiple roles. Cybersecurity is a combination of two streams: Offensive security and Defensive security. It includes many sectors such as Networking, Software, Systems, Information Security, Risk Analysis, Security Audit, Security Intelligence, Cloud Security, Incident Response, Security Testing, Ethical Hacking, Digital Security, and the list goes on. Let's see the top trending cybersecurity jobs in 2023.
Summary Brian Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Brian says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber Weakening cyber adversaries Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Brian Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Brian serves as the Assistant Director of the FBI's Cyber Division. What changed in those 20 years to bring Brian to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber? Tune into this week's SpyCast episode to find out! The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries? And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world. Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017) Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015) DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020) The Evolving Attack Surface (2020) Primary Sources Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021) Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!
Six years after the shock of Russian interference in the 2016 presidential election, is the US electoral process better protected from foreign influence? Could the next mid-term elections be the scene of disinformation campaigns or cyberattacks orchestrated by America's adversaries? To try to answer these questions, the Raoul Dandurand Chair's Center on Multidimensional Conflicts welcomes American expert Bilyana Lilly. Director of Security Intelligence and Geostrategy at the Krebs Stamos Group, she is the author of the recent book Russian Information Warfare: Assault on Democracies in the Cyber Wild West. A discussion hosted by Danny Gagné, research fellow and coordinator of the Center on Multidimensional Conflicts.This conference, organized in collaboration with the the Center on Multidimensional Conflicts, is part of the Center for United States Studies' events, analysing the US mid-term elections.
With the state of cybersecurity in constant flux, how can security teams better prepare both their organizations and society for the challenges ahead? Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world. Follow us on Social!! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube
Courageous Cindy. With 25 years in the service - women's units, men's units, IERT team, CISM, maximums, mediums, minimum, and Security Intelligence positions this episode has it all. This conversation could not have been more fun and interesting. Cindy talks about being assaulted the first day on the job - and shares her experience with responding to a staff hostage taking where 4 inmates had an officer for 4.5 hours. Her career took her on many different paths, but for the last 13 years she has been the SIO at Sask Pen. Cindy talks about find work life balance just in the last 2 years - sharing some of the things that she does now that help her to stay grounded and present in her life outside of the prison walls.
Episode: 00120 Release Date: August 15, 2022 Description: Rachel Carson joins us this week from the UK with a unique story on how she discovered the law enforcement analysis profession, and how she helped develop a crime analysis unit. Her badge story consists of developing algorithms and best practices to help track "hot routes" between train terminals. Rachel has an entrepreneur mindset and a heart for service, developing and being a part of multiple businesses and training programs. Rachel played an integral part on the IACA's International Outreach Committee and served as the VP of Membership for the past three years. Rachel is currently Head of Security & Intelligence at The Institute of Clever Stuff, Analytical Development Director at Futurum Consultancy & Training, Director & International Partner Liaison for Spun Candy, Director of Inspired Acts, and was recently re-elected as VP of Membership for the IACA by acclamation. CHALLENGE: There are Easter eggs in one of the tables of the Excel chapter that Jason wrote for the IACA textbook. First-person to email us at leapodcasts@gmail.com about what the Easter eggs are will receive a $20 gift card from us. Happy hunting! Name Drops: Steve French (00:19:35), Kyle McFatridge (00:45:20), Christopher Bruce (00:59:25), Mary Bertucelli (01:03:25), Yarisha Walsh/Kyle Stoker/Kim Barnes (01:04:11), Roseanna Ander (01:06:24), Chief William Scott (01:06:39), Sergeant Jason Devlin (01:07:04), Mindy Duong (01:07:23) Public Service Announcements: Paige Kenningale - ACIA New Horizons Podcast (https://www.acia.org.uk/Podcasts) Dawn Reeby's New Book (https://www.linkedin.com/in/dawn-reeby-%F0%9F%92%AB-holistic-coach-for-service-based-leaders-3b24439b/) Steve French (https://www.leapodcasts.com/e/steve-french-%e2%80%93-one-compassionate-chap/) Related Links: The OSINT tools referenced: Google dorks IntelTechniques by Michael Bazzell NexusXplore by OSINT Combine SkopeNow Association(s) Mentioned: IACA Vendor(s) Mentioned: I2 Contact: https://www.linkedin.com/in/rachel-carson-05b86834 Transcript: https://mcdn.podbean.com/mf/web/zybiyr/RachelCarson_transcript.pdf Podcast Writer: Mindy Duong Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts YouTube Version: https://youtu.be/_AlyP3RX40w 00:00:17 – Introducing Rachel 00:06:33 – Background in Mathematics 00:10:43 – ABS: Data Clock 00:24:19 – Break: Paige Kenningale & Steve French 00:25:46 – National Intelligence Model 00:41:24 – I2 Analyst Notebook 00:48:39 – Break: Dawn Reeby & Steve French 00:49:26 – Open Source 00:59:07 – IACA 01:09:54 – Words to the World
#002 - An intriguing conversation with Gareth Westwood, Global Security Intelligence Manager. He shared how his professional path led him from studying music composition, to military intelligence, and onto corporate intelligence. Topics covered include: job market challenges for practitioners, core competencies for intel analysts, and advice for aspiring practitioners. If you'd like to get the resources and show notes mentioned in this episode, go to:https://thesecuritystudent.com/shownotes
Canada's intelligence agency CSIS has a national presence across the country. That it where the investigations happen and the intel is collected. What it is like to run such a shop? Borealis talks to former senior CSIS IO Dan Faughnan.Dan Faughnan served for over 30 years with the Canadian Security Intelligence Service and the Canadian Armed Forces, retiring as a senior director general. During his long career Dan served in multiple domestic offices and overseas missions, developing and leading a significant number of operations, as well as transformational projects and programs.Phil Gurski is the President and CEO of Borealis Threat and Risk Consulting Ltd. and Programme Director for the Security, Economics and Technology (SET) hub at the University of Ottawa's Professional Development Institute (PDI). He worked as a senior strategic analyst at CSIS (Canadian Security Intelligence Service) from 2001-2015, specializing in violent Islamist-inspired homegrown terrorism and radicalisation.►Check Phil's latest book ''The Peaceable Kingdom'' - https://borealisthreatandrisk.com/the-peaceable-kingdom/►Website - https://borealisthreatandrisk.com/►Twitter - https://twitter.com/borealissaves►LinkedIn - https://www.linkedin.com/in/phil-gurski-8942468/►Email - borealisrisk@gmail.com
Brandon and Eric reflect on 2021 and their favorite episodes and topics of the year. Episode Links 32 - Open Source Sustainability (https://sudo.show/32) 30 - Loving Your Work with Dashaun Carter (https://sudo.show/30) 27 - Open Source Virtual Desktop Infrastrcture (https://sudo.show/27) 16 - Starting a Home Lab (https://sudo.show/16) 18 - Managing Multi-Cloud with Chris Psaltis (https://sudo.show/18) 22 - Tidelift (https://sudo.show/22) 24 - Data Quality with Soda (https://sudo.show/24) 37 - Data Integration with Michel Tricot of Airbyte (https://sudo.show/37) 28 - Security Intelligence with Steve Ginty of RiskIQ (https://sudo.show/28) 35 - Busting Open Source Security Myths (https://sudo.show/35) Software Links Project Hamster (https://github.com/projecthamster) Links to the network shows Destination Linux Network (https://destinationlinux.network) Sudo Show Website (https://sudo.show) Support the Show Sponsor: Bitwarden (https://bitwarden.com/dln) Sponsor: Digital Ocean (https://do.co/dln-mongo) Sudo Show Swag (https://sudo.show/swag) Contact Us: DLN Discourse (https://sudo.show/discuss) Email Us! (mailto:contact@sudo.show) Sudo Matrix Room (https://sudo.show/matrix) Follow our Hosts: Brandon's Website (https://open-tech.net) Eric's Website (https://itguyeric.com) Red Hat Streaming (https://www.redhat.com/en/livestreaming) Chapters 00:00 Intro 00:42 Welcome 02:41 DigitalOcean 03:45 Bitwarden 05:11 Main Content 47:20 Wrap Up
Professor Mark Clark Discusses CSUSB's New MS Program in National Security Intelligence Analysis and Cybersecurity and talks about protecting information on the internet.
Guest: Sasha Planting | Associate Editor at Daily Maverick Sasha Planting talks to John about the problem of cable theft on South African roads and the urgent need for security measures. It costs about R1-million a kilometre to replace that cable. That means R5.5-million in cable-related expenses a day. High-tech security would be cheap at the price. This year, Transnet Freight Rail cancelled 1,190 trains as a direct result of security-related incidents. There has been a spike in incidents on the coal line, the manganese line and on the Central Corridor that connects these lines. These lost volumes can never be recouped. These lines are cash cows; they are what is holding the already lossmaking company back from the brink See omnystudio.com/listener for privacy information.
Our guest Kerry Matre from Mandiant Security supports marketing cybersecurity products. It is interesting to hear her path from application development and Security Intelligence to support marketing and business development. She brings the primary question to clients: why are we doing this, and how will people interact? Our guest says she often finds that many tools the organization purchased already are not fully implemented. The use of statistics such as configuration confidence is a very insightful measure, as she explains. What does it take to be using your tools effectively? This conversation also has some great discussions on AI versus human analysis, where we are producing viable solutions using AI. Finally, it was interesting to hear Kerry's take on the analyst industry in a few years. This show provides some great incite about the direction of the intelligence industry. Visit our sponsors: BlockFrame Inc. SecureSet Academy Murray Security Services
As the Solar Winds and the Colonial Pipeline attacks showed, supply chain disruptions can have devastating consequences for workers, businesses, and consumers. Grayson Milbourne, Director of Security Intelligence at Webroot, an OpenText company, joins the podcast to address these recent attacks and their implications for SMBs and MSPs.
Cybercrime caused major problems for both individuals and businesses last year, with ransomware, malware, and phishing attacks growing increasingly frequent. Luckily, Grayson Milbourne, Director of Security Intelligence at Webroot, an OpenText company, was able to join host Joe Panettieri for a far-reaching conversation about the Webroot 2021 BrightCloud Threat Report. Their conversation covers the report's main insights and offers advice for SMBs and MSPs attempting to navigate a complex threat landscape.
Recorded Future's Insikt Group recently published the latest version of their annual report focused on the political landscape facing the LGBTQIA+ community worldwide in the last year. The report is titled Pride and Prejudice in Shifting Landscape of LGBTQIA+ Laws Worldwide, and it tracks both progress and challenges the Pride Community face around the globe. Joining us to share insights from the report as well as the story behind its inception are Recorded Future's Lea Cure and Evan Akin.
Recorded Future - Inside Threat Intelligence for Cyber Security
Recorded Future's Insikt Group recently published the latest version of their annual report focused on the political landscape facing the LGBTQIA+ community worldwide in the last year. The report is titled Pride and Prejudice in Shifting Landscape of LGBTQIA+ Laws Worldwide, and it tracks both progress and challenges the Pride Community face around the globe. Joining us to share insights from the report as well as the story behind its inception are Recorded Future's Lea Cure and Evan Akin.
Episode Topic: Technology Ethics Conference 2020 - Panel 1The Technology Ethics Center at Notre Dame convenes global thought leaders in academia, industry, non-profit organizations, and governmental agencies to develop ethical and legal frameworks that keep pace with technological development. This lecture discusses algorithmic bias in technology and the ethics and implications behind it. Featured Speakers: Solon Barocas, Principal Researcher in the New York City lab of Microsoft Research and an Assistant Professor in the Department of Information Science, Cornell UniversityShaun Barry, Global Leader in the Fraud & Security Intelligence practice, SASKevin Bowyer, Shubmehl-Prein Professor of Computer Science and Engineering, University of Notre DameGenevieve Fried, Researcher, Office of Senator Chris Coons (D-DE) Sara R. Jordan, Policy Counsel, Artificial Intelligence and Ethics at the Future of Privacy ForumRonald Metoyer, Associate Professor of Computer Science and Engineering, University of Notre DameRead this episode's recap over on the University of Notre Dame's open online learning community platform, ThinkND: go.nd.edu/96ee34.This podcast is a part of the TEC Talks ThinkND Series titled “Algorithmic Bias: Sources and Responses”.
Today, we're going to explore approaches to security at companies of different scales with Sacha Faust, Head of Security Intelligence at Amazon Payments. Sacha has held numerous roles in security and development across the industry spectrum, and we kick things off hearing about his journey in the space. The first part of the episode is about the difference between security engineering at startups versus established companies and Sacha weighs in on his experiences at Lyft versus Azure and Amazon. At Lyft, Sacha's approach was all about empowering teams and taking advantage of the fast-growing environment to build things into the company's fabric. In contrast, teams are bigger and processes more established at larger firms, and Sacha talks about the depth versus breadth-focused approach required. Here we explore what it means to go deep on a bug, hearing Sacha's ideas about learning from bug failures so you can make an impact you can measure, and the complexities of truly fixing something. We move on to the subject of Sacha's time as a developer next, and he talks about the lessons he learned about the intricacies of that world and the empathy they gave him when he switched back to engineering. His empowerment-first approach was very much born during that time as was his belief in the value of diversity of experience for building one's career as well as one's teams. For insights into security work at different scales and a few gems about the people side of security from Sacha too, be sure to tune in.
The national security and intelligence communities had a particularly tough year in 2019 with a growing number of indictments, arrests and convictions of security-clearance holders. They also experienced a rise in the theft of intellectual property and trade secrets. In response to these trends, the Office of the Director of National Intelligence will release a new counterintelligence strategy this week that it says takes a long-term approach to insider threats and nation-state threats. Federal News Network's Jory Heckman had more on what's in that strategy, on Federal Drive with Tom Temin.
See omnystudio.com/listener for privacy information.