POPULARITY
Solveiga Jaskunas is an HR Consultant, Career Coach, Connector and Speaker. Her passion lies in helping immigrants thrive professionally in the United States, and in working with employers to make their workplace culture more inclusive. Her consultancy focuses on HR consulting, career coaching, training, speaking, and network referral services for organizations and individuals. Her recent speaking event at the Expat Women Summit and HR Global summit reached participants from more than 50 countries. Solveiga was recently featured in Security Magazine, as one of three leaders with distinct LinkedIn communication styles and in the magazine in France. For more information about Solveiga, visit her profile at (https://www.linkedin.com/in/solveigajaskunas/)
Description Solveiga Jaskunas is an HR Consultant, Career Coach, Connector and Speaker. Her passion lies in helping immigrants thrive professionally in the United States, and in working with employers to make their workplace culture more inclusive. Her consultancy focuses on HR consulting, career coaching, training, speaking, and network referral services for organizations and individuals. Her recent speaking event at the Expat Women Summit and HR Global Summit reached participants from more than 50 countries. Solveiga was recently featured in Security Magazine, as one of three leaders with distinct LinkedIn communication styles and in the magazine in France. RESOURCES RELATED TO THIS EPISODE Follow Solveiga on LinkedIn How Right Now Campaign CREDITSTheme Music by lesfm from Pixabay.Produced by ChatWithLeadersMedia.com. See omnystudio.com/listener for privacy information.See omnystudio.com/listener for privacy information.
Guest: ✨ Theresa Payton, Author & CEO Fortalice® Solutions LLC [@FortaliceLLC]On LinkedIn | https://www.linkedin.com/in/theresapayton/____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Explore the intriguing case of 'NSO Group's Pegasus Spyware Code Handover to WhatsApp' as reported by The Hacker News. Dive into the court's decision, its implications, and understand the spyware's capabilities. Source article: thehackernews.com/2024/03/us-court-orders-nso-group-to-hand-over.html Unravel the alarming findings from Security Magazine's '92% of Companies Experienced an Application-Related Breach Last Year'. Discover the challenges in application security and the importance of prioritizing vulnerabilities. Source article: securitymagazine.com/articles/100470-92-of-companies-experienced-an-application-related-breach-last-year Reflect on consumer trust post-data breach in the retail sector with 'More than 60% of Consumers Would Avoid a Retailer Post-Breach' from Security Magazine. Learn about the significant impact on consumer behavior and proactive cybersecurity measures. Source article: securitymagazine.com/articles/100466-more-than-60-of-consumers-would-avoid-a-retailer-post-breach Delve into Bleeping Computer's report on the 'Windows Kernel Bug Exploited as Zero-Day Since August.' Understand the vulnerability, its exploitation by the Lazarus Group, and the crucial need for system updates. Source article: bleepingcomputer.com/news/security/windows-kernel-bug-fixed-last-month-exploited-as-zero-day-since-august/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Transcript: Mar 4 [00:00:00] Announcer: Welcome to The Daily Decrypt, the go to podcast for all things cyber security. Get ready to decrypt the complexities of cyber safety and stay informed. Stand at the frontier of cyber security news, where every insight is a key to unlocking the mysteries of the digital domain. Your voyage through the cyber news vortex starts now. [00:00:29] d0gesp4n: Welcome back to the daily decrypt. Today is March 4th. And I'm your host. Dogespan. Kicking off today's episode, we're talking about a real courtside drama from the hacker news us court orders, NSO group to hand over Pegasus spyware code to WhatsApp. It seems like NSO is Pegasus is flying a bit too close to the sun this time. Next up, we're scrolling through a security magazine report. That's got more leaks than my old garden hose. The article 92% of companies experienced an application related breach last year. Talks about the cyber equivalent [00:01:00] of Swiss cheese application security. Ready for a cyber shopping spree today we're virtually window shopping through an insightful article from security magazine. Titled more than 60% of consumers would avoid a retailer. Post-breach and for a final bite of the day, we're patching things up with a story from bleeping computer windows, kernel bug fixed last month exploded as zero day since August now. That's a longer running bud than my uncle's 72 Volkswagen. We're talking about a windows flaw that was more open than my dad's garage door. [00:01:34] d0gesp4n: This first article from the hacker news titled us court orders, NSO group to hand over Pegasus spyware code to WhatsApp. Let's unpack this and understand why it's significant. Let's talk about who NSO group is. They're in an Israeli tech firm known for creating Pegasus, which is a powerful piece of spyware. Now spyware for those who might not know is software that enables someone to spy on another's computer [00:02:00] or phone activities. Pegasus is particularly notorious because it can be installed on a device without the owner's knowledge. I imagine someone secretly watching everything you do on your phone, pretty scary. Right? Us judge has ordered NSO group to hand over the source code for Pegasus to Metta the parent company of WhatsApp. This is a big deal because the source code is like the secret recipe for how Pegasus works. Source code is basically a set of instructions written by programmers that tells the software how to function. It's like the blueprint for building a software application. In 2019 WhatsApp sued NSO group because they used what's app to distribute Pegasus to about 1400 devices, including devices of Indian activists and journalists. They exploded a zero day flaw, which is a previously unknown vulnerability in software to install the spyware. This flaw originally identified as CVE 20 19 35 60 gate was a critical bug in [00:03:00] what's apps. Voice call feature. The attackers could install Pegasus just by making a call and the target didn't even need to answer it. To make it more stealthy. They even erase the call logs. By getting the source code medical, understand how Pegasus infiltrated, WhatsApp and improve their defenses. But the court didn't require NSO group to reveal their client list. This has disappointed, many who hoped to learn, who use this spyware. The NSO group previously has been accused of selling Pegasus to governments who then used it to spy on journalists, activists and others. Knowing who used it would shed light on potential human rights abuses. This case isn't just about a single spyware. It's part of a bigger conversation about cybersecurity and privacy. And it's important to understand these different core cases and how it's playing out because well, cybersecurity is just a complex and ever evolving field. It's not just really about protecting our devices, but also understanding the ethical implications of [00:04:00] technology. I feel like a lot of these companies are just dabbling in that gray area until they're called out for something or the government steps in. One way or another, we really need to understand how this impacts our lives and keep looking for ways to stay safe and just overall be aware of. How people are invading our privacy. This next one comes from security magazine. The articles titled 92% of companies experienced an application related breach last year, and it sheds light on the widespread issue of application security breaches. This report by Checkmarx reveals that a staggering 92% of companies face breaches through vulnerabilities in applications they developed in-house last year. This is a huge number, indicating that application security is a critical concern for businesses [00:04:50] d0gesp4n: Some of you might be wondering what in application related breach is an application related breach occurs when hackers exploit weaknesses in software applications to [00:05:00] gain unauthorized access to data. It's like finding a back door into a secured building. This report highlights the struggle between meeting businesses, deadlines and ensuring application security. It's a tough balance for AppSec managers, CSOs and developers. One of the biggest challenges is prioritizing which vulnerabilities to fix first. Not all weaknesses are equal and some pose, a higher risk than others. One of the things that I had to do a lot with clients previously was tried to prioritize those things. So we would take it, take a step back and look at. How. What would happen if this vulnerability got exploited? We wouldn't really always focus on how severe the score was, but it was more what. I was holding what data, for instance, if a customer dealt with payment card information and stuff, we wanted to make sure that those were locked down as much as possible before moving into other areas of the business. But it overall, it is a difficult [00:06:00] balance to achieve because on one hand you have all these vulnerable systems in your network. And on the other hand, you have. Users are. Inherently vulnerable. We are all susceptible to falling for phishing attacks. And that is a lot of times the ways in which you could. Poke at all sorts of external websites. And we might be able to get a breach that way, but. Why would we spend all that time when we could get directly into a network and start bouncing from one workstation to another? Who knows how it's locked down internally? We tend to think about it a lot differently on the inside. And proving application security involves integrating developer friendly security tools into the development process. This means making security a part of the entire application development life cycle. Really the key here is the need for proactive approach to application security. We need to prioritize the security and protect the data, [00:07:00] especially. If we want to maintain customers trust and it is very difficult, but I think. We're moving in the right direction from what. From what I've seen across the board. Is that security is getting more involved in these public companies. And there. They're actual executive board and so on up and we're security teams are able to vocalize this now and we're able to start. Putting a dollar sign behind it. There's all these fines that are going to be put in place. More and more privacy concerns. Overall we're heading in the right direction, but we still have a long road ahead of us. Thanks for watching! [00:07:43] d0gesp4n: Tying into that last piece. We have another one from security magazine. This one titled more than 60% of consumers would avoid a retailer post breach. It's a deep dive into consumer behavior. Post-breach in the retail sector. The article reveals a startling fact [00:08:00] over 60% of customers would likely avoid shopping at a retailer that has recently experienced a data breach. This figure even jumps to 74% among high income consumers. This is really interesting to me because I was under the impression that a lot of times when a data breach went public, there would be. A little time that people would shy away from it, but ultimately going right back to it. I might be just a little ignorant to it. That's one of the things that I personally would hone in on, but if 60% of consumers that's a huge number. And that kind of makes me feel a lot better knowing that the general public. Is looking at it the same way. When a breach happens, it's not just about stolen data. It's about broken trust. Customers are entrusting their personal and financial information to retailers and a breach is a violation of that trust. The article also highlights that in the finance sector, the situation is even more critical around 83% of [00:09:00] consumers would think twice about using a finance app. If their data was compromised. This brings us to an important point. Businesses need to not only protect data, but also their reputation and customer trust. This is really interesting. I think just because we're. Positioning companies to think about, not just, yeah, there's a, there's going to be a little bit of a financial loss, especially if customer's data is gone, there's sometimes fines imposed but we're looking at it as far as reputation. Yeah. There might be a fine, however, We're now scarred. We have that. Mark on our chest that and trying to do business, but yet we have that breach sitting there. There's a couple of companies that I've used previously that have had cybersecurity breaches, and I have shifted and I haven't looked back. How do you feel when one of the products or services that you subscribe to or utilize notifies you that there's a breach? Let us know. [00:10:00] And to wrap things up, I wanted to get into the bug land. So we're going to be looking at the article from bleeping computer. Windows kernel bug fixed last month exploded as zero day since August. [00:10:12] d0gesp4n: Microsoft patched, a serious vulnerability in the window is curdle known as CVE 20 24, 2 1 3 3 8. Discovered by an Avast researcher. This flaw was actively exploited by attackers before Microsoft could fix it. Zero day or also known as an O day. Vulnerability means it was exploited by hackers before Microsoft was aware of it and could patch it. Think of it as a secret passage that hackers found and used before the homeowner could seal it. Another term that we've been throwing around often is CVE 20, 24 or 2023, whatever, followed by some more numbers. That is. Common vulnerabilities and exposures, and then they're dated. And then given a number based on when they came out within that year. This one, for [00:11:00] example, it's CVE 20 24, 2 1 3 3 8. It means that it's the 21338th vulnerability discovered this year. This flaw was dangerous because it gave attackers like the north Korean Lazarus group, deep access to the system known as Colonel level access. This allows them to disable security software and perform more sinister actions undetected. Lazarus exploded this bug to turn off security tools, using a technique called B Y O V D. Bring your own vulnerable driver. This could manipulate the system at its core affecting processes, files, and network activities. Now for an average user. It means that you could have been compromised without knowing. Risking the data and system integrity. That's like having an intruder in your house that you can't even see. The main thing that we can do with this is of course always making sure your systems are up to date. So anytime you [00:12:00] get that, it doesn't matter if you're on a windows system, Mac, if you're one of the Linux users out there. Any chance of yet. Make sure it's up to date. Windows we'll notify you. Yeah, you got to restart it. That's probably the most annoying aspect of it is it'll pop up and you got to restart your system. It's worth it. Step away. Go grab a coffee go take a quick walk. If you can. You'll be helping yourself out and. The organization that you work for. That's all I got for you. Thanks for tuning in Monday morning or Monday evening afternoon. Whenever you're getting a chance to listen to this. We appreciate. All of our listeners out there [00:12:35] d0gesp4n: and we'll see you tomorrow.
Ian Thornton Trump CD, Lisa Forte and Philip Ingram MBE look at events coming in 2024 and what could influence them from a geopolitical and cyber perspective. This episode is sponsored by CYJAX.Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE of Grayhare Media take a look at some of the more interesting world events which are set to take place in 2024. Kicking off our usual banter on this particular topic was an article in the Economist - but due to the “Great British Paywall” I've substituted this article https://www.vox.com/future-perfect/2024/1/3/24022864/elections-democracy-2024-united-states-india-pakistan-indonesia-european-parliament-far-right-voting instead which captures the essence of the discussion.With great analysis from Phil and Lisa we talk about the upcoming Russian election and the tone (as usual) turns ominous as we discuss reminders of Putin's responses to critics of his regime. https://www.newsweek.com/full-list-russians-fall-windows-putin-ukraine-war-1781790 We can expect more gravity related fatalities soon in the run up to the March 2024 Russian election.India, the world's largest democracy will conduct a national election April to May 2024. The growing population of India and it's important in world affairs is fast becoming a sought after strategic partner for many powerful countries. https://www.theguardian.com/world/2023/dec/31/bjp-modi-india-general-election-2024 but the massive disinformation capabilities could destabilise the process to a considerable degree. Lisa, citing the recent Brazilian election experience with disinformation across social media platforms and Phil identifying the magnitude of the problem brought to light in this research: https://www.ox.ac.uk/news/2021-01-13-social-media-manipulation-political-actors-industrial-scale-problem-oxford-report place the Indian elections in the right context and identify a potential lynch pin in geopolitical relationships. This will be an election which many people will be watching the results not the least of which are the 1.4 billion Indians—and a considerable number of Indian ex-pats across the world. For additional information on this subject please see: https://news.mit.edu/2023/study-microtargeting-politics-tailored-ads-0621The panel observes the potential impacts of recent layoffs in the big social media companies as well as AI content creation may in the words of Lisa “run amok” and the lack of safeguards or “kill switch” when it comes to viral content has every opportunity to feed a cycle of violence, anger and create the right atmosphere for successful disinformation and manipulation. The broader outcome of the election and the inevitable geopolitical forces lead to the panel to conclude that India may be open to shopping for the right defence partner in the years ahead to further its own geopolitical and national policy goals. It's inevitable when looking at key events of 2024 the panel turns to the big question of Russia Ukraine confit. Phil's podcast on the tactical situation can be found here: https://podcasts.apple.com/us/podcast/ukraine-day-645-an-update-by-philip-ingram-mbe/id1479994480?i=1000637077000 The
Crypto CubedIt's enigmatic and potential problematic. Lisa Forte, Partner at Red Goat Security , Phil Ingram MBE of Greyhare Media and Ian Thornton-Trump CD, CISO for Cyjax go around the table on Cryptocurrencies and the wide-ranging impact they are having on geopolitical conflict and economic conflict. The panel covers a lot of ground. The sensational trial of Sam Bankman-Fried who was found guilty on all seven counts related to the collapse of FTX could land him 115 years in jail depending on how much momentum there is for an appeal – his attorney Mark Cohen said Bankman-Fried respects the jury's decision but maintains his innocence and will continue to "vigorously fight the charges." So, yet another chapter in the saga may yet unfold.The background to the trial was straight forward. The FTX exchange fell into bankruptcy after users found they could no longer withdraw their funds, worth billions of dollars in aggregate. The money was funnelled it into a sibling company, called Alameda Research, and used it for risky stock trades, political donations, and funding his extravagant lifestyle. He also flamboyantly ignored his lawyer's advice and prior to the trial he conducted many media interviews as well as written testimony to Congress and then as part of the final trial preceding's appeared on the witness stand to defend himself. It's safe to say the jury was unimpressed as he crumbled against all the evidence, he himself had provided to government prosecutors due to his public statements.The fundraising efforts and overt Iranian funding of the Hamas terrorist organization came under discussion. Eleven days after the Terrorist attack in Israel the "U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) imposed sanctions on ten key Hamas terrorist group members, operatives, and financial facilitators in Gaza and elsewhere including Sudan, Türkiye, Algeria, and Qatar. This action targets members managing assets in a secret Hamas investment portfolio, a Qatar-based financial facilitator with close ties to the Iranian regime, a key Hamas commander, and a Gaza-based virtual currency exchange and its operator." Digging deeper into this it was soon realised crypto currency and exchanges had played a massive part in providing the funds to conduct the sinister attack into southern Israel. It appears financial sanctions against terrorist organizations were easily bypassed by cryptocurrencies exchanges despite intelligence of digital-currency wallets connected to Hamas receiving about $41 million over the past two years according to Tel Aviv-based crypto analytics and software firm BitOK and information on Palestinian Islamic Jihad receiving $93 million in crypto during the same period, based on crypto researcher Elliptic's data.Zooming out of these specific revelations the panel examined the wider implications of both nation state sanction avoidance, the ability to effectively bypass the American financial system and the role of crypto currencies in funding global political movements - somewhat anonymously. There are rather chilling revelations as cryptocurrencies are found at the very centre of political agendas, disinformation campaigns and financial transactions between countries subject to economic sanctions by both US and EU/UK governments. Despite analysis proclaiming that far more legitimate and legal transactions are occurring on crypto currency blockchains than illegitimate and illegal transactions the simple conclusion is we don't know how bad the problem is until the damage has already been done.
If you're not entirely sure what a career in national security would entail, look no further than Lauren Buitta to elaborate. Founder and CEO of Girl Security, Lauren has utilized her past career experience to help make the national security field more accessible and equitable for women. She has been named one of fifty women making the world a better place by InStyle, and one of the most influential people in security by Security Magazine. In this interview, we discuss where Lauren's interest in the national security field stemmed from, what inspired her to found Girl Security, and how Girl Security is helping equip young women to enter the national security workforce. Don't miss this episode of Claim Your Confidence where we talk about:Lauren's interest in understanding the human experience and the full scope of how policy can affect communities in the U.S. and around the globeHow majoring in political science in college led to Lauren working at a national security think-tank post-grad, and her experiences being one of few women in the fieldThe importance of diversity in the national security workforce, and how it leads to better policy outcomesHow Lauren had the idea for Girl Security long before she founded the company, and what prompted her to finally take the leap and invest in her ideaThe common misconceptions around what working in national security is like, and how Girl Security is working to help inform younger generations about the importance and breadth of national security and the opportunities that can be found in the fieldFind Lauren Buitta:www.girlsecurity.orgIG: @laurenbuittaLinkedIn: Lauren Bean BuittaFollow Lydia:www.lydiafenet.comIG: @lydiafenetLinkedIn: Lydia Fenet
If you're not entirely sure what a career in national security would entail, look no further than Lauren Buitta to elaborate. Founder and CEO of Girl Security, Lauren has utilized her past career experience to help make the national security field more accessible and equitable for women. She has been named one of fifty women making the world a better place by InStyle, and one of the most influential people in security by Security Magazine. In this interview, we discuss where Lauren's interest in the national security field stemmed from, what inspired her to found Girl Security, and how Girl Security is helping equip young women to enter the national security workforce. Don't miss this episode of Claim Your Confidence where we talk about: Lauren's interest in understanding the human experience and the full scope of how policy can affect communities in the U.S. and around the globe How majoring in political science in college led to Lauren working at a national security think-tank post-grad, and her experiences being one of few women in the field The importance of diversity in the national security workforce, and how it leads to better policy outcomes How Lauren had the idea for Girl Security long before she founded the company, and what prompted her to finally take the leap and invest in her idea The common misconceptions around what working in national security is like, and how Girl Security is working to help inform younger generations about the importance and breadth of national security and the opportunities that can be found in the field Find Lauren Buitta: www.girlsecurity.org IG: @laurenbuitta LinkedIn: Lauren Bean Buitta Follow Lydia: www.lydiafenet.com IG: @lydiafenet LinkedIn: Lydia Fenet Don't forget to subscribe to the podcast for free wherever you're listening or by using this link: https://bit.ly/ClaimYourConfidencePodcast If you like the show, telling a friend about it would be amazing! You can text, email, Tweet, or send this link to a friend: https://bit.ly/ClaimYourConfidencePodcast Learn more about your ad choices. Visit podcastchoices.com/adchoices
Fred Burton is a former police officer, special agent and New York Times best-selling author. He's served on the front lines of high-profile investigations like the hunt for and arrest of Ramzi Yousef, the mastermind behind the first World Trade Center bombing; the 1988 plane crash of PAK-1 that killed U.S. Ambassador Arnold Raphel and Pakistani President Muhammad Zia-ul-Haq; and the search for Americans kidnapped by Hezbollah in Beirut, Lebanon.His best-selling books include his personal memoir GHOST: Confessions of a Counterterrorism Agent, Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice, Under Fire: The Untold Story of the Attack in Benghazi and his fourth book, Beirut Rules: The Murder of a CIA Station Chief and Hezbollah's War Against America.Burton also consults with Fortune 500 companies on security developments and how to keep their personnel and business safe as the Executive Director of the Ontic Center for Protective Intelligence. Burton was selected by Security Magazine as one of the Most Influential People in Security in 2021 and his books have been featured in thrillers by Brad Thor, Jack Carr and Tom Clancy's Target Acquired by Don Bentley. Follow Fred on IG
Elon Musk, who is amidst a transition to a new CEO to take his place at Twitter, has come under criticism for allegedly giving in to government pressure to censor tweets ahead of national elections in Turkey, according to multiple reports. Apple's next more powerful processor, the M3 chip is expected later this year, according to Bloomberg. The company is also expected to unveil its long-anticipated virtual reality and augmented reality headset at its worldwide developer conference next month. Also in this brief, India is developing a nationwide system to help people block their lost mobile devices. Notes: Nearly half of all internet traffic in 2022 was generated by bots, according to a report by Imperva Research Labs, Security Magazine reports. The report found that 47 percent of all traffic came from bots, including both "good" bots like search engine crawlers and "bad" bots like those used for web scraping and distributed denial-of-service (DDoS) attacks. India is set to launch a nationwide system to combat mobile device theft, according to a Press Trust of India report that appeared in various publications. The system will enable mobile phone users to block and track their lost or stolen devices and track their devices using GPS technology. Elon Musk, who is amidst a transition to a new CEO to take his place at Twitter, has come under criticism for allegedly giving in to government pressure to censor tweets ahead of national elections in Turkey, according to multiple reports. Critics argue that Musk, who has been a vocal advocate for free speech, is an opportunist who has compromised his values for business interests. The controversy stems from SpaceX's dealings with Turkey's right-wing leader, which some speculate may have influenced Musk's decision to reverse his stance on censorship. “The choice is to have Twitter throttled in its entirety or limit access to some tweets. Which one do you want?” Musk tweeted yesterday, in response to one critic. He added in another tweet that all internet companies are doing this around the world, while Twitter is only being clear about it. Meanwhile, Musk has recruited Linda Yaccarino, until last week the chairman of advertising and partnerships at NBC Universal Media, as the new CEO of Twitter. Musk confirmed rumours that Yaccarino would lead Twitter in a tweet on Friday. She's expected to take charge in six weeks. Apple is working on its next silicon, the M3 chip for Mac, which features improved CPU, GPU, and RAM specifications, Bloomberg's Apple watcher Mark Gurman reports. The M3 chip is expected to be available in the latter half of 2023, and it is anticipated to be a significant upgrade over Apple's previous chips. Apple is also likely to unveil a high-end mixed reality headset at its Worldwide Developers Conference (WWDC) in June, MacRumours reports, citing a Wall Street Journal report that's behind a paywall. The headset will have an internal screen for virtual reality and outward-facing cameras for augmented reality overlays. It is said to be unconventional and experimental relative to other Apple products, with a waist-mounted external battery pack, and a price tag of around $3,000.
Lauren Buitta, the founder and CEO of Girl Security, joins Stephanie, Ilana, and Evan on this week's episode of Secure the Job: Breaking into Security. Girl Security prioritizes serving underrepresented communities, communities in low-opportunity zones, and communities targeted by violence. In 2022, Lauren was named "One of the Most Influential People in Security" by Security Magazine. She was named "One of 50 Women Making the World a Better Place" by Instyle Magazine in 2021 and awarded the 21st Century Leader Award by the National Committee on American Foreign Policy. Lauren discusses what cybersecurity looked like when she first started, current trends that excite her in the industry, the importance of women to the cybersecurity landscape, and how you can learn more and get involved with Girl Security. In This Episode You Will Learn: Why identity and representation are increasingly important in cybersecurity How her time working for the government influenced Girl Security What excites Lauren about the future of cybersecurity and Girl Security Some Questions We Ask: What did cybersecurity look like when you first started? How did the journey to creating girl security begin? Given the current skills gap landscape, what does the industry need? Resources: More details at girlsecurity.org Follow Girl Security on Twitter View Lauren Buitta on LinkedIn View Stephanie Machuca on LinkedIn View Ilana Basman on LinkedIn View Evan Brown on LinkedIn Related Microsoft Podcasts: Listen to: Uncovering Hidden Risks Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.
On today's episode of School Safety Today, Michelle Dawn Mooney chatted with Mike Matranga, former Director of Safety and Security at Texas City ISD and CEO of M6 Global. They talked about how situational awareness skills can be used to implement early intervention measures, how schoolwide training is critical for identifying and providing mental health resources, and the importance of practicing emergency response plans with all stakeholders.Honing situational awareness skills is key to enacting a multi-faceted approach to identifying concerning behaviors in order to prevent harm to self or others. It is critical now more than ever to move from being reactive to proactive in identifying these behaviors and having the resources to refer and help those in need. All roles in the school community have this collective responsibility – a well-trained and informed staff, parent groups, and student groups are key.When it comes to emergency response planning, it is not enough to just have a plan. Schools need to coordinate and rehearse the plan. And no single department or role should the plan fall to; all stakeholder groups need to come together to develop, review, and practice.Mike Matranga is the founder and CEO of M6 Global Defense Group, an elected Texas City Independent School District (TCISD) Board Member at Large, and a former TCISD Executive Director of Security and School Safety with a demonstrated history of working in multiple facets of the security and investigations industry. He has been featured in several national publications, including the Wall Street Journal, WIRED Magazine, and the Security Magazine cover story in March 2020. He was recently ranked No. 5 in the nation for his unique school security planning and operational experience using technology and human behavior techniques to thwart mass attacks. Matranga has been a pioneer in school-based security practices, even leading to legislation being written per his recommendations.
When we think about compassion in healthcare, you may not think of security officers in the same sense as nurses or docs but, you'd be wrong! Join Mike Cummings to hear about his decades in healthcare security, why he chose to change the name of his security department to represent greater compassion and how organizations can utilize compassion training with (literally) everyone who is patient facing. Plus, Mike shares an amazing story about an act of extreme humility and compassion to an employee who lost her job. Mike tells how simple language changes can help with non-escalation, rather than having to learn language for de-escalation. Join Marcus and Mike to hear some great dialogue about boosting compassion in the workplace.Key topics:00:00 – Introductions02:00 – Marcus jumps in and asks where it all began for Mike and Cummings Security. 06:40 – Marcus talks about his preconceived notion of what hospital security does, and then Mike talks about what it really does.10:15 – Marcus asks Mike about the de-escalation process and conflict management for bedside providers.14:06 – Mike is asked to share a time where he witnessed compassion in his own life. 20:50 – The conversation turns and the two discuss human interactions within healthcare from every member on staff. 30:00 – Marc shoots off his rapid-fire questions. Mike wants to leave the audience with “Learn to listen and be kind.”40:11 – Thank you and conclusions! Resources for you: Connect with Marcus on LinkedIn: https://www.linkedin.com/in/marcusengel/Connect with Mike Cummings on LinkedIn: https://www.linkedin.com/in/mike-cummings-cpp-26537a160Learn more about Cummings Security: https://www.cummings-security.com/Learn more about Marcus' Books: https://marcusengel.com/store/Subscribe to the podcast through Apple: https://bit.ly/MarcusEngelPodcastSubscribe to the podcast through Spotify: https://bit.ly/Spotify-MarcusEngelPodcastMore About Michael "Mike" Cummings, CPP:Assessing & Establishing Healthcare Security & Workplace Violence Prevention Programs Providing Negligent Security Case Assistance33 Years of Security Leadership Success Driven by Dedication to Best Practices & Continuous ImprovementExpanded security operations, while consolidating for mergers and integrating evolving technology, to accommodate Aurora Health Care's fast-paced growth to become the largest healthcare system in Wisconsin (from three to 15 hospitals).Served as International President and as Chairman of the Board for the pre-eminent professional security association, ASIS International.Earned a reputation as a key thought leader and pace-setter in healthcare security nationally:Named One of the 25 Most Influential People in Security (14th) in 2009 by Security Magazine.Ranked in the Top 500 Security Programs 7 consecutive years by Security Magazine (as high as 4th and never lower than 14th in the Hospital / Medical Center category).Acquired extensive knowledge base in preventing workplace violence for program development across all industries.Provided testimony as an expert security witness in both depositions and trials. Date: 1/23/2023Name of show: Compassion & Courage: Conversations in HealthcareEpisode title and number: Episode 84 – Mike Cummings, CPP - Why Compassionate Security Matters
On December 11, 2022, Abu Agila Mohammad Mas'ud Kheir Al-Marimi (Mas'ud), the suspected bomb maker in the bombing of Pan Am Flight 103, was arrested by the U.S. Department of Justice and brought to the United States for prosecution. In this episode we are joined by two distinguished guests, Fred Burton and Mark Zaid, who discuss counterterrorism, the intelligence community, the Lockerbie investigation spanning more than three decades, and the quest for American justice.Due to the sensitivity of these topics, listener discretion is advised. Fred Burton is a former police officer, special agent for the Diplomatic Security Service of the U.S. State Department, and a New York Times best-selling author. He's served on the front lines of high-profile investigations like the attempted hijacking of Pan Am Flight 73 in Karachi, Pakistan in 1986, the bombing of Pan Am Flight 103, the hunt for and arrest of the mastermind behind the first World Trade Center bombing in 1993; the 1988 plane crash that killed a U.S. Ambassador and the President of Pakistani; and the search for Americans kidnapped by Hezbollah in Beirut, Lebanon.His best-selling books include his personal memoir GHOST: Confessions of a Counterterrorism Agent and his other books Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice, Under Fire: The Untold Story of the Attack in Benghazi and Beirut Rules: The Murder of a CIA Station Chief and Hezbollah's War Against America.He was selected by Security Magazine as one of the Most Influential People in Security in 2021 and his non-fiction books have been featured in fictional thrillers by Brad Thor, Jack Carr and Tom Clancy's Target Acquired by Don Bentley. Fred's website is www.officialfredburton.comMark Zaid is an American attorney, based in Washington, D.C., with a practice focused on national security law, freedom of speech constitutional claims, and government accountability.Many of his cases are very well known, such as suing Libya for the 1988 terrorist bombing of Pan Am Flight 103, which resulted in a $2.7 billion settlement, the largest of its kind against a foreign government for terrorist activities. Mark often represents former and current federal employees, intelligence and military officers, whistleblowers and others who have grievances or have been wronged by agencies of the United States Government or foreign governments. He also regularly represents members of the media. Mark's website is www.markzaid.com
In this episode of The Gate 15 Interview, Andy Jabbour visits with James A. DeMeo and Herb Ubbens on their work with Crowdguard, facility security and security best practices and more. James A. DeMeo, M.S. is a best-selling author, professional speaker, and event security expert. Mr. DeMeo brings vast experience to the public/private, non-profit, sports/entertainment, corporate, higher education & vendor management/contract analyst ecosystems. Mr. DeMeo serves as Vice President for Crowdguard US, a crowd safety solutions provider & CEO of Unified Sports and Entertainment Security Consulting, LLC., (USESC) based in Raleigh, NC. He was recognized by Security Magazine as The Most Influential People in Security 2017. Mr. DeMeo is also the author of the best-selling book, What's Your Plan? A Step-By-Step Guide To Keep Your Family Safe During Emergency Situations. Mr. DeMeo holds professional memberships with both ASIS International and National Center for Spectator Sports Safety and Security-NCS4. He serves as a remote learning Adjunct Instructor with the following Universities: Tulane University's School of Professional Advancement-SOPA, Jacksonville State University, Dept. of Kinesiology, Mercer University-Stetson School of Business where he teaches both graduate/undergraduate students about Event Security, Facilities and Risk Assessment. Mr. DeMeo is currently enrolled in an Online Higher Education Graduate Certificate Program at Appalachian State University-Cratis D. Williams School of Graduate Studies. James on LinkedIn James on Twitter: @JDeMeo007 Herb Ubbens. Guiding organizations to increase their resiliency and emergency preparedness, reduce risk and provide safety and value to their clients and assets. Board Certified in Security Management (CPP) and Physical Security (PSP). SAFETY Act DHS Assessor in BPATS (Best Practices for Anti-Terrorism Security). OSHA general industry and construction trainer, safety expert and Project Manager. Herb on LinkedIn In the discussion we address: James' and Herb's backgrounds and the work they're doing today to draw down risk and helping to secure mass gatherings and facilities. Physical threats and reasonable ways to reduce risk Best practices for organizations James' book, “What's Your Plan?” Thanksgiving, favorite drinks, and Gen X rock and hip hop! A few references mentioned in or relevant to our discussion include: Crowdguard US website: https://crowdguardus.com Want to see the latest innovation in pedestrian protection within public spaces? Join us for Crowdguard US Demo Day December 8, 2022 at the North Carolina Museum of Art where we will display the 2019 Counter Terror award winning Surface Guard barrier system. Read more here! Andy mentions Dr. Tamara Herold Incident: Several Injured After Car Reportedly Drives Into Carnival in South Central Incident: Investigation into fatal crash at Apple store in Hingham continues International Association of Venue Managers (IAVM) Academy for Venue Safety and Security (AVSS)
In this episode, Grant Reveal, the Director of Identity and Access Management at Micron Technology, talks about how we can demonstrate the business value of Identity and Access Management and how we get away from being viewed as the department of “NO” to “more SECURE”. Key Takeaways: From the department of “no” to “more secure” Three components of IAM (People, Process, and Technology) Why does the story matter? Why Is Information Security important? Time component in learning IAM is a must. The day-1 Process is building relationships and making people secure. Identity and Access Management vs Traction The Automation of training and hiring time. How does the SDLC process help customers' needs? Having a defined roadmap for a team is very helpful. When leaders share their stories, they also build credibility. Compliance with IAM policies and procedures Strong procurement and audit systems Importance of building relationships and awareness in the organization. About today's guest: Connect to Grant at: www.linkedin.com/in/grantreveal Grant is an experienced leader with breadth and depth throughout the IT and InfoSec disciplines. His focus for almost ten years has been within the Identity and Access Management space, with experience building and leading the IAM teams for three Fortune 500 firms. Before focusing on the InfoSec discipline, Grant led IT teams and held senior-level leadership positions within Higher Education, including CIO. He has several professional certifications, including CISSP, CCSP, CRISC, CISM, CDPSE, and earned his Bachelor of Science in Information Technology from Franklin University. Grant has spoken at numerous conferences and gatherings regarding the business values IAM can deliver and was named to Security Magazine's 2019 List of Most Influential People in Security. Grant also values lifelong learning as he continues to pursue his Master's degree and works to give back through training and mentoring the next generation of technologists. ________ Thank you so much for checking out this episode of The Tech Trek and if you enjoyed this episode, please take a minute and leave a quick rating and review on the Apple podcast app! Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)
David Stauss is a Partner at Husch Blackwell, a law firm offering comprehensive counsel on day-to-day operations in various industries, including banking and finance, data privacy and cybersecurity, and intellectual property. He is also chair of the firm's Privacy and Cybersecurity Practice Group, where he counsels clients on existing and emerging state, federal, and international privacy laws. As a recognized thought leader, David is an author and frequent speaker on privacy and cybersecurity. He was selected as JD Supra's top data privacy author in 2022 and has been published and quoted in numerous publications, including The Wall Street Journal, CBS News, and Security Magazine. He is the editor of the Byte Back blog — one of the leading data privacy blogs in the US — and hosts the Data Privacy Unlocked podcast, which focuses on the development of U.S. privacy law. In this episode… The American Data Privacy and Protection Act is in some ways unclear, leading individual states to devise their own privacy laws. So, what do these regulations entail for cybersecurity companies? According to privacy law expert David Stauss, states like Virginia and Colorado are developing laws emphasizing consent around personal data. Conversely, California will allow organizations to utilize sensitive data with certain restrictions. With disparities among each state's regulations, David urges businesses to remain savvy and stay abreast of potential updates. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with David Stauss, Partner at Husch Blackwell, to discuss state and federal privacy regulations. David shares how companies can comply with state privacy laws, the potential of the American Data Privacy and Protection Act, and each state's plans for the expansion of privacy rights.
#cybersecurity #security Our reliance on digital infrastructure and the Internet makes everyone vulnerable to cybersecurity attacks. Given the importance of cybersecurity, everyone from CEOs to board members and employees must understand the nature of this threat. Although cybersecurity involves technology, managing the problem relies on people and the willingness of individuals to change their behavior.To learn how to manage a cybersecurity program, we spoke with Gregory Touhill, director of the world-renowned CERT Division of the Carnegie Mellon University Software Engineering Institute (SEI). Proactive cybersecurity strategy should be an important element of any digital transformation effort.The conversation includes these topics:-- On the state of cybersecurity in 2022-- On security weakness arising from the intersection of administrative and operational systems-- On the challenges of enterprise security-- On the importance of prioritizing enterprise cybersecurity-- On managing ransomware attacks-- On creating a culture of cybersecurity-- On the future of managing cybersecuritySubscribe to the CXOTalk newsletter: https://www.cxotalk.com/subscribeRead the full transcript: https://www.cxotalk.com/episode/state-cybersecurity-2022At the SEI Cert Division, Greg Touhill leads a diverse group of researchers, software engineers, security analysts, and digital intelligence specialists working together to research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to improve the practice of cybersecurity.Touhill was appointed by former President Barack Obama to be the first chief information security officer (CISO) of the United States government. Previously, he served in the Department of Homeland Security (DHS) as deputy assistant secretary in the Office of Cybersecurity and Communications. Before joining the Software Engineering Institute, he was president of Appgate Federal, a provider of cybersecurity products and services to civilian government and defense agencies.Touhill is a 30-year veteran of the U.S. Air Force where he was an operational commander at the squadron, group, and wing levels. He served as a senior leader of military cybersecurity and information technology programs, culminating as the chief in-formation officer of the United States Transportation Command, one of the nation's 10 combatant commands. A combat veteran, he is the recipient of numerous awards and decorations including the Bronze Star medal and the Air Force Science and Engineering Award. He retired from the Air Force with the rank of brigadier general.He is an adjunct faculty member of the CMU Heinz College of Information Systems and Public Policy and the Deakin University (Australia) Centre for Cybersecurity Research and Innovation. A member of many organizational boards and committees and recipient of many awards, Touhill was recog-nized by Security Magazine as one of its Most Influential People in Security and by Federal Computer Week in the Federal 100. He is the co-author of the books Cybersecurity for Executives: A Practical Guide and Commercialization of Innovative Technologies.
The question that many Security Drivers and Secure Transportation providers have heard – “Why do I need a Security Driver – Why can't we use a chauffeur service?” Or – why can't we use an Uber or Lyft car? A few years ago there was an article that appeared in Security Magazine, titled “What to Look for in Travel Security and Executive Protection Services.” While the article may be old the content is still valid. The author concludes that while the Executive is traveling, having a security-trained driver is paramount to a successful executive protection program. As the author emphasizes in the article, the benefits of a security-trained driver extend well beyond their greater ability to utilize a vehicle's performance capabilities, and we'll add, particularly in unfamiliar locations far from home. The article goes on to say that there is no formal definition of “security-trained driver” that exists; there is no central governing body whose credentials you can trust to lead you to the right provider. A “Security-trained driver” could mean anything from a military veteran with 20+ years of relevant experience to a taxi driver who's gone through a defensive driving program. We respectfully disagree with that comment. Mention Links The origin of the 80% standard in the Science of Security Driving Chauffeur vs. Security Driver Key Quotes "There has been a standard accepted by the corporate Kidnap and Ransom Insurance (K&R) and the High-Net-Worth (HNW) community for more than four decades. It is called the 80% standard." "A good chauffeur is concerned about not spilling the boss's coffee and avoiding bumps. Generally, chauffeurs can handle routine emergencies if they happen slowly. This has nothing in common with the skills needed for a trained security driver. " Full Show notes are available at SecurityDriver.Com Join the International Security Driver Association The International Security Driver Association (ISDA) is the only organization in the world dedicated to supporting the advancement of professional Security Drivers and other Secure Transportation providers. Learn more about who we are, what we do, who we do it for, and member benefits; visit ISDACenter.Org.
George Finney, CSO at Southern Methodist University; Author of Well Aware: Master The Nine Cybersecurity Habits to Protect Your Future George Finney is the Chief Security Officer (CSO) and Director of Digital Interests for Southern Methodist University. George works in a variety of areas at SMU including facilitating IT Security and Compliance, increasing Regulatory Awareness, streamlining the IT Contracts process, as well as advocacy for Open Source software and processes. George joined SMU in March of 2003 as a Network Engineer and worked on several major university IT initiatives, including evaluating Intrusion Detection Systems, implementing network-based packet capture devices and implementing and supporting Network Admission Control. He has developed and matured cybersecurity programs and is an expert in policy, awareness, compliance, operational management and the complex legal issues surrounding security with a talent for building partnerships. Prior to joining SMU, George worked in the telecommunications industry for several years on Voice Over IP projects, Data Security Consulting, and in Network Operations. In May of 2008, George completed his Juris Doctorate at Southern Methodist University's Dedman School of Law and is licensed to practice law in Texas. George was recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is part of the Texas CISO Council, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group, and is an Advisory Board Member for SecureWorld. He holds a Juris Doctorate from Southern Methodist University and a Bachelor of Arts from St. John's College and as well as multiple cybersecurity certifications including the CISSP, CISM, and CIPP. George is a frequent speaker, and author of Well Aware: Master The Nine Cybersecurity Habits to Protect Your Future and No More Magic Wands: Transformative Cybersecurity Change for Everyone. George earned a bachelor of arts degree in liberal arts in 1999 from St. John's College in Santa Fe. He spends most of his spare time cycling, writing novels, and working on short film projects. Highlights: 0:00 - Introductions and Backgrounds George was a liberal arts major in college, studying philosophy and literature. He wanted to be a stockbroker in college. 3:00 – First Job at GTE in IT & Networking - Security Just Came as a Natural Part of it “I jumped to start up - switched gears from networking to system administration. Inherited an environment that was always locked down. I taught myself security by studying how the previous admin had hardened all of our servers. From there it just ballooned out of control. Then I went to Law School.” 4:00 – Putting Yourself out there While Managing Privacy Writing his book (Well Aware)! 5:10 - "Little ironic that I'm so focused on people, because when you write a book, you have to go into a cave and isolate yourself from other human beings for an excessive amount of time." ..."I was inspired to write the book... wanted to build a bridge with non-security folks, but who we rely on to be successful in our cybersecurity programs." "Security Should Start to Get Easy - People Should Want to Work with Us and Help Empower Our Projects because it's Going to Help Not Just their Company, but it Will Accelerate Everyone's Career" 11:45 - "To get the security jobs, if you can demonstrate that you have worked on security projects, supported those things, this will set people apart. It's a personal part of every person's career trajectory." 20:00 - The Pepsi Challenge "Back in the 80's Pepsi tried to compete with Coke and had free sample stations in store. It didn't work; Coke is still the leader - why? Because a 30 second commercial doesn't work - it doesn't change behaviors." ... "gamification works for some people - you have to meet people where they are." 33:00 - There are Many Barriers to be Broken Down "Understand an organization well
October is Cybersecurity Awareness Month, which makes this a great time to learn more about how America's electric companies are working to protect the energy grid from increasingly sophisticated cyber threats. On this episode, we first are joined by Manoj Chouthai, Vice President, IT Engineering, Operations, and Cybersecurity at Con Edison, to discuss how electric companies manage cybersecurity risk and the value of partnering with industry and government stakeholders to enhance our collective security. Then, EEI Vice President of Security and Preparedness Scott Aaronson discusses emerging cybersecurity issues and best practices for cyber hygiene with Margaret Hopkins, Senior Vice President of Shared Services and Chief Information Officer at Puget Sound Energy. Want to learn more about cybersecurity from Scott Aaronson? Read his article, "Protecting the Energy Grid is a Team Sport," which was recently published in Security Magazine.
Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality. In this episode, Winn joins the No Password Required team to talk about how he went from the world of rock-and-roll to cybersecurity, times when he pissed off the CIA, and why Louis Armstrong wasn't the best teacher he ever had (you read that right!) Ernie, Clabby, and Pablo talk about the reality of cybersecurity policies and employee training. In the Positively Cyber segment, Pablo introduces Snoop Dogg as the Dark Net Intelligence Analyst of our fictitious organization.
It can be challenging for an organization to prepare for every single outcome of an emergency. With an all-hazards approach to emergency management, you focus on the impact of the incident and not the cause. In this episode, Keith Berthiaume, Enterprise Emergency Preparedness Program Manager at Boeing, joins us to discuss how the all-hazards approach works across Boeing's large geographical footprint to ensure business continuity. Keith discussed: - Boeing's five distinctive preparedness programs - Implementing a Crisis Management Group - How to prepare for a global incident - How Boeing established a unified command and coordinated response to the COVID-19 pandemic Check out this resource we mentioned in the episode: Security Magazine's feature on Boeing The Employee Safety Podcast is hosted by Peter Steinfeld, SVP of Safety Solutions at AlertMedia. You can find this interview and many more by subscribing to The Employee Safety Podcast on Apple Podcasts, Spotify, or here. Listening on a desktop and can't see the links? Just search for The Employee Safety Podcast in your favorite podcast player.
In this episode I talk about high profile cyber-attacks in the Spring and Summer of 2021. I'll review who was attacked, what the attack involved, it's impact, the aftermath, and how it affected the economy. Sign up for NewsBits from SANS at https://www.sans.org/newsletters/newsbites/ Review Security Intelligence periodically: https://securityintelligence.com/Security Magazine offers solid content: https://www.securitymagazine.com/Executive Order 14208: https://www.cisa.gov/executive-order-improving-nations-cybersecurityWe are at War, Cyber War: https://www.securitymagazine.com/articles/96125-we-are-at-war-a-cyber-war16 Sectors off limits: https://www.itsecurityguru.org/2021/06/17/biden-says-16-sectors-should-be-off-limits-to-attack/Arctic Wolf Survey: https://arcticwolf.com/resources/press-releases/arctic-wolf-global-survey-reveals-lack-of-confidence-in-cybersecurity-defenses-and-government-action-amid-fears-of-state-sponsored-attacksInsurance and Ransomware: https://www.barrons.com/articles/ransomware-attack-cyber-insurance-industry-51633075202Infant death tied to ransomware 2019: https://threatpost.com/babys-death-linked-ransomware/175232/Colonial Pipeline:https://www.securezoo.com/2021/05/pipeline-ransomware-attack-shuts-down-for-45-of-east-coasts-fuel-us-passes-emergency-waiver https://medium.com/cloud-security/colonial-pipeline-hack-4486d16f2957JBS Breach: https://minnesota.cbslocal.com/2021/06/01/meat-producer-jbs-hit-by-cyberattack-worthington-plant-closes-for-the-day/ https://www.bloomberg.com/news/articles/2021-05-31/meat-is-latest-cyber-victim-as-hackers-hit-top-supplier-jbsIowa Co-Op Links: https://www.foxbusiness.com/technology/ransomware-attack-new-cooperative-agriculture-grain-pork-chicken-supplyhttps://www.securezoo.com/2021/09/iowa-based-farm-service-provider-new-cooperative-hit-by-blackmatter-ransomware-attack/Minnesota Attackhttps://www.reuters.com/technology/minnesota-grain-handler-targeted-ransomware-attack-2021-09-23/ https://www.cybersecuritydive.com/news/agriculture-food-ransomware-coop/607080/
Are hospital employees concerned for their safety and security? Are they making this part of their evaluation on whether to become an employee or whether they stay? Is the business of the hospital disrupted by an unusual number of potential and actual WPV incidents? We turned to an executive leader at a hospital that has a cultural DNA of innovation and change, to find out if the risk, resilience, and security program is keeping pace. If you listen to the entire podcast, you will discover the answers to the above questions as well as some key technologies that are helping them, make important data driven decisions. Mark Reed, CHPA, is currently the Director of Support Services at Martin Luther King Jr. Community Hospital, (MLKCH) in South Central Los Angeles overseeing Security, Safety, Emergency Management, PBX, Parking, and numerous other programs. Mark was recognized by Campus Safety Magazine as the 2019 Director of the Year. Under Mark's leadership, the MLKCH Public Safety team was recognized as the 2019 Outstanding Security Team at the OSPAs presented by ASIS. He also is a current member of the Hospital Association of Southern California's Safety and Security Committee. And in 2020, he was named one of the most influential security leaders in the world by Security Magazine.
According to Security Magazine, a cyber attack happens every 11 seconds. Mick talks to Parasar Kodati about the integrations we are building out to protect our PowerScale and ECS platforms from these attacks.
Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month's entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America's potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability. You can watch the video version here.
In this episode of Tech Done Different, you'll hear from two special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women in Magazine.You'll hear from not one but two (!) special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women in Security Magazine. You'll hear us explore the diversity and inclusion challenges in security and how to improve in this critical area.You'll learn:why it can be daunting to feel differentwhy diversity isn't just the right thing to do, it makes powerful business sensewhat attributes women bring to the team dynamicwhy gender diversity isn't just an infosec problem, it's across all techwhen the attrition of quality candidates begins to happen and how to combat thatwhy the barriers exist, and how to combat themwhy most job ads are an issue, and what to do about itwhy companies need to be more flexibleGuestsJacqui Loustau, Founder of Australian Women in Security Network (@Source2C on Twitter)Aby Swabey, Co-Founder Source2Create and Publisher of Women in Security Magazine (@CSO_Australia on Twitter)HostTed HarringtonResourcesLearn more about what Jacqui is up to at: https://www.awsn.org.au/Learn more about what Aby is up to at: https://source2create.com.au/This Episode's SponsorsIf you'd like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here: https://www.itspmagazine.com/podcast-series-sponsorshipsFor more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?https://www.itspmagazine.com/podcast-series-sponsorshipsLearn more about Ted at https://tedharrington.com/podcast and his book at https://hackablebook.com
In this episode of Tech Done Different, you'll hear from two special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women in Magazine.You'll hear from not one but two (!) special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women in Security Magazine. You'll hear us explore the diversity and inclusion challenges in security and how to improve in this critical area.You'll learn:why it can be daunting to feel differentwhy diversity isn't just the right thing to do, it makes powerful business sensewhat attributes women bring to the team dynamicwhy gender diversity isn't just an infosec problem, it's across all techwhen the attrition of quality candidates begins to happen and how to combat thatwhy the barriers exist, and how to combat themwhy most job ads are an issue, and what to do about itwhy companies need to be more flexibleGuestsJacqui Loustau, Founder of Australian Women in Security Network (@Source2C on Twitter)Aby Swabey, Co-Founder Source2Create and Publisher of Women in Security Magazine (@CSO_Australia on Twitter)HostTed HarringtonResourcesLearn more about what Jacqui is up to at: https://www.awsn.org.au/Learn more about what Aby is up to at: https://source2create.com.au/This Episode's SponsorsIf you'd like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here: https://www.itspmagazine.com/podcast-series-sponsorshipsFor more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?https://www.itspmagazine.com/podcast-series-sponsorshipsLearn more about Ted at https://tedharrington.com/podcast and his book at https://hackablebook.com
Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month devotes the entire podcast to misinformation, disinformation, and conspiracy theories. You can watch the video version here.
In 2020, Security Magazine listed Sounil Yu as one of the most Influential People in Security in 2020, in part because of his work on the Cyber Defense Matrix, a framework for understanding and navigating your cybersecurity environments. The Cyber Defense Matrix started as a project when Sounil was the Chief Security Scientist at Bank of America. The initial problem he focused on with the matrix was how to evaluate and categorize vendors and the solutions they provided. The Cyber Defense Matrix is a structured framework that allows a company to understand who their vendors are, what they do, how they work along side one another, what problem they profess to solve, and ultimately to find gaps in the company’s portfolio of capabilities. In the seven years Sounil has been working on the project, he has developed use cases that make the Cyber Defense Matrix practical for purposes such as rationalizing technology purchases, defining metrics and measurements, and identifying control gaps and opportunities. The matrix has been adopted by the OWASP Foundation as a community project. Elements of the matrix have been incorporated into the Center for Internet Security’s (CIS) Top 20 Critical Security Controls. I talked with Sounil to hear how the project was going, what his plans are for the future of the matrix, and what help he can use from the community for expanding its usefulness. ABOUT SOUNIL YU Before Sounil Yu joined JupiterOne as CISO and Head of Research, he was the CISO-in-Residence for YL Ventures, where he worked closely with aspiring entrepreneurs to validate their startup ideas and develop approaches for hard problems in cybersecurity. Prior to that role, Yu served at Bank of America as their Chief Security Scientist and at Booz Allen Hamilton where he helped improve security at several Fortune 100 companies and government agencies.
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. Listen to Episode Three now! This month discusses the Suez Canal and the issues of global supply chain management; nation-state attacks against cyber infrastructure; and international threat groups. You can watch the companion vodcast here. https://www.securitymagazine.com/cyber-and-geopolitical-vodcast.
In this fantastic episode of The EdUp Experience, sponsored by The Evolllution, we talk with James A. DeMeo, CEO, Venue Risk Management! As the world adjusts to a world post-corona virus world and begins to repopulate venues for sports and entertainment, risk assessment and security measures are of critical importance. James talks to us about the necessity for institutions of higher education to protect students, university personnel, and fans, through emergency response plans and general safety measures. James A. DeMeo, M.S. brings over three decades of security, law enforcement and consulting experience to both the public and private sectors. Mr. DeMeo is the founder, president and CEO of Unified Sports and Entertainment Security Consulting, LLC., (USESC) based in Raleigh, NC. Mr. DeMeo earned his Master's degree in Sport Management from Adelphi University in 2012. Mr. DeMeo was recognized by Security Magazine as The Most Influential People in Security 2017. Mr. DeMeo currently serves as a remote learning Adjunct Instructor with Tulane University-School of Professional Advancement. Thanks so much for tuning in. Join us again next time for another episode! Contact Us! Connect with the hosts - Elvin Freytes, Elizabeth Leiba, and Dr. Joe Sallustio ● If you want to get involved, leave us a comment or rate us! ● Join the EdUp community at The EdUp Experience! ● Follow us on Facebook | Instagram | LinkedIn | Twitter | YouTube Thanks for listening! We make education your business!
ON THIS EPISODE OF PI MAGAZINE, THE PODCAST, JIM & NIC SPEAK W/ BARRY NIXON OF PREEMPLOYMENTDIRECTORY.COM ABOUT BACKGROUND CHECKS & THE IMPORTANCE OF USING THE BEST SOURCES OF INFORMATION WHEN DOING SCREENING & BACKGROUND CHECKS. W. Barry Nixon is the COO, PreemploymentDirectory.com the leading background screening information portal and online worldwide directory of professional background screening firms and Suppliers to the background screening industry. He co-authored the landmark book, Background Screening & Investigations: Managing Hiring Risk from the HR and Security Perspective. He also is the publisher of award-winning newsletters, The Background Buzz and The Global Background Screener, and the author of the Backgrounder column in PI Magazine. In addition, Barry is a past recipient of the elite ‘Top 25 Influential People in Security’ by Security Magazine and past Co-Chair, International Committee for the Professional Background Screening Association (PBSA). He also served as a Global Ambassador for PBSA for many years. W. Barry NixonPreemploymentDirectory.com 42024 Gardner Drive Alpharetta, GA 30009Website: https://preemploymentdirectory.com/ Email: wbnixon@PreemploymentDirectory.com 1-949-770-5264 PI Magazine Social Media Pageshttps://twitter.com/PImagazineUSA https://www.linkedin.com/company/pi-magazine-inc-/about/ https://www.facebook.com/PIMAGAZINEUSA/podcast@pimagazine.com James NanosJames@pimagazine.com Nicole CusanelliNicole@pimagazine.com
Science is what you know Philosophy is what you don’t know -- Bertand Russell For the things we have to learn before we can do them, we learn by doing them. -- Aristotle On this Very Special Episode of InSecurity, Matt Stephenson moderated a chat between SMU CISO George Finney and BlackBerry Global VP of Engineering Rich Thompson. We covered a range of topics, but narrowed the field to the Big Ideas of Habit, Neuroscience & Artificial Intelligence and Behavior & Technology. The notion was to consider how those things influence our approach to Cybersecurity. Dig it… About George Finney George Finney (@WellAwareSecure) is the CSO for SMU in Dallas, Texas and is the author of the new book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future as well as several others. He is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. George has worked in Cybersecurity for nearly 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture. As a part of his passion for education, George has taught cybersecurity at Southern Methodist University and is the author of several cybersecurity books including No More Magic Wands: Transformative Cybersecurity Change for Everyone. He has been recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is a part of the Texas CISO Council, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group, and is an Advisory Board member for SecureWorld. George holds a Juris Doctorate from Southern Methodist University and a Bachelor of Arts from St. John’s College and as well as multiple cybersecurity certifications including the CISSP, CISM, and CIPP. About Rich Thompson Rich Thompson (@TheRichThompson) is Vice President of Sales Engineering, North America at BlackBerry. He has 25+ years of experience in security. This includes 21 years leading security efforts at the regional and national level in the retail industry, including stops at Big Lots, Toys Я Us, ESPRIT, J Crew… shoutout to 90s fashion. From there, Rich spent 5 years leading Sales Engineering and Professional Services efforts in the enterprise software industry. He has experience in forensics, incident response, electronic discovery, information risk management and governance. Rich joined Cylance in October 2014 in order to help Cylance in the vision of protecting every endpoint under the sun. He also has surprisingly wide-ranging musical tastes. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe. I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know... Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... Can’t get enough of Insecurity? You can find us at Spotify, Apple Podcasts and ThreatVector as well as GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
It was an honor to speak with James DeMeo for our 23rd Spear Talk! James has over 27 years in the security industry and is considered a subject matter expert in event security by several leading international and domestic magazines; Security Magazine, Security Management Magazine, and Pan Stadia!We covered a wide range of topics, from his career in law enforcement, the importance of after-action reports, recent active shooter events, and why his first book, "What's Your Plan? A Step-by-Step Guide to Keep Your Family Safe During Emergency Situations" is essential reading for all age groups!Follow @silverspearsecurity for all things Silver Spear Security, LLC. @johnsilverspear is the host / COO of Silver Spear Security, LLCFollow @jamesdemeo for all things James!
Theresa Payton is a nationally recognized expert on cybersecurity and she made history as the first female to serve as the White House Chief Information Officer, serving under President George W. Bush's administration. Theresa was named one of the “Top 25 Most Influential People in Security” by Security Magazine and is the author of Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth. She is a frequent guest on major media outlets to provide her perspective on cybersecurity and privacy issues. In this episode we talk about her career path to holding her position at the White House, what a normal day there was like (hint: they were long!), examples of disinformation campaigns, and her work at her cybersecurity consulting firm using human-centric design solutions.
Hear how to protect yourself from cybersecurity threats We have done a number of podcast interviews on a topic that should be of great concern to you: cybersecurity. As an anthropologist, I am always fascinated by people’s habits. Your habits, as today's guest George Finney tells us, may make it easy for hackers to get into your data systems and make you and your organization easy victims, stealing your data, assuming your identity, and turning a good day into a nightmare. Perhaps now's the time for you to listen to George teach you how to change your habits so you can protect yourself. You really can't afford not to. Do you ever awake in the morning, open your computer and wonder if you've been hacked during the night? Your identity stolen? Your database wiped out? If so, you need to listen carefully to my interview guest George Finney, cybersecurity expert. His goal is for you to become more vigilante, reviewing emails with better scrutiny and avoiding dangerous phishing emails that can invade your computer, your systems and your life. Take it from me: I had my cell phone number stolen in January 2020 and with it my identity, my Google accounts, my Apple ID...I can keep going. It is not pretty, and if George can make you deadly serious about scrutinizing your emails more carefully, please give a listen. In our technology-dependent culture, it becomes harder every day to keep up with what’s safe and what's dangerous, especially with so many employees working from home. There’s no escaping the ultimate responsibility for protecting ourselves and our organizations from the very real cybersecurity threats that exist online, but it doesn’t have to be an overwhelming topic to tackle. That's where George comes in. About George Finney As Chief Information Security Officer (CISO) at Southern Methodist University, George Finney understands how our often-overlooked habits hold the solution to everyday cybersecurity challenges. In response, he developed a comprehensive approach that can help keep us secure online. With nearly 20 years' experience, George has helped a wide variety of companies from startups to global telecommunications firms to nonprofits improve their security posture. He has been recognized by Security Magazine as a top cybersecurity leader and is a member of the Texas CISO Council. He is also the author of several books on cybersecurity, most recently Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, available Oct 20, 2020. You can connect with George through his LinkedIn page. Want more advice on how to prepare for the future? Start with these Blog: Is Your Crisis Coming? Anthropology Can Help You Change To Avoid It. Podcast: Michael Davis—Cybersecurity: Pushing Defenders Ahead of Attackers Podcast: Michael Gale—The Digital Transformation Coming to You Additional resources My award-winning book: "On the Brink: A Fresh Lens to Take Your Business to New Heights" Simon Associates Management Consultants website
I accept Chaos. I’m not sure whether it accepts me -- Bob Dylan On this bonus episode of InSecurity, Matt Stephenson chats with BlackBerry CISO John McClurg to discuss his Security Magazine article Unified Endpoint Security: Combating the Chaos, Complexity and Other Conundrums Plaguing Our Community. This was originally a BlackBerry webinar where John breaks down the role Artificial Intelligence can play in a Unified Endpoint Security solution. About John McClurg John McClurg (@JohnMcClurg) is a Sr Vice President and CISO at BlackBerry. He spent his early career with the US government, serving as both a supervisory special agent and branch chief for the FBI as well as a deputy branch chief for the CIA. In these roles, McClurg was involved in the capturing of both Kevin Poulsen and Harold James Nicholson. Following his public service, John has served as a vice-president and Chief Security Officer for Lucent, Honeywelland Dell. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Sander Vinberg has visited British Columbia multiple times to share information at industry events. He is one of the Threat Researchers at F5 Labs and takes care of putting together a lot of the information that you see from the team. We learned more about Sander's role but also learned about his kayak building during quarantine and his musical endeavours. Sander will join Buu on a live stream later this week. Some of the groups Sander has recorded with: https://www.vaudevilleetiquette.com/ https://www.sarahgerritsenmusic.com/angeline https://jacobnavarro.com/music Here's a fun video they made to promote a show he did unveiling the new wheel in Seattle: https://www.youtube.com/watch?time_continue=2&v=qfL0CY2bnkk Live Streams New Architectures, Old Attacks Sander Vinberg, Threat Researcher, F5 Labs July 15th, 10am PDT https://www.youtube.com/watch?v=D5ZMUbTYMZI&feature=youtu.be Building Organizations That Do Good David Wood, Founder – Kina Social Ventures, Founder – Wirefire July 17th, 11am PDT https://www.youtube.com/watch?v=emdKcX2Ck8k F5 Updates TMOS 16.0 has released https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20LTM&version=16.0.0 APM Access Guided Configuration 7.0 has released alongside TMOS 16.0 https://techdocs.f5.com/kb/en-us/products/big-ip_apm/releasenotes/product/relnote-guided-config-7-0.html Great video on the new Azure AD integration - https://www.youtube.com/watch?v=zzFGGi0Hajo&feature=youtu.be Great playlist of BIG-IQ videos https://www.youtube.com/watch?v=YZ6dZa512j8&list=PLyqga7AXMtPMw9ob6u73-anE6BWRsPhLr AWAF and ASM Attack Signatures have been updated You can download updates from downloads.f5.com NGINX Controller install playbook for Ansible Use only for basic lab testing https://github.com/MattDierick/F5-Networks/tree/master/others/Ansible/NGINX/NGINX%20Controller Video to go along with: https://www.youtube.com/watch?v=CS5P4wCcqeY Webinars Stay S.A.F.E. with CDW and F5 Learn more about the Shape AI Fraud Engine Thursday, July 16th, 10:30am PDT https://cvent.me/wzkqVE TLS Telemetry Report: The Changing World of Encryption on the Web July 23, 2020 – 10am PDT https://www.f5.com/company/events/webinars/tls-telemetry-report-changing-world-of-encryption-on-the-web?utm_medium=email&utm_source=f5sv&utm_campaign=amer-sc_et&utm_content=wb The rapidly changing encryption landscape has improved privacy and security—but also increased the effectiveness of attackers. The world's most popular sites are using TLS. Malware is increasingly using encryption. How our new CRYPTONICE tool works. Explore Best Practices for Securing Hybrid Cloud Applications in Microsoft Azure Globally July 29th – 8am PDT https://www.eventbrite.com/e/microsoft-f5-equinix-optimization-for-secure-innovation-in-azure-tickets-109265315500 Learn about how F5, Equinix and Microsoft are creating a consistent, secure operational model for todays distributed workforce and applications. The partnership is also discussed in this video by Gizzelle Akin of Equinix, featuring Cyrus Rafi - https://www.youtube.com/watch?v=jd21MVQepXo Industry News F5's Gail Coury was features in Security Magazine, highlighting female executives in enterprise security https://www.securitymagazine.com/articles/92723-security-leadership-women-on-the-frontline Dangerous Android Malware Returns To Beat Google Play Store Protection https://www.forbes.com/sites/zakdoffman/2020/07/09/ldangerous-android-malware-warning-google-play-store-security/#1257496f1f9e Means for malicious app malware continue to evolve as fast as they are found Subscribe to our YouTube channel! - https://www.youtube.com/darylandbuu?sub_confirmation=1 Daryl Montgomery and Buu Lam are the F5 Account Team based in Vancouver, British Columbia covering valued clients across British Columbia, Northwest Territories, Yukon and Nunavut. This weekly show covers recent topics in the world of F5 and information technology in Vancouver. Please consider Subscribing and enabling Notifications. These weekly shows will be live streamed at the beginning of each week. Buu's Hour Live Streams are released throughout the week. Podcast format on Apple Podcast, Google Play Podcast and Spotify Instagram - https://www.instagram.com/buushour/ LinkedIn - https://www.linkedin.com/in/daryl-montgomery-8876752/ https://www.linkedin.com/in/buulam/ Buu's Hour B Roll Channel - https://www.youtube.com/channel/UCRSFdUbMRvX925MU7_knxSw Website / Newsletter Sign Up - http://darylandbuu.com
Theresa Payton & Doug Citizen: Who Do You Trust? The 2016 Oxford Dictionary word of the year was post-truth 2017 Term of the Year by the Collins English Dictionary was Fake News Has it really been nearly 15 years since Stephen Colbert brought truthiness into our lives? It used to be, everyone was entitled to their own opinion, but not their own facts. But that's not the case anymore. Facts matter not at all. Perception is everything. It's certainty. -- Stephen Colbert; AV Club, 01.25.06 Only in today's modern age can you hate your neighbor but love someone posting something in Germany that you don't even know -- Clint Watts; 07.15.08 Distorting the truth is not just about elections it’s a global issue. It’s a war against our minds. Making us not know who or what to believe… manipulating us to create a vacuum and make you not trust reputable sources of information. It’s about all social issues. It impacts all countries. The motivations behind it are not what you think and will surprise and shock you. Reporters and overall traditional news media are at risk… Let’s talk about why… Elections are at risk… Let’s talk about why… Let’s see if we can help you get learned up on spotting manipulation campaigns and how to report them. And… not for nothin… how can we help you avoid being a victim of one? This week on InSecurity, Matt Stephenson welcomes 3 time defending champion Fortalice CEO and former White House CIO Theresa Payton back to the show. We add a wrinkle this week by inviting Dough Citizen… an undisclosed “regular person” who is a small business owner, voter and someone who genuinely cares about the present & future of his country. This isn’t about politics, this is about the mechanics of elections & government. Don’t get it twisted… this is more important than ever About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." Theresa’s new book drops in April. Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth In her new book, cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. In the book, Theresa reveals: How digital voting machines, voting online, and automatic registration may boost turnout but make us more vulnerable to cyberattacks. How trolls from Russia and other nations actively stroke discord among Americans in falsely-generated controversies over race relations, vaccinations, fracking, and other social issues. Whether what we have uncovered from the Mueller investigation so far is only what they wanted us to know. About Doug Citizen Doug is a small business owner in a municipality smaller than Tokyo by with more than 10 occupants. He lives in a town somewhere between the Atlantic and Pacific oceans and somewhere between the borders of Canada and Mexico. He represents 330,000,000 people in the conversation. He cares. That’s what is important. Respect his security and privacy. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review
In the latest episode of Cisco's Security Stories, we have the incredible fortune to speak to Theresa Payton, who was named one of the top 25 Most Influential People in Security by Security Magazine and is one of the most respected authorities on security and intelligence operations. Theresa was the first female CIO of The White House, taking up the post in George W Bush’s second term. We chat about what life was really like working in the White House. She also starred in CBS’ ‘Hunted’ TV series which gives ordinary citizens to chance to try and evade police capture , running the intelligence operations side. Theresa is also very passionate about protecting people’s right to privacy, and has co-authored two books focused on helping others learn how to protect their privacy online. Her third book is called ‘Manipulated: Inside the cyberwar to hijack elections and distort the truth’ which is coming out on 22nd April, and we talk in quite a bit of detail about the topic of hijacking elections, and what people can do to protect their voting rights.Also in this episode, our ‘On this day’ feature takes us back to 1993 to discuss the announcement of the ‘Clipper chip’, which was designed to enhance the security of communications devices. It’s a really interesting story that addresses people’s right to privacy and the balance with survelliance, so stay tuned for that.And Ben chats to us about 'credential dumping', an increasingly popular technique whereby an attacker scours a compromised computer for credentials in order to move laterally and/or carry out further attacks. To learn more, visit https://blogs.cisco.com/security/stealing-passwords-with-credential-dumping
Women in Cybersecurity: Perspectives on The New Normal Science is not a boy's game, it's not a girl's game. It's everyone's game. It's about where we are and where we're going. Space travel benefits us here on Earth. And we ain't stopped yet. There's more exploration to come -- Nichelle Nichols Tennis legend Serena Williams was once asked by a reporter about being considered “one of the greatest female athletes of all time,” She replied: “I prefer the words ‘one of the greatest athletes of all time." That made news for a week, which is embarrassing given the fact that Venus has more titles than Michael Jordan, Michael Schumacher and Cristiano Ronaldo… combined. How bout we just round up the some of the top people in the field for a discussion on what is happening in this crazy world right now? Sound good? Good. This week on Insecurity, Matt Stephenson speaks with an All-Star Cybersecurity panel of experts including Dr Jessica Barker, Cheryl Biswas, Sherri Davidoff & Theresa Payton. With COVID19 changing everything from industry conferences to the US Presidential Election process, what role does cybersecurity play in The New Normal and The Next Normal? Check it out… About Dr Jessica Barker Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cybersecurity. She has been named one of the top 20 most influential women in cybersecurity in the UK and awarded as one of the UK’s Tech Women 50. She is Co-Founder and Co-Chief Executive Officer of Cygenta, where she positively influences cybersecurity awareness, behaviors and culture in organizations around the world. Dr Barker is a popular keynote speaker and shares her expertise in the media, for example on BBC News, Sky News, Channel 4 News and in Grazia magazine and the Sunday Times. She is Chair of ClubCISO, a peer-based members forum of over 300 information security leaders. In the last year, Dr Barker has given cybersecurity outreach sessions to over 5,000 school students. Jessica’s new book Confident Cyber Security will be released on June 3rd, 2020, published by Kogan Page. About Cheryl Biswas Cheryl Biswas (@3ncr1pt3d) is a Strategic Threat Intel Analyst with a major bank in Toronto, Canada. Previously, she worked as a Cybersecurity Consultant with KPMG. Her experience includes strategic analysis of threat actors and campaigns, security audits and assessments, privacy, DRP, project management, vendor management and change management. Cheryl holds an ITIL certification and has a degree in political science. She is actively involved in the security community as a conference speaker and a volunteer, and encourages women and diversity in infosec as a founding member of the The Diana Initiative. About Sherri Davidoff Sherri Davidoff (@sherridavidoff) is the CEO of LMG Security and the author of Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, Davidoff has been called a “security badass” by the New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC and many more. Sherri is an instructor for Black Hat, and the co-author of Network Forensics: Tracking Hackers through Cyberspace. Davidoff is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in computer science and electrical engineering from MIT. She has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called Alien. About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." Theresa’s new book, Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
According to Security Magazine, employee thefts cost US businesses 50 Billion per year. One of the most egregious thefts ever investigated by the FBI was Rita Crundwell, City Comptroller of Dixon, IL, who embezzled over 53 Million dollars over the course of 22 years. By the time of her arrest, she had over 300 horses across 22 farms in 13 states. She had a motorcoach which seems similar to a very fancy looking tour bus, that she upgraded 5 times, worth 2.1 million dollars. My promise to you, my dear listeners, is to go through what I think of as “the dirty dozen”. It is the “dirty dozen” of what makes business so dirty and hard. And so if you are a young person, you can go into it with your eyes open. If you are investing in training or any other type of business, you are seeing it from a real view. If you are someone who has been around for a while and waking up to what your environment is really about, you can come on this bus too. I truly think a small minority of people are making it way too hard for the rest of us.Research: All the Queen's Horses: https://www.allthequeenshorsesfilm.com/Security Magazine: https://www.securitymagazine.com/articles/88432-employee-theft-costs-us-businesses-50-billion-per-yearMusic: Chris ZabrieskieGrey Skies Remix Stories About the World that Once Was What Does Anyone Know About Anything The Wizard of LiesKai Engel: Devotion Synth Kid: Trapped in the Upside Down Support the show (http://www.patreon.com/officedetox)
*Sarah McLachlan's In the Arms of An Angel Plays* Has someone at your Thanksgiving dinner been hacked online recently? You're not alone. There is a hacker attack every 39 seconds. (Security Magazine). IT questions and general questions about weird things happening online are common this time of year. This mini-sode skims the surface on this topic but with enough detail to impress your family that you really know your stuff and maybe save one or two of them from becoming part of that statistic.
James DeMeo joins the Safety Talk Podcast to discuss a wide variety of topics related to event security and general public safety. James was recognized by Security Magazine as The Most Influential Person in Security 2017 and is also the author of the bestselling book What’s Your Plan? A Step-By-Step Guide To Keep Your Family […]
Criminal Justice Evolution Podcast - Hosted by Patrick Fitzgibbons
Hello everyone and welcome back to the Top Ranked CJEvolution Podcast. Special thanks to all the brave men and women who work in the Criminal Justice Field and who keep us safe every-day. Keep up the great work and please be safe. CJEvolution is now partnered with Detetachem. This amazing company is keeping our brave men and women safe with portable threat detection that fits in the palm of your hand. Head over to www.cjevolution.com to see how Detectachem can help your organization. In this episode, Patrick welcomes James. A. DeMeo, M.S. James brings extensive security, law enforcement & consulting experience to both the public/private sectors. James was recognized by Security Magazine as The Most Influential People in Security 2017. James is also the author of the bestselling book on family safety & preparedness entitled, What's Your Plan? A Step-By-Step Guide To Keep Your Family Safe During Emergency Situations. James and Patrick also talk about life after Law Enforcement. James says the following: “Having the courage to step outside your comfort zone is never an easy task. I retired from law enforcement in 2011. A noble but dangerous profession. I decided to go back to school and earn an advanced degree. Since retiring from Act 1, I have attained numerous professional achievements. With that being said, I am a much wiser, more well-rounded individual for doing so. My best advice would be to face your fears head-on, take a deep breath and simply go for it. Make your dreams a reality. You can't change the world by living in fear. You can't change the world by talking about it. Go out and do it. Today. Right now.” You can find James & his book here: https://jamesademeo.com/ https://www.linkedin.com/in/james-a-demeo-m-s-b1bb5654/ Stay tuned for more great guests and content on the CJEvolution Podcast www.cjevolution.com Patrick
Theresa Payton: Inside the War to Hijack Elections The velocity of social sharing, the power of recommendation algorithms, the scale of social networks, and the accessibility of media manipulation technology has created an environment where pseudo-events, half-truths, and outright fabrications thrive. Edward Murrow has been usurped by Alex Jones. But we’ve known this for a while… Renee DiResta; The Return of Fake News—and Lessons From Spam Sometimes on InSecurity… we like to have some fun. Sometimes we like to get technical. Sometimes… but not that often… we need to take things seriously. This week, we do some of each… but we don’t stray too far from taking it all seriously at the end. In this week’s episode of InSecurity, Matt Stephenson talks with an expert in securing information at the absolute highest levels of Federal Government. Theresa Payton has been putting in the legwork to find out what did and did not happen in the 2016 United States elections. Theresa has been researching a new book about what happens when opposing forces exert their will on the voting populace of a nation in order to alter the course of the electoral process. If we’ve already turned you off because you’ve made up your mind that something did or did not happen… well… stick around. Because today’s guest has likely served much closer to the Oval Office than any of us have. We’ll take a look at how we got here, who did it and why. Theresa Payton has a line on what has already happened and could happen to manipulate the coming 2020 US elections… About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, co-Founder of Dark Cubed, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer (CIO) at the Executive Office of the President from 2006 to 2008, Theresa administered the information technology enterprise for the President and 3,000 staff members. Prior to her time at the White House, Theresa Payton was a senior technology executive in banking, spending 16 years providing banking solutions using emerging technologies. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
This week we are talking to James DeMeo the author of What’s You Plan. We discuss the culture of preparedness and how we can encourage people to be vigilant about their soundings. In todays world you can be involved in an act of violence any place, and anytime. Guest BioJames A. DeMeo, M.S. has over 27 years in the security industry and is considered a subject matter expert in Event Security by several leading international and domestic magazines; Security Magazine, Security Management Magazine, and Pan Stadia. Mr. DeMeo earned his M.S. degree in Sport Management from Adelphi University in 2012. He was part of the AEG Leadership Team which opened the Barclays Center in 2012 (Brooklyn, New York). Mr. DeMeo participated as an integral compon-ent of a research team including esteemed professors for a poster project presented at the North American Society for Sport Management Conference (NASSM, June 4th, 2016, Orlando, FL) entitled, Professional Sport Security and Marketing Interface: A Delphi Study, Assessing the Influence of Sport Security Operations on the Guest Experience: Using the Delphi Method to Understand Practitioner Perspectives, later published in The Journal of Sport Safety (The University of Southern Mississippi). He has delivered presentations at several national conferences and has spoken at numerous colleges and universities throughout the U.S. on sport security operations. Mr. DeMeo is the Founder, President, and CEO of USESC (Unified Sports and Entertainment Security Consulting, LLC). His company is based in Raleigh, North Carolina. On September 1, 2017, Mr. DeMeo was recognized and honored by Security Magazine as one of The Most Influential People in Security, 2017. Past award recipients have included top corporate CSO s, CISO s as well as individuals such as Senator Joseph Lieberman, Representative Michael Rogers, Judge William Webster, FBI Director Robert Mueller, and INTERPOL Security General Ronald Noble.Related ShowsLinks LinkedIn: https://www.linkedin.com/in/james-a-demeo-m-s-b1bb5654/Twitter: https://twitter.com/JDeMeo007Instagram: https://www.instagram.com/jamesdemeo/?hl=enFacebook: https://www.facebook.com/profile.php?id=100005559888566Website: http://jamesademeo.com/Email: jdemeo65@gmail.comAdvertisersTitan HST https://www.titanhst.com/Emergency Managers Leadership Conference www.emlc.us
New from the Deep State Radio Network, National Security Magazine will be a regular podcast series featuring long-form interviews with important national security newsmakers. In this week's episode we feature a conversation with Wendy Sherman, the first woman to hold the post of Under Secretary of State for Political Affairs and author of the new book, "Not for the Faint of Heart", a memoir of her extraordinary life. We discuss with her experiences negotiating the Iran nuclear deal, facing off with North Korea's leaders and coping with the challenges of dealing with Washington's bureaucracy. She also shares her candid views on the current administration and where we are headed on the critical issues of our time. Tune in! See acast.com/privacy for privacy and opt-out information.
New from the Deep State Radio Network, National Security Magazine will be a regular podcast series featuring long-form interviews with important national security newsmakers. In this week's episode we feature a conversation with Wendy Sherman, the first woman to hold the post of Under Secretary of State for Political Affairs and author of the new book, "Not for the Faint of Heart", a memoir of her extraordinary life. We discuss with her experiences negotiating the Iran nuclear deal, facing off with North Korea's leaders and coping with the challenges of dealing with Washington's bureaucracy. She also shares her candid views on the current administration and where we are headed on the critical issues of our time. Tune in!Support this show http://supporter.acast.com/deepstateradio. See acast.com/privacy for privacy and opt-out information.
InSecurity Podcast: Theresa Payton has protected our money, our President and now our most at-risk children What if I told you that there are awful people out there exploiting children and using high end technology to cover their tracks? What if I told you that they are getting away with it? What if I told you that there are people out there with the experience, knowhow, technology… and most importantly, the will… to find these people What if I told you that they ARE finding these scumbags What if I told you that can help… Theresa Payton is currently the CEO of Fortalice and co-founder of Dark Cube. She started her career in the financial sector before moving on to public service. She once worked in a big white building you might recognize. In today’s episode of InSecurity, Matt Stephenson speaks with Theresa about her journey from the banking business in Florida… to becoming the CIO of the White House… to starring on a hit show on CBS… to playing a role in finding exploited children. Her journey is incredible and you won’t want to miss it. About Theresa Payton Theresa Payton is President and CEO of Fortalice Solutions, co-Founder of Dark Cubed, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer (CIO) at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Prior to her time at the White House, Theresa Payton was a senior technology executive in banking, spending 16 years providing banking solutions using emerging technologies. Payton founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
Larry Snow with the Secure Transportation and Executive Protection News for Tuesday, June 5th, 2018. In Vehicle News From Newsweek VLADIMIR PUTIN'S NEW BULLETPROOF LIMO FLEET COST $192 MILLION AND RUSSIA WANTS TO SELL HUNDREDS OF THEM Russian President Vladimir Putin used his inauguration to unveil his long-awaited, armored limousine—the first of its kind in post-Soviet times. The car is one of a fleet that cost $192 million to develop, which has been in production since 2012, and manufacturers hope to launch an entire brand off the publicity around it. Read More ===================== In Cyber Security News A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year. Read More ==================== In Executive Protection news The June 2018 Edition of Security Magazine has an excellent article titled - Travel Security and Executive Protection. The article interviews International Security Driver Association (ISDA), member Greg Threatt. The author of the article, Sarah Ludwig, poses the question – What are the components and challenges of a successful travel security program? Interesting to note that the article brings up the importance of Cyber Security. Cybersecurity is a reoccurring theme in this podcast because the ISDA definitely see a convergence of physical security with cybersecurity. It is our belief that EP jobs of the near future will require cybersecurity knowledge. Read More ========================== This flash briefing is brought to you by the International Security Driver Association. Whether you are exploring a career in executive protection, new to the profession, honing your expertise, or an established security executive, ISDA offers its Members benchmark educational, networking, and marketing programs. For more information about the ISDA membership, articles related to secure transportation, security, and executive protection, go to isdacenter.org. Thanks for listening to the Security Driver and Executive Protection News flash briefing.
In Executive Protection News Diane Ritchey, Editor in Chief of Security Magazine, Security Talks stresses the importance of investigative skills for Executive Protection Success. For info and to read the article go to SecurityMagazine.Com. In Vehicle Safety Tips Safelite stresses the importance of regularly replacing Wiper blades and gives examples how to tell if your blades are worn. In Business of Executive Protection Tips Is your security business ready for the EU General Protection Data Regulation? The new European Union general data protection regulation (EU GDPR) has a direct impact on marketing practices, including email marketing. If your business is based in the EU or you process and collect personal data from EU citizens, the General Data Protection Regulation affects you. The GDPR says you must obtain freely given, specific, informed, and unambiguous consent. You also must clearly explain how you plan to use their personal data. There will be penalties for noncompliance. For a small company the penalties may not be worthy of mention, but for larger companies, the penalties will be significant. Click here more information on the GDPR This flash briefing is brought to you by the International Security Driver Association. The International Security Driver Association serves its members by supporting an international forum of protection professionals who share their knowledge and experience for the education and benefit of the membership. ISDA represents all aspects of the Executive Protection profession from all parts of the Globe. ISDA serves members who are either inexperienced or experienced practitioners. Whether you are exploring a career in executive protection, new to the profession, honing your expertise, or an established security executive, ISDA offers its Members benchmark educational, networking, and marketing programs. For more information about the ISDA go to isdacenter.org.
As James and I continue to publish our Enfuse Conference 2017 series of episodes we are this week joined by Theresa Payton. Theresa is the former CIO of the George W. Bush White House Administration, and now on the show Hunted where she runs a team of cyber trackers. Guest: Theresa Payton ( @TrackerPayton) - Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of Fortalice Solutions, an industry-leading security consulting company, and co-founder of Dark Cubed, a cybersecurity product company, Theresa is a proven leader and influencer who works with clients and colleagues to uncover strategic opportunities and identify new and emerging threats. Theresa began her career in financial services, where she coupled her deep understanding of technology systems with visionary leadership, executing complex IT strategies and winning new business. Following executive roles Bank of America and Wachovia, Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. In 2015 Theresa was named a William J. Clinton distinguished lecturer by the Clinton School of Public Service. She is the author of several publications on IT strategy and cybersecurity and a frequent speaker on IT risk. In 2014 she co-authored, with Ted Claypoole, the book Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family, which was subsequently featured on the Daily Show with John Stewart. Among her numerous accolades and recognitions, Theresa was named one of the top 25 Most Influential People in Security by Security Magazine and One of Infosec’s Rising Stars and Hidden Gems by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.
BluVector (https://bluvector.io/) . Prior to her role at BluVector, she served as general manager of IBM’s Security Services Division, charged with development and delivery of managed and professional security services to IBM clients worldwide. In addition, she served as IBM's Global CISO and VP of IT Risk. Kris is a recognized expert in the field on security, risk, compliance and governance, with appearances in Forbes, CNBC, NPR and USA Today. Within the past five years she has been recognized as 2015 SC Magazine Top 25 Security Managers, 2014 SC Magazine Power Player, 2012 Compass Award Winner by CSO Magazine, one of E-Week’s 2012 “Top Women in Information Security That Everyone Should Know”, Top 25 CTO by InfoWorld, as Top 25 Most Influential Security Executives by Security Magazine. She also holds U.S. and EU patents for Object Oriented Risk Management Models and Methods. Additionally, she is a member of numerous external boards and advisory panels, including Grotech Ventures (http://www.grotech.com/) . In this episode we discuss her start information security and risk, what worries her about the RSA conference, AI and Machine Learning - and what it means for security, emerging threats, advice for CISOs, communicating risk management, and so much more. Where you can find Kris: LinkedIn (https://bluvector.io/) Twitter (https://twitter.com/bluvector) HITBGSEC 2015 - Kristin Lovejoy - Keynote: Security vs Privacy (https://www.youtube.com/watch?v=QjD3NZvzPUM)
Throughout the world, companies are finding that data breaches have become as common as a cold but far more expensive to treat. With the exception of Germany, companies had to spend more on their investigations, notification and response when their sensitive and confidential information was lost or stolen. As revealed in the 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year. Will these costs continue to escalate? Are there preventive measures and controls that will make a company more resilient and effective in reducing the costs? Nine years of research about data breaches has made us smarter about solutions. Critical to controlling costs is keeping customers from leaving. The research reveals that reputation and the loss of customer loyalty does the most damage to the bottom line. In the aftermath of a breach, companies find they must spend heavily to regain their brand image and acquire new customers. Our report also shows that certain industries, such as pharmaceutical companies, financial services and healthcare, experience a high customer turnover. In the aftermath of a data breach, these companies need to be especially focused on the concerns of their customers. As a preventive measure, companies should consider having an incident response and crisis management plan in place. Efficient response to the breach and containment of the damage has been shown to reduce the cost of breach significantly. Other measures include having a CISO in charge and involving the company's business continuity management team in dealing with the breach.In most countries, the primary root cause of the data breach is a malicious insider or criminal attack. It is also the most costly. In this year's study, we asked companies represented in this research what worries them most about security incidents, what investments they are making in security and the existence of a security strategy. An interesting finding is the important role cyber insurance can play in not only managing the risk of a data breach but in improving the security posture of the company. While it has been suggested that having insurance encourages companies to slack off on security, our research suggests the opposite. Those companies with good security practices are more likely to purchase insurance. Global companies also are worried about malicious code and sustained probes, which have increased more than other threats. Companies estimate that they will be dealing with an average of 17 malicious codes each month and 12 sustained probes each month. Unauthorized access incidents have mainly stayed the same and companies estimate they will be dealing with an average of 10 such incidents each month. When asked about the level of investment in their organizations' security strategy and mission, on average respondents would like to see it doubled from what they think will be spent—an average of $7 million to what they would like to spend—an average of $14 million. This may be a tough sell in many companies. However, our cost of data breach research can help IT security executives make the case that a strong security posture can result in a financially stronger company. About the speaker: Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy, data protection and information security practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework. Security Magazine has named Dr. Ponemon as one of the "Most Influential People for Security."Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws. He serves as chairman of the Government Policy Advisory Committee and co-chair of the Internet Task Force for the Council of American Survey and Research Organizations (CASRO).Dr. Ponemon was a senior partner of PricewaterhouseCoopers, where he founded the firm's global compliance risk management group. Prior to joining Price Waterhouse as a partner, Dr. Ponemon served as the National Director of Business Ethics Services for KPMG Peat Marwick, and was appointed Executive Director of the KPMG Business Ethics Institute.Dr. Ponemon has held chaired (tenured) faculty positions and published numerous articles and learned books. He has presented hundreds of keynote speeches or learned presentations at national or international conferences on privacy, data protection, information security, corporate governance, and responsible information management. Dr. Ponemon is an active member of the International Association of Privacy Professionals, serving as founding member of the Certified Information Privacy Professional (CIPP) Advisory Board. Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master's degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
Lawyers hold some of their clients’ most private communications, which makes them a top target of all hackers. As technology competence becomes the required norm, lawyers need to understand not only how to protect their clients’ information but how to react if a cyber attack does happen. On this episode of Digital Detectives, Sharon D. Nelson, Esq. and John W. Simek invite Steven Chabinsky to discuss cyber-risk management for lawyers. Steven Chabinsky is senior vice president of legal affairs, general counsel, and chief risk officer for the cyber-security-technology firm CrowdStrike. He is also is an adjunct faculty member of George Washington University and the cyber columnist for Security Magazine. Prior to joining CrowdStrike, Chabinsky had a distinguished 17-year career with the FBI, during which he was the top cyber lawyer, then the head of the Cyber Intelligence Section, and ultimately deputy assistant director of the FBI's Cyber Division. Tune in to hear the major threats law firms are facing, what lawyers should do if their systems are hacked, and the future of cyber threats and cyber security. Thanks to our sponsor, The Digital WarRoom.
Editor Diane Ritchey talks about plans for the new upcoming Security Magazine podcast program. You've read Security magazine; now it's time to listen.
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory➡️ Join 321,000 people who read my free weekly newsletter: https://newsletter.scottdclary.com➡️ About The GuestTheresa Payton is a respected cybersecurity expert and former White House Chief Information Officer, known for her groundbreaking work in digital security. As the first woman to hold the CIO position at the White House, she led key cybersecurity initiatives during the George W. Bush administration. With over 20 years of experience, Theresa is a trusted authority on protecting individuals, businesses, and governments from cyber threats. She is also the CEO of Fortalice Solutions, a security consulting firm that helps organizations defend against cyber-attacks.Theresa is a bestselling author, with books including "Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth," which was listed as one of the "Top 10 Books About Cybercrime" by The Guardian. She frequently appears on major news outlets as an expert analyst on cybersecurity and digital misinformation. A recipient of numerous awards, including the FBI's 2018 Director's Community Leadership Award (DCLA), Theresa has been named one of the "Top 50 Women in Tech" by Award Magazine and one of the "Top 25 Most Influential People in Security" by Security Magazine. She holds an M.S. in Management Information Systems from the University of Virginia and sits on several advisory boards for innovative global technology firms.➡️ Show Linkshttps://x.com/TrackerPayton/ https://www.linkedin.com/in/theresapayton/ ➡️ Bookshttps://www.amazon.com/Manipulated-Inside-Cyberwar-Elections-Distort/dp/1538133504 https://www.amazon.com/Privacy-Age-Big-Data-Recognizing/dp/1442225459 ➡️ Podcast SponsorsHubspot - https://hubspot.com/ iDigress Podcast - https://idigress.show/ NetSuite — https://netsuite.com/scottclary/ Indeed - https://indeed.com/clary➡️ Talking Points00:00 - Intro02:36 - Theresa's Tech Journey10:45 - Balancing Security & Customer Experience15:29 - Banking Security Breakthroughs19:50 - Why Security Became Her Focus25:39 - The CIO's Tool Trap31:21 - Innovating at the White House38:59 - Sponsor: iDigress Podcast39:36 - Fixing Human Error in Cybersecurity45:26 - Overlooked Global Cyber Threats57:37 - Neurolink, AI & Future Dangers1:00:25 - Ethics vs. Security: A Critical Balance1:02:36 - Daily Security Essentials1:07:09 - Mastering Password Protection1:11:18 - Preparing Future Generations for Cyber Threats1:12:40 - Securing U.S. Elections1:19:20 - Cybercrime & Manipulation Tactics1:22:19 - Theresa's Final Words of Wisdom1:25:54 - Advice to Her Younger SelfAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy