POPULARITY
Categories
In this episode, Mark Ledlow, Bruno Dias, and Matt Talbot discuss the importance of comprehensive threat and risk assessments in corporate and educational environments. They explore the integration of physical security with behavioral threat assessments, emphasizing the crucial role every employee plays in maintaining safety. Additionally, they touch on the psychological aspects of individuals who commit acts of violence, drawing on their own extensive field experiences. Matt shares a powerful story from his time working in a high-risk prison environment, highlighting the importance of building trust and respect with inmates. The episode wraps up with information about their ongoing projects and how listeners can reach out to them for their expert services.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Handling: The importance of dealing with adversity and leveraging experiences to stay fearless is emphasized. Comprehensive Security Approach: Incorporating physical security into behavioral threat assessment provides a unique value. Inclusiveness in Safety: Every employee, regardless of their role, should be viewed as part of the safety and security team. Warning Signs: Identifying and acting on warning behaviors and signs is crucial in preventing violent incidents. Human Side of Inmates: Building respectful relationships with inmates can foster mutual respect and potentially prevent violent outcomes. Impactful Storytelling: Personal stories, such as working with high-risk individuals, can convey powerful lessons in security management. Legacy and Education: The importance of leaving a positive legacy and educating the next generation of security professionals.QUOTES"We really need to think about everybody who is positioned to be able to possibly help." "Humans communicate kind of like dogs shed hair, right? It's just a necessity." "Everybody plays a role... there's something good in everybody and my job was to figure that out." "Sometimes it's about just getting to the human side of somebody." "Treating people with validation and making them feel significant can prevent them from committing violent acts." "Our goal is to leave something original, something impacting on this larger community."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
AI has taken us into uncharted territory.
How did they get in? How did we find them when they got in? What can we do in future to clean up the mess faster? Chris Sistrunk reflects on a decades' industrial cyber incident response experience at Mandiant (Google).
It's our World Password Day Special!
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Experience & Challenges Using Asset Inventory Tools [The Industrial Security Podcast]Pub date: 2025-04-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAsset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
What's the best thing small businesses can do to improve their security posture?
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Travis Farral. Travis has been working in information security since the 90s at places such as Nokia, ExxonMobil, and XTO Energy. He is currently VP & CISO at Archaea Energy, a bp owned, renewable natural gas company based in Houston, Texas. He has spoken at events around world on topics such as Cyber Threat Intelligence, MITRE ATT&CK, and Incident Response. Notable activities during his career include everything from programming logic controllers, building and leading SOCs, driving forklifts, standing up cybersecurity teams, developing threat intelligence programs, and handling responses to incidents, among many other things over the last few decades. [April 21, 2025] 00:00 - Intro 00:18 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:08 - Travis Farral Intro 02:58 - A Different Path than Today 05:25 - Healthy Hacking 08:08 - Anything Can Be Weaponized 10:54 - Questionable Behavior 14:31 - Smash That Report Button!!! 18:58 - Improving Our Odds 21:00 - You Have to Keep It Simple 22:25 - Letters to a Young CISO 24:20 - Find Travis Farral online - LinkedIn: linkedin.com/in/travisfarral 25:01 - Mentors - Shawn Edwards - Jay Leek 27:02 - Book Recommendations - R. E. Lee: A Biography - Douglas Southall Freeman 29:34 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Asset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.
Asset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.
This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.In Watchtower Weekly, we unpack Adolescence (the Netflix show everyone can't stop talking about) and how AI agents are being used to help overwhelmed cybersecurity professionals.
Surprise! In this bonus episode, Ralph Echemendia shares more of his experiences working as a Technical Supervisor on the Snowden movie.
2025 will be a pivotal year for technology regulation in the United States and around the world. The European Union has begun regulating social media platforms with its Digital Services Act. In the United States, regulatory proposals at the federal level will likely include renewed efforts to repeal or reform Section 230 of the Communications Decency Act. Meanwhile, States such as Florida and Texas have tried to restrict content moderation by major platforms, but have been met with challenges to the laws' constitutionality. On March 19, NYU Law hosted a Forum on whether it is lawful, feasible, and desirable for government actors to regulate social media platforms to reduce harmful effects on U.S. democracy and society with expert guests Daphne Keller, Director of the Program on Platform Regulation at Stanford Law School's Cyber Policy Center, and Michael Posner, Director of the Center for Business and Human Rights at NYU Stern School of Business. Tess Bridgeman and Ryan Goodman, co-editors-in-chief of Just Security, moderated the event, which was co-hosted by Just Security, the NYU Stern Center for Business and Human Rights and Tech Policy Press. Show Notes: Tess Bridgeman Ryan GoodmanDaphne Keller Michael PosnerJust Security's coverage on Social Media PlatformsJust Security's coverage on Section 230Music: “Broken” by David Bullard from Uppbeat: https://uppbeat.io/t/david-bullard/broken (License code: OSC7K3LCPSGXISVI)
Why does Hollywood get hacking wrong in so many movies and TV series?
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Needles in Haystacks - Recruiting OT Incident Responders [The Industrial Security Podcast]Pub date: 2025-03-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIndustrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Industrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.
Industrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.
Hochiki has recently celebrated the first anniversary of its Training Academy. With that in mind we caught up with Kara Martin of Hochiki at the Gillingham office to find out more about the Academy and the importance of correctly installing life safety technology. It's too important to get it wrong, so how can you be sure you get it right?
What's it like to work as a CISO at a security company? This week, 1Password's VP of Security and CISO, Jacob DePriest, reveals all. Jacob also shares his advice for building strong security teams with diverse perspectives, backgrounds, and skillsets.
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Would You Rather Use a Control System That's Proven Correct? [The Industrial Security Podcast]Pub date: 2025-02-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
For safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
For safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
What's GhostGPT?
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
In this episode of the Defense of Security Podcast, Jerry Bell and Andrew Kalat discuss the evolving landscape of cybersecurity threats, focusing on ransomware tactics that exploit insider threats, the hijacking of LLM resources, and the effectiveness of phishing simulations. They explore how adversaries are increasingly targeting employees to gain access to sensitive data and … Continue reading Defensive Security Podcast Episode 296 →
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: How to Embed 30 Years of Security Funding into Capital Budgets [The Industrial Security Podcast]Pub date: 2025-01-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMost of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
We're back!
Most of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.
Most of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.
This week on The Lockdown, The Practical Privacy & Security Podcast, we're kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.In this week's episode:Reflecting on personal privacy practices and professional projects.A look at U.S. state privacy regulations taking effect in 2025.Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.Detailed privacy settings for iOS and why GrapheneOS is the better alternative.AI assistants like ChatGPT and Claude, and their risks.Privacy concerns with vehicles, focusing on data leaks and constant surveillance.The intersection of cybersecurity and OSINT in modern attacks.Show Links:Apple offers $95 million in Siri privacy violation settlementAmazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring cameraNulide / FindMyDevice · GitLabBritish journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto QuotidianoVolkswagen EV data leak exposes personal information of 3.3 million peopleTesla data helped police after Las Vegas truck explosion, but experts have wider privacy concernsSupport this show: https://www.patreon.com/c/TheLockdownOfficial website: https://psysecure.com/podcast/"If you want to keep a secret, you must also hide it from yourself."-George OrwellPodcast music: The R3cluse
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Insights into Nation State Threats [The Industrial Security Podcast]Pub date: 2024-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationNation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Welcome to A Very (Artificial) Festive Special!
Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?
Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?
In this episode of the Security Podcast of Silicon Valley, Jon and Sasha of YSecurity sit down with Neil Serebryany, the visionary Founder and CEO of CalypsoAI. Neil shares his fascinating journey from the National Geospatial-Intelligence Agency to leading a cutting-edge AI security company. We dive into the evolving landscape of AI risks, data protection, and regulatory challenges while exploring the future of AI as it transforms industries and society. Learn how CalypsoAI is paving the way for secure AI adoption and what it means for the future of business and innovation. #AI #CyberSecurity #TechInnovation #CalypsoAI #AIRegulation #DataSecurity #AIAdoption #AICompliance #SecureAI
Are the world's most popular websites using outdated password policies?
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: OT Security Data Science - A better vulnerability database [The Industrial Security Podcast]Pub date: 2024-11-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSecurity automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.
Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.
In this episode of the Security Podcast of Silicon Valley, a YSecurity Production, Jon and Sasha sit down with Jacob Berry, Field CISO at Clumio, to explore the intricate balance between security and business growth. Jacob shares his journey from a "punk hacker" to leading security for a cutting-edge cloud data protection company. We delve into the evolving role of the CISO, the complexities of managing security for cloud-based services, and the importance of balancing confidentiality, integrity, and availability. Jacob also discusses the human side of security, from customer conversations to the challenges and opportunities in the fast-paced world of startups. Tune in to learn how Jacob navigates the intersection of technology, privacy, and business strategy.
In this episode of the Security Podcast of Silicon Valley, a YSecurity.io production, Hosts Jon McLahlan and Sasha Sinkevich sit down with Vijay Balasubramaniyan, the visionary Co-Founder and CEO of Pindrop Security. From his roots in voice technology at giants like Google and IBM to pioneering security innovations at Pindrop, Vijay shares his unique journey of merging voice and security. Discover how Pindrop is leading the charge against deepfake fraud, revolutionizing voice authentication, and even protecting democracy. Tune in for a deep dive into the future of voice and security, with insights from one of the industry's leading minds.
What's the true cost of a data breach?
Tomomi Ayoyama translated the book Countering Cyber Sabotage - Consequence-Driven, Cyber-Informed Engineering - to Japanese. Tomomi recalls the effort of translating CCE to Japanese and looks forward to applying CCE and OT security principles to industrial cloud systems at Cognite.
Tomomi Ayoyama translated the book Countering Cyber Sabotage - Consequence-Driven, Cyber-Informed Engineering - to Japanese. Tomomi recalls the effort of translating CCE to Japanese and looks forward to applying CCE and OT security principles to industrial cloud systems at Cognite.
Nerd-out with us this episode, as we dissect the fundamental problems and challenges with traditional passwords.
Are the frequent stories about data breaches in the news making us desensitized?
Compromise a cloud service and tens thousands of vehicles can be affected at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."
Compromise a cloud service and tens thousands of vehicles can be affected at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."
Are there personality traits that make some people more vulnerable to cyberattacks? We lift the lid on this and more in a one-of-a-kind interview with cyberpsychologist, Dr Erik Huffman. Tune in, as Erik unpacks the human-element of security, how AI is transforming social engineering, and how we can turn humans from the weakest security link into our greatest superpower. ⛓️
Why should we stop using work laptops for personal use? Is your car sneakily selling your driving data? We answer all that and more in Watchtower Weekly.
How can we reimagine social media to make it safer for everyone? Tracy Chou is on a mission to do just that. Join Block Party founder, Tracy Chou, as she sits down with Roo to share her thoughts on privacy in an always online world and what led her to create Privacy Party: A tool that's reshaping the way we use social media and giving power back to the user.
In a culture fraught with fear about safety and security, where do we stand as wise women of God? Is it wrong to love safety and security? Why can it often feel elusive? What does God have to say about safety and security? Resources mentioned in this episode: The Unhurried Homeschooler Mentoring Course Link to podcast episode search bar Raising Boys to Men Book Raising Boys to Men Audiobook The Unhurried Homeschooler The Unhurried Homeschooler Audiobook Unhurried Grace for a Mom's Heart The Four-Hour School Day CTC Math Voetberg Music Academy (Use discount code WILSON20 for 20% off ) Subscribe to my monthly email and receive access to Unhurried Grace for a Mom's Heart: 31 Days in God's Word