POPULARITY
Read beyond the headlines! Support Local Journalism https://www.spokesman.com/podcastoffer
Episode 525 - Richard DeVeau - Light's Out - We Paint a Picture of a special forces veteran, CIA officer, and leader of Boston's Homeland Security teamAbout the authorAfter majoring in marketing at Bentley University, Richard spent a career as a copywriter and creative director serving such clients as Red Lobster, Ducati Motorcycles, Marriott Hotels, and Clorox. He also brought his writing skills to bear for communications agencies that serve nonprofit organizations, including American Red Cross, Wounded Warrior Project, Toys for Tots, CARE, Special Olympics and many others. And he was a frequent editorial contributor to Fundraising Success Magazine.In 2000, he helped launch acclaimed author Stephen King's internet publishing debut and the world's first mass- marketed e-book, Riding the Bullet. Richard wrote the online ad campaign that prompted more than 400,000 people to purchase and download the novella.His screenplay, Graven Image, placed in the top twenty percent of the Academy of Motion Pictures' Nicholl Fellowships international screenwriting competition in 2014.Richard is also an accomplished fine art painter. Over the past thirty years, he has exhibited work in numerous solo and group shows. His work was represented by two commercial art galleries in his native Boston and is now represented by a gallery in Chicago, where he currently resides.Richard and his wife have four adult children and two grandchildren.Book: Light's OutA retired couple are murdered in their Wisconsin home - art and other valuables are stolen. A Lake Michigan oil tanker explodes and sinks that same night.Eve Taunt - special forces veteran, CIA officer, and leader of Boston's Homeland Security team - believes there is a connection between these two events.She and her team quickly find themselves in pursuit of a domestic terrorist - an M.I.T. educated, military trained missile genius with Ted Bundy-like psychopathy - to stop him before he carries out his next devastating attack. This one is even more lethal than the overhwelming inferno he just unleashed on Boston.As Eve closes in, she discovers these attacks are orchestrated by a US senator and a powerful cabal of highly placed leaders and lawmakers with a hidden agenda.https://a.co/d/2yD92bjSupport the show___https://livingthenextchapter.com/podcast produced by: https://truemediasolutions.ca/Coffee Refills are always appreciated, refill Dave's cup here, and thanks!https://buymeacoffee.com/truemediaca
Deputy Director of Narcotics Control Commission, Lawyer Twum Barimah, has hinted that he was part of the security team that examined the aircraft for suspected drug trafficking at KIA
The American Democracy Minute Radio Report & Podcast for March 14, 2025DOGE Cuts 300 Experts From CISA's Election Security Team and U.S. Government Cybersecurity Support; Funding for State Cybersecurity Also SuspendedMore Trump administration mass layoffs at CISA have experts raising concerns over U.S. readiness for cyber attacks on election infrastructure and federal agency networks. An additional 100 inhouse and contracted cyber specialists were terminated in early March. Some podcasting platforms strip out our links. To read our resources and see the whole script of today's report, please go to our website at https://AmericanDemocracyMinute.orgToday's LinksArticles & Resources:American Democracy Minute - CISA Pauses All Election Security Programs for Full ReviewThe Register - CISA pen-tester says 100-strong red team binned after DOGE canceled contractCISA - Statement on CISA's Red TeamInfosecurity Magazine - Trump Administration Shakes Up CISA with Staff and Funding CutsTechCrunch - DOGE axes CISA ‘red team' staffers amid ongoing federal cutsCBS News - Cybersecurity agency's top recruits decimated by DOGE cutsVotebeat - U.S. agency has stopped supporting states on election security, official confirmsCenter for Internet Security - "Due to the termination of funding by the Department of Homeland Security, the Center for Internet Security no longer supports the EI-ISAC."Groups Taking Action:Common Cause Election Disinformation, Protect Democracy, Election Worker Legal Defense Network, Center for Internet Security/ISA, IssueOne/Don't Mess With US.orgPlease follow us on Facebook and Bluesky Social, and SHARE! Find all of our reports at AmericanDemocracyMinute.orgWant ADM sent to your email? Sign up here!#Democracy #DemocracyNews #ProtectElections #CISA #DOGE #ElectionIntegrity
US Marshals Service deputizes Musk’s security team Please Subscribe + Rate & Review KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson wherever you listen! --- KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi & E. Curtis Johnson – KMJ’s Afternoon Drive Weekdays 2-6 PM Pacific on News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
US Marshals Service deputizes Musk’s security team Please Subscribe + Rate & Review KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson wherever you listen! --- KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi & E. Curtis Johnson – KMJ’s Afternoon Drive Weekdays 2-6 PM Pacific on News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
News with Sean 1-29-2025 …What is the Internal Security Team?
He's been the detachment commander for the St Paul RCMP for only 6 months and already has made a strong impression with the community. Staff Seargent, Dennis Silliker is making himself one of the most accessible members this area has seen. And, is even up for sharing some of his Completely Interesting stories with a local podcast. An RCMP for over 18 years, that includes stints with the RCMP Musical Ride and part of the Prime Minister's Security Team, there's no shortage of those. Dennis brings some of those candid stories and his commitment to improving the RCMP's presence to this podcast!
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition Show Notes: https://securityweekly.com/esw-389
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition Show Notes: https://securityweekly.com/esw-389
Enjoying the content? Let us know your feedback!It is a topical episode we're diving into a high-stakes challenge every organization faces: It is holiday season, how do you manage threats when most of the security team is off duty.Imagine a holiday season, a long weekend, or even an unexpected emergency. With key team members unavailable, how do we keep our defenses strong? This episode will provide actionable strategies, backed by real-world examples, to help you stay prepared.Stick around until the end, where we'll also bust a common cybersecurity myth.- https://www.bleepingcomputer.com: CISA Urges Switch To Signal Like-Encrypted Messaging Apps After Telecom HacksBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.
Erweitere dein Wissen über Karrierewege in die Cybersecurity mit "Cybersecurity ist Chefsache".In der aktuellen Folge begrüßt Nico Werner Isabel Höhn, die aktuell im internen Security-Team von Hays arbeitet. Isabel spricht über ihren beeindruckenden Quereinstieg in die IT-Sicherheit – von der Personalvermittlerin hin zu ihrer Rolle im Cybersecurity-Bereich und ihrem langfristigen Ziel, CISO zu werden.Einige der Kernthemen dieser Folge:Leidenschaft statt Informatikstudium: Wie Isabel durch Passion und Neugier die Cybersecurity für sich entdeckte.Herausforderungen im Quereinstieg: Warum es wichtig ist, mutig zu sein und sich selbst zu beweisen.Die Rolle der Soft Skills: Warum Kontextverständnis und Übersetzung zwischen Technik und Business so entscheidend sind.Recruiting in der Cybersecurity: Isabels Perspektive auf den Fachkräftemangel und wie Unternehmen offener für neue Talente werden können.Erfahre, warum Netzwerke, Austausch und Weiterbildung essenziell sind, und wie Isabel ihren ganz persönlichen Weg in die IT-Sicherheit fand. Diese Folge ist ein Muss für alle, die sich für Karrierewege in der Cybersecurity interessieren!
Erweitere dein Wissen über Karrierewege in die Cybersecurity mit "Cybersecurity ist Chefsache".In der aktuellen Folge begrüßt Nico Werner Isabel Höhn, die aktuell im internen Security-Team von Hays arbeitet. Isabel spricht über ihren beeindruckenden Quereinstieg in die IT-Sicherheit – von der Personalvermittlerin hin zu ihrer Rolle im Cybersecurity-Bereich und ihrem langfristigen Ziel, CISO zu werden.Einige der Kernthemen dieser Folge:Leidenschaft statt Informatikstudium: Wie Isabel durch Passion und Neugier die Cybersecurity für sich entdeckte.Herausforderungen im Quereinstieg: Warum es wichtig ist, mutig zu sein und sich selbst zu beweisen.Die Rolle der Soft Skills: Warum Kontextverständnis und Übersetzung zwischen Technik und Business so entscheidend sind.Recruiting in der Cybersecurity: Isabels Perspektive auf den Fachkräftemangel und wie Unternehmen offener für neue Talente werden können.Erfahre, warum Netzwerke, Austausch und Weiterbildung essenziell sind, und wie Isabel ihren ganz persönlichen Weg in die IT-Sicherheit fand. Diese Folge ist ein Muss für alle, die sich für Karrierewege in der Cybersecurity interessieren!
Erweitere dein Wissen über Karrierewege in die Cybersecurity mit "Cybersecurity ist Chefsache".In der aktuellen Folge begrüßt Nico Werner Isabel Höhn, die aktuell im internen Security-Team von Hays arbeitet. Isabel spricht über ihren beeindruckenden Quereinstieg in die IT-Sicherheit – von der Personalvermittlerin hin zu ihrer Rolle im Cybersecurity-Bereich und ihrem langfristigen Ziel, CISO zu werden.Einige der Kernthemen dieser Folge:Leidenschaft statt Informatikstudium: Wie Isabel durch Passion und Neugier die Cybersecurity für sich entdeckte.Herausforderungen im Quereinstieg: Warum es wichtig ist, mutig zu sein und sich selbst zu beweisen.Die Rolle der Soft Skills: Warum Kontextverständnis und Übersetzung zwischen Technik und Business so entscheidend sind.Recruiting in der Cybersecurity: Isabels Perspektive auf den Fachkräftemangel und wie Unternehmen offener für neue Talente werden können.Erfahre, warum Netzwerke, Austausch und Weiterbildung essenziell sind, und wie Isabel ihren ganz persönlichen Weg in die IT-Sicherheit fand. Diese Folge ist ein Muss für alle, die sich für Karrierewege in der Cybersecurity interessieren!
JR Cunningham, CISO at Nuspire, joins the show to talk about why cybersecurity isn't just another IT job - mentally, it's more like being a first responder.George K and George A talk to JR about:
Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario)On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin___________________________Episode NotesIn the third and final installment of the series titled "Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals," Sean Martin continues his compelling conversation with Kush Sharma. This episode focuses on the critical aspects of team dynamics, project management, and stakeholder engagement in the realm of cybersecurity.Kush Sharma elaborates on the importance of establishing a well-structured and communicated vision for security operations within an organization. He emphasizes the necessity of setting expectations with security teams before any major project initiation. According to Sharma, transparency is vital. Security leaders must candidly discuss with their teams that not every decision will tip in their favor, but their role is to advocate for security while being adaptable to business needs. He stresses the importance of documenting and following up on risk mitigation measures even if they aren't implemented immediately.Sharma also sheds light on the concept of integrating business and security functions more seamlessly. He proposes not just embedding security into business but also bringing business personnel into the security fold. By having business unit members work within security teams temporarily, organizations can build a robust line of communication and mutual understanding. This cross-functional approach creates internal champions for security measures and helps significantly cut costs as internal personnel generally have lower operational costs compared to external consultants.A significant portion of the episode revolves around the nuanced engagement with different stakeholders, particularly at the executive level. Sharma advises CISOs to view themselves as peers to other C-suite executives, prepared to defend their positions and decisions vigorously. It's crucial for CISOs to maintain this executive-level mindset and openly communicate the broader business implications of security decisions. Sharma highlights that making a business case for security and showing tangible returns on investment can secure better funding and support from the executive team, leading to more substantial investments in long-term security measures.Sean Martin wraps up the episode by touching on the importance of storytelling in cybersecurity. By translating technical achievements and risk mitigation efforts into relatable stories, CISOs can effectively communicate the value of their work across the organization. These narratives help ensure security remains a priority in business strategies and operations, fostering an environment where security considerations are integral to planning and executing new initiatives.In conclusion, the episode provides essential insights for current and aspiring CISOs on navigating the complexities of internal communications, leadership, and strategic planning in cybersecurity. Both Kush Sharma and Sean Martin offer practical advice and strategies that can help elevate the role of security within any organization, thereby protecting its infrastructure and supporting its growth objectives.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario)On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin___________________________Episode NotesIn the third and final installment of the series titled "Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals," Sean Martin continues his compelling conversation with Kush Sharma. This episode focuses on the critical aspects of team dynamics, project management, and stakeholder engagement in the realm of cybersecurity.Kush Sharma elaborates on the importance of establishing a well-structured and communicated vision for security operations within an organization. He emphasizes the necessity of setting expectations with security teams before any major project initiation. According to Sharma, transparency is vital. Security leaders must candidly discuss with their teams that not every decision will tip in their favor, but their role is to advocate for security while being adaptable to business needs. He stresses the importance of documenting and following up on risk mitigation measures even if they aren't implemented immediately.Sharma also sheds light on the concept of integrating business and security functions more seamlessly. He proposes not just embedding security into business but also bringing business personnel into the security fold. By having business unit members work within security teams temporarily, organizations can build a robust line of communication and mutual understanding. This cross-functional approach creates internal champions for security measures and helps significantly cut costs as internal personnel generally have lower operational costs compared to external consultants.A significant portion of the episode revolves around the nuanced engagement with different stakeholders, particularly at the executive level. Sharma advises CISOs to view themselves as peers to other C-suite executives, prepared to defend their positions and decisions vigorously. It's crucial for CISOs to maintain this executive-level mindset and openly communicate the broader business implications of security decisions. Sharma highlights that making a business case for security and showing tangible returns on investment can secure better funding and support from the executive team, leading to more substantial investments in long-term security measures.Sean Martin wraps up the episode by touching on the importance of storytelling in cybersecurity. By translating technical achievements and risk mitigation efforts into relatable stories, CISOs can effectively communicate the value of their work across the organization. These narratives help ensure security remains a priority in business strategies and operations, fostering an environment where security considerations are integral to planning and executing new initiatives.In conclusion, the episode provides essential insights for current and aspiring CISOs on navigating the complexities of internal communications, leadership, and strategic planning in cybersecurity. Both Kush Sharma and Sean Martin offer practical advice and strategies that can help elevate the role of security within any organization, thereby protecting its infrastructure and supporting its growth objectives.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Carlos Francisco, CPP, spent more than two decades climbing the ranks in security at Walt Disney World Resorts, learning how to balance situational awareness, de-escalation, and customer service. Now, he joins the GSX Daily edition of SM Highlights to discuss the human-centric security culture that led the world-class environment for guests at the “Happiest Place on Earth” and how to apply those lessons across the security management profession. Additional Resources Take security higher at GSX: https://www.gsx.org/ Learn additional lessons for career growth—especially for early career and aspirational leaders—here: https://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/ Study the value of concierge guarding from cultural properties and museums: https://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/ Are your soft skills up to par to handle a customer-centric culture? Get pro tips here: https://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/ Need to come to grips with cybersecurity acumen and where cyber risk intersects with physical security? Read Security Management's ongoing cybersecurity coverage on our topic page: https://www.asisonline.org/security-management-magazine/Topics/cybersecurity/
Do you look at other church safety and security programs and wish you were where they are? Well every church safety and security team started right where you are with one person! Join us for the 9th Annual Securing Your Place of Worship Online Conference on Tuesday, September 10th! This year, Wes Pederson from Eagle Brook Church and Mike Lynch from Traders Point Church will be tackling tough questions to help guide your security team. Don't miss out for this online event—register now: https://www.worshipsecurity.org/conference We're excited to feature Lt. Col. Dave Grossman and Carl Chinn as keynote speakers. Plus, we've got signed books, free courses, and decision decks all to give away! This fully virtual and online conference brings over 9 hours of expert teaching from 10 presenters right to your screen, wherever you are. Don't miss out—register now: https://www.worshipsecurity.org/conference
The McCullough Report with Dr. Peter McCullough – Mounting pressure from fellow Democrats and celebrities, the Trump assassination attempt, and an embarrassing bout of acute COVID-19 in heavily vaccinated President Biden prompted an awkward withdrawal from the presidential race. Team Biden had weeks, if not months, to plan for this transition. Thus, when it happened on a Sunday, it looked clumsy and poorly executed...
The McCullough Report with Dr. Peter McCullough – Mounting pressure from fellow Democrats and celebrities, the Trump assassination attempt, and an embarrassing bout of acute COVID-19 in heavily vaccinated President Biden prompted an awkward withdrawal from the presidential race. Team Biden had weeks, if not months, to plan for this transition. Thus, when it happened on a Sunday, it looked clumsy and poorly executed...
In this comprehensive episode of CISO Tradecraft, host G Mark Hardy sits down with Christian Hyatt, author of 'The Security Team Operating System'. Together, they delve into the five essential components needed to transform your cyber security team from reactive to unstoppable. From defining purpose and values to establishing clear roles, rhythms, and goals, this podcast offers practical insights and tools that can improve the efficacy and culture of your security team. If you're looking for strategic frameworks to align your team with business objectives and create a resilient security culture, you won't want to miss this episode! Christian Hyatt's LinkedIn Profile: https://www.linkedin.com/in/christianhyatt/ Link to the Book: https://a.co/d/aHpXXfr Transcripts: https://docs.google.com/document/d/1ogBdtJolBJTOVtqyFLO5onuLxBsfqqQP Chapters 00:00 Introduction and Guest Welcome 01:31 Overview of the Security Team Operating System 03:31 Deep Dive into the Five Elements 07:53 Aligning Security with Business Objectives 21:59 Defining Core Values for Security Teams 25:03 Aligning Organizational and Team Values 26:05 Establishing Clear Roles and Responsibilities 30:58 Implementing Effective Rhythms and Goals
The cyber insurance market is ever-changing and firms continue to have a difficult time understanding what their underwriters want and how to communicate their current cyber programs and needs internally to financial stakeholders (among others). Join David and David as we talk about the top 5 issues cyber insurers are worried about with Law Firms this year from privileged account management to privacy and DLP, to the ever-present and evolving ransomware threats. Further, they will discuss what resources are available when working on your cyber insurance renewal. Often times, the economic buyer of cyber insurance isn't in lock step on what the CISO and Security Team is doing and that can result in strengths and wins not being articulated to your insurer which can result in inferior coverage. Moderator: @David Forrestall - CEO, SecurIT360 Speaker: @David Anderson - Vice President, Cyber Liability, Woodruff Sawyer Recorded 6-20-2024
In this BlackCLoak Brand Story, hosts Sean Martin and Marco Ciappelli engage in an in-depth conversation with Founder Chris Pierson, Chief Information Security Officer Ryan Black, and Product Manager Matt Covington. The discussion explores the company's dedication to protecting security and privacy for CISOs, executives, and high-net-worth individuals.The episode kicks off with Martin and Ciappelli extending a warm welcome to Pierson, Black, and Covington while highlighting the mission-driven approach of BlackCloak. Pierson elaborates on BlackCloak's unique focus on protecting not just organizations but also extending security measures to the personal lives of executives and their families. This connection underscores the significance of safeguarding home environments, which are increasingly becoming targets for cyberattacks.Covington shares his intriguing journey from having a master's degree in literary theory to becoming involved in cybersecurity, emphasizing the importance of empathy in product development. He explains how BlackCloak's technology seeks to scale its services efficiently by automating repetitive tasks, thereby allowing their experts to focus on critical problem-solving for clients.Throughout the conversation, Ryan Black describes the flexible, personalized concierge service that BlackCloak offers, aimed at addressing the unique security needs of individuals outside the corporate framework. He emphasizes that their approach goes beyond traditional enterprise security, focusing on protecting personal devices and networks that executives use at home.The episode also touches on the emotional and psychological aspects of cybersecurity, illustrating how personal experiences with phishing attacks have driven both Black and Covington in their professional paths. The hosts and guests also discuss the personal side of cybersecurity, addressing behavioral vulnerabilities and the integration of user-friendly technology in personal security measures.Finally, the session highlights the collaborative and proactive culture at Black Cloak, where team members are committed to going above and beyond to protect their clients. This episode offers listeners valuable insights into how BlackCloak is pioneering an empathetic and comprehensive approach to cybersecurity.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuests: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonRyan Black, Chief Information Security Officer, BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ryancblack/Matt Covington, VP of Product, BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/mecovington/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebBlackCloak welcomes Ryan Black: https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5zAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this BlackCLoak Brand Story, hosts Sean Martin and Marco Ciappelli engage in an in-depth conversation with Founder Chris Pierson, Chief Information Security Officer Ryan Black, and Product Manager Matt Covington. The discussion explores the company's dedication to protecting security and privacy for CISOs, executives, and high-net-worth individuals.The episode kicks off with Martin and Ciappelli extending a warm welcome to Pierson, Black, and Covington while highlighting the mission-driven approach of BlackCloak. Pierson elaborates on BlackCloak's unique focus on protecting not just organizations but also extending security measures to the personal lives of executives and their families. This connection underscores the significance of safeguarding home environments, which are increasingly becoming targets for cyberattacks.Covington shares his intriguing journey from having a master's degree in literary theory to becoming involved in cybersecurity, emphasizing the importance of empathy in product development. He explains how BlackCloak's technology seeks to scale its services efficiently by automating repetitive tasks, thereby allowing their experts to focus on critical problem-solving for clients.Throughout the conversation, Ryan Black describes the flexible, personalized concierge service that BlackCloak offers, aimed at addressing the unique security needs of individuals outside the corporate framework. He emphasizes that their approach goes beyond traditional enterprise security, focusing on protecting personal devices and networks that executives use at home.The episode also touches on the emotional and psychological aspects of cybersecurity, illustrating how personal experiences with phishing attacks have driven both Black and Covington in their professional paths. The hosts and guests also discuss the personal side of cybersecurity, addressing behavioral vulnerabilities and the integration of user-friendly technology in personal security measures.Finally, the session highlights the collaborative and proactive culture at Black Cloak, where team members are committed to going above and beyond to protect their clients. This episode offers listeners valuable insights into how BlackCloak is pioneering an empathetic and comprehensive approach to cybersecurity.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuests: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonRyan Black, Chief Information Security Officer, BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ryancblack/Matt Covington, VP of Product, BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/mecovington/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebBlackCloak welcomes Ryan Black: https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5zAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this episode of The New CISO, host Steve is joined by returning guest Sándor Incze, CISO at CM.com.In part two of his interview, Sándor shares his strategies for boosting team productivity. As a long-time security leader, Sándor understands how to get the best out of his team. Listen to the episode to learn more about the difference between nervousness and excitement, the benefits of his CM model, and how running a cyber security staff is like soccer.Listen to Steve and Sándor discuss how software development is like an F1 race and how to make a candidate confident during an interview:In the Interview (1:33)Sándor and Steve discuss high-stakes, stressful job interviews and how they can make candidates nervous. Although some security professionals are proud to make someone fumble during the interview process, Sándor and Steve share how to bring out the best version of someone to see if they are the right fit.CM Squared (8:56)Sándor shares the CM (or CM Squared) Model, a document he uses when auditing different companies' security systems to find their faults. With this model, Sándor can simplify technologies for business leaders and enhance their protections.Like an F1 Race (15:30)Like F1 racing, Sándor believes software development is a team effort. To help emphasize this metaphor, Sándor explains how different members of security teams mirror the roles of a racing crew.Team Strategies (19:49)When Sándor evaluates his role as a leader, he thinks of his staff as a soccer team. His team needs to score “goals,” and as their “coach,” it is his job to guide them.He also shares his motto, “Do something you like, do something you're good at, and contribute.”The New CISO (27:12)To Sándor, being a new CISO means “keep it simple.” Making things too complicated does not stop cyber crimes. However, learning to talk to each other does.Links:LinkedIn
Vicki Dillard reports on Presidents Putin and Xi's Diehard Bodyguards' Exchange Brings Biden's Security Team In Question. Connect with Vicki: @vickidillardtv --- Send in a voice message: https://podcasters.spotify.com/pod/show/africandiasporanews/message Support this podcast: https://podcasters.spotify.com/pod/show/africandiasporanews/support
What is best for your church security team, having a roaming security patrol or a fixed point patrol? You can only choose one, let's discuss! Decision Decks: Unique Scenario Cards for Church Safety and Security: Six Deck Box Set: https://a.co/d/8OUDO6q Conflict Deescalation Scenarios: https://a.co/d/6tNrJsZ Safety Team Scenarios: https://a.co/d/ciEwDJa Threat Assessment Scenarios: https://a.co/d/hkWkVih Suspicious Behavior Scenarios: https://a.co/d/0ilrAUV Medical Response Scenarios: https://a.co/d/aJgzLIr Crisis Intervention Scenarios: https://a.co/d/7SMgynD Need Simon's help with risk assessments, emergency preparedness or training email team@kingswoodsc.com
Today, we'll be discussing Episodes 7 and 8 of Queen of Tears, the hit K Drama on Netflix starring Kim Ji-won as Hong Hae-in, Kim Soo-hyun as Baek Hyun-woo, Park Sung-hoon as Yoon Eun-Seong, Kwak Dong-Yeon as Hong Soo-cheol, Lee Joo-bin as Cheon Da-Hye. We discuss:The song we feature during the recap: Love You With All My Heart by Crush.Soo Cheol calls Hyun-Woo “maehyeong” 매형, which means older sister's husband.How Hae-in loses her will to live when Hyun-woo admits that he wanted a divorce.How Hyun-woo decides to make Hae-in hate him so that she has a reason to live.How Hyun-woo wants to stay by Hae-in's side even if it means being the subject of her rage, humiliation and hatred; he has powerful reasons for wanting to be by her side.Both Hae-in and Hyun-woo are left wondering if everything the other person said and promised was a lie.Through the flashback of the marriage proposal, we can piece together how our couple got engaged, broke up, got back together, and finally married.How we held our breaths when Hyun-woo discovers that Hae-in has lost her memory of Germany and Hyun-woo wanting a divorce, which means Hae-in has to relive this trauma TWICE.The crazy divorce settlement scene with Song Joong-ki as Vincenzo Cassano.How Hae-in realizes that Hyun-woo was suffering during their marriage; she learns this when she overhears Hyun-woo at Grandma's Home Cooking restaurant.The Chairman wants Hyun-woo fired by Hae-in defends him from the Security Team.How Hyun-woo followed David Yoon when he was following Hae-in. We see a very different Hyun-woo in that scene. We think we will see a very different Hyun-woo from now on.How David Yoon pressured Soo-cheol to sign the resort deal with David Yoon, and then the deal went south, giving Pione Investment the chance to swoop in and pretend to save the deal.But when the investors pull out and the Chairman's embezzlement investigation comes out, David Yoon ends up with control over Queens Group.Meanwhile, Hae-in turns down the Hercyna deal and rejects David Yoon's offer (again) to replace Hyun-woo.We feel sorry for Soo-cheol, whose wife double-crossed him, left him, and took their son to New York.Hyun-woo and Aunt Beom-ja have definitive proof, through a DNA test, that David Yoon is Moh Sul-hee's son!Moh Sul-hee and David Yoon have been playing the long game. Moh Sul-hee endeared herself to the Chairman, whom she tricked into giving her power of attorney, and then poisoned.How the Hong family has been kicked out of their own company and have fled to Yongdu-ri.The hilarious scenes involving Hyun-woo, Hae-in and their secretaries.More Crash Landing On You references and tie-ins!The Koreans' seeming obsession with the Myers Briggs Personality Types.The K Drama elements in this show, including all the crying, the epic umbrella scene involving Hyun-woo and Hae-in, more connections from the past between Hae-in and David Yoon, all the product placements, and Hyun-woo saving Hae-in from an oncoming truck.Our new, #39 product placement - cameos!Our predictions for the end of the show!We learn more about the amazing Park Sung-hoon!ReferencesPark Sung-hoon on WikipediaMyers Briggs Personality TypesCrush on WikipediaLove You With All My Heart by Crush on YouTube
In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google's open source and supply chain security teams. We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for SecurityWeek's 2024 Supply Chain Security Summit.Follow SecurityWeek on LinkedIn
Wayne Cabot and Paul Murnane have the morning's top headlines from the WCBS 880 newsroom.
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8
We talk the depressing latest developments in the Kroy and Kim divorce saga before getting into Bravo this week. We discuss Beverly Hills and the reappearance of Kim, Sutton vs. Kyle, RHOP and RHOM and why both of the seasons seem a little slow and off to us, RHOSLC and Monica's breakdown, Lisa vs. Meredith and another excellent episode, Winter House and Danielle's nutty behavior, always being anti-Malia, Southern Charm and the continued maturity of Craig, and more! Don't forget to review and subscribe on Apple PodcastsFollow us on Twitter: @escapetopod Instagram: @escapetorealitypodcastSend us an email: escapetorealitypodcast@gmail.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
THURSDAY! Ahoy, maties! We have a full solo recap of this weeks Salt Lake City. What the hell is going on with Monica? Did Meredith dm? Why does Lisa have a cyber security team??? Find out in this solo recap!! Also, special thanks to Laura Beth Harpe (@laurabethharpe) for taking the fantastic salt lake notes! Sign up for our substack for free! https://sobaditsgoodryanbailey.substack.com OUR HOLIDAY GIFT GUIDE IS OUT NOW! Also, this show and every show is dedicated to my beautiful mom Rebecca Ann Bailey-July 18th, 1948-August 25, 2023 Timestamps :31-Show Notes/RHOSLC Thesis Statement 5:30-Family sutff 21:00-RHOSLC Recap -Check out our latest promo codes here: https://betches.com/promos -Go sign up for the patreon for over 250 episodes NOT on the main feed! https://www.patreon.com/sobaditsgood Also, So Bad It's Good has merch now! Go to www.sobaditsgoodmerch.com to order yours TODAY! If you're enjoying the insane amount of blood, sweat and literal tears of this pod consider telling a friend or rating us 5 stars on iTunes! Special shoutout to Maritza Lopez (Insta: @maritza.gif) for all of her insanely hard work creating these beautiful pieces of art on my instagram and patreon page!! Instagram: @sobaditsgoodwithryanbailey, @ryanbailey25 Twitter:@ryanabailey25 TIKTOK @sobaditsgoodwithryanb Learn more about your ad choices. Visit megaphone.fm/adchoices
Momo, Krom and Blemish prepare to manage security for the Wizards Choice Awards.CreditsArnie: Arnie NiekampUsidore: Matt YoungChunt: Adal RifaiMomo the Mouse: Erin KeifKrom the Fingarian: Mark FrederickBlemish: Martin WilsonMysterious Man: Tim SniffenProducers: Arnie Niekamp, Matt Young, and Adal RifaiAssociate Producer: Anna HavermannPost-Production Coordination: Garrett SchultzEditor: Garrett SchultzMagic Tavern Logo: Allard LabanTheme Music: Andy PolandGet tickets for our upcoming live shows at Thalia Hall and SF Sketchfest!Check out the new merch at our Teepublic store!Follow the show on YouTube to listen to the episode alongside two dynamic static animations of the tavern!You can support the show directly and receive bonus episodes and rewards by joining our Patreon at https://www.patreon.com/magictavern for only $5 per month. Follow us on X and Instagram, and now Patreon!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, Spencer and Darrius discuss a common divide found among companies between the Security Team and the development teams. These are two teams that are ultimately trying to benefit the company, and by working together both are able to succeed.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Adam Zoller, svp, CISO at Providence. Joining me is our guest Sam Jacques, vp of clinical engineering, McLaren Health Care. In this episode: When should cybersecurity be brought into the discussion when a merger is underway? Why is security always going to be an issue in a merger or acquisition? If we know it's so important, why does it always feel like we're reinventing the wheel each time? Thanks to our podcast sponsor, Claroty Claroty enables varied sectors to protect their cyber-physical systems, known as the Extended IoT. The platform integrates seamlessly, offering comprehensive controls for visibility, risk management, network protection, and more. Trusted by global leaders, Claroty operates in hundreds of organizations worldwide. Headquartered in NYC, it spans Europe, Asia-Pacific, and Latin America.
Richard Ma is the Founder & CEO @ Quantstamp (https://quantstamp.com). With clients like Binance, SuperRare, Compound, Visa, Ethereum 2.0, & more, Quantstamp's mission is to secure the decentralized internet, and has protected over $200B in digital asset risk from hackers. More than 500 startups, foundations, and enterprises work with Quantstamp to keep their innovative products safe. In this episode we chat about Richard's path into crypto, what it's like working with crypto-native projects vs. less crypto-native ones, what crypto looks like if it gets safer to engage with, the advice he wishes he could impart to his earlier self, & much more.Recorded Wednesday October 25, 2023.
On Today's episode I sit down with a former colleague of mine Heath Taylor where he uses his extensive background in information security and cybersecurity from his time in the US Navy and at Live Nation Ticketmaster. He stresses the need for organizations to adopt a proactive approach to identify and respond to potential threats. He also underscores the complexity of operations at large organizations and the significance of cybersecurity within an organization. Throughout the conversation, the significance of finding the right people for a company is highlighted, with a specific focus on clear communication and an analytical mindset in the field of cybersecurity. We also discuss our approach to effective leadership and career progression. Communication emerges as a central theme, with a particular focus on its importance in articulating cybersecurity issues and potential impacts on business operations. The discussion touches on the challenges associated with security posture and inventory management within organizations. We also delve into the complexities of building versus buying cybersecurity solutions, addressing issues such as fake accounts, account takeovers, compromised websites, shared passwords, and the need for improved security measures. Never being satisfied, we even touch on security awareness, secure applications, supply chain attacks, and the need for bug bounty programs as essential components of a robust cybersecurity strategy. Collaboration and partnerships among teams are emphasized as a means to prevent fraudulent activity. Heath Taylor: https://www.linkedin.com/in/heath-taylor-87519037/ "Heath Taylor is a cybersecurity leader with a wealth of experience in threat intelligence and a proven track record of managing all aspects of cybersecurity for large enterprises. Heath is a seasoned expert in the field and has built and led highly effective technical security teams, delivering industry-leading incident response, corporate security, governance, risk and compliance (GRC), and product security. Heath is a skilled leader in driving security initiatives and has a unique talent for developing innovative security solutions, standardizing security policies, and ensuring regulatory compliance. Additionally, he is known for his ability to create CSIRT/SOC/CTI functions. Heath has led programs that include engineering, strategic planning, risk management, process improvement, and regulatory compliance." ---------- I am so happy to have our great partner Spec back as the Q4 Sponsor! Their patented no-code orchestration platform has been a complete game changer for how we approach fraud and authentication. They give fraud fighters (and marketing and security teams!) full coverage and visibility into the entire customer journey with the ability to collect data, deploy in any tech stack and connect to any solution to answer their attacks such as calling 3rd party APIs, building logic and workflows, all with the ability to take action anywhere in the entire customer journey! With constant moving targets it's nice to have a product that moves it's aim with you! Please visit www.specprotected.com to learn more and schedule a demo today to see what you have been missing all along!
This episode features all things security with our guest, Laura Bell Main, CEO & Founder @ SafeStack. She shares valuable strategies for building your security team & tool stack. We cover why security is a human problem based on human motivations, prioritization conversations for assessing risks, considerations for early-stage security teams, how behavior change & decision making impact security, and considerations for companies in the “messy middle” phase. Laura also addresses communicating about security in terms of tech debt, recommendations for incorporating security monitoring tools, how to measure those tools' ROI, and more.ABOUT LAURA BELL MAINWith over twenty years of experience in software development and information security, Laura Bell Main (@lady_nerd) specialises in bringing security into organisations of every shape and size.She is the co-founder and CEO of SafeStack, an online education platform offering flexible, high-quality, and people-focused secure development training for fast-moving companies, with a focus on building security skills, practices, and culture across the entire engineering team.Laura is an experienced conference speaker, trainer, and regular panel member, and has spoken at a range of events such as BlackHat USA, Velocity, and OSCON on the subjects of privacy, covert communications, agile security, and security mindset.She is also the co-author of Agile Application Security and Security for Everyone."The most important thing that we forget to tell folks when they're starting out in security is most of our tooling is about being more effective and efficient. It's not about doing something you can't do yourself. Security isn't about a magic box. I wish it was, it would be a lot easier if we could just buy a magic box. Done! Off we go to the beach, but what we have is a really human problem.”- Laura Bell Main Join us at ELC Annual 2023!ELC Annual is our flagship conference for engineering leaders. You'll learn from experts in engineering and leadership, gain mentorship and support from like-minded professionals, expand your perspectives, build relationships across the tech industry, and leave with practical proven strategies.Join us this August 30-31 at the Fort Mason Center in San FranciscoFor tickets, head to https://sfelc.com/annual2023SHOW NOTES:What to do about security if you don't already have a security team (2:28)Security as a “human problem” in the scope of eng orgs (4:58)Why you need to understand human motivations (7:21)Prioritization frameworks & chaos engineering for assessing threats (9:14)Considerations for the early stages of forming a security org (11:47)Understanding security through a behavior change model (14:57)How to operationalize a security mindset within a software team (18:00)Examples of how decisions can flag security risks (20:50)Approaches for tracking & managing security as tech debt (23:20)Addressing security considerations as a “messy” middle-stage company (27:17)High friction aspects of security behavior change for eng orgs (30:51)Tips for knowing if you have the right security tool (34:41)How to evaluate the ROI of tools you're considering (38:06)Methods for incorporating security monitoring into your current tool stack (39:32)Rapid fire questions (42:45)LINKS AND RESOURCESThe Body Keeps The Score - The inspiring story of how a group of therapists and scientists— together with their courageous and memorable patients—has struggled to integrate recent advances in brain science, attachment research, and body awareness into treatments that can free trauma survivors from the tyranny of the past.Open source checklist for high-growth CTOsThis episode wouldn't have been possible without the help of our incredible production team:Patrick Gallagher - Producer & Co-HostJerry Li - Co-HostNoah Olberding - Associate Producer, Audio & Video Editor https://www.linkedin.com/in/noah-olberding/Dan Overheim - Audio Engineer, Dan's also an avid 3D printer - https://www.bnd3d.com/Ellie Coggins Angus - Copywriter, Check out her other work at https://elliecoggins.com/about/
Alana Forrest started her 29-year public service career in 1983 at the Palo Alto Police Department and rose through the ranks to Lieutenant. Forrest was promoted to the position of Captain by joining the Los Gatos/Monte Sereno Police Department in 2000 and retired in 2012. She has spent the last 11 years in corporate security and currently leads Global Safety and Security at Intuit. She is a proud co-founder of the California Women Leaders in Law Enforcement Symposium, which began as a local partnership in 2006 and is now endorsed by multiple law enforcement associations with a national following.Forrest joins host Dr. Marisa Randazzo to discuss:The impact of mentoring on her career and the motivation behind starting the Women Leaders in Law Enforcement Foundation.The role of storytelling and connecting on a personal level to demonstrate security's value to other areas of an organization.Advice for women/girls pursuing a career in protection.Key takeaways:[08:38] Marisa Randazzo: I just think it's so important — the value of mentorship. But it's often difficult to figure out how to get started, so the details that you're sharing here are very helpful. I want to ask a follow-up question about the California Women Leaders in Law Enforcement Symposium. Who is it open to? [09:14] Alana: It's open to anyone. It's not just women but anyone in active law enforcement and retirees can also attend. We're trying to just open up the floodgates and allow anybody who wants to come to join us in California every year. It's been one of the proudest accomplishments in my career — to establish this and have it still be so successful.[15:53] Marisa Randazzo: It sounds like what your foundation now your symposium did was give people up a place for that colleagueship, especially from those smaller departments when they didn't have it in-house necessarily but they could still access. That same level of connection and advice and commiseration just from outside their department but still within the industry. That's phenomenal.[16:16] Alana: Yeah, absolutely and even now unfortunately in the 2000s and here we are in 2023 — we still hear similar stories of challenges that we heard in the 1980s and 90s. So it really does provide an opportunity and a forum for people who are really struggling to get some much needed support. It's kind of sad that we are still having some of these conversations. But at least there's support there.[17:53] Alana: One of the things that I've really tried to do when I first enter any organization is build those relationships and find the right people to talk to — who's in charge of what but also who are the team players that have leadership qualities that you can tell are the people that get things done or has the leadership's ear. Seek out those people to get by your side and have lunch or coffee and have a discussion — what are your pain points with global safety and security or at the security team? [20:51] Alana: I've been in where data really drives the conversation and so I think any sort of data points or storytelling [help in displaying value]. Tell the stories to let people know exactly what's going On. As people started to come back to work I would take people through our Global Security Operations Center and let them see what we do because people really don't have ah an understanding of how much work we do to keep them safe behind the scenes. So when they walk into that room and they see all the monitors and they see all the people and all the activity and I explain what we're doing and how we keep them safe, that is a huge win. [33:36] Alana: You know one of the things I'll emphasize is again — finding those mentors and those champions and building relationships is so important. I didn't get to any promotion or any position in my private sector career without the benefit of a relationship or a connection that I cultivated. And also just being willing to be helpful to anyone who reaches out for questions.
The Morning Rush 7/7/23 Hour Two - Travis and Ross talk Britney Spears slapped by Spurs security team and get thrown into the PENALTY BOX
Tonight we are joined by Steve Moses of Palisade Training Group and we will be discussing their Church Security Team Instructor/Lead Development Course. After Action Project is brought to you by RangeBuddy.App. Don't miss any content – subscribe now: https://goo.gl/1AHRY5 Enter our show giveaways here: www.afteractionprojet.com/giveaway The After Action Project Podcast brings you into the … After Action Project 066 – Church Security Team Instructor Development with Steve Moses of Palisade Training Group Read More »
Sponsored By: Able Insurance www.ableinsurance.net Follow The Ball Hawk Show: Bleav Network, Apple Podcasts, Spotify, and other podcasts platforms Ahmad Hawkins Website: http://www.ahmadhawkins.com
Is your church safe? Do you have an active resposne team? Are they well trained in helping with situations? Does your church have access to training, and implementation of a church security team? Today's guest, Micah Bender founder of Heavenly Arm is with us to discuss how his program can help churches to prepare for any emergency. Medical emergencies, disruptive issues, and beyond. Heavenly Arm (Active Response Ministry) is designed to provide churches with the necessary tools to develop, train and implement Active Response teams in your local church. We discuss this in detail as we plow thorugh some of the issues facing churches today and how to handle them in a professional and Christian manner. If you want to find out more, reach out to Micah at heavenlyarm@gmail.com
North West met her step-mom, and Selena Gomez sure doesn't look single.