POPULARITY
In this episode, Mark Ledlow dives into a refreshing discussion with security experts Bruno Dias and Matt Talbot. The duo, both holding doctorates, shares their intense journey through academia, the challenges of maintaining certifications like the CTM, and the importance of physical security and workplace violence prevention. They highlight their new business venture and mentorship program aimed at elevating industry standards and helping others transition into the field of threat assessment. With anecdotes from their careers and practical advice, this episode offers a deep look into the dynamics of threat management and the value of fostering connections using unconventional methods like discussions about tattoos.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEducation and Experience: Both guests have extensive education and operational experience in their fieldsImportance of Connection: Using unique methods like discussing tattoos to connect with people in challenging environmentMentorship and Community Service: They emphasize the importance of mentoring and providing resources to help others enter and thrive in the threat assessment field.Comprehensive Services: Their business, CO, offers a wide range of services from physical security assessments to crisis response and workplace violence prevention.QUOTES"Flying is a high-risk situation... and you have to maintain certification by hours."Most people just want to feel connected to something and a part of something and have at least one other person that they can relate to."Graduating, getting that degree. That's the best part about it.""There are so many similarities in terms of just the pace at which we were able to get through our respective programs."The best thing about a PhD program is that every eight-hour work day now feels like somewhat of a vacation day"At the end of the day, most people just want to feel connected to something and a part of something"We understand the value of physical security assessments in violence prevention.""We won't offer anything that we haven't done directly, boots on the ground."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm-5a655044/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe importance of proactive surveillance and intelligence gathering in security.Lessons learned from historical security breaches and attack plots.The significance of cultural fit and adaptability in security teams.Challenges faced by security personnel in adjusting to different operational environments.The necessity to constantly update and share intelligence within the security community.The evolving methods of threat actors and their preparedness.Fred Burton's involvement in upcoming TV and film projects based on his books.QUOTES"The scope of detail that some of these threat actors are engaged with is just frightening.""Intelligence is powerful when done correctly.""You can't run a program without intelligence today.""If you've got a good security team, trained in observation skills, you should be able to spot threat actors ahead of time.""Getting people in and out without being hassled is the kind of value add that we routinely do in this business.""It's amazing what you can do if you just try to blend in and ask questions.""Some degree of protection at public venues is essential, especially for controversial issues.""Surveillance is critical before you get the bodies out there. Get that team out there moving around snooping."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSecurity Concerns on Open Borders: Despite the high number of migrants, there has not been a domestic act of terror directly linked to transnational terrorists from the southern border.Domestic vs. Geopolitical Threats: Domestic threats such as school shootings are more frequent and concerning compared to geopolitical and international threats.Historical Predictive Failures: The U.S. has historically struggled to predict major geopolitical events, regardless of advancements in intelligence.Adaptation and Responsiveness: The executive protection industry often operates reactively, highlighting the need for better proactive measures and adequate resourcing.Regional Differences in Security Perception: Security needs and perceptions differ greatly across the U.S., with coastal regions being more open to private security compared to more self-reliant attitudes in middle America.QUOTES"To the best of my knowledge, there never has been a domestic act of terror directly linked to a transnational terrorist coming from the southern border.""Trust me, you'll be the first one to know if I uncover something that you really need to be concerned about for you or your family.""Our nation seems to always be surprised... I want to believe that we're better today at anticipating surprise, but history has shown we're not.""Most CEOs today are almost more receptive to that kind of low-key protection."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
This show we have DB "Boon" Benton of Threat Management Solutions back on the show. Threat Management Solutions, Dave Benton, Ohio, Florida, Pennsylvania Boon is a survivor of the 2012 Benghazi Al Qaeda attacks where he was one of the CIA GRS contractors who helped defend and evacuate personnel. Boon, Tyrone "Rone" Woods, Kris "Tanto" Paronto, Jack Silva, Mark "Oz" Geist, John "Tig" Tiegen and Glenn "Bub" Doherty working for GRS saved countless lives in these attacks. Unfortunately, Rone and Bub were both killed during their heroic acts. We also lost Ambassador Christorpher Stevens, and Communications Specialist Sean Smith. Their story was memorialized in the book and movie 13 Hours in Benghazi. Boon is also co-author of the book, Benghazi Know thy Enemy with former CIA Targeting Officer Sarah Adams. DB is also a BJJ Black belt and an expert in the field of combatives. This show we talk details regarding some of the classes that he offers. A few discussed but not limited to, Low Signature Pistol, Close Range Engagement, and Concealed Defensive Carbine. A bonus discussion on Boon's preferred 556 and 300 BLK ammo was also very informative. One really concerning topic Boon brought up was the uncovered Al-Qaeda US and Europe attacks that the terrorist organization intends to commit in 2025. Books discussed: Benghazi: Know Thy Enemy: Adams, Sarah, Benton, Dave: 9798986822105: Amazon.com: Books Al-Qaeda 2.0: The Upcoming Attack on the United States and Europe Unveiled (Understanding Global Jihad): Archer, William: 9798338313640: Amazon.com: Books 13 Hours: The Inside Account of What Really Happened In Benghazi: Zuckoff, Mitchell, Annex Security Team: 9781455538447: Amazon.com: Books WE ARE PUMPED TO HAVE A NEW AFFILIATE LINK FOR ORIGIN AND JOCKO FUEL!!! Help support this show by purchasing any of your JiuJitsu gear, Jocko Supplements, books clothing and more... link below. Origin/Jocko Fuel – Bringing back American manufacturing, producing the best Jiu-Jitsu Gis on the market, Jeans, rash guards, and world class supplements to help you on the path. Use EvoSec10 at checkout for 10% off, this helps us greatly. EVOSEC Originusa.com AFFILIATE LINK Tenicor – www.tenicor.com they are educators, and innovators in the holster market. They are firearms instructors themselves, pressure testing their gear in multiple force on force events every year. We support those who do the work. Please visit our new sponsor Training Ground at https://thetrainingground.life Training Ground offers top notch trianing in Jiu Jitsu, Judo, Tang Soo Do and Firearms. An environment where learning is paramount for both students and instructors. Again, patronizing our sponsors helps us greatly.
How do public safety agencies mitigate threats against individuals, schools, workplaces, and public officials? Dr. Mario Scalora is a forensic psychologist, professor, and expert in threat management. In this episode, he sits down with Sheriff Wagner, Chief Deputy Houchin, and Captain Vik to discuss threat management - what it is, how it's done, and the stakeholders involved. He also discusses the UNL Public Policy Center and its contributions to public safety in Lancaster County and beyond. Episode Music Credits: Vittoro by Blue Dot Sessions (www.sessions.blue) Rodney Skopes by Blue Dot Sessions (www.sessions.blue)
Giles Inkson, Director of Services EMEA, NetSPIThe European Union's Digital Operational Resilience Act, which comes into force in January 2025, addresses a key issue in EU financial regulation. DORA means financial institutions must follow rules for protection, detection, containment, recovery and repair capabilities against ICT-related incidents. Previously most institutions managed the main categories of operational risk with the allocation of capital, but did not manage all components of operational resilience. Robin Amlôt of IBS Intelligence speaks to Giles Inkson, Director of Services EMEA for NetSPI.
As the busy season kicks off, the team pauses to reflect on two significant industry events they recently attended. They dive into their experiences at the annual Threat Management Conference (TMC) hosted by the Association of Threat Assessment Professionals (ATAP) and CTG's 8th Annual Physical Cyber Convergence Forum in Phoenix. Both gatherings offered invaluable networking opportunities, thought-provoking discussions, and insightful conversations, proving worth the investment. Also discussed is Presage Global's recent LinkedIn EP Industry Training Survey. Join the discussion and let us know if you attended - protectiontalk@outlook.com
Guests: Tyler Wall, CEO, Cyber NOW EducationOn LinkedIn | https://www.linkedin.com/in/tylerewallOn YouTube | https://www.youtube.com/@cybernoweducationJarrett Rodrick, Sr. Manager, Threat Management at Omnissa [@WeAreOmnissa]On LinkedIn | https://www.linkedin.com/in/jarrett-rodrick/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn the latest episode of Redefining CyberSecurity, host Sean Martin converses with Tyler Wall and Jarrett Rodrick, co-authors of "Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success." The discussion dives into the essential aspects of starting and advancing a career as a Security Operations Center (SOC) analyst, shedding light on the realities and opportunities within the cybersecurity landscape.Tyler Wall, a full-time cybersecurity professional and founder of CyberNow Education, highlights that entering the SOC analyst role doesn't necessarily require a college degree. Wall emphasizes the importance of certifications like Security+ and Network+, combined with real-world IT experience. The discussion points out that many successful SOC analysts have transitioned from desktop support roles or other IT positions, using these pathways to gain relevant experience and knowledge.Jarrett Rodrick, formerly a SOC lead at VMware and now overseeing multiple security teams at Omnissa, underscores that this field values practical skills and continuous learning. Rodrick's own journey from combat soldier to SOC manager exemplifies the diverse backgrounds from which professionals can emerge. He points out that, during the COVID-19 pandemic, the cybersecurity job market was robust, but now there is fiercer competition with many qualified candidates vying for roles.Wall and Rodrick discuss the structure of their book, which includes five real-world stories from various SOC analysts. These stories serve to inspire and provide practical insights into the everyday challenges and rewards of the role. The book also covers the technical and non-technical skills necessary for SOC analysts, such as curiosity, the ability to delve into rabbit holes of information, and a thorough understanding of cloud security.Networking and community involvement are vital for career growth, as highlighted by Wall. He advises aspiring SOC analysts to join groups like DEF CON, 2600, and online communities such as Black Hills Information Security to build connections and gain industry insights. Blogging about one's learning journey and challenges can also attract attention and establish a professional network.The conversation also touches upon the future of the SOC analyst role, particularly in light of advancements in automation. Rodrick notes that while automation will handle some of the more mundane tasks, it will never completely replace human analysts. These tools are designed to enhance efficiency and allow analysts to focus on more complex and strategic issues. Wall adds that having a background or education in cloud security is increasingly important as more companies migrate to cloud environments.In summary, the episode provides a comprehensive overview of the SOC analyst career path, highlighting the need for practical skills, continuous learning, and community engagement. Wall and Rodrick's insights and recommendations serve as a valuable guide for anyone looking to enter or advance in this critical cybersecurity role. Their book, "Jump-start Your SOC Analyst Career," is a testament to their commitment to supporting the next generation of SOC analysts and promoting a secure digital world.Key Questions AddressedHow can one get started as a SOC analyst?What skills are necessary for a SOC analyst?How is automation impacting the SOC analyst role?About the BookThe frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work.The recent surplus in demand for SOC analysts makes Jump-start Your SOC Analyst Career a must-have for aspiring tech professionals and long-time veterans alike. Recent industry developments such as using the cloud and security automation are broken down in concise,understandable ways, to name a few. The rapidly changing world of cybersecurity requires innovation and fresh eyes, and this book is your roadmap to success.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode of the Detection at Scale podcast, Jack speaks to Daniel Wiley, Head of Threat Management and Chief Security Advisor at Check Point Software, to discuss the intricacies of balancing technology and human analytics in cybersecurity. Daniel shares his experiences in building three successful internal startups at Check Point and emphasizes the importance of continuous learning throughout one's career. He also touches on effective incident response strategies for small- to medium-sized businesses, and the vital role of adaptable data schemas in managing large-scale security operations. Topics discussed: The highs and lows experienced in the cybersecurity startup journey, including the importance of quick decision-making and team-building. Strategies for developing effective IR playbooks tailored for small- to medium-sized businesses to handle security threats efficiently. The integration of machine analytics and human expertise to manage and interpret large volumes of cybersecurity data. Managing 24/7 global SOCs, including the challenges of shift rotations and ensuring analysts are not overloaded. Techniques for determining which data is crucial for cybersecurity efforts and how to handle terabytes of data per second. The necessity of ongoing education and staying updated with the latest in cybersecurity to maintain effectiveness in the field. The significance of hiring the right team from the start and making swift, decisive personnel changes when necessary. Check Point's focus on maintaining high operational margins and its impact on the business's success and sustainability. Resources Mentioned: Daniel Wiley on LinkedIn Check Point Software website The Hard Thing About Hard Things by Ben Horowitz Cyber for Builders by Ross Haleliuk
In this episode of School Safety Today by Raptor Technologies, Michelle Dawn Mooney sat down with Dr. Marisa Randazzo to discuss the importance of continuous improvement in threat assessment practices. Dr. Randazzo shares her extensive experience in threat assessment, emphasizing the importance of quality training and to regularly evaluate and enhance their threat assessment processes to prevent violence and address potential threats effectively. Key Takeaways: Behavioral threat assessment is a critical, evidence-based process used by schools to evaluate and mitigate potential threats Quality training by experienced professionals is critical for effective behavior threat assessment and management The need for continuous improvement in threat assessment practices due to frequent turnover in school personnel and the evolving nature of threats Dr. Marisa Randazzo is the Executive Director for Threat Assessment at Raptor Technologies. She brings extensive expertise and experience in threat assessment, threat management, school shootings, and other types of targeted violence and protective intelligence investigations. Previously, she co-founded and led SIGMA Threat Management Associates LLC and served as Executive Director of Threat Management at Ontic. Dr. Randazzo also served for ten years with the U.S. Secret Service, eventually as the agency's Chief Research Psychologist where she co-directed the Safe School Initiative and co-developed the NTAC model, also known as the “federal model” for school threat assessment. Dr. Randazzo is a recognized author of four influential books on threat assessment in educational settings, widely referenced in federal guides and national standards. She holds a Ph.D. and Master's degree from Princeton University and a B.A. from Williams College in Psychology and Religion. Currently, she also serves as Director of Threat Assessment for Georgetown University.
From the fizz of soda pop to the buzz of cybersecurity – witness Joe's extraordinary journey through the tech landscape. Our latest podcast episode takes you through a narrative of unexpected career leaps and the critical role of intelligence in the digital age. Joe, a former soft drink enthusiast turned cybersecurity guru, shares tales from his early tech escapades to his pivotal role at iDefense, where his collaboration with government agencies like the NSA, painted a picture of a complex and ever-evolving cyber battleground.Unravel the twisted tale of Anthony Lewandowski's controversial departure from Google, highlighting the precarious nature of intellectual property and insider threats. This episode peels back the layers of corporate espionage, discussing how companies like Code 42 are at the vanguard of detecting unsanctioned data movement. We tackle the ethical quandaries posed by the race for innovation, where the lines between ownership and fair competition often blur. The discussion showcases the intricate work of safeguarding expansive AI datasets and the careful balance of advancing technology while maintaining integrity.Navigating the murky waters of data security, we dissect the nuanced approach required for managing insider threats. Balancing an investigative eye with the necessity for swift action, our conversation sheds light on how companies toe the line between education and enforcement. As we discuss the limitations of traditional DLP systems and the emerging prominence of cloud monitoring, you'll gain insight into how organizations are adapting to the challenges of ensuring data remains in the right hands – all while contending with the unforeseen risks AI platforms like ChatGPT might present to data security. Join us for an exploration into the strategies that fortify companies against the tides of insider threats.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
An incredible discussion with the internet viral phenom Commander Dale Brown, founder of Threat Management and Detroit Dust as well as the author of Detroit Urban Survival. Well known for his YouTube videos demonstrating how to successful disarm and/or escape a dangerous assailant, this discussion dives well beyond the informative and humorous short videos. We delve into Dale's background, family legacy, his personal ambition and the real-life testimonials that continue to fuel his drive to protect the lives of others.A pretty lengthy episode that is well worth the listen! Don't forget to sign up for Survival Training sessions with Commander Brown at PillarandPride.com
Paris-based cybersecurity startup Filigran is capitalizing on the success of OpenCTI to build a suite of open-source threat management products. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this first podcast episode, Alex Beeson and Jon Hope, dive into the dynamic world of cybersecurity at Sophos. They discuss the company's proactive measures in countering emerging threats with Intercept X, shedding light on the critical attack warning feature designed to pinpoint high-priority alerts. The conversation explores the integration of Sophos' new APIs within Sophos XDR, highlighting the benefits of consolidation in threat detection and response. Excitingly, the hosts reveal new collaborations, such as the partnership with Veeam, and share insights into the early access program for Sophos' cutting-edge DNS protection. Tune in for an insider's perspective on the latest developments and strategies employed by Sophos to stay ahead in the ever-evolving landscape of cybersecurity.
This episode we have the Jerry Wetzel on the show. This is long overdue! Eric has been interfacing with Jerry for close to 20 years via online forums like Total Protection Interactive and social media. He is a wealth of knowledge in weapons integration into the combat sports model yet completely from the context in the street environment. Jerry is a preeminent expert in reductionist solutions for dealing with a knife in the real world. Some of our most important mentors credit him with building a lot of what they do, Paul Sharp, Cliff Byerly and many more, yet Jerry humbly states that the exchange was mutual. Just recently Eric finally was able to meet and train under Jerry at the Combatives Summit in Florida. The material was outstanding, life saving information that is changing Eric's approach to knife defense. For more info on Jerry: Knife and Self Defense Training - Red Zone Threat Management (rzthreatmanagement.com) centerlinegym.com Intro and Outro Music by: The Tactical Twins, Jason Bieler and The Baron Von Bielski Orchestra and Tim Alexander/Fata Morgana Please subscribe and share our podcast with friends and family. Visit our website for bios, future events and info at www.evosec.org Like, follow and share us on Facebook and Instagram @evosecusa WE ARE PUMPED TO HAVE A NEW AFFILIATE LINK FOR ORIGIN AND JOCKO FUEL!!! Help support this show by purchasing any of your JiuJitsu gear, Jocko Supplements, books clothing and more... link below. Origin/Jocko Fuel – Bringing back American manufacturing, producing the best Jiu-Jitsu Gis on the market, Jeans, rash guards, and world class supplements to help you on the path. Use EvoSec10 at checkout for 10% off, this helps us greatly. EVOSEC Originusa.com AFFILIATE LINK Tenicor – www.tenicor.com they are educators, and innovators in the holster market. They are firearms instructors themselves, pressure testing their gear in multiple force on force events every year. We support those who do the work. Again, patronizing our sponsors helps us greatly. Evolution Security is Eric Davis and Aaron Davis specializing in self-protection education, defensive pistol and carbine, consulting, and weapons based grappling. Their mission is to help those serious about protecting themselves and their loved ones become more capable though filtered information, recommended study, and highlighting their mentors who are the best in the field. In addition, Eric and Aaron (twins) are musicians keeping with Musashi's adage that martial artist should focus on art outside of the martial.
On this episode, Karen speaks with Dr. Marisa Randazzo, the Executive Director of Threat Management at Ontic, where she leads strategic consulting and services to support the development of threat assessment protocols; she also serves as the Director of Threat Assessment for Georgetown University. Previously, Dr. Randazzo led SIGMA Threat Management Associates LLC as the Chief Executive Officer and Founder. Dr. Randazzo is recognized internationally as an expert on threat assessment & threat management, school shootings and other types of targeted violence, and protective intelligence investigations. Dr. Randazzo served for ten years with the U.S. Secret Service, most recently as the agency's Chief Research Psychologist. She is the co-author of two leading books on threat assessments, both of which are referenced as best-practice resources, and has testified before congress regarding her areas of expertise.
It's time for shoptalk, and the August edition comes in just under the wire. As always, there is a lot to discuss, and the team discusses current events affecting the security industry. Listen as we unpack the unique risk issues surrounding social media and online gaming influencers, information security around mobile apps, threats aimed at politicians, and Drew Barrymore's stalker. Team CiCP also talks about the weaponization of LinkedIn, and the assassination of The Wagner Group's leader Yevgeny Prigozhin. All this and more on this month's installment of CiCP's Shoptalk. Give us your feedback at protectiontalk@outlook.com
Heather talks to us about threat management, application security, and Optiv. She talks to us about what worries and drives her to do what she does. She also talks about what we can do to drive the field forward. Positive collaboration can help us all to protect and keep the lights on. She talks about the executive order that affects us all in the industry. Connect with Heather: https://www.linkedin.com/in/heathercasehall/ Visit Optiv: https://www.optiv.com/ Visit Pacific Hackers: https://www.phack.org/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter: https://twitter.com/ShortArmSAS
Heather talks to us about threat management, application security, and Optiv. She talks to us about what worries and drives her to do what she does. She also talks about what we can do to drive the field forward. Positive collaboration can help us all to protect and keep the lights on. She talks about the executive order that affects us all in the industry. Connect with Heather: https://www.linkedin.com/in/heathercasehall/ Visit Optiv: https://www.optiv.com/ Visit Pacific Hackers: https://www.phack.org/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter: https://twitter.com/ShortArmSAS
In this episode we talk with Analyst Supervisor Jacqueline Danzig, whose team works hand in hand with deputies and detectives to get them the information they need to solve – and even prevent – crimes. When she started her career they were still tracking burglaries by putting pins in maps, but now she and other analysts are much more high tech as they gather facts, uncover details, and spot the trends that can predict the next crime wave. As Danzig says, there are no crystal balls, just data. They're scientists who make their best predictions, and those percentages she analyzes give law enforcement an advantage. We talk about her work with Threat Management, which strives to get people off the pathway to violence to prevent future crimes. She also talks about the Habitual Offender Monitoring and Enforcement Task Force, which has made a huge difference in preventing the worst teen offenders from committing auto burglaries and thefts. You'll find out about the future of analysts, and learn why it is almost impossible to get away with any crime these days.Email us your questions and suggestions at lets56@pcsonet.comFollow us: Facebook | Instagram | Twitter | YouTubePCSO Website
Dr. Tau Braun makes his return to the Liberty Monks, unveiling compelling evidence that challenges the prevailing narrative of Covid-19. According to his findings, it appears that the pandemic may have been a strategically orchestrated false flag, designed to divert attention from the true depopulation weapon: the vaccine itself. Tau Braun Ed.D, MS. EMT U.S. National Counterterrorism & EMS Advisor and Trainer Chief Scientist, CounterBioterrorism (CBT) Division, BioChem Engineering Executive Director, Violence Prevention Agency (VPA) As a Clinical Psychologist, Dr. Tau Braun focused on integrative psychology and wellness. Post 9/11, Dr. Braun began to narrow his research and practice to understanding the causes of violence, the prevention and response to violence, and crisis psychology. As a U.S. National Counterterrorism and Emergency Management SME, Dr. Braun advises and trains educational institutions, healthcare facilities, corporations (including Fortune 100 and 500 companies), and both state and federal government organizations in Violence Prevention Strategies and Crisis Response, such as Threat Management; Active Attacker Prevention and Response, Counterterrorism, and Crisis Leadership. In 2019, Dr. Braun provided testimony on Mass Violence to the Texas Senate. Discover more about Dr. Braun's supplements at https://www.biochemstore.com/ Please subscribe at www.libertymonks.com to get up to date info on all of our latest episodes! Follow us on our Facebook page Follow us on: Twitter and Gettr See Select Videos on: YouTube Rumble Brighteon Listen on iTunes, Spotify and Anchor Show Notes: [00:02:26] Medical patient advocacy. [00:03:51] Crisis stages and neighbor turning. [00:09:03] Bio warfare and its origins. [00:11:28] Blood coagulation and Spanish flu. [00:15:10] Fifth generation warfare. [00:18:11] Cell Penetrating Peptides. [00:23:29] The dark side of AI. [00:25:09] Law enforcement and military advantage. [00:28:12] Transhumanism and Technology. [00:31:37] Antihistamines and Fear. [00:35:12] Importance of antioxidants. [00:38:24] Lectins and Pectin. [00:42:53] Jab shedding in unvaccinated. [00:43:20] Importance of copper and zinc. [00:45:00] Food supplements and prepping. [00:50:21] Hardening of Arteries in Youth. [00:52:19] Vaccine-induced immune deficiency. [00:55:19] Credentials and character.
In this episode of the Managing Uncertainty podcast, Bryghtpath Principal & Chief Executive Bryan Strawser discusses the recent workplace shooting in Louisville, Kentucky, and the questions that have arisen around workplace violence prevention and threat management. Bryan shares a few key components that mature organizations should implement, including a strong workplace violence prevention program with …
In today's episode of Category Visionaries, we speak with Peter Prizio Jr, CEO of SnapAttack, a threat management platform that's raised $8 Million in funding. SnapAttack is the Enterprise-Grade & MSSP Platform that helps security leaders answer their most pressing question: “Are we protected?” By rolling intel, adversary emulation, detection engineering, threat hunting, and purple teaming into a single, easy-to-use product with a no-code interface, SnapAttack unlocks the potential of your security operations. Prior to SnapAttack, Peter developed complex defense weapons systems and citizen services for Government clients, ultimately finding a home in cybersecurity startups spanning from Third Party Risk and Cyber Threat Intelligence. He is passionate about collaboration and information sharing across organizations, industries, and public sectors as a backbone for proactive security. We speak about why the scale and sophistication of cybersecurity threats means that constant innovation is an industry essential. By capturing detailed information about cyberattacks and handing it over to the defender, their mission is to help clients hunt for hackers and respond more effectively. We also speak about Peter's background as an Electrical Engineer and his fascination with finding out how things work, how SnapAttack spun out from RnD at Booz Allen Hamilton, the challenge of finding the hacker hunters to deal with contemporary security concerns, and why government clients might be hard to crack at first, but the networking rewards make them worth it in the end. Topics Discussed: Peter's background as an electrical engineer, and his fascination with how things function that eventually led him to the cybersecurity space How SnapAttack spun out of the ‘Dark Labs' RnD at Booz Allen Hamilton, and how they found themselves as an independent entity The current state of threat detection and why most companies relying on traditional manual hunting can find themselves stretched to capacity Why constant evolution in the scale and sophistication of cyber threats means defenders need to stay at the cutting edge of innovation How SnapAttack's ‘snapshot' strategy puts critical tools in the hands of defenders to detect and deal with real-world threats Why doing business with government agencies can be a real slog to start with, but why the long-term benefits make the effort worth it in the end Favorite book: The Little Red Book of Wisdom
In this episode, Matthew Dumpert of Kroll's Security Risk Management (SRM) team, and Artem Sherman, Product Manager at Resolver, discuss the increasing need for a cohesive and comprehensive risk assessment solution at a time when organizations face a variety of virtual and physical security risks. Join them as they review how Resolver, a cloud-based software and recent addition to Kroll's offerings, can provide the tools needed to build an all-encompassing threat management program.
Bringing over 25 years of experience in security consulting, executive security, investigations, and training, Chuck Tobin, Chairman and President of AT-RISK International, Inc., shares his knowledge on how the threat management space has evolved and how to keep up. As the Director of Security/Senior Consultant to three Prime Ministers/Presidential Candidates, Chuck has developed a global political campaign security expertise. This combined with his knowledge and practice in violence threat assessment, investigations, executive security, and training has led him to many leadership positions in the industry.Chuck Tobin joins host Chuck Randolph to discuss:How social media has changed threat intelligence investigationsWhy it's equally important to learn about a potential threat on a human level, as well as analytical (check out an ATAP training he recommends.)How to speak in a language that decision-makers understand to communicate security concerns
GUEST OVERVIEW: Kent Moyer is CEO of World Protection Group. A dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
In Episode 86 of TheCyber5, we are joined by Senior Manager of Threat Management for Nvidia Chris Cottrell. Here are six topics we discuss in this episode: What is a threat management department within enterprise security? Threat management departments are usually formed when security teams become mature and have table stakes functions within threat intelligence, red team, penetration testing, and threat hunting. These functions are usually formed after compliance, risk, governance, vulnerability management, and security operations center (SOC) are operational. Unfortunately, threat management is not a well defined lexicon in enterprise. For example, “threat hunting” in one organization could mean a SOC escalating alerts in another company. Incident Response's Role in Threat Management Incident response is usually a separate capability from threat management (red team, threat hunting, threat intelligence) and the governance, risk, and compliance (GRC) roles. Incident response is a reactive capability and has the ability to find an actor inside the environment, whereas SOC is the first reactive capability to stop the attacker at the perimeter. Threat management is still considered a proactive capability to keep attackers out at the perimeter. Defining the Roles within Threat Management Threat Hunt: Expert level investigators that know how to review network telemetry with a variety of tools and alerts and find an anomaly to investigate if an adversary is inside the environment. They usually take their clues from incident response, red team, or threat intelligence. Threat Intelligence: Expert level analysts and engineers reviewing the types of threats that could attack an organization and develop alerts and playbooks for threat hunters. They also have many other roles depending on the business. Red Team: Penetration testers that emulate or simulate adversaries within the environment to determine what alerts should be created and prioritized. Threat Intelligence Must Start with Business Requirements Threat intelligence is meaningless and not contextualized until analysts understand how the business makes money and the corresponding risks that could disrupt the business. Building a threat intelligence program from scratch can take up to a year, and the first six months will be building relationships with the business before any feeds can start to be incorporated. Stories are the Best Metrics for Threat Intelligence Programs Mean time to respond and mean time to alert are table stakes metrics for SOC, but are out of the control of the threat management team (red team, threat intel, etc). However, the better metrics for threat intelligence teams are success stories when information was actioned by a business unit and risk was averted. Reactive Capabilities When An Incident Occurs The threat management department becomes critical during a security incident. Red teamers have the mindset to look for a mistake in a vulnerability or network defense. Threat hunters have mindsets to look for mistakes in adversaries. The same mindsets are critical to investigating security events and incidents with the incident response team. Threat intelligence can conduct external threat hunting outside the firewalls when an incident occurs.
DJ Goldsworthy, Vice President of Security Operations and Threat Management at Aflac, joins the podcast for episode number 1. Brian and John dig into DJ's background in cybersecurity research and development, and his current role at Aflac where he oversees 8 teams. He's a leader, but he's really hands-on, keeping his technical edge. How do you make sure the right areas of a team this expansive get the right support? The right funding? They soon dig into the current threat-scape and trends in cybersecurity, particularly in terms of the increase in commoditized threats. These are no longer poorly written emails with a couple of links, but cybercrime as a service.Cybercriminals are also selling access to xIoT devices, which includes IoT, OT, and Network devices, after having gained persistence in a network. Let's get into Things on the IoT Security Podcast!Follow DJ on LinkedIn at https://www.linkedin.com/in/djgoldsworthyFollow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/. Let's get into Things on the IoT Security Podcast!Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontosAnd you can follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
In this episode, Matthew Dumpert and Chris Palmadesso of Kroll's Security Risk Management practice and Timothy Gallagher of Kroll's Cyber Risk practice are joined by Robert DiGenova, Deputy Chief of Police at the Stevens Institute of Technology, to discuss the importance of understanding and responding to threats on the campus and in the university environment, as well as understanding the data behind these threats.
On today's show we discuss the truth behind Pelosi security. GUEST OVERVIEW: Kent Moyer is CEO of World Protection Group, a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: Kent Moyer is a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST HOST: Owen Stevens On today's show World Protection Group CEO Kent Moyer discusses the £1-Mil-a-year security bill for target Salman Rushdie. GUEST OVERVIEW: Kent Moyer is a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: Kent Moyer is a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST HOST: Owen Stevens On today's show we debate should Donald Trump terminate the Secret Service and use private Executive Protection? Why didn't the secret service stop the Mar-A-Lago raid? GUEST OVERVIEW: Kent Moyer is CEO of the World Protection Group, a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: Kent Moyer is a dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: A dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: Kent Moyer is CEO of the World Protection Group, dedicated experts in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
GUEST OVERVIEW: A dedicated expert in the field of Executive Protection, Protective Intelligence, & Threat Management. With offices in Shanghai, Mexico City, and headquarters in Beverly Hills, WPG is a full-service, international firm specializing in Executive Protection and Drone Security Operations. Its luxury arm, 001, provides a customized, comprehensive security program for billionaires.
Traits of the Active shooter 18-22 years old #ActiveShooter #MassShootings #HighlandPark #Shooter Traits of the Active shooter 18-22 years old #ActiveShooter #MassShootings #HighlandPark #ShooterMass shootings have increased significantly in the United States, according to the most recent data available from the FBI. Statistics show that from 2000 to 2007, mass shooting incidents averaged 6.4 incidents annually, while from 2008 to 2013, they increased to 16.4. As a result of this increase, several studies have looked at the individual motivations and psychological “micro-foundations” that drive targeted violence–everything from video games to religious beliefs–in an effort to help law enforcement officials understand mass shooting, hate crimes, terrorism, and violence not only in the United States but also abroad. A 2015 study published in Behavioral Sciences and the Law, “The Concept of Identification in Threat Assessment,” examines the relationship between psychological “identification”–or the process by which an unstable person subsumes his or her own identity and models themselves after a violent aggressor–and acts of targeted violence. The researchers are based at the University of California-San Diego and the State University of New York Upstate Medical University as well as the San Diego Psychoanalytic Center, the firm Operational Consulting International and the Institute of Psychology and Threat Management in Germany. The authors drew on information from reviews and indirect assessment of evidence of criminal cases, as well as consultation with psychiatrists, psychologists and judicial officials who had direct access to primary investigative evidence on the cases. They also examined four detailed case studies on perpetrators of targeted violence: Antares Wong, Seung-Hui Cho, Joseph Paul Franklin and Anders Breivik. In analyzing the psychology of the four “active shooters,” the study authors drew on the work of psychiatrists Sigmund and Anna Freud and Erik Erikson on psychosocial development. The study's findings include: The four perpetrators committed different acts of targeted violence, at different points in time, killing and injuring innocent people in the United States and abroad. Despite their differences, they all evidenced common expressions of “identification.” “In the context of threat assessment, identity becomes embedded in aggressive identifications, if not extremely violent images of the self in action, most often apparent in the fantasies of the young adult as a perpetrator of homicide against another.” Identification is characterized by one or more of five characteristics: pseudo-commando, warrior mentality, close association with weapons or other law-enforcement/military paraphernalia, identification with other attackers/assassins, and becoming an agent to advance a particular cause or belief system. Authors identified eight warning behaviors, including: Pathway warning behavior: research, planning, preparation, or implementation of an attack Fixation warning behavior: an increasingly pathological preoccupation with a person or a cause Identification warning behavior: a psychological desire to be a “pseudo-commando,” have a “warrior mentality,” closely associate with weapons or other military or law enforcement paraphernalia Novel aggression warning behavior: an act of violence that appears unrelated to any targeted violence pathway behavior which is committed for the first time Energy burst warning behavior: an increase in the frequency or variety of any noted activities related to the target Leakage warning behavior: the communication to a third party of intent to do harm to a target through an attack Last resort warning behavior: evidence of a violent “action/time imperative” Directly communicated threat warning behavior: the communication of a direct threat to the target or to law enforcement before at attack.
According to Dr. Tau Braun, Covid is indeed a man-made biological weapon. In a statement made in his June 21, 2021 letter to the FBI, Dr. Braun states, "The Spike Protein has numerous "fingerprints" pointing to a manufactured biological weapon, it can be aerosolized and can easily be deployed as a chemical weapon with devastating short term and long term impacts." Dr. Braun goes on to say, "There are very few professionals in the world who work in Threat Assessment and Threat Management who have an adequate skill set to understand and unpack the complexity of this worldwide biological attack." Dr. Tau Braun happens to be one of those skilled professionals. As a U.S. National Counterterrorism and Emergency Management SME, Dr. Braun advises and trains educational institutions, healthcare facilities, corporations (including Fortune 100 and 500 companies), and both state and federal government organizations in Violence Prevention Strategies and Crisis Response, such as Threat Management; Active Attacker Prevention and Response, Counterterrorism, and Crisis Leadership. In 2019, Dr. Braun provided testimony on Mass Violence to the Texas Senate, and is regularly a speaker at global conferences. During the COVID crisis, Dr. Braun found himself in the epicenter, New York City, and shifted his focus towards mitigation and prevention strategies against the virus, a non-human mass casualty attacker, causing immense amounts of human suffering. Dr. Braun is currently investigating the bio-synthetic aspects of SARS-CoV2, the possibility that it is a military-grade biological weapon, and mapping its pathophysiology. Find out more about Dr. Braun's work at https://www.drtaubraun.com/ Read Dr. Braun's letter to the FBI Please subscribe at www.libertymonks.com to get up to date info on all of our latest episodes! Follow us on our Facebook page Follow us on: Twitter and Gettr See Select Videos on: YouTube Rumble Brighteon Listen on iTunes, Spotify and Anchor
Dr. Marisa Randazzo, Executive Director of Threat Management at Ontic, discusses the Uvalde, Texas school shooting and tactics for preventing future tragedies. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Your company can have round-the-clock cyber protection and monitoring, and it doesn't have to break the bank. Discover the cutting-edge SOC as a Service solution from global provider SubRosa. Go to https://subrosacyber.com/soc-as-a-service (https://subrosacyber.com/soc-as-a-service) for more information.
Paul Lozada has been a police officer in one form or another since 1979. He has been training other people in martial arts since even before that. Paul has extensive experience in developing Departmental objectives, policies and programs in regard to Threat Management, Intelligence-Led Policing, Gang Investigations, and much more. His credentials are extensive and his experience has led to opportunities as a consultant in Hollywood which he talks about in this episode. He is a father, a Chaplin, and author of his new book Officer 1Eight7.Follow Paul:Instagram: @officer1eight7 Book: https://www.officer1eight7.com/The Be Effective Podcast with Adam Haidary, the CEO & founder of PolicePosts and Effective Fitness Training. Discussing everything from law enforcement, training, current critical incidents, and wherever the conversation goes.Instagram: @beeffectivepodcast@effective.fitnesstraining@policepostsWebsite:www.effective.fitnessEmail List:https://www.effective.fitness/policeposts-email-listSponsors:Effective Fitness Training Program: (Effective Fitness)Effective Fitness Training {14 Day Free Trial} + CombativesUse code: “podcast” for 10% off for life
The incredibly articulate https://my.captivate.fm/Anne%20Leslie,%20Senior%20Management%20Consultant,%20IBM%20Security (Anne Leslie, Threat Management Consultant, IBM Security), shares some powerful messages and recommendations on threat management. One such message is to nurture a Whole-of-Enterprise approach where "leaders believe that the people who work for them are not just as important as the systems and the data, they're more important." Anne also emphasizes the importance of "looking within and knowing what it is that we have, why people might want that, and how they might go about getting it." Time Stamps 00:42 -- So, let's begin by talking about the major information security threats out there and you being in Europe, we'd love to get that perspective. 05:49 -- Anything that you see out there by way of best practices, in terms of staying on top of the latest attack vectors and methods. 10:43 -- I'd love to hear your perspective on a human-centered cyber defense strategy. 19:20 -- I read in the media reports that organizations are often slow, and for lack of a better word, negligent in promptly and effectively responding to cyber intelligence. This is definitely a weakness that no organization can afford. What are your thoughts? 29:38 -- I'd love to get your thoughts on joint ownership and accountability, or shared ownership and accountability? 38:44 -- Any final thoughts? Memorable Anne Leslie Quotes 06:29 "So one of the things that I notice in our industry, across businesses, is that we have a tendency to look outwards before we look inwards. And in practical terms, what that means is, we're not very clear collectively about what it is in our organizations and our businesses that adversaries might want." 06:29 "Let's start with looking within and knowing what it is that we have, why people might want that, and how they might go about getting it. If we already have answers to those questions, we're on a good footing." 13:34 "I believe that people come to work every day with an often unarticulated aspiration to be useful. And it just seems to me that we're totally missing out on capitalizing on people's best intentions and their creativity and their motivation - when we label them weak when we label them as a vulnerability against which we need to defend." 13:34 "People want to contribute, people want to be helpful, they want to be united in something that's a little bit bigger than themselves. And security practitioners, in particular, maybe not all of them, but the majority that I've interacted with, are driven by a desire to protect, they're driven by a cause. To them, security is more than a job, it's a cause they want to defend." 18:09 "It's not just about buying more technology, It's about doing more with what we have, where we are. And making the most of the capability that we can get from our people is a key factor in that." 23:41 "I loved what you just said about the impact of security being positively correlated with the health of the culture in the organization. Yes, a million times, yes! Because when you have a healthy organization - which is built up consistently, with consistent behaviors, consistent attitudes, consistent interventions on the part of leadership - what it instills, in people at every level of the organization, is a sense of accountability, a sense of responsibility, a sense of pride. And most importantly, it instills a desire to protect, because people have an emotional connection to their organization and an emotional connection to the leadership, even if they've never spoken to them." ---------------------------------------------- Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/...
Brought to you by The Ontic Center for Protective IntelligenceProduced by AJ McKeonMusic by Brian Bristow and performed by Smokin' NovasContact us at podcast@ontic.co or visit ontic.co/center for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Compromized Desktop Applications By Web Technologies https://isc.sans.edu/forums/diary/Compromized+Desktop+Applications+by+Web+Technologies/26384/ Cracking Maldoc VBA Project Passwords https://isc.sans.edu/forums/diary/Cracking+Maldoc+VBA+Project+Passwords/26390/ Cisco Patching Treck IP Stack Vulnerabilities https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC Ubiquity Devices Breack Due to Malformed Feed https://community.ui.com/questions/Threat-Management-rules-silently-disabled-for-users-as-of-July-17-2020/35221bd2-843d-41a3-a957-33f57d9a8468
Commander Dale Brown joined me to discuss his private security firm, Threat Management Center. They aren't private police because he doesn't think people want to be policed by them. He noticed that police do not protect, they only enforce law, so he created this firm to educate people on the law, teach them urban survival tactics and, above all, protect people from predation and protect life. Threat Management serves approximately 5,000 families in Detroit. He adopted an anti-kill philosophy, and has found that a byproduct of it is also prosperity. When there is less death and prosecution, there is more prosperity in that society! Crime has drastically reduced in the areas of Detroit that they serve. https://www.threatmanagementcenter.com/
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.