Logo

    113: Adam

    en-usMarch 22, 2022
    What challenges did Adam face when applying for jobs?
    How did Adam's past affect his job prospects?
    What support did the assistant principal provide to Adam?
    Why is addressing bullying in schools important?
    How can one turn their life around after mistakes?

    Podcast Summary

    • The Importance of Acknowledging Past Mistakes when Job HuntingReflection on past actions and taking accountability can positively influence future opportunities, even when a criminal record or mistake may be involved.

      Past mistakes can come back to haunt you, especially when applying for a job. In Adam's case, a past criminal record threatened his chances of landing a job at a fancy UK high school. As we go through life, it's important to reflect on our past actions and how they may impact our future. It's never too late to make amends or try to right our wrongs. Ignoring or trying to cover up past mistakes, as Jack did with the cookies, might work for a while, but ultimately, the truth always has a way of catching up. It's crucial to take accountability and make a conscious effort to do better in the future.

    • The Correlation Between Bullying and Dangerous ActivitiesStudents involved in bullying are at risk of turning to negative coping mechanisms, such as criminal activities - schools must address and prevent bullying to provide a safe environment for students to thrive in.

      Bullying can have severe consequences and can push a person towards negative coping mechanisms and dangerous activities. Being part of a group can sometimes give a sense of power and safety, but it's important to be aware of the consequences and risks involved. Involvement in criminal activities, such as selling drugs, can have serious legal and personal consequences and can lead to being exploited by higher-level gangs. It's crucial to address and prevent bullying in schools to prevent students from resorting to such activities and provide them with a safe and positive environment to grow and thrive in.

    • Adam's Journey to Overcome Past MistakesDespite facing setbacks, with determination and support, anyone can turn their life around and excel in their career.

      Adam faces the consequences of his actions and decides to turn his life around by moving to the UK to make a fresh start, but finds it challenging to integrate into society. He takes on odd jobs and eventually pursues an apprenticeship in IT. However, he faces a setback when he discovers he needs a criminal record check for the job. After sharing his story with the assistant principal, she supports him and helps him obtain the job. Adam continues to excel in his career and works hard to overcome his past mistakes, which shows that with determination and hard work, anyone can turn their life around.

    • Importance of Secure Passwords and Least Privilege Concept in Network SecuritySetting unique passwords for each computer, following least privilege concept, and safeguarding the admin password are crucial elements to maintain network security and prevent unauthorized access to sensitive information.

      Using the same local admin password for all computers in a network and having easy-to-guess passwords is bad practice, as it allows junior employees to have access to sensitive information. It is important to follow the concept of least privilege, which means one should not give users access to more than what is necessary for them to do their job. Users should be forced to pick a password when they sign up for their account to avoid default passwords. The admin password should be the most guarded and protected password on the network. The school had to terminate Adam's employment because of his criminal record and the discovery that he was posting false classified ads for computers.

    • The dangers of personal problems in the workplaceHandle personal problems effectively and seek help if necessary to avoid making rash decisions. Maintain good security protocols and regularly change passwords to protect sensitive information. Take personal matters outside of the workplace seriously.

      The story highlights the dangers of personal problems in the workplace and how they can lead to impulsive actions. Adam's curiosity and past experience led him down a dangerous path of hacking into his former employer's network, which could have had serious consequences. It's important to handle personal problems effectively and seek help if necessary, to avoid making rash decisions. Furthermore, maintaining good security protocols and regularly changing passwords is vital in protecting sensitive information. Adam's experience should serve as a cautionary tale of the consequences of hacking and the importance of taking personal matters outside of the workplace seriously.

    • The Danger of Unbridled Curiosity in Workplace SecurityIt is crucial to maintain ethical boundaries when accessing sensitive information at work to avoid potential consequences, as even the smallest curiosity could escalate into malicious activity.

      Adam's curiosity led him to go beyond just identifying security alerts in Office 365 and escalate his privileges by changing a superuser's password and logging in as them to look around. He even went as far as guessing VPN passwords to connect to the school network from home. Although he realized that he had gone too far and made no attempts to hide his tracks, his activity could easily be traced back to him. This led him to acknowledge that his actions had become malicious and could have serious consequences. It is important to be mindful of the boundaries at work, especially when it comes to accessing sensitive information, as curiosity can easily lead to crossing the line.

    • The Cost of Weak Passwords: A Cautionary Tale of School Network HackProtecting sensitive data and preventing unauthorized access starts with strong passwords and robust network security measures. Be wary of connecting personal devices to work networks to avoid the risk of remote wiping.

      The hacker in the story was able to gain access to the entire infrastructure of the school just by guessing the admin password and using lateral movement. Once inside, he was able to wipe thousands of devices and even execute a command that made the servers unable to boot. The story highlights the importance of strong passwords and network security measures to prevent unauthorized access and data breaches. It also serves as a warning to individuals to be cautious about connecting personal devices to organizational networks, as doing so could potentially give the admin power to wipe their device remotely.

    • The Consequences of Ignoring Mental HealthIt is crucial to address past trauma and seek help to avoid destructive behaviors with long-term consequences. Mental health should not be ignored or underestimated, as it can lead to disastrous outcomes.

      Adam's destructive and malicious actions of wiping out an entire infrastructure of a school, including backups, showed his desire for revenge against those who wronged him in the past. He felt powerless in his life and had a glimpse of power and strength in numbers when he joined a gang, but it escalated out of control and he ended up in prison. This attack had devastating consequences on the school, with hundreds or thousands of devices damaged. Adam's actions resulted from a lifetime of anger built up from past trauma and the recent breakup, highlighting the importance of addressing mental health and seeking help to avoid destructive behaviors with lasting consequences.

    • Adam's Confession and Cooperation with the PoliceCooperation with law enforcement can have positive outcomes, but the fear of being caught can lead to anxiety and stress.

      Adam's confession to his cybercrime was based on his experience with the police when he was first arrested in Australia. He was very cooperative when he was caught and accepted the consequences. The police asked for his help for restoring the servers that he had destroyed in order to help the schools servers back up and running again. Even though the head of IT and senior technician were off work recovering from Covid, the police were prepared with 15 officers, but Adam's cooperation caught them off-guard. He showed them where he did everything from and confessed to it all. The paranoia of being caught put Adam under constant anxiety, stress and made him unable to concentrate on anything work-related.

    • Preventing Cyberattacks Caused by Ex-EmployeesTo prevent cyberattacks caused by ex-employees, companies should handle the termination process professionally by revoking all privileges, conducting exit interviews, changing passwords, and having a backup system. Employer should also be aware of any erratic behavior involving unauthorized use of company resources.

      Unauthorized access to company's network by an ex-employee led to the collapse of the system. The ex-employee was caught by the police via his IP address. The incident occurred due to the disagreement between the employer and the employee over the use of a corporate credit card. Such incidents can be prevented if companies handle the termination of an employee in a professional manner by revoking all the privileges, providing exit interviews, and promptly changing all the passwords. Also, companies need to have a backup of their system to restore it in case of such cyberattacks. Employers should pay attention to erratic behavior by their employees, especially if it involves unauthorized use of company resources.

    • The importance of frequently updating passwords.Always change passwords when someone leaves your company or when a personal/professional relationship ends. Neglecting password security can lead to severe consequences, including legal charges and damage to your reputation. Protect your assets from unauthorized access by keeping your passwords updated and secure.

      Always change your admin passwords when someone from IT leaves the company. This should be standard best practices for all organizations because if you don't, they now have privileged access into your company. Additionally, you should also change your passwords immediately when a relationship ends, whether it's personal or professional. Neglecting password security can cause significant damage to your reputation and even lead to criminal charges. In Adam's case, he spent 21 months in prison because he didn't follow this best practice and used his old passwords to make unauthorized purchases. It's crucial to keep your passwords updated and secure to prevent these types of incidents and protect your personal and business assets from unauthorized access.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    The Power of Prioritizing Yourself with Kescha Wilson

    The Power of Prioritizing Yourself with Kescha Wilson

    Striving for success usually requires consistently putting out high amounts of energy to become high-performance individuals. However, it may come at a cost when attention to our well-being is relegated to the background. Notably, this is a common situation associated with burnout among successful people, and it could have unpredictable consequences. 

    Hey everyone, Kescha Wilson is joining us on today's episode of The Mary Guirovich Show, and she talks about the difficulty high-performing women have in prioritizing themselves, highlighting her experience with burnout and outlining practical steps to recovery. Listen and learn more from this enlightening conversation!

    In Today’s Episode, We Discuss:

    • Introducing our guest today, Kescha Wilson. [00:50]
    • Pivoting from the FBI to her work with women leaders. [03:28]
    • The major trait preventing self-prioritization in high-performing women. [06:23]
    • Indicators of a "Functional Exhaustaholic" [12:00]
    • Contributing events to Kescha’s lifestyle as a high performer. [17:50]
    • Myths about burnout and recovery.  [23:43]
    • The Power of Self-prioritization & the Power of Ease. [25:09]
    • Habits that aid recovery from burnout [32:22]
    • How to approach setting boundaries [35:00]
    • Kescha's most powerful woman-mentor [40:10]
    • Kescha’s advice to women who feel stuck at a stage in their careers. [42:02]
    • Final comments from Kescha [43:46]

     

    Connect with Sara Curto

    Website: Design Her Queendom

    Email: info@designherqueendom.com

    Instagram

    Facebook

     

    Connect with Mary Guirovich

    Facebook

    LinkedIn

    Instagram

    Twitter

    YouTube

     

    Resources Mentioned:

    Kescha’s Book: The Power of Ease

    7-Step My Promotion Plan system

     

    Follow & Review on Apple Podcasts

    Are you following my podcast? If you’re not, I want to encourage you to do that today so you don’t miss any future episodes! I would also appreciate it if you would leave me a review on Apple Podcasts or Spotify! I read each of them, and they help me make sure I am providing the content that you love to hear!

     

    Kescha Wilson’s Bio:

    Kescha Wilson is the founder and CEO of Design Her Queendom, a personal development company deeply committed to helping powerhouse women leaders reprioritize themselves while managing the demands of career and the responsibilities of home. She specializes in work-life integration, self-prioritization, lifestyle restructuring, and burnout recovery. 

    Design Her Queendom was born out of Kescha’s personal burnout recovery experience as a wife, mother, and former Special Agent with the FBI. She is a Work-Life Strategist and is invested in disrupting and deprogramming the emotional exhaustion codes that keep women buried underneath serving, saving, supporting, and self-sacrificing for the sake of others. She galvanizes women to own their power to design the lives and ecosystems they truly value and desire.

     

     

     

    AI Podcast 2.0: The host in the machine

    AI Podcast 2.0: The host in the machine
    In Part 1 of this series, AI proved that it could use real research and real interviews to write an original script for an episode of Planet Money. Our next task was to teach the computer how to sound like us. How to read that script aloud like a Planet Money host.

    On today's show, we explore the world of AI-generated voices, which have become so lifelike in recent years that they can credibly imitate specific people. To test the limits of the technology, we attempt to create our own synthetic voice by training a computer on recordings of former Planet Money host Robert Smith. Then we introduce synthetic Robert to his very human namesake.

    There are a lot of ethical, and economic, questions raised by a technology that can duplicate anyone's voice. To help us make sense of it all, we seek the advice of an artist who has embraced AI voice clones: the musician Grimes.

    This episode was produced by Emma Peaslee and Willa Rubin, with help from Sam Yellowhorse Kesler. It was edited by Keith Romer and fact-checked by Sierra Juarez. Engineering by James Willetts. Jess Jiang is our acting executive producer.

    We built a Planet Money AI chat bot. Help us test it out:

    Planetmoneybot.com.

    Learn more about sponsor message choices: podcastchoices.com/adchoices

    NPR Privacy Policy

    The Art of Mixed Reality: Nancy Cahill, Artist

    The Art of Mixed Reality: Nancy Cahill, Artist

    Nancy Cahill creates intensely fragmented forms pulsing with momentum that threaten to explode of their paper confines. Well, her creations did just that earlier this year when she partnered with a developer to create her augmented reality app, 4th Wall, which allows users to place her VR drawings within their own environment, anytime, anywhere. The app also allows users to virtually visit her LA studio, and to experience an AR hologram of her discussing the conceptual underpinnings of her work.

    In this episode, we talk with Nancy about her journey from "traditional" art mediums to VR and AR projects, the disconnect between the art and tech worlds, and where she sees virtual reality is headed.


    -About Nancy Baker Cahill-

    Nancy Baker Cahill is a multi-disciplinary artist and founder of 4th Wall, a free Augmented Reality (AR) app which allows users to place art in 360 degrees anywhere in the world. She received her B.A. from Williams College. From 2010-2012 she initiated and led a collaborative art project at Homeboy Industries called “Exit Wounds.” Works from this project were exhibited throughout Los Angeles as part of the Craft and Folk Art Museum (CAFAM)’s “Folk Art Everywhere” program. In 2015 she designed and led a collage workshop with homeless individuals under the aegis of a CAFAM grant. She is also the recipient of an ARC Grant from the Center for Cultural Innovation and will be a featured TEDx speaker in September 2018 in Pasadena.

    Solo exhibition highlights include the Pasadena Museum of California Art, Ochi Projects, her Virtual Reality (VR) public art project on the IF (Innovation Foundation) sponsored Sunset Digital Billboards, and a VR/AR event at LACE (Los Angeles Contemporary Exhibitions) in April 2018. She has been profiled by Forbes Magazine, Fast Company, The Smithsonian Magazine, The Art Newspaper, the Los Angeles Times, KCET’s award-winning “Artbound” series, Aesthetica, Good Magazine, LA Magazine, LA Weekly, Peripheral Vision Arts and on several podcasts, including Feminist Crush and State of the Art. She served for years as a member of the Hollywood Public Art Advisory Board, is a member of the Pasadena Art Alliance, an Advisory Board member of Fulcrum Arts and Vice Chair of the Board of Directors at LACE.

    Follow Nancy @nancybakercahill or @4thwallapp

    Learn more about Nancy here


    The Resurgence of Networking — A Conversation with Aviatrix CEO Doug Merritt

    The Resurgence of Networking — A Conversation with Aviatrix CEO Doug Merritt

    On this episode of the Futurum Tech Webcast – Interview Series, host Daniel Newman welcomes Doug Merritt, Chairman, CEO and President at Aviatrix for a conversation on secure cloud networking, what the market for it is looking like, and the impacts of AI.

    Their discussion covers:

    • An overview of the convergence of cloud networking 

    • Overall market growth for cloud networking

    • What role AI is playing in cloud networking 

    • The importance of security in cloud networking

     

    The Courage to Believe More For Your Career

    The Courage to Believe More For Your Career

    As Christians, we believe that God is real. But living in a world that doesn’t always share our beliefs can sometimes make it hard to maintain the level of faith and trust needed to believe in Him. In today’s episode, we want to cover a few different things: why it is so important to believe; what holds us back from believing; and how you can actually up level your faith in God and start daring to dream greater dreams. Let’s delve in.

    In Today’s Episode We Discuss:

    • Why belief is so important [03:00]
    • What placebo is? [03:40]
    • Beliefs are actually stored in our subconscious [05:20]
    • Reaching our God given potential [07:03]
    • what holds us back from believing [07:14]
    • Belief can change in a moment[16:32]
    • Four steps to changing our beliefs. [17:20] 

    Resources Mentioned:

    Follow the Podcast

    Joe Dispenza’s Book: You Are The Placebo: Making Your Mind Matter

    Mary’s Book: God's not done with you: How to Advance Your Career and Live In Abundance

    Follow & Review on Apple Podcasts

    Are you following my podcast? If you’re not, I want to encourage you to do that today so you don’t miss any future episodes! I would also appreciate it if you would leave me a review on Apple Podcasts or Spotify! I read each of them, and they help me make sure I am providing the content that you love to hear!

     

    Let's Connect! 

    Facebook

    LinkedIn

    Instagram

    Twitter

    YouTube