Logo

    Presenting: Click Here "Lapsus$"

    en-usJuly 12, 2022
    What unique hacking incident involved Okta recently?
    Who is Brett Winterford?
    What challenges do organizations face with evolving cyber threats?
    How did Vytek Boden sabotage the sewage plant?
    What is Vanta's offer for Darknet Diaries listeners?

    Podcast Summary

    • A law enforcement agency carried out an unexpected hack on OktaOrganizations must stay vigilant and adaptable to respond to evolving cyber threats, even from unconventional sources like law enforcement agencies.

      The cyber threat landscape is constantly evolving, and organizations must be prepared for new and unexpected challenges. In this episode, we heard about a unique hacking incident involving Okta, an identity management platform used by thousands of organizations. The hackers were not a sophisticated nation-state group or a ransomware gang, but an unpredictable and impulsive law enforcement agency. This presented a new kind of challenge for security teams, as there isn't a standard playbook for responding to such incidents. Okta's Regional Chief Security Officer, Brett Winterford, had to act quickly to assess the technical impact and communicate with customers. This incident serves as a reminder that organizations must stay vigilant and adaptable in the face of evolving cyber threats. Vanta, a sponsor of this podcast, offers a centralized platform to help organizations manage and scale their security programs and streamline compliance. As a bonus for Darknet Diaries listeners, Vanta is offering a 20% discount. Visit vanta.com/darknet20 to claim your discount.

    • Lapsus Hacking Group: Teenagers with Reckless Hacking TacticsTeen hackers, known as Lapsus, have been causing chaos by stealing company data and threatening to leak it unless a ransom is paid. Their tactics include various methods to gain access and disinformation campaigns, making it crucial for organizations to stay informed and adapt their security strategies.

      The hacking group Lapsus, responsible for numerous high-profile cyberattacks, is made up of teenagers exhibiting an adolescent strategy of reckless hacking for notoriety. This group, which gained notoriety in December 2021, has been stealing company data and threatening to leak it unless a ransom in Bitcoin is paid. They have targeted various industries, including healthcare and technology, and have been particularly interested in obtaining source code. The Okta breach, which was initially reported to be more severe than it actually was, involved the compromise of two Okta accounts, but no significant damage was done. The group's tactics, which include trying various methods to gain access and causing disinformation campaigns, present a significant challenge for companies looking to protect themselves. It is essential for organizations to stay informed about emerging threats and adapt their security strategies accordingly.

    • Hackers Target Company ReputationA new hacking group, Lapsus, targets company reputation by observing technical support sessions and publishing screenshots, while Mint Mobile offers a solution to high wireless bills with affordable online plans

      Hackers not only target data and source code but also aim for a company's reputation. A group called Lapsus, led by a 17-year-old from the UK, has demonstrated this by observing thin client sessions of technical support engineers at Microsoft and publishing screenshots on their Telegram channel. This type of attack is harder to prepare for in tabletop exercises. Meanwhile, Mint Mobile offers a solution to high wireless bills, with plans starting at $15 a month, by selling wireless service online and cutting out retail store costs. The leader of Lapsus, despite being a minor, has significant experience in the criminal underground, as evidenced by his digital trail and historical posts. He is known for using social engineering instead of coding skills to hack into systems. Lapsus stands out from other hacking crews due to their lack of use of malware. While it may seem odd for a detective to be chasing teenagers, the digital evidence speaks for itself.

    • Old-school tactics by Lapsus$ result in high-value targets and significant financial lossesLapsus$ uses SIM swapping and social engineering to bypass modern security measures and gain access to high-profile targets, resulting in millions of dollars in financial losses

      The hacking group Lapsus$ is using old-school tactics, such as SIM swapping and social engineering, to gain access to high-profile targets, often resulting in significant financial losses. These methods, which exploit human vulnerabilities rather than relying on sophisticated malware, have allowed Lapsus$ to bypass modern security measures and appear as formidable hackers. The group's low volume of attacks but high-value targets, like Microsoft, have netted them millions of dollars. Their actions can be explained by the increased dopamine levels in the adolescent brain, which can lead to risk-taking behavior. However, their careless actions, such as revealing their members' identities in public forums, can undermine their operations. This serves as a reminder that companies must be vigilant against not only advanced cyber threats but also the human element, and that the actions of young people, driven by their developing brains, can have far-reaching consequences.

    • Young Hackers: A Growing ThreatStay vigilant against cyber threats, as the next attack could come from an unexpected source. Manage monthly subscriptions with Rocket Money to save money.

      The world of hacking is evolving, and young people are increasingly getting involved. The recent Lapsus $extit group, with members aged between 16 and 21, is a prime example. Their bragging and attempts to show off their dominance led to their arrest, but it also highlights the growing threat of script kiddies and SIM swapping methods. This trend is not new; even in the 1960s, teenagers managed to gain unauthorized access to IBM's most powerful computer. The moral of the story is that it's essential to stay vigilant against cyber threats, as the next big attack could come from an unexpected source. Additionally, Rocket Money, a personal finance app, can help manage your monthly subscriptions and save you money.

    • Two young men nearly brought down IBM's Computer Center with a simple hack in 1964A single vulnerability in a complex system can cause significant disruptions, and cybersecurity threats continue to evolve, requiring constant vigilance

      In the summer of 1964, two young men, Shamos and his friend, almost brought down the IBM Computer Center in Manhattan with a simple hack. They discovered that by altering a single hole in a long rectangular computer card, they could prevent the machine from rebooting. They made multiple copies of the altered card and randomly inserted them into the machine's card box. The machine malfunctioned, causing significant disruptions to IBM's operations, including the National Weather Service. The hackers watched as IBM engineers struggled to diagnose the problem, but they didn't reveal their involvement. The incident highlights the potential impact of a single vulnerability in a complex system and the challenges of identifying and addressing such issues. Fast forward to today, and cybersecurity threats continue to evolve. Last week, Google and Mandiant reported record-breaking numbers of zero-day vulnerabilities exploited in the wild, underscoring the importance of staying vigilant against emerging threats. Meanwhile, a cyberattack targeting an underwater cable linking Hawaii's telephone, Internet, and cell phone service was thwarted by Homeland Security Investigations, demonstrating the critical role of cybersecurity in protecting essential infrastructure.

    • Understanding New Cyber Threats and Securing Critical InfrastructureNew cyber threats like Acid Rain and Whisper Gate require constant monitoring and understanding for early detection. Securing critical infrastructure, even when not internet-connected, is crucial to prevent real-world disruptions.

      Cyberattacks, like the ones targeting organizations and individuals discussed in this episode, can come from various sources, including known cybercriminal groups and state-sponsored hackers. The new malware variants, such as Acid Rain and Whisper Gate, can cause significant damage and understanding their capabilities is crucial for early detection. Meanwhile, in the real world, an Australian shire faced a different kind of challenge when its sewage system was hacked. The SCADA system controlling the pumps was not internet-connected, but the attackers still managed to cause widespread damage. This highlights the importance of securing such critical infrastructure and the challenges of troubleshooting intermittent issues. In the midst of these cyber threats and real-world disruptions, individuals like Dmitry Chery Panov are creating solutions to help people find each other during times of conflict. The MRPL life website is a testament to the resilience and creativity of people in the face of adversity.

    • Ex-employee sabotages OT system, causing major sewage spillDisgruntled employees with technical expertise pose a significant risk to operational technology systems, which require on-site access and can cause costly damages if compromised.

      Operational technology (OT) systems, like SCADA systems that control industrial equipment, require a different skill set than IT systems and cannot be accessed remotely without physical presence. However, in this case, an ex-employee, Vytek Boden, was able to sabotage a sewage plant's pumping station by manipulating its wireless controls, leading to a major sewage spill. Vytek, who had bad relations with his former employers, used his knowledge of the system to cause malfunctions and cover his tracks. This incident highlights the importance of securing OT systems against unauthorized access and the potential consequences of disgruntled employees with technical expertise.

    • First known instance of a 'revenge sewage attack'Cyber attacks can lead to serious real-world consequences, like sewage spills and costly damages. Take cyber security seriously to prevent potential attacks.

      Cyber attacks can have serious real-world consequences. In early 2000, a man named Vitek remotely accessed Marucci Shire's sewage system over 40 times, ultimately causing it to fail and resulting in over 1000 gallons of sewage spilling everywhere. This was the first known instance of a "revenge sewage attack." In October 2001, Vitek was sentenced to 2 years in jail and fined over $13,000 for his actions. This case serves as a reminder that cyber attacks are not just virtual threats, but can have very real and damaging consequences. It's important for individuals and organizations to take cyber security seriously and take steps to protect themselves from potential attacks.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    SIM swapping : quand votre opérateur livre les clés du royaume

    SIM swapping : quand votre opérateur livre les clés du royaume

    Bonjour à tous et bienvenue dans le ZD Tech, le podcast quotidien de la rédaction de ZDNet. Je m'appelleLouis Adam et aujourd'hui, je vais vous expliquerpourquoi les attaques dites de "SIM Swapping" sont aussi dangereuses.

    "SIM Swapping", ou "échange de cartes SIM" en français, c'est le nom donné à un type d'attaque qui s'est révélée terriblement efficace au cours des dernières années. Cette technique a été employée aussi bien pour pirater des anonymes et vider leurs comptes en banque que pour se connecter au compte du patron de Twitter et publier des messages racistes.


    Le cœur du SIM Swapping, c'est de parvenir à récupérer une carte SIM attribuée à un abonné par un opérateur. Et pour y parvenir, tous les moyens sont bons : on peut par exemple appeler le service après-vente de l'opérateur et se faire passer pour la victime afin de demander l'envoi d'une nouvelle carte SIM.


    Bien sûr, il y a quelques vérifications : le SAV demande certaines informations avant d'approuver l'envoi, mais en collectant des informations sur la cible, au travers d'une recherche en source ouverte ou via un phishing réalisé en amont, on peut assez facilement contourner ces protections.


    Et si la manière douce ne fonctionne pas, les attaquants ont d'autres possibilités. Aux Etats-Unis, on a ainsi vu des opérateurs téléphoniques se faire pirater les comptes et les ordinateurs utilisés par leur service après-vente. L'objectif : permettre aux attaquants de lancer eux-mêmes une procédure de remplacement de carte SIM. Dans certains cas, des employés d'opérateurs téléphoniques ont même été directement corrompus par des cybercriminels afin de déclencher ce type de procédure.


    Pour la victime, difficile de faire face à ce type de piratage. Lors de l'activation de la nouvelle SIM par l'attaquant, elle perd l'accès à internet et au réseau mobile sur son téléphone. Et généralement, elle perd dans la foulée l'accès à ses principaux comptes en ligne – e-mail, réseaux sociaux – ceux-ci étant rapidement réinitialisés par le pirate qui souhaite en prendre le contrôle.


    Seule solution pour résoudre le problème : contacter son opérateur, signaler l'attaque et demander à faire bloquer la nouvelle carte SIM obtenue par les pirates.


    Malheureusement, cela peut prendre un peu de temps.


    Pour se protéger du SIM swapping, la balle est dans le camp des opérateurs plus que des abonnés.


    C'est en effet aux opérateurs de mettre en place des mesures de vérification d'identité robustes avant d'activer de nouvelles cartes SIM. En France, les opérateurs promettent que ce type d'attaques reste pour l'instant marginal. Pour une victime, la meilleure protection reste l'utilisation d'une clé de sécurité physique pour l'authentification multifacteurs plutôt qu'une authentification basée sur des SMS. 

    More AI = More Cyberthreats

    More AI = More Cyberthreats
    The number of data compromises last year increased by 78% from just 2022, according to the 2023 Annual Data Breach Report. One primary reason for this increase? Artificial intelligence. “This Week in Tech” co-hosts Tim Beyers and Tim White discuss the rise of cyber threats, and what it means for companies like Microsoft, Crowdstrike, and Zscaler. They also discuss how these breaches work, and what you can do to protect yourself and your family. Members of any Motley Fool Service can watch “This Week in Tech” at 10:00 am ET on Fridays, or any time at the Fool Live replay hub: https://www.fool.com/premium/live/replayhub?cat=fool-live-full-shows  To become a Motley Fool member, head to www.fool.com/signup Companies mentioned: MGM, UHC, MSFT, NVDA, CRWD, OKTA, ZS, T, DDOG, ACN Host: Tim Beyers Guest: Tim White Producer: Ricky Mulvey Engineer: Tim Sparks Learn more about your ad choices. Visit megaphone.fm/adchoices

    Episode 9: Cybersecurity - How secure are your operations?

    Episode 9: Cybersecurity - How secure are your operations?
    How secure is your organization from security breaches, whether it is malicious or caused by human error? Listen to this podcast where Mark Bowling the Vice President of Security Response Services at ExtraHop and Jacob Mix, Engineering Manager at Eagle Technology, Inc. take an in-depth look at how you can minimize your risk through proper preparedness. Topics covered in this podcast: •           What are the elements of Cybersecurity, and how does it work? •           Top Cybersecurity challenges CMMS users face•           Basics to secure your organization •           Identify Cybersecurity threats •           Proteus MMX security features •           How to use Proteus MMX securely in your organization For more information visit www.eaglecmms.com or email sales@eaglecmms.com

    A Practical Way Any Manufacturer can Implement New Technology

    A Practical Way Any Manufacturer can Implement New Technology

    Almost every business leader is discussing what role AI will play in their company.  

    For manufacturers, AI is considered to be foundational to the move towards Industry 4.0.  

    However most manufacturers are not quite sure how to specifically apply AI to their operations.   How to go from theory to practical application.  

    Meet Bryan DeBois, director of Industrial AI at RoviSys, one of the largest independent global system integrators focused on manufacturing.

    Today on A Seat at The Table, we’ll be answering some of the questions manufacturers have about operationalising technologies such as AI, Data Infrastructure and Advanced Analytics - and how they can boost productivity for manufacturers.

    Bryan will be discussing

    1.  How smart factories are transforming the manufacturing industry with data and AI

    2. How to start a digital transformation journey for medium-to-large manufacturing companies

    3. How to integrate a new data pipeline into an existing infrastructure with minimal disruption to its operations?

    4. The role that key humans will play in new tech-driven operations.


    Despite all the advancements in technology, people still play a vital role in the success of a business.  That’s why top companies invest in getting the best talent on board.  

    However finding good people is not always easy - especially when you need people with very specific skills or experience, such as with new technologies.

    That’s why leading companies turn to Asianet Consultants to help them recruit that winning talent that will give them a competitive edge.  

    Asianet has decades of experience and a vast network that gives them an edge in finding the right executives for even niche positions.

    You can find out more about them at asianetconsultants.com.  I’ll also leave a link in the show notes.

    Meanwhile, let’s find more about the future of manufacturing from Bryan.

    USEFUL LINKS:

    Asianet Consultant's website:  https://asianetconsultants.com

    Rovisys website:  https://www.rovisys.com/

    Connect with Bryan Debois:  https://www.linkedin.com/in/bryan-debois/

    Visit A Seat at The Table's website at https://seat.fm

    Netflix Black Mirror Becoming Reality?

    Netflix Black Mirror Becoming Reality?

    In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix's Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.

    As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools to navigate the complex web of cyber threats. Tune in, buckle up, and let's embark on a journey to secure the future of your digital existence.

    Support the show

    Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.