Logo

    Voice Acting In The Internet Age | A Conversation With Joanna Teljeur | Cy Beat Podcast With Deb Radcliff

    enFebruary 13, 2023
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Guest: Joanna Teljeur, Independent voice actor

    On LinkedIn | https://www.linkedin.com/in/joannateljeur/

    On Facebook | https://www.facebook.com/joannateljeur

    ____________________________

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Voice actor Joanna Teljeur’s notable credits include the Golf Channel, HGTV and NBC Universal. We met online after she read my first book, “Breaking Backbones: Information is Power,” published through Archway, and she is currently recording my second book, subtitled “Information Should be Free.” Her performance was compelling as the book starts with a drone war outside a GlobeCom data center, and she also pronounced a lot of crazy hacker handles in there like d_ArkAngl, Des0l8tion, Skew3r, and CyAnthia (the protagonist)!

    In this podcast, she explains how voice acting is not for the faint of heart, as it is highly competitive just like screen acting, and how you need to make some basic investments in audio technologies and soundproofing to get started.

    ____________________________

    Resources

    Breaking Backbones Audio Narrated by Joanna: https://www.amazon.com/Breaking-Backbones-Information-Hacker-Trilogy/dp/1665701099

    Breaking Backbones Book 2 (Joanna is currently recording): https://www.amazon.com/Breaking-Backbones-Information-Should-Trilogy/dp/1665726997/

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Recent Episodes from Cy Beat Podcast

    What Keeps Healthcare CISOs Up at Night? | A Conversation with Michael Bray and Errol Weiss | Cy Beat Podcast With Deb Radcliff

    What Keeps Healthcare CISOs Up at Night? | A Conversation with Michael Bray and Errol Weiss | Cy Beat Podcast With Deb Radcliff

    Guests: 

    Michael Bray, CISO, Vancouver Clinic

    On LinkedIn | https://www.linkedin.com/in/michael-bray-cism-crisc-cissp-qte-board-advisor-a190521/

    Errol Weiss, CSO, Health-ISAC (Information Sharing and Analysis Center)

    On Twitter | https://twitter.com/HealthISAC

    On LinkedIn | https://www.linkedin.com/in/errolweiss/

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Healthcare CISOs weigh in on cyber threats to the healthcare sector including AI-enabled phishing, impersonation, HR and BEC scams, along with double and triple extortion where the institution, patients and employees are targeted by ransomware gangs.

    “Extortion is getting really ugly—it’s hard to believe how amoral the threat actors are,” explains our guest Errol Weiss, CSO of the Health-ISAC.

    He and Michael Bray, CISO of the Vancouver Clinic, also explain the value of information sharing among peer organizations, managing attack surfaces, and educating leadership.

    ____________________________

    Resources

    Health-ISAC website: https://h-isac.org

    Health Industry Cybersecurity Practices by HHS: https://405d.hhs.gov/

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    So, You Want to be a CISO? | A Conversation with CISO Sue Bergamo | Cy Beat Podcast With Deb Radcliff

    So, You Want to be a CISO? | A Conversation with CISO Sue Bergamo | Cy Beat Podcast With Deb Radcliff

    Guest: Sue Bergamo, CISO and host of Short-Takes Podcast

    On Twitter | https://twitter.com/Suebergamo

    On LinkedIn | https://www.linkedin.com/in/suebergamo/

    Website | https://www.btepartners.com

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Sue Bergamo has a lot of expertise in the CISO role. To share her knowledge, she recently published the book, “So, You Want to be a CISO? A practical guide to becoming a successful cybersecurity leader.”

    In this interview, Sue shares her journey as we talk about CISO challenges, responsibilities, liabilities, avoiding burnout, and the best path to success. “I have nothing to prove so take my knowledge and do what you want with it,” she says. She also explains that when her parents read the book, their takeaway was “Why do you want that job?”

    ____________________________

    Resources

     

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    CISO’s Under the Gun: Introduction to Cy Beat’s New CISO Series | Cy Beat Podcast With Deb Radcliff

    CISO’s Under the Gun: Introduction to Cy Beat’s New CISO Series | Cy Beat Podcast With Deb Radcliff

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Having spent 30 years covering cybercrime and cybersecurity, I understand the tough roles that CISO’s fill while their corporate leaders are all too quick to discount solid security advice and then, when a breach happens, are just as quick to throw their CISOs under the bus. In this episode, I read from my books where CISO’s actually do come under the gun. They are blamed for a massive hacker and drone attack that broke the evil GlobeCom’s network backbones, and get shot down by those who want to control GlobeCom 2.0. In follow-up episodes, I will interview CISOs who work in different critical infrastructure verticals to learn their challenges and secrets for success, CISO liability and indemnity, life after CISO, compliance, AI, and more.

    ____________________________

    Resources

     

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    Guest: Andrew Strutt, Hacker and Defense Agency Contractor [@2600net]

    On Twitter | https://twitter.com/andrew_strutt

    On LinkedIn | https://www.linkedin.com/in/andrew-strutt-b457a252/

    On Facebook | https://www.facebook.com/groups/2600net

    On YouTube | https://www.youtube.com/@HackerVideo

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Hackers supporting defense agencies is common enough that I included this scenario in the third book of my hacker trilogy (Breaking Backbones: From Chaos to Order).

    In real life, this is the true story of Andrew Strutt, a respected, self-taught hacker, co-founder of Telephreak.org, and administrator of the 2600 IRC and Facebook page (with 63,000 followers). He even had his door kicked down in a warrantless FBI raid—a badge of honor in the hacker community.

    Even with this background, Andrew, with the help of a fellow hacker, got through the security clearances to work in defense agencies because, as he says, he never done anything illegal.

    Join us for this fun episode featuring a historic figure in the hacker community.

    ____________________________

    Resources

     

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Guest: Winn Schwartau, Infowar Expert at WinnSchwartau.com

    On Twitter | https://twitter.com/winnschwartau

    On LinkedIn | https://www.linkedin.com/in/winnschwartau/

    On Facebook | https://www.facebook.com/profile.php?id=100083293070618

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Winn Shwartau coined the term Electronic Pearl Harbor when testifying to Congress in 1991, a few years later he was named the “Civilian Architect of Information Warfare” by a Commodore in the OBE Royal Navy. Now, he’s about to publish a book on Metawar, the next iteration of Infowar, where AI and virtual reality are used to manipulate belief systems, truth, and the subjective reality of “the human endpoint.”

    In this podcast, we go back and forth on definitions, but what he has to say about Metawre is downright chilling.

    ____________________________

    Resources

    Cybeat Episode 11: Cyberwar Versus Electronic Warfare: https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Guest: Marcus H. Sachs, Deputy Director for Research, McCrary Institute for Cyber and Critical Infrastructure Security [@McCraryCyber]

    On Twitter | https://twitter.com/MarcusSachs

    On LinkedIn | https://www.linkedin.com/in/marcsachs/

    On YouTube | https://www.youtube.com/channel/UCbGROxTp2WcVTqBCrLScLlg

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Marc Sachs was a Major in the U.S. Army supporting cyber battlefield operations when I first interviewed him for a 2001 Computerworld article about info warriors.

    Recently, Marc was instrumental distinguishing between cyber war versus electronic warfare scenarios in book three of my Breaking Backbones Hacker Trilogy, “Chaos to Order.” His infrastructure expertise was also invaluable when describing a cyber attack on three major power grids.

    Back in the '90's, “We didn’t quite know what we were doing, there were no rules of engagement … and yes, we had friends on the dark side," Marc says. In our discussions back then, we were predicting cyber battles such as those playing out in Ukraine and Israel. But we hadn't foreseen the arms-race for AI-enabled, autonomous fighting machines.

    ____________________________

    Resources

    Info Warriors Computerworld Article with March Sachs: https://www.computerworld.com/article/2590364/the-info--warrior.html

    Breaking Backbones: Chaos to Order, book 3 of Deb's hacker trilogy: https://www.amazon.com/Breaking-Backbones-Chaos-Deb-Radcliff/dp/1665747277/

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    In this podcast series, we examine the differences between information warfare, cyber warfare, and electronic warfare, including where they intersect and overlap.

    Having just published the third book of my Breaking Backbones Hacker Trilogy, a thriller series, it’s time to cover some of the topics in the trilogy. In the next few episodes, we’ll examine the differences between information war, cyberwar, and electronic warfare, starting with excerpts from my books and then following up with additional podcasts by bringing in experts who also served as models for the heroes in my stories.

    So, please stay tuned for followup shows in which we will discuss where all of this is going and what’s at stake.

    ____________________________

    Resources

    Deb's cyber thrillers: https://www.amazon.com/Deb-Radcliff/e/B092KFMG5B/ref=aufs_dp_fta_dsk

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Identity IS Security and It’s Time We Treat it as Such | A Conversation With Jeff Reich | Cy Beat Podcast With Deb Radcliff

    Identity IS Security and It’s Time We Treat it as Such | A Conversation With Jeff Reich | Cy Beat Podcast With Deb Radcliff

    Guest: Jeff Reich, Executive Director of Identity Defined Security Alliance [@idsalliance]

    On Twitter | https://twitter.com/JeffReichCSO

    On LinkedIn | https://www.linkedin.com/in/jreich/

    On YouTube | https://www.youtube.com/channel/UC8yfa2vRYDjS7TUWKAHIrwg

    ____________________________

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Everything we do online is tied to identity, which means that identity is foundational to cybersecurity. Learn how the two are coming together under the Identity Security Alliance.

    Online identities depend on three elements—carbon based (who we are), machine-based (what we’re using), and artificial identity (such as username and passwords), says Jeff Reich, executive director of the Identity-Defined Security Alliance (IDSA). In this podcast, we discuss why it’s taken so long for identity and security to come together and he describes how the IDSA is leading the charge on this important pillar of security. We also discuss the effectiveness of the National Cybersecurity Strategy objective 4.5 to support development of a “Digital Identity Ecosystem,” and how that might play out in the future.

    ____________________________

    Resources

     

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Taking the Leap from Cybersecurity Pro to Fiction Author | Cy Beat Podcast With Deb Radcliff

    Taking the Leap from Cybersecurity Pro to Fiction Author | Cy Beat Podcast With Deb Radcliff

    Guests:

    Richard Thieme, Author and professional speaker focused on the deeper implications of technology, religion, and science, founder of Thiemeworks

    On LinkedIn | https://www.linkedin.com/in/richardthieme/

    On Facebook | https://www.facebook.com/richard.thieme.10

    On YouTube | https://www.youtube.com/watch?v=7q_YCQuXGTU

    Pat Rullo, Author, Audio Book Producer, Host of SpeakUp Talk Radio [@speakupradioh]

    On LinkedIn | https://www.linkedin.com/in/patrullo/

    On YouTube | https://www.youtube.com/channel/UC67FD_4out6-KuWqAZUEYmw?

    ____________________________

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Technology has changed the way society interacts with authors, the way the authors interact with society, and how our stories are expressed, sold, marketed, and shared.

    Some of us in the cyber community are stepping out of our comfort zones to write fictional thrillers, dramas, and action stories that are based on our experiences. My “Breaking Backbones Hacker Trilogy,” for example, is an ode to the hackers, cybercops, vigilantes, and cyber security pros I’ve met during my 30-year career as a cybercrime reporter and thought leader.

    Richard Thieme is another such person. He is a professional writer and speaker who focuses on cyber’s impact on society, and he commands standing-room-only audiences in his keynotes. He has recently published the second book in his new trilogy, “Mobius,” which is his best writing yet. It is a fictionalized account of a regretful spy who finally turns whistleblower on his agency, and it is based on his work with real spies in

    ____________________________

    Resources

     

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Reinventing Cybersecurity Awareness and Marketing with Movies and TV | Cy Beat Podcast With Deb Radcliff

    Reinventing Cybersecurity Awareness and Marketing with Movies and TV | Cy Beat Podcast With Deb Radcliff

    Guests:

    Alissa Knight, Hacker-turned-producer and founder of Knight Studios [@knightinkmedia]

    On LinkedIn | https://linkedin.com/in/alissaknight

    On Twitter | https://twitter.com/knightinkmedia

    On Facebook | https://www.facebook.com/knightalissa

    On YouTube | https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQ

    Shannon Wilkinson, CEO and Founder of Tego Cyber, women in technology and STEM advocate, and formerly with the United Nations [@tegocyber]

    On Twitter | https://twitter.com/SWilkinsonCyber

    On LinkedIn | https://linkedin.com/in/swilkinsoncyber

    ____________________________

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    We’re all familiar with sponsored whitepapers, webcasts and podcasts, but what about sponsoring movies, tv shows or digital streaming shows telling the story of fighting cybercriminals?

    On the heels of KnightTV’s release of the Dark Ops streaming video series, we look at a new way of telling cyber stories while also marketing cybersecurity. The series is based on true cases, starting with an FBI cyber unit taking down bad guys trying to steal critical national secrets from the U.S. and enlisting insiders to do their dirty work. It also includes special effects like explosions, and features one of our speakers, Alissa Knight, in the opening scene. In this show, we learn how these episodes were developed, produced, and sponsored, and how these shows are bringing awareness of security products around the globe.

    ____________________________

    Resources

     

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io