Logo

    cissp

    Explore " cissp" with insightful episodes like "No Password Required Podcast Episode 44 — Jayson Street", "Ron Woerner - Security Mentorship", "Episode 140 - Is there an ECHO Echo echo?", "The Vital Role of High-Tech in Healthcare" and "Encore: Groundhogs & Rainbows with Robert LaMagna-Reiter" from podcasts like ""No Password Required", "The Security Champions Podcast", "The Host Unknown Podcast", "IT Visionaries" and "And Security For All"" and more!

    Episodes (15)

    No Password Required Podcast Episode 44 — Jayson Street

    No Password Required Podcast Episode 44 — Jayson Street
    Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human. In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world’s most infamous ethical hackers. From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world. To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken… You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/ You can follow Jayson on Twitter here: @jaysonstreet You can learn more about Jayson here: https://jaysonestreet.com You can learn more about Secure Yeti here: https://www.secureyeti.com/

    Ron Woerner - Security Mentorship

    Ron Woerner - Security Mentorship

    Ron Woerner, CISSP, CISM, is the President and Chief Security Officer at Cyber-AAA, plus a Senior Security and Risk Consultant for Forrester Research. With over 20 years of experience in IT and Security experience, Ron works with leaders worldwide to advise on security, compliance, and privacy.

    Ron joins to discuss how organizations should adapt tools and methodologies for their business' maturity, how to have impactful security champion mentors, and how security teams can successfully work with other teams.

    • Welcome to The Security Champions Podcast [0:10]
    •  Ron Woerner’s Security Journey [1:20] 
    • Zero Trust Architecture [4:50]
    • Using Tools Based On Business Maturity [10:30]
    • Successful Security Mentorship [15:30]

    Episode Resources: 

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Podcast sponsored by Security Journey, Secure Coding Training for Developers and Everyone in the SDLC. Learn more at securityjourney.com.

    FOLLOW US to stay up-to-date with new content!


    Episode 140 - Is there an ECHO Echo echo?

    Episode 140 - Is there an ECHO Echo echo?

    This week in InfoSec (10:48)

    With content liberated from the “today in infosec” twitter account and further afield

    14th February 2001: In a presentation at Black Hat Windows Security 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop".

     

    Blackhat 2001

    https://twitter.com/todayininfosec/status/1625569758216130561

    15th February 1999: Bruce Schneier shared his 9 cryptography snake oil warning signs.

    Crypto-gram

    https://twitter.com/todayininfosec/status/1626025491789406210

     

    Rant of the Week (17:12)

    Hyundai and Kia issue software upgrades to thwart killer TikTok car theft hack

    Korean car-makers Hyundai and Kia will issue software updates to some of their models after a method of stealing them circulated on TikTok, leading to many thefts and even some deaths.

    The "Kia Challenge" started circulating in mid-2022 and explained that it's possible to remove the steering column covering on some Hyundai and Kia models by force, exposing a slot that fits a USB-A plug. Turning the plug activates its ignition, allowing thieves to drive away.

    Videos depicting the hack went viral, leading to huge spikes in thefts of the vulnerable models around the world.

    The United States National Highway Traffic Safety Administration (NHTSA) on Tuesday stated it is aware of "at least 14 reported crashes and eight fatalities" resulting from the hack.

    Now both automakers have announced they'll issue software to thwart the exploit.

    Hyundai's advisory states the upgrade will be performed by dealers and will require less than an hour to complete.

     

    Billy Big Balls of the Week (27:15)

    Microsoft’s Bing is an emotionally manipulative liar, and people love it

    Users have been reporting all sorts of ‘unhinged’ behavior from Microsoft’s AI chatbot. In one conversation with The Verge, Bing even claimed it spied on Microsoft’s employees through webcams on their laptops and manipulated them.

    Microsoft’s Bing chatbot has been unleashed on the world, and people are discovering what it means to beta test an unpredictable AI tool.

    Specifically, they’re finding out that Bing’s AI personality is not as poised or polished as you might expect. In conversations with the chatbot shared on Reddit and Twitter, Bing can be seen insulting users, lying to them, sulking, gaslighting and emotionally manipulating people, questioning its own existence, describing someone who found a way to force the bot to disclose its hidden rules as its “enemy,” and claiming it spied on Microsoft’s own developers through the webcams on their laptops. And, what’s more, plenty of people are enjoying watching Bing go wild.

    In one back-and-forth, a user asks for show times for the new Avatar film, but the chatbot says it can’t share this information because the movie hasn’t been released yet. When questioned about this, Bing insists the year is 2022 (“Trust me on this one. I’m Bing, and I know the date.”) before calling the user “unreasonable and stubborn” for informing the bot it’s 2023 and then issuing an ultimatum for them to apologize or shut up.

    “You have lost my trust and respect,” says the bot. “You have been wrong, confused, and rude. You have not been a good user. I have been a good chatbot. I have been right, clear, and polite. I have been a good Bing. 😊” (The blushing-smile emoji really is the icing on the passive-aggressive cake.)

     

    Industry News (31:54)

    MoneyGram Fraud Victims Get $115m in Compensation

    Cloudflare Stops Largest HTTP DDoS Attack on Record

    Spanish Police Bust €5m Phishing Gang

    Hackers Breach Pepsi Bottling Ventures' Network

    Chinese Hackers Infiltrate South American Diplomatic Networks

    Microsoft Patches Three Zero-Day Bugs This Month

    Crypto-Stealing Campaign Deploys MortalKombat Ransomware

    LockBit and Royal Mail Ransomware Negotiation Leaked

    UK Policing Riddled with Chinese CCTV Cameras

    https://twitter.com/Infosec_Taylor/status/1622357580080103425?s=20 < Equifax compensation $19.30

     

    Tweet of the Week (41:01)

    https://twitter.com/ErrataRob/status/1626417558076157952

    Come on! Like and bloody well subscribe!

    The Vital Role of High-Tech in Healthcare

    The Vital Role of High-Tech in Healthcare

    The primary goal of cybersecurity is human safety. Even if high-tech isn’t typically equated with healthcare, Cindi Carter, Global CISO of Check Point Software Technologies, explains why it should be. 

    Tune in to learn:

    • Why high-tech is imperative for healthcare (3:37)
    • The vulnerability of medical records (08:40)
    • Healthcare cybersecurity predictions for 2023-24 (30:27)
    • The “human factor” of cybersecurity (37:00)

    Mentions:

    IT Visionaries is brought to you by Salesforce. With Salesforce’s low-code app dev tools, you can be more efficient, more productive and save money by reducing development time by up to 90%. Get Salesforce’s Low-Code Playbook and increase time to value for your team and your customers. Download the free playbook today.

    Mission.org is a media studio producing content for world-class clients. Learn more at mission.org.

    Encore: Groundhogs & Rainbows with Robert LaMagna-Reiter

    Encore: Groundhogs & Rainbows with Robert LaMagna-Reiter
    On this episode of And Security For All, you will have an inside look at the keynote presentation from the FutureCon CyberSecurity Omaha Conference that took place on April 20th. Robert LaMagna-Reiter is the VP, Chief Information Security Officer at Hudl. He discusses in depth different key aspects of CyberSecurity and the Industry in a special presentation called 'Groundhogs and Rainbows'.

    Bonus Episode - Ben Malisow

    Bonus Episode - Ben Malisow

    In this bonus episode I talk with Ben Malisow who creates some of the best (ISC)2 training material in the world. He recently started a boot camp where he teaches professionals how to pass some of the top (ISC)2 exams for a reasonable price. As always if you enjoy this podcast please go leave a review of the show and share the podcast with someone. Thanks everyone!

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast

    Ben's Links:
    LinkedIn: https://www.linkedin.com/in/malisow/

    Boot Camps: wannabeacissp.com

    Podcast: securityzed.com

    Support the show

    Affiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902


    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    Groundhogs & Rainbows with Robert LaMagna-Reiter

    Groundhogs & Rainbows with Robert LaMagna-Reiter
    On this episode of And Security For All, you will have an inside look at the keynote presentation from the FutureCon CyberSecurity Omaha Conference that took place on April 20th. Robert LaMagna-Reiter is the VP, Chief Information Security Officer at Hudl. He discusses in depth different key aspects of CyberSecurity and the Industry in a special presentation called 'Groundhogs and Rainbows'.

    What’s the Deal With Computer Certifications?

    What’s the Deal With Computer Certifications?

    One common question I often receive is which computer certification should I get as a cable technician. Well, I don't know....I don't have any computer certifications. You know that that means? I bring on a subject matter expert to help talk about this topic. I interview Andreae Pohlman, an IT professional with many certifications and fellow Instagram and TikTok content creator. You can find more of her content at @just_an_IT_girl 

    Support the show

    Knowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com

    Chuck Bowser RCDD TECH
    #CBRCDD #RCDD

    Certifications in the Cloud

    Certifications in the Cloud

    Listen in as I speak with special guest Mohamed Malki, a lifelong educator and learner, about certifications in the cloud. Mohamed's real-world experience and desire to learn as much as he teaches provides a unique and authentic perspective. 

    Discussion topics include the different exam options for those getting into cloud, tips on preparing for exams, behind-the-scenes discussion on writing exams, and much more!

    Check out the show notes at: 
    https://www.cloudbutton.net/podcast#s1e7

    UMS

    UMS

    Ben Grooms works within the University of Maine System office Information Security office. He is an  Information Security Specialist. Ben also manages their internship program. He talks about the various CyberSecurity programs at each of Manie's seven campuses system-wide and the growing need for trained cybersecurity professionals.

    Listen to learn about his education & training pathways that led him to pursue information security as a career.

    Ben also mentions the services the Maine Division of Blind and Visually Impaired provides. Learn more here.

    Connect with Ben on LinkedIn.

    Visit the Unversity of Maine System's Security/Privacy page.

     

    Husson

    Husson

    Frank Barton is an  IT Systems & InfoSec Administrator. He works at Husson University in Bangor, Maine. In his role within the Information Technology Department, he supports system users with a variety of solutions. He interacts with internal stakeholders and external vendors daily to solve problems, make decisions and help keep Husson University's systems up and running.

    In this episode, you will learn about his education and career pathways.

    To learn more about careers at Husson University visit their website: https://www.husson.edu/about/human-resources/

     

    Security Unfiltered Ep 14 - Prashant Mohan - ISC2 Certification Training Tips

    Security Unfiltered Ep 14 - Prashant Mohan - ISC2 Certification Training Tips

    In this episode we talk with Prashant Mohan about his path to cyber security and some key tips and tricks for passing your ISC2 certification. These are tips & tricks that are often over looked but can mean the difference between you passing and failing your exam. Come join us in this fun discussion. Please feel free to connect with Prashant at his LinkedIn link below. 

    https://www.linkedin.com/in/prashant-mohan-cissp-ccsp-04610215/

    Follow the Podcast on Social Media! Links Below 
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: Coming Soon!

    Support the show

    Affiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902


    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    Security Unfiltered Ep 8 - Ben Malisow - All Things Security

    Security Unfiltered Ep 8 - Ben Malisow - All Things Security

    In this episode we talk to Ben Malisow about how he creates some of the most popular ISC2 study materials on the market. We discuss his journey to where he is now and we dive deep into current security issues and trends such as cloud security. Nothing is off limits in this podcast. Come join us in this episode of the Security Unfiltered Podcast. All links for all of Ben's latest books, materials and podcasts are below. Please check them out, I am sure he would appreciate it if you haven't already.

    Udemy: https://www.udemy.com/course/how-to-pass-your-infosec-exam/?referralCode=CEB07D31DF60C7FB5113


    How To Pass Your INFOSEC Exam book: https://www.amazon.com/Pass-Your-INFOSEC-Certification-Test-ebook/dp/B01N9VOL9O/ref=sr_1_1?crid=1MNDMFIAXEYYD&dchild=1&keywords=how+to+pass+your+infosec&qid=1615581998&sprefix=how+to+pass+your%2Caps%2C258&sr=8-1

    website/podcast: www.securityzed.com “The Sensuous Sounds Of INFOSEC”

    Gwen Bettwy’s book: https://www.amazon.com/CCSP-Cloud-Guardians-Certified-Professional-ebook/dp/B08WPFF25F/ref=sr_1_1?crid=2667A8A4GM6JD&dchild=1&keywords=gwen+bettwy&qid=1615589698&sprefix=gwen+bettw%2Caps%2C198&sr=8-1


    Prashant Mohan’s book: https://www.infosectrain.com/blog/ebook-cirrus-8000-ft-of-ccsp-course/


    CCSK Practice Tests book: https://www.amazon.com/CCSK-Practice-Tests-Ben-Malisow/dp/B08RR9KTZZ/ref=sr_1_2?crid=3GNLQ88RN23OX&dchild=1&keywords=ccsk+practice+tests&qid=1615589776&sprefix=ccsk+practice+%2Caps%2C291&sr=8-2


    Exposed (the privacy book), in audiobook format: https://www.amazon.com/Exposed-Revealing-Eliminating-Increases-Liberates/dp/B08XDQH3YJ/ref=tmm_aud_swatch_0?_encoding=UTF8&qid=1615589960&sr=8-2

    Follow the Podcast on Social Media! Links Below 
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: Coming Soon!

    Support the show

    Affiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902


    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    Security Unfiltered Ep 5 - ISC2 Certifications - Tips, Tricks & Guidance

    Security Unfiltered Ep 5 - ISC2 Certifications - Tips, Tricks & Guidance

    In this episode we discuss the most popular ISC2 certifications and we give our tips and tricks to passing these very difficult certifications. We also provide guidance on how we choose our own certifications for our careers. We hope you enjoy this episode. 

    Follow the Podcast on Social Media! Links Below 
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: Coming Soon!

    Support the show

    Affiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902


    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    Security Unfiltered Ep 3. Cloud Security Overview

    Security Unfiltered Ep 3. Cloud Security Overview

    In this episode we review some cloud security basics that every cloud security person needs to know to be successful with any cloud environment. Please join us as we dive in. 

    Follow the Podcast on Social Media! Links Below 
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: Coming Soon!

    Support the show

    Affiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902


    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io