Logo

    cybersecurityawareness

    Explore " cybersecurityawareness" with insightful episodes like "EP 055 Social Media Harms, The Dark Side of Tik Tok, Blackmail Emails, Remote Access of Home CCTV and the Digital Profiling of Children", "Episode 45: The Cyber Queen’s Untraditional Rise & Mission", "October 1, 2023", "1 de octubre de 2023" and "1 Octtobre 2023" from podcasts like ""The Security Circle", "Cybersecurity Simplified", "Embracing Digital This Week", "Abrazando lo Digital Esta Semana" and "Abbracciare il digitale questa settimana"" and more!

    Episodes (18)

    EP 055 Social Media Harms, The Dark Side of Tik Tok, Blackmail Emails, Remote Access of Home CCTV and the Digital Profiling of Children

    EP 055 Social Media Harms, The Dark Side of Tik Tok, Blackmail Emails, Remote Access of Home CCTV and the Digital Profiling of Children

    Scott Holland, a seasoned cybersecurity expert, has dedicated his career to fortifying the digital landscapes of schools, charities, and government entities. Born with an innate curiosity for technology, I embarked on a journey into the world of cybersecurity at a young age. 

    With a solid educational foundation in computer science and information security, Scott quickly became a sought-after professional in the cybersecurity realm. His passion for safeguarding sensitive information led him to specialize in developing robust and adaptive security solutions tailored to the unique challenges faced by educational institutions, charitable organizations, and government agencies.

    In his work with schools, Scott has implemented cutting-edge technologies to create secure learning environments. He understands the importance of safeguarding student and faculty information, fostering an atmosphere of trust and reliability within educational institutions.

    In the charitable sector, Scott has collaborated with various organizations to secure donor information, protect sensitive data, and ensure the continuity of their vital operations. His commitment to the values of these charities has made him a trusted partner in the nonprofit community.

    Scott's contributions to governmental cybersecurity initiatives have been instrumental in safeguarding national interests. Working closely with government agencies, he has implemented robust measures to defend against cyber threats, ensuring the integrity of critical systems and information.

    Beyond his technical prowess, Scott is known for his dedication to cybersecurity education and awareness. He actively engages with the community, conducting workshops, seminars, and awareness campaigns to empower individuals and organizations with the knowledge needed to navigate the evolving digital landscape safely.

    Ben:

     A dedicated, dependable and positive entrepreneur who, through professional and academic career to date, has gained a range of proficiencies and direct industry experience in providing organisations of all sizes with IT and cyber security systems that truly aid their business to grow in a safe and stable manner.

    Ben's military career saw him in various interesting endeavours from two tours of Afghanistan to training exercises in central Europe. This experience created a firm foundation of values, mindset, processes and the will to continue in the face of adversity. He worked with some truly amazing people during this time and attributes many of his successful traits to this period.

    Ben has a passion for, and can see a need to, provide quality IT services for the current business landscape that are customer service centric and absolutely provide an organisation with a stable platform from which to thrive and do what they do best. Ben believes IT is an enabler, and when harnessed correctly, efficiently and in a stable manner, is a catalyst to business growth.

    Ben has implemented imperative IT systems in highly specialised industries from public sector 24/7 CCTV monitoring server and networking infrastructure to cyber security protection platforms for the medical, legal and financial sector to ensure the data protection and safeguarding for their clients.

    https://ipoverwatch.com/
    Company Page:  https://www.linkedin.com/company/ip-overwatch/
    Ben personal:  https://www.linkedin.com/in/solomonben/
    Scott personal:  https://www.linkedin.com/in/scott-h-15078551/

    Source of statistics referenced
    https://www.guardchild.com/socia

    Security Circle ⭕️ is an IFPOD production for IFPO the International Foundation of Protection Officers

    Episode 45: The Cyber Queen’s Untraditional Rise & Mission

    Episode 45: The Cyber Queen’s Untraditional Rise & Mission

    In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone online is vulnerable if they connected to the world wide web, which includes our youth. Our very impressionable kids who love to click.

    Today, our guest on Cybersecurity Simplified is Amber DeVilbiss, a cyber queen who has a special place in her heart for educating kids and women. She uses her platform as a cybersecurity practitioner and influencer to reach the masses.

    About Amber DeVilbiss:

    DeVilbiss is crazy passionate about making the cyber world fun and accessible to humans of all ages. She promotes educational TikToks and writes/illustrates cybersecurity books for kids. She strongly believes in giving back and founded Teach Kids Tech – a foundation dedicated to providing children in underserved communities with access to technical literature and education. DeVilbiss has also helped co-found LIFT Women in Security, a nonprofit on a mission to enable and lift all females in tech!

    Learn how Overwatch Managed Cybersecurity is joining the fight against child trafficking:  https://www.highwirenetworks.com/overwatch-managed-security-joins-fight-against-child-trafficking/ 

    To get more cybersecurity news from High Wire Networks, visit:
    https://www.highwirenetworks.com/news-events/ 

    To learn more about the Cybersecurity Simplified Podcast and to browse previous episodes, visit:
    https://www.highwirenetworks.com/cybersecurity-podcasts/

    Have an inquiry or topic request, reach out to: podcast@highwirenetworks.com

    October 1, 2023

    October 1, 2023

    Digital transformation news for the week of October 1st including stories in data management, artificial intelligence, and cybersecurity. Come listen to the celebration of cybersecurity awareness month, an AI that makes Snoop Dogg a dungeon master for D&D, and learn about a new data architecture Polystore. Blog: https://embracingdigital.org/briefs/edw-35/en/episode.html Video: 

    1 de octubre de 2023

    1 de octubre de 2023

    Noticias de transformación digital para la semana del 1 de octubre, incluyendo historias sobre gestión de datos, inteligencia artificial y ciberseguridad. Ven y escucha la celebración del mes de concientización sobre ciberseguridad, un sistema de inteligencia artificial que convierte a Snoop Dogg en un maestro de mazmorras para D&D, y aprende sobre una nueva arquitectura de datos llamada Polystore.
    Blog: https://embracingdigital.org/briefs/edw-35/es/episode.html 
    Video: 

    1 Octtobre 2023

    1 Octtobre 2023

    Notizie sulla trasformazione digitale della settimana dell'1 ottobre, che includono storie sulla gestione dei dati, sull'intelligenza artificiale e sulla sicurezza informatica. Vieni a conoscere la celebrazione del mese della consapevolezza della sicurezza informatica, un'intelligenza artificiale che fa di Snoop Dogg un dungeon master per Dungeons & Dragons e scopri una nuova architettura dei dati chiamata Polystore. Blog: https://embracingdigital.org/briefs/edw-35/it/episode.html Video: 

    Voice of the Future: Exploring AI, Speech Tech, Ethics, and Regulations | A conversation with Nigel Cannings | Redefining Society with Marco Ciappelli

    Voice of the Future: Exploring AI, Speech Tech, Ethics, and Regulations | A conversation with Nigel Cannings | Redefining Society with Marco Ciappelli

    Guest/s Name Nigel Cannings, CTO at Intelligent Voice [@intelligentvox]

    Bio ✨Nigel Cannings is the CTO at Intelligent Voice. He has over 25 years' experience in both Law and Technology, is the founder of Intelligent Voice Ltd and a pioneer in all things voice. Nigel is also a regular speaker at industry events such as NVIDIA GTC and holds multiple patents in Speech, NLP and Confidential Computing technologies.  He is an Industrial Fellow at the University of East London.

    On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=uk

    Google Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en

    ____________________________

    Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
    _____________________________

    This Episode’s Sponsors

    BlackCloak 👉 https://itspm.ag/itspbcweb

    Bugcrowd 👉 https://itspm.ag/itspbgcweb

    Devo 👉 https://itspm.ag/itspdvweb

    _____________________________

    Episode Introduction

    Nigel Cannings, a lawyer and AI and Speech Technology expert, unravels the complexities of artificial intelligence, providing insights into ethics, regulation, and the human connection to technology in this captivating episode.


    In a world bursting at the seams with technology and information, the clash between the marvel of innovation and the ethical boundaries of creativity is becoming an increasingly prominent discussion. Welcome to the Redefining Society Podcast, hosted by Marco Ciappelli, where today's conversation delves into the complexity of artificial intelligence, speech technology, and the moral dilemmas that come with our pursuit of the unknown.

    As a co-founder of ITSPmagazine Podcast Network and an observer of technology's impact on society, I, Marco Ciappelli, find myself at the epicenter of this intriguing debate, steering conversations that push the boundaries and challenge the status quo. With this particular episode, we embark on a journey guided by the wisdom of Nigel Cannings, an AI expert and speech tech specialist, whose story interweaves the excitement of technological breakthroughs with the ethical questions that surround them.

    Nigel's extensive knowledge in AI, particularly in speech technology, sheds light on both the potential and the pitfalls of this exciting field. His hands-on experience ranging from detecting vulnerable customers and spotting fraud to grappling with biases in AI paints a comprehensive picture that doesn't shy away from the darker corners of technology. His background in law and his transition into technology add layers to a dialogue that is as fascinating as it is pertinent.

    In our conversation, Nigel and I explore the unseen worlds of voice scams, deep fakes, and the revolutionary growth of AI models. We discuss the ethics of AI, touching upon copyright issues, technology advancement, and the human element in the loop of data collection. We probe the question of fraud, the need for regulation, and the very essence of what it means to create something that appears intelligent.

    As I converse with Nigel, we drift between utopian visions and dystopian scenarios, yet the focus remains on the here and now. Where have we come from, and where are we going? How did we reach this point of sudden explosion in AI, and what does it truly mean for humanity? Is this a paradigm shift or merely a fleeting innovation?

    Our exchange exposes uncomfortable truths, such as the exploitation of workers in AI development and the blurred lines of legal boundaries. Yet, through the dialogue, we find shared dreams, a thirst for understanding, and a passion for unraveling the entangled web of ethics, technology, and human experience.

    So join us, dear listeners, as we delve into an episode that promises to be both enlightening and provocative. If you've ever pondered the impact of AI on your life or the moral complexities that come with innovation, this episode is for you. Let us redefine society together, exploring the intersection of technology, cybersecurity, and humanity.

    Your curiosity is the key, and the conversation has just begun. Subscribe, share, and stay tuned for a dialogue that promises to provoke, challenge, and inspire. Welcome to the Redefining Society Podcast.

    _____________________________

    Resources

    ____________________________

    To see and hear more Redefining Society stories on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-society-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast

    Voice of the Future: Exploring AI, Speech Tech, Ethics, and Regulations | A conversation with Nigel Cannings | Redefining Society with Marco Ciappelli

    Voice of the Future: Exploring AI, Speech Tech, Ethics, and Regulations | A conversation with Nigel Cannings | Redefining Society with Marco Ciappelli

    Guest/s Name Nigel Cannings, CTO at Intelligent Voice [@intelligentvox]

    Bio ✨Nigel Cannings is the CTO at Intelligent Voice. He has over 25 years' experience in both Law and Technology, is the founder of Intelligent Voice Ltd and a pioneer in all things voice. Nigel is also a regular speaker at industry events such as NVIDIA GTC and holds multiple patents in Speech, NLP and Confidential Computing technologies.  He is an Industrial Fellow at the University of East London.

    On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=uk

    Google Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en

    ____________________________

    Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
    _____________________________

    This Episode’s Sponsors

    BlackCloak 👉 https://itspm.ag/itspbcweb

    Bugcrowd 👉 https://itspm.ag/itspbgcweb

    Devo 👉 https://itspm.ag/itspdvweb

    _____________________________

    Episode Introduction

    Nigel Cannings, a lawyer and AI and Speech Technology expert, unravels the complexities of artificial intelligence, providing insights into ethics, regulation, and the human connection to technology in this captivating episode.


    In a world bursting at the seams with technology and information, the clash between the marvel of innovation and the ethical boundaries of creativity is becoming an increasingly prominent discussion. Welcome to the Redefining Society Podcast, hosted by Marco Ciappelli, where today's conversation delves into the complexity of artificial intelligence, speech technology, and the moral dilemmas that come with our pursuit of the unknown.

    As a co-founder of ITSPmagazine Podcast Network and an observer of technology's impact on society, I, Marco Ciappelli, find myself at the epicenter of this intriguing debate, steering conversations that push the boundaries and challenge the status quo. With this particular episode, we embark on a journey guided by the wisdom of Nigel Cannings, an AI expert and speech tech specialist, whose story interweaves the excitement of technological breakthroughs with the ethical questions that surround them.

    Nigel's extensive knowledge in AI, particularly in speech technology, sheds light on both the potential and the pitfalls of this exciting field. His hands-on experience ranging from detecting vulnerable customers and spotting fraud to grappling with biases in AI paints a comprehensive picture that doesn't shy away from the darker corners of technology. His background in law and his transition into technology add layers to a dialogue that is as fascinating as it is pertinent.

    In our conversation, Nigel and I explore the unseen worlds of voice scams, deep fakes, and the revolutionary growth of AI models. We discuss the ethics of AI, touching upon copyright issues, technology advancement, and the human element in the loop of data collection. We probe the question of fraud, the need for regulation, and the very essence of what it means to create something that appears intelligent.

    As I converse with Nigel, we drift between utopian visions and dystopian scenarios, yet the focus remains on the here and now. Where have we come from, and where are we going? How did we reach this point of sudden explosion in AI, and what does it truly mean for humanity? Is this a paradigm shift or merely a fleeting innovation?

    Our exchange exposes uncomfortable truths, such as the exploitation of workers in AI development and the blurred lines of legal boundaries. Yet, through the dialogue, we find shared dreams, a thirst for understanding, and a passion for unraveling the entangled web of ethics, technology, and human experience.

    So join us, dear listeners, as we delve into an episode that promises to be both enlightening and provocative. If you've ever pondered the impact of AI on your life or the moral complexities that come with innovation, this episode is for you. Let us redefine society together, exploring the intersection of technology, cybersecurity, and humanity.

    Your curiosity is the key, and the conversation has just begun. Subscribe, share, and stay tuned for a dialogue that promises to provoke, challenge, and inspire. Welcome to the Redefining Society Podcast.

    _____________________________

    Resources

    ____________________________

    To see and hear more Redefining Society stories on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-society-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Guest: Trond Arne Undheim, Founder of Yegii [@Yegii_Insight] and Research Scholar in Global Systemic Risk, Innovation, and Policy at Stanford University [@Stanford].

    On Linkedin | https://www.linkedin.com/in/undheim/

    On Twitter | https://twitter.com/trondau

    Website | https://trondundheim.com/

    On Facebook| https://www.facebook.com/trond.undheim/

    On Instagram | https://www.instagram.com/trondundheim/?hl=en

    On YouTube | https://www.youtube.com/channel/UCI4EpjuQzb58EiawzElwvYQ

    ____________________________

    Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
    _____________________________

    This Episode’s Sponsors

    BlackCloak 👉 https://itspm.ag/itspbcweb

    Bugcrowd 👉 https://itspm.ag/itspbgcweb

    Devo 👉 https://itspm.ag/itspdvweb

    _____________________________

    Episode Introduction

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Welcome to another thought-provoking episode of "Redefining Society" with your host, Marco Ciappelli. The show where we navigate the crossroads of technology, cybersecurity, and humanity, contemplating the philosophical questions that shape our existence in a world marked by continuous transformation.

    Today's episode invites us to embark on a journey where the future is not a distant concept, but an immediate reality. We find ourselves in a Hybrid Analog Digital Society, where the fabric of our lives is woven with the threads of technological advancement and human resilience. The call to stop ignoring or pretending that technology is not affecting us is resonating across our collective conscience.

    Joining us is Futurist Trond Undheim, founder of Yegii, and a Research Scholar at Stanford University. Trond's work delves into the complex interplay of evolving technology, geopolitical economy, and fragile ecosystems. By developing intelligent models and assessing cascading global risks, Trond aims to preserve the future of humanity and our planet.

    Through this candid conversation, we will explore:

    • The emerging technologies that offer opportunities and present imminent risks.
    • The tension between colossal technological ambitions and the necessity for sustainable growth.
    • The ways future industries can empower human workers alongside AI.
    • How regulators and professionals must adeptly navigate digital tools and human networks in a boundless pool of knowledge.

    Here, you will hear not only about predictions and patterns but the way history informs the future, and how Trond and others like him are reading the tea leaves of humankind's past to illuminate potential paths forward.

    So, pour yourself a coffee, settle in, and allow yourself to be challenged and inspired by this conversation that transcends mere observation and dives into action research. We're not just watching what's unfolding; we're exploring ways to shape it.

    If this topic resonates with you, don't keep it to yourself. Share this episode with friends, family, and colleagues, and encourage them to think, discuss, and question. Make sure to subscribe to "Redefining Society" for more enlightening conversations at the intersection of technology, cybersecurity, and society. Let's face it: The future is now, and we must embrace it together.

    _____________________________

    Resources

    Yegii | https://yegii.org/blog/

    ____________________________

    To see and hear more Redefining Society stories on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-society-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Guest: Trond Arne Undheim, Founder of Yegii [@Yegii_Insight] and Research Scholar in Global Systemic Risk, Innovation, and Policy at Stanford University [@Stanford].

    On Linkedin | https://www.linkedin.com/in/undheim/

    On Twitter | https://twitter.com/trondau

    Website | https://trondundheim.com/

    On Facebook| https://www.facebook.com/trond.undheim/

    On Instagram | https://www.instagram.com/trondundheim/?hl=en

    On YouTube | https://www.youtube.com/channel/UCI4EpjuQzb58EiawzElwvYQ

    ____________________________

    Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
    _____________________________

    This Episode’s Sponsors

    BlackCloak 👉 https://itspm.ag/itspbcweb

    Bugcrowd 👉 https://itspm.ag/itspbgcweb

    Devo 👉 https://itspm.ag/itspdvweb

    _____________________________

    Episode Introduction

    Shall we play a game? How about End of The World 2075, and then we can talk about exploring intelligent models to preserve the future of humanity? Ok! | A Conversation with futurist Trond Arne Undheim | Redefining Society Podcast With Marco Ciappelli

    Welcome to another thought-provoking episode of "Redefining Society" with your host, Marco Ciappelli. The show where we navigate the crossroads of technology, cybersecurity, and humanity, contemplating the philosophical questions that shape our existence in a world marked by continuous transformation.

    Today's episode invites us to embark on a journey where the future is not a distant concept, but an immediate reality. We find ourselves in a Hybrid Analog Digital Society, where the fabric of our lives is woven with the threads of technological advancement and human resilience. The call to stop ignoring or pretending that technology is not affecting us is resonating across our collective conscience.

    Joining us is Futurist Trond Undheim, founder of Yegii, and a Research Scholar at Stanford University. Trond's work delves into the complex interplay of evolving technology, geopolitical economy, and fragile ecosystems. By developing intelligent models and assessing cascading global risks, Trond aims to preserve the future of humanity and our planet.

    Through this candid conversation, we will explore:

    • The emerging technologies that offer opportunities and present imminent risks.
    • The tension between colossal technological ambitions and the necessity for sustainable growth.
    • The ways future industries can empower human workers alongside AI.
    • How regulators and professionals must adeptly navigate digital tools and human networks in a boundless pool of knowledge.

    Here, you will hear not only about predictions and patterns but the way history informs the future, and how Trond and others like him are reading the tea leaves of humankind's past to illuminate potential paths forward.

    So, pour yourself a coffee, settle in, and allow yourself to be challenged and inspired by this conversation that transcends mere observation and dives into action research. We're not just watching what's unfolding; we're exploring ways to shape it.

    If this topic resonates with you, don't keep it to yourself. Share this episode with friends, family, and colleagues, and encourage them to think, discuss, and question. Make sure to subscribe to "Redefining Society" for more enlightening conversations at the intersection of technology, cybersecurity, and society. Let's face it: The future is now, and we must embrace it together.

    _____________________________

    Resources

    Yegii | https://yegii.org/blog/

    ____________________________

    To see and hear more Redefining Society stories on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-society-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast

    Securing Your Business in the Digital Age: A Guide for Non-Technical Decision Makers

    Securing Your Business in the Digital Age: A Guide for Non-Technical Decision Makers

    In this episode, we sit down with cybersecurity expert Kip Boyle, who has been working in the field since 1992 and has held various leadership roles in the military, at a top research institute, and at a major insurance company. With his extensive experience and unique perspective, Kip shares insights on how non-technical business decision makers can understand and guard against cyber security risks, as well as how to harness the business value of digital security. He also discusses the common challenges and misconceptions that organizations face when it comes to cyber risk management and how his company, Cyber Risk Opportunities, helps executives optimize their cyber risk management programs. Kip's book, Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks is available as a free download for listeners of the show. This is an episode you don't want to miss if you're looking to up your cyber risk management game and safeguard your business in the digital age.

    Meet Our Guest
    Kip Boyle is a husband, dad, entrepreneur, and experienced cyber risk manager. He founded Cyber Risk Opportunities LLC in 2015 after 7 years as the CISO of PEMCO Insurance in Seattle. As a captain on active duty in the US Air Force, he served in the Combat Archer and F-22 Stealth Fighter programs, where he was the director of enterprise network security. These days, he serves as virtual chief information security officer for many customers, including a professional sports team and fast-growing FinTech and AdTech companies. Over the years, Kip has built teams by interviewing hundreds of cybersecurity professionals. And now, he’s sharing his insider’s perspective with you!

    Show Links
    Follow us on Twitter: @thedwwpodcast 

    Email us: podcast@digitalworkspace.works 

    Visit us: www.digitalworkspace.works 

    Subscribe to the podcast: click here
    YouTube channel: click here


    Download your free copy of Fire Doesn't Innovate
    Get in touch with Kip on LinkedIn or via email at Kip@cyberriskopportunities.com

    ★ Support this podcast on Patreon ★

    Chris Krebs Speaks to The Crew & Twitter Whistleblower

    Chris Krebs Speaks to The Crew & Twitter Whistleblower

    In this week's episode, the cybersecurity experts Bryan Hornung, Reginald Andre, Randy Bryan, and Ryan O'Hara discuss what they have been doing in Charlotte, North Carolina, for cybersecurity and what's happening nowadays. Next, the crew will get into what they are hearing from a former CISA Director, Chris Krebs, who is well-known in cybersecurity. Lastly, the crew will get into the recent Twitter Whistle Blower report in the news and how this impacts cybersecurity professionals and business leaders.

    Tune in! Like and Subscribe!

    CyberSecurity with Edward Amoroso

    CyberSecurity with Edward Amoroso

    Experienced Chief Executive Officer, Chief Security Officer, Chief Information Security Officer (second person to hold the CISO position in history), University Professor, Security Consultant, Keynote Speaker, Computer Science Researcher, and Prolific Author (six published books) with a demonstrated history of working in the telecommunications industry beginning at Bell Labs and leading to SVP/CSO position at AT&T. Skilled in Cyber Security, Network Architecture, Wide Area Network (WAN), Managed Services, and Network Design. Strong entrepreneurship professional with PhD in Computer Science from the Stevens Institute of Technology, and also a graduate of Columbia Business School. Directly served four Presidential Administrations in Cyber Security, and now serves as a Member of the M&T Bank Board of Directors, Senior Advisor for the Applied Physics Lab at Johns Hopkins University, Adjunct CS Professor at the Stevens Institute of Technology, CS Department Instructor at New York University, and Member of the NSA Advisory Board (NSAAB). 

    Support the show

    How To Deal With a Compromise

    How To Deal With a Compromise

    In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise. Most of the time you will hear about the technical information but it’s rare you will hear about the mental and emotional aspect. 
     

    To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below 

    Top Cyber Security Solution Providers

    Top Cyber Security Solution Providers

    In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of:  

     

    Top Cyber Security Solution Providers 

    1. Beyond Trust
    2. Black Berry - Cylance
    3. Carbon Black
    4. Check Point 
    5. Cisco 
    6. Crowdstrike
    7. CyberArk 
    8. Dark Trace
    9. Force Point 
    10. Fortinet
    11. KnowBe4 
    12. IBM
    13. Palo Alto
    14. ProofPoint 
    15. RSA Networks
    16. Symantec
    17. Splunk 
    18. Sophos
    19. Transmit Security
    20. TrendMicro
    21. Vectra 


     

    Top Cyber Security solutions 

     

    Categories: 
    Software

    Hardware 

    Services/Consulting 


     

    Different Solutions: 

    -Data Loss Prevention

    -Identity and Access Management - IAM

    -Priviedge Access Management - PAM

    -Risk and compliance management 

    -Encryption

    -Unified Threat Management (UTM)

    -Firewall 

    -Antivirus/Antimalware Solutions 

    -Intrusion Detection Systems (IDS)

    -Intrusion Prevention Systems (IPS)

    -Network Detection System (NDS)

    -Network Prevention System (NPS)

    -Disaster Recover 

    -Email Security 

    -End Point Security 

    -Network Detection Security 

    -Security Information and Event Management (SIEM) 

    -Advance Threat Protection (ATP)

    -Cloud Access Security Broker 

    -Secure Web Gateway 

    -Internet of Things Security (IoT)

    -Network Access Control (NAC) 


     

    To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below 

    Disney Plus Was Hacked

    Disney Plus Was Hacked

    In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. 

     

    News: 

    Disney Plus Accounts Are Already Being Hacked and Sold online
     

    On November 12th, 2019 the day Disney Plus went live user accounts where hacked. 

    "Hijacked Disney+ accounts are being sold online just hours after Disney's new streaming service launched, reports have claimed.

    Many of these stolen accounts are being offered for free on hacking forums or are available for sale with prices ranging from $3 to $11, despite the fact that a legitimate Disney+ subscription only costs $7."
     

    “ Disney+ credentials

    The hackers behind these account takeovers were able to mobilize quickly to steal Disney+ account credentials and make them available for sale online. This suggests that they either gained access to these accounts by either using leaked credentials from past data breaches or by using info-stealing malware.

    Hacking forums now have thousands of Disney+ accounts available for sale but ZDNet also discovered that some forums were giving away these credentials for free so that the hacker community could use and share them with others.
     

    https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online


     

    Fundamental Principals of Cyber Security 

    1. Personal Security 
    2. Risk Management 
    3. Business Continuity 
    4. Laws, Regulations and Compliance 
    5. Investigation and Ethics 

     

    C.I.A - "Confidentiality, Integrity and Availability”
     

    Confidentiality - is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to people, places or things.

    Integrity - is the concept of protecting the reliability and integrity. Integrity protection prevents unauthorized alternation. 

    Availability - Which means authorized subjects are granted timely and uninterrupted access. 

     

    To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below 

    List of Careers in Cyber Security

    List of Careers in Cyber Security

    In today’s DailyCyber Podcast which you can listen to on the go. I discuss different positions in Cyber Security to help you as you are researching for your career. I also share what questions I would recommend you should ask yourself.

    To learn more watch the video or listen to the podcast and comment below

    50 Cybersecurity Titles That Every Job Seeker Should Know About

    From: Cybercrime Magazine

    Editor: Steve Morgan

    https://cybersecurityventures.com/50-cybersecurity-titles-that-every-job-seeker-should-know-about/

     

    1.  Application Security Administrator – Keep software / apps safe and secure.

    2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime

    3. Automotive Security Engineer – Protect cars from cyber intrusions.

    4. Blockchain Developer / Engineer – Code the future of secure transactions.

    5. Blue Team Member – Design defensive measures / harden operating systems.

    6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.

    7. Cybersecurity Scrum Master – Watch over and protect all data.

    8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.

    9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.

    10. Cloud Security Architect – Secure apps and data in the cloud.

     

     

     

    SANS

    https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs

    20 Coolest Cyber Security Jobs:

    1.  Application Security Administrator

    – Keep software / apps safe and secure.2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.3. Automotive Security Engineer – Protect cars from cyber intrusions.4. Blockchain Developer / Engineer – Code the future of secure transactions.5. Blue Team Member – Design defensive measures / harden operating systems.6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.7. Cybersecurity Scrum Master – Watch over and protect all data.8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.10. Cloud Security Architect – Secure apps and data in the cloud.

     

    2. Threat Hunter

    Featured top of the list for good reason, Threat Hunters are one of the most valuable jobs to the IT industry, with skills shown to improve the speed of threat detection and response more than two-fold, in comparison to teams without this dedicated resource. Enjoy job security by offering a 64% improvement in the detection of advanced threats, and a 63% reduction in investigation time according to the 2018 Threat Hunting Report.

    Related SANS courses and GIAC Certification: FOR578 (GCTI Certification), FOR572 (GNFA Certification), FOR508 (GCFA Certification), FOR526, FOR610 (GREM Certification) and SEC487

     

    3. Penetration Tester

    "Penetration testing is the active circumvention of security features in networks, systems, and applications. This is where the penetration tester emulates threats by attempting to access alternative functionality. A penetration tester will also assess data or functionality in a manner not anticipated by the group designing that system. A good penetration tester will need to be highly technical and will also require a level of skill that enables meaningful communication of risk to management. Pen testing is a critical capability that most organisations will require, and it can also be quite fun, if not sometimes tedious. I love what I do, both as a tester and as an instructor for SANS."

    Adrien De Beaupre SANS SEC642 Instructor

    Related SANS courses: SEC487, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)

     

    4. Forensic Computer Analyst

    Analyst findings might be used as evidence in a criminal investigation, to resolve a business or legal dispute, to uncover specific targets or to detect suspicious activity.

    Related SANS courses: All FOR classes plus SEC504, (GCIH Certification), SEC401 (GSEC Certification) and SEC487

     

    5. Incident Responder

    When you're passionate about fighting cyber-crime, being an incident responder will bring a great deal of job satisfaction. Learn to discover the issue, mitigate the damages and investigate the situation from all angles.

    Related SANS courses: All FOR classes plus SEC504 (GCIH Certification), SEC501 (GCED Certification) and SEC487

     

    6. Security Architect

    Design, build and supervise the implementation of network and computer security. As a Network Security Architect, you will test for vulnerabilities and install firewalls, along with various security policies and procedures.

    Related SANS courses: SEC450, SEC503 (GCIA Certification), SEC511 (GMON Certification), SEC530, (GDSA Certification), FOR572 (GNFA Certification), SEC501 (GCED Certification) and MGT516

     

    7. Malware Analyst

    For those that like to fight the breach head on, a Malware Analyst will ensure the fast and effective response and containment to a cyber-attack.

    Related SANS courses: FOR610 (GREM Certification)

     

    8. CISO/ISO or Director of Security

    As a chief information security officer, you will be the balance between the IT department and the boardroom, with an equal understanding of both business and information security. Together with the ability to influence and negotiate, you will also have a thorough knowledge of global markets, policy, and legislation. With the ability to think creatively, the CISO will be a natural problem solver and will find ways to jump into the mind of a cyber criminal, discovering new threats and their solutions.

    Related SANS courses: SEC401 (GSEC Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)

     

    9. Security Software Developer

    As a senior developer, this creative position requires the ability to design secure software using protected programming techniques, that are free from vulnerabilities which could be abused by hackers. You will have the ability to incorporate security analysis, defences and countermeasures in order to ensure strong and reliable software.

     

    Related SANS courses: MGT525 (GCPM Certification), DEV522 (GWEB Certification), DEV541, DEV544, and SEC540 (GIAC Certification coming soon)

     

    10. Media Exploitation Analyst/Law Enforcement Computer Crime Investigator

    If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked or damaged, then this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.

     

    Related SANS courses: FOR500 (GCFE Certification), FOR585 (GASF Certification), FOR518 and FOR498

     

    11. Software Validation Engineer

    As a software validation engineer, you will assess software in order to verify issues and log defects. You will be responsible for developing summary reports for tests performed and will review data with all team members. In summary, to fill this role you will be a qualified engineer responsible for managing, inspecting, testing and modifying the equipment and procedures used to manufacture various products.

     

    Related SANS courses: MGT525 (GCPM Certification) and SEC540 (GIAC Certification coming soon)

     

    12. Security Operations Centre Analyst

    SOC Analysts work alongside security engineers and SOC managers, to provide situational awareness through detecting, containing, and resolving IT threats. Working closely with incident response teams, a SOC analyst will address security issues - when detected, quickly and effectively.

     

    Related SANS courses: SEC501 (GCED Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification) and SEC555 (GCDA Certification)

     

    13. Vulnerability Researcher/Exploit Developer

    As one of the fastest growing careers in the tech industry, this vital role is responsible for research and analysis of new exploits and will hold experience in penetration testing and writing exploit code.

     

    Related SANS courses: SEC460, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)

     

    14. Security Audit and Risk Management Specialist

    As the role responsible for identifying and assessing a company's potential risks to safety, reputation and financial prosperity, the security audit and risk management specialist will have strong problem solving and analytical skills together with an ability to negotiate and be diplomatic while working under pressure.

     

    Related SANS courses: SEC401 (GSEC Certification), MGT516, MGT525 (GCPM Certification), DEV522 (GWEB Certification) and SEC540 (GIAC Certification coming soon)

     

    15. Cyber Security Analyst/Engineer

    As one of the highest-paid jobs in the field, the skills required to gain footing in this role are advanced. You must be highly competent in threat detection, threat analysis, and protection, broken authentication, cross-site scripting and cross-site request forgery. This is a vital role in preserving the security and integrity of an organisation's data.

     

    Related SANS courses: SEC401 (GSEC Certification), SEC501 (GCED Certification), MGT516, MGT525 (GCPM Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification), SEC503 (GCIA Certification), SEC530 (GDSA Certification) and SEC555 (GCDA Certification)

     

    16. Mobile Security Manager

    Taking care of an organisation's mobile device safety, as a Mobile Security Manager you are responsible for monitoring and securing all of a companies' Smartphones, laptops, smartwatches, and other connected devices. Managing the collective tools, technologies, and processes that enable the securing of a mobile device or mobile computing environment, you will be part of a broader information security management policy that focusses mainly on mobile IT assets.

    Related SANS courses: FOR585 (GASF Certification), plus SEC575 (GMOB Certification) and MGT514 (GSTRT Certification)

     

    17. Application Penetration Tester

    One of the most exciting roles within the cyber security industry, you will be responsible for the penetration testing (or ethical hacking), of applications; a significantly vulnerable point. The objective is to find security weaknesses before a cyber criminal does.

    Related SANS courses: DEV522 (GWEB Certification)

     

    18. Disaster Recovery/Business Continuity Analyst/Manager

    Level up your skills and earn your place as a disaster recovery manager, where you will be responsible for managing the design, implementation, and communication of organisations continuance and disaster recovery plans. Your processes will ensure the safeguarding of business data, technology, information systems, and databases.

    Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT514 (GSTRT Certification) and MGT516

     

    19: Technical Director and Deputy CISO

    Would you like to train and develop future leaders in the cyber security department? You will be responsible for deciding on the costs needed to develop senior roles, on executing the security strategy consistently throughout the department and identifying and managing the skills and weaknesses of associates.

    Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)

     

    20: Intrusion Analyst

    "I've come to realise that network monitoring, intrusion detection, and packet analysis represent some of the very best data sources within our enterprise. These can be used to very rapidly confirm whether or not an incident has occurred, and allow an experienced analyst to determine, often in seconds or minutes, what the extent of a compromise might be. In a very real sense, I have found this to be the most important course that SANS has to offer. Not only will it cause you to think about your network in a very different way as a defender, but it is incredibly relevant for penetration testers who are looking to "fly under the radar." The concepts that you will learn in this course apply to every single role in an information security organisation!"

    David Hoelzer — SANS SEC503 Instructor

    Related SANS courses: SEC503 (GCIA Certification) and SEC401 (GSEC Certification)

     

    21: IoT/Critical Infrastructure Security Director

    A crucial role within today's world where cyber attacks to our critical infrastructure are increasing in risk. In an age where almost every devise or piece of machinery can be connected to the internet, they too are at risk of being hacked. The Internet of Things (IoT) has evolved so quickly that managing its security has become a minefield. When we look broadly into the matter, Critical Infrastructure is at risk to foul play. Power grids, chemical plants, and transportation systems are being attacked by hackers. In a report by Business Insider, ?A new front in cybersecurity', investigations found that companies operating critical infrastructure reported 295 cyber attacks in 2015. While technology is consistently evolving, so too will attacks to this industry.

    The role of security director to IoT and Critical Infrastructure is invaluable - some might say indispensable.

    Related SANS courses: All SANS ICS Courses and Certifications, plus MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)

    https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io