DiscoverRansomware Rewind
Ransomware Rewind
Claim Ownership

Ransomware Rewind

Author: Joe Erle

Subscribed: 3Played: 4
Share

Description

Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight.

Why Subscribe?

Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends.

Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand.

Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field.

We dive deep into the latest in cybersecurity, cyber insurance, and ransomware.

Mike Dowdy is the former president of two hosting companies and has been in the trenches of cyber security for over ten years. He has tribal knowledge on protecting yourself from threats and what to do if you are a victim.

Joe S Erle, MBA, CIC, CRM, TRA knows firsthand the devastating effects of not having a cyber security insurance plan. Despite the dry nature of cyber insurance Joe's advice is entertaining, fun, and educational.
15 Episodes
Reverse
In this episode of the Ransomware Rewind podcast, we interviewed David Ritter, CEO and co-founder of Penta Privacy Lock. David elaborates on the complexities of privacy regulations like GDPR and CCPA amidst recent significant data breaches. He discusses the importance of privacy compliance in addition to robust cybersecurity measures and introduces Privacy Lock as a tool for mitigating the fallout from privacy breaches. 00:00 Introduction and Guest Introduction 00:49 Recent Ransomware and Privacy Breaches 01:36 Regulations and Privacy Laws Overview 03:37 Challenges in Privacy Compliance 05:20 Blockchain and Privacy Compliance 07:05 Privacy Lock and Mitigating Breach Fallout 11:04 Costs and Fines for Privacy Breaches 16:29 Healthcare Data Privacy 28:33 Consumer Privacy Rights and Future Trends 32:46 Conclusion and Contact Information Guest: David Ritter Website / https://www.myprivacylock.io LinkedIn / https://www.linkedin.com/in/davidritter1984boulder Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance  X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/ Co-Host: Mike Dowdy, Cloud Solutions & AI Consultant  LinkedIn / https://www.linkedin.com/in/mikedowdy/ Thanks again for listening to the show - Don't forget to Like, Comment, and Subscribe!
In this episode, we sit down with Chris Hood, a seasoned customer experience expert, to discuss the critical steps management should take in the event of a cybersecurity breach. Chris offers valuable insights into building and maintaining customer trust, effective communication during crises, and leveraging AI to enhance cybersecurity. Perfect for business leaders, technology enthusiasts, and anyone interested in the intersection of cybersecurity and customer experience. Don't miss this engaging conversation filled with practical advice and real-world examples. 00:00 Introduction to the Ransomware Rewind Podcast 00:03 Meet Chris Hood: Customer Experience Expert 00:57 Understanding the Human Side of Cybersecurity 04:06 The Importance of Customer Trust During a Breach 05:36 Challenges in Rebuilding Trust Post-Incident 08:09 Examples of Good and Bad Customer Experiences 13:24 The Role of Call Centers in Customer Experience 18:07 Leveraging AI in Cybersecurity 20:07 The Concept of Zero-Factor Authentication 23:13 Password Security and Best Practices 26:08 Career Opportunities in Cybersecurity 26:46 Cybersecurity Summer Camp Experience 27:34 Proud Parent Moments and Financial Challenges 27:57 Where to Buy the Books 28:22 Target Audience for the Books 29:47 Favorite Stories from the Books 32:40 Advice for Leaders After a Breach 34:25 Importance of Backups in Cybersecurity 39:57 Good Customer Experience Examples 44:53 The Cost of Customer Churn 45:24 Conclusion and Final Thoughts Hosts: Joe Erle, Cyber Group Practice Leader at C3 Insurance X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/ Mike Dowdy, Cloud Solutions Consultant LinkedIn / https://www.linkedin.com/in/mikedowdy/ Chris Hood Website / https://chrishood.com Insta / https://www.instagram.com/chrishood.ig/?hl=en LinkedIn / https://www.linkedin.com/in/chrishood 
Dr Chase Cunningham AKA Dr. Zero Trust goes after the "Big Cyber" and the US government telling truths about BS and mishandling sensitive and top secret data. Join us on this episode of the Ransomware Rewind podcast as we dive deep into the world of Zero Trust and current cyber events with Dr. Chase Cunningham, also known as Dr. Zero Trust. From his extensive background working with the government and armed forces Dr. Cunningham provides expert analysis on the complex landscape of digital security. We also discuss the implications of AI, the future of warfare, and the critical role of encrypted messaging apps like Signal in today's environment. Additionally, he shares his thoughts on cyber insurance, the importance of operational security at all levels, and provides a sneak peek into his latest books, 'Variable' and 'Buy the Breach.' Whether you're a cybersecurity professional or a curious listener, this episode is packed with crucial information and engaging discussion. Don't forget to like, subscribe, and share! 00:00 Introduction to Dr. Zero Trust 00:33 Weekend Plans and Government Work 01:41 Signal Gate Scandal 03:40 Security Clearances and Hypocrisy 06:35 Classified Information and Signal 09:24 Social Engineering Risks 13:28 Government Backdoors in Messaging Apps 16:24 Dr. Zero Trust's Books 21:17 Discussing Favorite Actresses 21:34 Making Money from Breaches 22:57 Case Studies on Breaches 23:33 The Value of Cyber Insurance 24:56 Suspicious Investments and Breaches 25:58 Consulting and Pro Bono Work 26:54 Incident Response Stories 28:44 Future of AI and Robotics 31:24 Challenges in Quantum Computing 34:01 Final Thoughts and Sign Off   Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance  X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/   Cohost: Mike Dowdy, Cloud Solutions Consultant  LinkedIn / https://www.linkedin.com/in/mikedowdy/   Guest: Dr. Chase Cunningham Chief Strategy Officer, Author  LinkedIn / https://www.linkedin.com/in/dr-chase-cunningham/ Email / chase@drzerotrust.com Website / www.drzerotrust.com    Podcast: https://www.youtube.com/@drzerotrust  Apple Music: https://podcasts.apple.com/us/podcast/drzerotrust/id1570251081 Spotify: https://open.spotify.com/show/5YrSai2Q9UGATh8GXgzA5K  Pre-order his lates book on Amazon here: https://a.co/d/hDRcQpV  Thx for joining us.  Life, Subscribe, and share to help up make an impact in protecting businesses and individuals from hackers.
In this episode of Ransomware Rewind, I interview Alexandre Blanc, a strategic cybersecurity advisor at Alexandre Blanc Consulting, to discuss critical issues in data protection and cybersecurity. He shares practical advice for consumers and businesses to manage their digital footprints, employ multi-factor authentication, and use encrypted passkeys. We also discuss the implications of digital identities, data leaks, AI in cybersecurity, and the importance of maintaining control over personal data. Moreover, the conversation covers the future of AI, the need for public awareness, and tips to enhance personal and organizational cybersecurity postures. 00:00 Guest Introduction 00:46 Massive Credential Breach Discussion 01:07 Data Protection and Cloud Security 04:09 Risk Management for Individuals 05:11 Password Management and Security Best Practices 07:50 Digital Footprint and Dark Web Investigations 10:57 Identity Theft and Real-World Examples 13:06 Public Cloud Risks and Data Privacy 14:47 AI and Data Collection Threats 22:18 Digital Transformation and Human Impact 25:26 The Disappearance of a LinkedIn Contact 25:57 The Role of Technology in Human Control 26:19 The Debate on Connected Cars 26:54 Data Ownership and Privacy Concerns 27:33 Psychological Profiling and Media Influence 31:19 The Impact of AI on Cybersecurity 32:33 The Future of AI: Star Trek or Skynet? 32:51 Balancing Technology and Human Freedom 33:51 Generational Differences in Tech Perception 38:38 The Responsibility of Content Creators 44:44 Practical Advice for Digital Privacy Joe Erle, Cyber Group Practice Leader at C3 Insurance X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/ Mike Dowdy LinkedIn / https://www.linkedin.com/in/mikedowdy/ Special Guest: Alexandre Blanc Cyber Advisor - Consultant - President and Owner LinkedIn / https://www.linkedin.com/in/alexandre-blanc-cyber-security Don't forget to like and subscribe!  
In this episode of the Ransomware Rewind podcast, Mike and Joe interview renowned cybersecurity expert Eric Cole, also known as the Cyber Czar. The discussion delves into Eric's fascinating journey from being a CIA hacker in the 1980s to creating successful cybersecurity firms and becoming a thought leader in the industry.  Read down to the bottom to get the link for Dr. Eric Cole's book for free! 00:00 Welcome to Ransomware Rewind 01:06 Eric's Journey to the CIA 05:42 Early Cybersecurity Challenges 10:31 Adventures with John McAfee 15:44 The Butterfly Effect Philosophy 24:52 The Importance of Business Acumen for CISOs 28:53 The Power of Effective Communication 29:14 The Butterfly Effect in Cybersecurity Training 29:34 Sharing Knowledge for Greater Impact 30:01 Challenges in Communicating Security Needs 30:28 Humorous Take on ROI in Personal Life 30:57 Avoiding Unwinnable Fights 31:08 Debating the Role of Chinese Nationals in Tech 32:24 Inconsistencies in Tech Regulations 34:40 The Cold War of Cybersecurity 37:21 The Backbone of the Internet 39:23 The Future: Star Trek or Skynet? 40:31 Ethical Dilemmas in Predictive Policing 42:51 Final Thoughts and Future Plans Joe Erle, Cyber Group Practice Leader at C3 Insurance X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/ Mike Dowdy LinkedIn / https://www.linkedin.com/in/mikedowdy/ Special Guest: Dr. Eric Cole, Cybersecurity Expert Consulting Company / https://secure-anchor.com/about/ LinkedIn / https://www.linkedin.com/in/ericcole1/ Youtube / https://www.youtube.com/c/DrEricCole Bulletproof Cyber Podcast / https://www.youtube.com/channel/UCY8Ef086jcWMvx0wkArY-xA  Instagram / https://www.instagram.com/drericcole/?hl=en X / https://x.com/drericcole Buy Eric's Book, Cyber Crisis on Amazon: https://a.co/d/bxH94tF  Get Eric's newest book for free here: https://safe.secure-anchor.com/online-danger-free  Thx for watching - Don't forget to like and subscribe.
Dennis Underwood, a cybersecurity expert and CEO of Cyber Crucible, joins the show to discuss a variety of topics ranging from his experiences in Pittsburgh to the intricacies of cybersecurity. He delves deep into the technical aspects and importance of cybersecurity. He explains how Cyber Crucible's autonomous software works to prevent data breaches in real-time, even preventing hackers from executing malware. Our conversation also touches on the evolution of hacking tactics, the importance of multifactor authentication, the value of cyber insurance, and practical security tips for businesses. We discussed the increasingly professional structure of hacking organizations, compared various cybersecurity solutions, and explored some notable cyberattacks, including ransomware incidents. The episode wraps up with a focus on the human element in cybersecurity and the critical role of preparation and proper planning in preventing cyber threats. If you enjoyed this episode, don't forget to subscribe. Thank you for listening! 00:00 Introduction 01:01 Cyber Crucible Product Overview 02:33 Explaining Cyber Crucible 04:49 Comparing Cybersecurity Products 06:26 Hacker Techniques and Evolution 19:37 Influencers and Cybersecurity 26:32 Exploring Insurance for Online Marketplaces 27:13 Underwriting and Due Diligence in Insurance 29:10 Cybersecurity Threats: NotPetya and Ransomware 31:31 Ransomware Negotiations and Hacker Motivations 35:01 Suspicious Ransom Payments and Company Involvement 40:26 Targeted Hacks and Executive Protection 46:31 Practical Security Tips for Businesses 52:17 Connecting with Dennis Underwood and Crowdfunding   Social Media: Connect to Joe, Mike, and David on social media platforms like LinkedIn, TikTok, and Instagram: Joe Erle, Cyber Group Practice Leader at C3 Insurance X / https://x.com/joe_erle Tiktok / https://www.tiktok.com/@itscyberjoe Insta / https://www.instagram.com/itscyberjoe/ Meta / https://www.facebook.com/joeerle/ LinkedIn / https://www.linkedin.com/in/joeerle/ Questions about cyber insurance? Email joe@c3insurance.com Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/ Co-Host: Mike Dowdy, Cloud Solutions Consultant at RapidScale LinkedIn / https://www.linkedin.com/in/mikedowdy/ Questions about cloud security? Email mike.dowdy@rapidscale.net  www.rapidscale.net Special Guest: Dennis Underwood, CEO of Cyber Crucible LinkedIn / https://www.linkedin.com/in/dennis-underwood/ Cyber Crucible / https://www.cybercrucible.com/ See you next time.  #cybersecurity #ransomware #ransomwarerewind
Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud David Fradin tells his harrowing story of a how he lost $1.7 million to a sophisticated online pig butchering scam. Learn key insights and practical tips to protect yourself from similar scams. Discover the complex tactics scammers use to build trust and exploit victims, and explore actionable solutions to help prevent these crimes. Tune in to become more aware and better equipped to safeguard your finances and personal information 00:00 Introduction and Crypto Scam Experience 00:32 Guest Introduction and Mission 01:09 Keys to Product Success 02:06 Podcast and Professional Background 03:21 Detailed Scam Story 08:18 Scam Aftermath and Financial Impact 10:31 Government and Law Enforcement Involvement 13:02 Global Scam Operations and Solutions 14:00 Social Media's Role in Scams 22:25 WhatsApp and Social Media Accountability 24:08 Apple's Values and Final Thoughts 25:05 From Political Campaigns to Product Management 25:34 The Staggering Impact of Pig Butchering Scams 25:50 Victim Blaming and Stigma 26:23 Creative Solutions to Combat Scams 26:42 Recognizing Scam Tactics 29:19 The Role of AI in Scams 32:09 Crypto and Financial Fraud 34:16 Charity and GoFundMe Scams 35:04 Bike Theft and Recovery 40:11 Final Thoughts and Advice Social Media: Connect to Joe, Mike, and David on social media platforms like LinkedIn, TikTok, and Instagram Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance X/ joeerle Insta/ itscyberjoe Tiktok/ itscyberjoe Meta/ joeerle LinkedIn/ https://www.linkedin.com/in/joeerle/ Questions about cyber insurance?  Email joe@c3insurance.com Get the PDF - 14 Steps to Protect your Company's Data Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale LinkedIn/ https://www.linkedin.com/in/mikedowdy/ Questions about cloud security? Email mike.dowdy@rapidscale.net www.rapidscale.net Special Guest David Fradin Operation Shamrock (helps people who've been victims of internet fraud and pig butchering): https://operationshamrock.org/ David's LinkedIn: https://www.linkedin.com/in/davidfradin David's Consulting Company: www.spicecatalyst.com David's Book - Letters from my Hymie: https://a.co/d/4GnKUOW Don't forget to subscribe. Check out our other episodes & thank you for listening.
Business owners and IT professionals: Learn how to kickstart a successful career in cybersecurity with expert insights from Cybersecurity Consultant and Content Creator, Sam Romanov. Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they explore the latest trends in cybersecurity. Discover practical tips on becoming a cybersecurity consultant and how to train yourself to be competitive in this cybersecurity job market. Key Takeaways: Breaking into Cybersecurity: Tips for beginners looking to start their careers. CISO Consulting: The role of a Chief Information Security Officer and how to become a successful consultant. Cybersecurity Trends: Understanding the latest threats and technologies shaping the industry. Career Advancement: Strategies for professionals looking to grow in their cybersecurity careers. Explore the world of cybersecurity with Sam Romanov, a renowned expert in the field. Learn about the latest trends, challenges, and opportunities in cybersecurity consulting. From breaking into the industry to becoming a successful CISO consultant, this episode provides actionable advice for both beginners and seasoned professionals. Chapters: Introduction and Guest Introductions (00:00 - 03:02) Getting Started in Cybersecurity (03:02 - 07:46) CISO Consulting: Challenges and Opportunities (07:46 - 14:44) Cybersecurity Trends and Threats (14:44 - 21:22) Practical Tips for Career Advancement (21:22 - 26:02) Navigating Cybersecurity Regulations (26:02 - 31:11) Closing Thoughts and Contact Information (31:11 - 40:45) This episode of the podcast features Sam Romanov, a cybersecurity expert with extensive experience in the field. The discussion focuses on how to enter the cybersecurity industry, the role of a CISO consultant, and the latest cybersecurity trends. Sam shares insights on overcoming common challenges and provides practical advice for advancing your career in cybersecurity. Recommended Certifications for Cybersecurity: CompTIA Network+: Essential for understanding networking fundamentals. CompTIA Security+: A foundational certification for security professionals. CISSP: Advanced certification for experienced security professionals. CISM: Focuses on risk management and information security governance. Social Media: Join our conversation on social media platforms like LinkedIn, TikTok, and Instagram, where we share insights, news, and tips on cybersecurity. Engage with our community to stay informed and network with fellow cybersecurity enthusiasts. Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance https://www.linkedin.com/in/joeerle https://www.instagram.com/itscyberjoe/ https://www.tiktok.com/@itscyberjoe Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale https://www.linkedin.com/in/mikedowdy/ Special Guest: Sam Romanov, Cybersecurity Expert at Cornerstone Technology Solutions https://www.linkedin.com/in/samuel-romanov-198a2916b/  https://www.instagram.com/cybersecurity.sam/ https://www.tiktok.com/@cybersecurity.sam Sam's Cybersecurity Growth Community https://www.skool.com/cybersecurity-growth-community Sam's Free Ebook: Starting your career in Cybersecurity https://tinyurl.com/3yc4m7ht  #CyberSecurity #CareerAdvice #CISOConsulting #CyberInsurance #DataProtection #IncidentResponse #RiskManagement #cybersecurityjobs
Business owners and IT professionals: Learn practical cybersecurity tips and be entertained at the same time. :) Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they bring you unique insights from top industry professionals (Cyber Lawyer & Pentester on this episode) on the latest threats and protection strategies. In this episode, we uncover the shocking details of the United Healthcare hack and its far-reaching implications. Don't let your business become the next victim – subscribe now to stay one step ahead of cybercriminals and protect your digital assets. Our expert panel discusses the far-reaching implications of the UHC breach, the importance of robust cyber insurance, and practical steps businesses can take to protect themselves. From insider trading suspicions to Nancy Pelosi connections, we uncover the intriguing details surrounding this major cyber incident. Was there a connection to the murder of UHC CEO, Brian Thompson? We put on our tin foil hats for a moment to discuss if Luigi Mangione worked alone or was part of a calculated conspiracy. Special guests: Ross Molina, Partner and Vice Chair of the Data Privacy & Cybersecurity Practice of Lewis Brisbois https://www.linkedin.com/in/ross-molina-20784111 &  Mathew Quammen, Pentester, Co-Founder, and President of Optimize Cyber https://www.linkedin.com/in/matthewquammen/ Explore the United Healthcare ransomware attack with cybersecurity experts. Learn about the $22 million ransom, supply chain vulnerabilities, and the critical role of cyber insurance. Discover how multi-factor authentication, incident response plans, and proactive risk management can safeguard your business from devastating cyber threats. Chapters: Introduction and guest introductions (00:00 - 03:02) United Healthcare hack overview (03:02 - 07:46) Supply chain vulnerabilities and vendor management (07:46 - 14:44)  Cyber insurance and its importance (14:44 - 21:22) Insider trading suspicions and Nancy Pelosi connection (21:22 - 26:02) Legal protections and incident response planning (26:02 - 31:11) Practical cybersecurity tips for businesses (31:11 - 37:02) Closing thoughts and contact information (37:02 - 40:45) Extended Summary: This episode of Ransomware Rewind features a panel of cybersecurity experts discussing the massive United Healthcare hack and its implications. The attack, carried out by Black Cat Alpha V, resulted in the theft of 6 terabytes of data affecting over 100 million records. United Healthcare paid a $22 million ransom but still faced significant challenges afterward. The conversation covers various aspects of cybersecurity, including: The importance of supply chain security and vendor management  The critical role of cyber insurance in mitigating risks Legal protections and the need for incident response planning Practical cybersecurity measures like multi-factor authentication (MFA) and regular audits The potential insider trading and political connections surrounding the hack Experts emphasize the need for businesses of all sizes to take cybersecurity seriously, highlighting that many protective measures are more affordable and accessible than commonly believed. They stress the importance of having a comprehensive incident response plan, robust cyber insurance coverage, and proactive risk management strategies. The episode concludes with practical advice for businesses, including the use of MFA, regular IT provider audits, and the importance of understanding and managing supply chain risks. Listeners are encouraged to use their annual insurance reviews as an opportunity to assess and improve their overall cybersecurity posture. #CyberSecurity #RansomwareAttack #UnitedHealthcareHack #CyberInsurance #DataProtection #IncidentResponse #SupplyChainRisk #MFA #riskmanagement
  Enterprise Incident Response & Crisis Management with Combat Veteran, Ricoh Danielson In this exclusive interview, we speak with Ricoh Danielson, a U.S. Army Combat Veteran of Iraq and Afghanistan turned cybersecurity expert. Topics in This Interview (breakdown with timestamps below) How businesses can prepare for and respond to cyberattacks Best practices for personal security to safeguard your digital identity Safety measures after disasters and crisis management tips The rise of AI-driven ransomware and its impact on businesses Ricoh’s military experiences and how they shaped his approach to cybersecurity Why Watch This Video? Learn from Ricoh’s expertise as a digital forensics powerhouse with experience handling high-profile hacks. Discover practical strategies to protect your business from ransomware and other cyber threats. Gain insights into effective communication during a breach or disaster.   About Ricoh Danielson: Ricoh is a U.S. Army Combat Veteran with over 9 deployments across Iraq, Afghanistan, and Africa. As the founder of Fortitude Tech LLC and 1st Responder, he has worked on high-stakes cases involving hospitals, corporations, and state governments. Recently featured on NTD News discussing cyberattacks in New Orleans and Las Vegas, Ricoh is also an author and sought-after speaker in the cybersecurity space.   Chapters: 0:00 Intro to Ricoh Danielson: Ricoh shares his journey from military service to becoming a leader in digital forensics and cybersecurity. Learn how his combat experience shaped his approach to crisis management.  2:15 How Businesses Can Prepare for Cyberattacks: Practical steps to defend against ransomware, phishing, and other threats using identity access management (IAM) and conditional access policies.  5:30 Personal Security Tips: Actionable advice on protecting your digital identity, recognizing phishing scams, and avoiding psychological tactics used by hackers. 9:45 Crisis Management After Disasters: Insights into preparing for grid failures or natural disasters with go bags, alternative communication plans, and safety strategies. 13:20 AI-Driven Ransomware Explained: A deep dive into polymorphic ransomware powered by AI—how it works and why businesses must stay ahead of these advanced threats. 17:00 Lessons from Military Service Applied to Cybersecurity: How Ricoh’s military background prepared him to handle chaotic situations like ransomware attacks on hospitals and global corporations. 20:00 The Role of CISOs and Board Communication: Challenges CISOs face when communicating risks to boards, securing equity in companies, and leveraging D&O insurance for protection. 24:00 How to Break Into Cybersecurity: Advice for aspiring professionals on certifications like Network+ and Security+, as well as opportunities in governance, risk, compliance (GRC), IAM, and privilege access management (PAM). 28:00 Quick Wins for Improving Cybersecurity Posture: Simple strategies like enabling conditional access policies in Microsoft 365 environments or conducting Business Email Compromise (BEC) assessments. 31:00 Crisis Management & Incident Response Strategies: The importance of alternative communication plans during crises—Ricoh shares exercises involving burner phones and laptops for CEOs. 34:00 Preparing for Grid Failures & Disaster: Tips on securing six months’ worth of food/water supplies, understanding ham radios for communication, and ensuring family safety during emergencies. 37:00 Cybersecurity Books by Ricoh Danielson - Ricoh introduces his books, including No-Nonsense Cybersecurity (https://a.co/d/43Myc13) for practical advice, FM Field Manual (https://a.co/d/14qOL5K)as an art-focused coffee table book on cybersecurity, and Tactical Manual (https://a.co/d/iGfOBS6), a highly technical guide with step-by-step instructions. Subscribe for more interviews like this! Comment below what you found interesting in the podcast.   🔗 Follow Ricoh Danielson on Instagram @Ricoh_Danielson or LinkedIn www.linkedin.com/in/ricoh-danielson-736a0715  🔗 Learn more about Ricoh on his website: www.ricohd.us  🔗Breakfast with a CISO on Youtube: www.youtube.com/@dricoh22/videos 🔗 Find the host, Joe Erle, at: www.linkedin.com/in/joeerle @itscyberjoe on instagram and tiktok Get the 14 steps to protecting your data PDF here: www.c3insurance.com/cyber Or you can email Joe at joe@c3insrance.com for speaking inquiries or cyber insurance quotes. If you need cloud security solutions... our absent host, Mike Dowdy, can be found here: linkedin.com/in/mikedowdy Cybersecurity #IncidentResponse #DigitalForensics #BusinessSecurity #AIThreats #RansomwareResponse #CISORoleInsights #AIThreatMitigation #DigitalForensicsExpertise #IncidentResponseStrategies #CybersecurityLeadership #MilitaryToCybersecurity #CrisisManagementTips #ProtectYourBusinessOnline #AdvancedCyberThreats
In this episode of Ransomware Rewind: iphone & BYOD best practices for businesses for cybersecurity, Crypto meme coin rug pulls, cloud security mistakes, legacy software vulnerabilities, and more. Dave Tuckman from Fr Secure joins us to discuss everything from digital currencies, including the infamous "Hawk Tuah Girl" meme coin, to the evolving landscape of cloud security. We also chat about some wild predictions—like the possibility of time travel using quantum computing... Tune in for fascinating insights, fun tangents, and expert analysis on cybersecurity and beyond. Topics Covered:  Smartphone and Cloud Security The rise and fall of meme coins: "Hawk Tuah Girl" How meme coins are impacting the crypto world Predictions for the future of tech (including time travel!) Make sure to subscribe and never miss an episode of the Ransomware Rewind Podcast! Follow us on LinkedIn for daily tech and cybersecurity insights: Get a hold of Joe for Cybersecurity Insurance https://www.linkedin.com/in/joeerle/  www.c3insurance.com/cyber Get a hold of Mike for Cloud Security and Management Solutions https://www.linkedin.com/in/mikedowdy/  https://rapidscale.net/ Dave Tuckman for IT consulting and strategy and IR services https://www.linkedin.com/in/davetuckman/ Take advantage of FR Secure's free resources here: https://frsecure.com/resources/   #cybersecuritytalks #cybersecurity #cybersecuritypodcast #businesspodcast #cloudsecurity
In this episode, Mike and Joe are joined by John Braggiotti. With over 20 years experience in the datacenter space working on data centers on multiple continents John knows the real reasons the likes of Microsoft, Amazon and Google are spending billions on data centers. We dive into the shadowy world of nation-state spying and how governments are leveraging cyber tools to gain an edge in the global arena. We explore the pivotal role of data centers as the backbone of the information economy, powering everything from streaming services to sensitive government operations. Finally, we decode the connection between cryptocurrency and geopolitics, uncovering how blockchain technology is influencing power dynamics worldwide. Tune in for an eye-opening discussion on the intersections of espionage, infrastructure, and innovation in the digital era.
In this episode of Ransomware Rewind, hosts Joe Erle, a cyber insurance expert, and Mike Dowdy, a cloud technology veteran, dive into the dark world of Ransomware as a Service (RaaS). RaaS is a business model that allows cybercriminals with little technical expertise to deploy ransomware attacks by purchasing services from expert developers on the dark web. Joe and Mike break down how RaaS works, its rise in popularity, and the impact it has on businesses across the globe. They discuss the chilling trend of ransomware kits being sold like software subscriptions and the far-reaching consequences this has on industries and governments a like. Tune in to learn about the evolving landscape of cyber threats, how companies can protect themselves, and what role both insurance and cloud solutions play in mitigating the risks of falling victim to these attacks. Whether you're an IT professional, business owner, or simply interested in cybersecurity, this episode offers valuable insights into one of the most dangerous threats in today’s digital world.
Imagine receiving a desperate call from a loved one, their voice pleading for help, while a criminal demands money in the background. Deep fakes have brought this nightmare scenario closer to reality, with AI-generated voices and videos that mimic anyone, even your own family. In this episode, we dive into the chilling world of deep fakes, exploring their potential for exploitation, from high-profile scams involving top executives to everyday fraud that could happen to anyone. How can we protect ourselves in a world where nothing is as it seems? Join us as we uncover the human vulnerability at the heart of this emerging threat and discuss practical strategies to stay one step ahead of the cybercriminals. Stay tuned as we delve into the case of the Ferrari CFO, the chilling implications for our personal and professional lives, and why being 'more human' might be the key to fighting back.
AT&T Hospital Hacks

AT&T Hospital Hacks

2024-07-3025:26

Comments