Discover
BarCode

130 Episodes
Reverse
Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syndrome, and highlights the importance of leaning into positive feedback. He also previews the energy and innovation surrounding the upcoming Hacker Summer Camp and the thriving community that powers it.00:00 Introduction to the Hacker Mindset04:50 The Attributes of a Hacker10:04 Challenging Assumptions in Life14:37 Exercises to Cultivate a Hacker Mindset19:31 Upcoming Book Release and Conclusion19:51 The Journey of Writing: From First to Second Book24:17 Overcoming Imposter Syndrome: Strategies and Insights34:29 Hacker Summer Camp: Celebrating a Decade of IoT Village36:55 Creative Concepts: Cybersecurity-Themed Bar IdeasSYMLINKS[Ted Harrington’s Website] – Ted Harrington’s official website where you can find his blog, professional background, talks, research, and links to his books, podcast, and events. A central hub for his work in cybersecurity and ethical hacking.[Ted Harrington’s Podcast – “Tech Done Different”] – Ted's podcast explores how to think differently about technology, security, and leadership. He interviews top minds in security, engineering, and beyond.[Ted Harrington’s Books] – A showcase of Ted’s published works, including Hackable and the upcoming Inner Hacker, both of which explore ethical hacking, secure software development, and mindset transformation.[Ted Harrington’s TED Talk – “Why You Need to Think Like a Hacker”] – In this TEDx talk, Ted explains how the hacker mindset—curiosity, nonconformity, commitment, and creativity—can be a superpower in solving complex problems in both cybersecurity and everyday life.[Ted Harrington on LinkedIn] – Ted’s professional LinkedIn profile, where he regularly shares insights on ethical hacking, leadership, and secure software. He’s active and encourages messages from those looking to learn or collaborate.[IoT Village Website] – A hacking village founded by Ted Harrington that focuses on IoT security. Hosted at major security conferences like DEF CON, it offers hands-on labs, expert talks, and a collaborative space for learning how to ethically hack IoT devices.
In this conversation, Chris Glandon interviews Josh Mason, a Solutions Architect at CINAC and founder of Newb Village. They discuss Josh's journey from being a U.S. Air Force pilot to entering the cybersecurity field, his motivation behind creating Newb Village to support newcomers in the industry, and his new book 'Speak Security with a Business Accent'. They also explore the role of SYNAC in cybersecurity and share insights on creating a welcoming environment for new professionals in the field. The conversation wraps up with a light-hearted discussion about unique bars and venues in the cybersecurity community.00:00 Josh Mason's Journey into Cybersecurity08:38 The Birth of Noob Village20:02 Speak Security with a Business Accent26:59 Transforming Technical Language for Business Impact30:01 Understanding Metrics for Different Audiences33:15 Aligning Business Goals with Security Metrics36:49 Insights into SYNAC and Its Offerings47:22 Exploring Unique Bars and Venues48:37 Imagining a Cybersecurity-Themed BarSYMLINK[Noob Village] - An inclusive space at DEF CON is designed to welcome and guide newcomers in the cybersecurity community. It offers resources like pamphlets, volunteers (“buddies”), and a booth called “No Stupid Questions” to support first-time attendees.Noob Village LinkedIn Page –A LinkedIn organization page with updates about volunteer calls, community news, and DEF CON involvement .[Joshua C. Mason – LinkedIn] - A cybersecurity leader and vCISO profile with extensive experience, offering insights on Noob Village, initiatives for veterans, and IT-to-security career development. Frequently shares event involvement (like DEF CON), mentorship tips, and professional updates.[Joshua C. Mason – Website] – Josh’s professional website for Mason Security Consulting (Mason SC), where he offers vCISO services, cybersecurity consultancy, and insights from his military and IT background.[Mason SC Book Page] - Josh Mason's personal site, where signed copies of his book are available. The book includes cybersecurity leadership insights drawn from his experiences in the Air Force and IT.[Onward to Opportunity – A career training program for veterans, offering free training and certification opportunities in areas like project management and IT, including PMP and CISSP prep.[Synack] - A cybersecurity company offering “pen test as a service.” It connects clients with vetted ethical hackers using a managed platform to identify exploitable vulnerabilities efficiently.
In this engaging conversation, Chris Glanden interviews Kevin Johnson, a seasoned expert in IT and cybersecurity. Kevin shares his extensive journey from system administration to becoming a leader in penetration testing and ethical hacking. He emphasizes the importance of hands-on learning, the evolution of penetration testing standards, and the role of open source in the industry. The discussion also touches on the significance of community, acknowledgment, and charity work in cybersecurity, along with personal anecdotes and insights into the future of the field.00:00 Introduction to Kevin Johnson03:39 Kevin's Journey in IT and Security06:29 The Evolution of Penetration Testing09:35 Transitioning from IT to Security12:30 The Importance of Hands-On Learning15:28 Involvement in Open Source Projects18:38 The Role of Mentorship in Career Development21:14 Ethical Hacking and Its Misconceptions24:23 The Future of Cybersecurity27:27 Understanding Risk in Cybersecurity29:14 The Evolution of Penetration Testing Standards31:00 The Human Element in Penetration Testing32:46 The Challenges of Automated Pen Testing35:26 Transparency and Knowledge Sharing in Cybersecurity39:36 Standing on the Shoulders of Giants44:41 The Importance of Acknowledgment and Gratitude48:26 The 501st Legion: Charity Through Cosplay53:08 Creating a Cybersecurity-Themed BarSYMLINKS[Secure Ideas Website] Kevin Johnson’s cybersecurity consulting and training firm, offering penetration testing, security assessments, and educational resources. It also hosts blog posts and tools created by the Secure Ideas team.[Kevin Johnson on LinkedIn] Kevin’s professional LinkedIn profile, where he shares insights on cybersecurity, career development, and industry leadership.[@secureideas on Twitter (X)] – Kevin’s Twitter/X account, where he frequently shares thoughts on InfoSec, pen testing practices, open-source contributions, and industry transparency.[Samurai WTF (Web Testing Framework)] – An open-source Linux distribution for web application penetration testing. Co-created and taught by Kevin, this toolkit helped train thousands of security professionals in hands-on ethical hacking.[BASE (Basic Analysis and Security Engine)] – A fork of the discontinued ACID project for Snort, created by Kevin to continue development and improve IDS event analysis. This project marked a pivotal moment in his open-source journey.[SANS Institute] – A premier cybersecurity training organization where Kevin became a senior instructor, authored multiple courses, and earned the GCIA, GCIH, and GCFA certifications that shaped his professional trajectory.[Penetration Testing Execution Standard (PTES)] – http://www.pentest-standard.orgAn industry-defined standard for performing thorough and ethical penetration tests. Kevin is actively involved in modernizing this standard to reflect current tools, risks, and methodologies.[OWASP (Open Worldwide Application Security Project)] – A nonprofit organization focused on improving software security. Kevin previously served on the global board and has long supported OWASP's community-driven tools and educational efforts.
In this engaging conversation, Chris Glanden speaks with Pat Gorman AKA InfoSec Pat, a cybersecurity professional with over 12 years of experience. Pat shares his unique journey into the cybersecurity field, discussing his early life, career transitions, and the importance of certifications. He emphasizes the need for practical skills and the value of community engagement in the cybersecurity space. The discussion also touches on the challenges faced by newcomers in the industry and the significance of clear, accessible content for learning. Pat's candid insights and personal anecdotes provide a relatable perspective on navigating the cybersecurity landscape.00:00 Introduction to Barcode Podcast01:02 InfoSec Pat's Journey into Cybersecurity04:42 Transitioning from IT to Cybersecurity10:24 The Importance of Hands-On Learning16:50 Demystifying Cybersecurity for Newcomers21:18 Exploring Career Paths in Cybersecurity27:45 Lessons Learned from Certification Experiences30:54 The Journey to Certification34:44 The Fallout with Offensive Security36:40 Navigating the Certification Landscape38:00 The Importance of Practical Skills41:45 Essential Soft Skills for Pen Testing45:20 Building a Personal Brand and Community Engagement48:10 Overcoming Adversity and Personal Growth52:05 Unique Experiences and Future AspirationsSYMLINKS[InfoSec Pat - YouTube Channel] - Pat Gorman’s YouTube channel where he publishes tutorials, walkthroughs, and educational videos on cybersecurity, penetration testing, and lab setups.[InfoSec Pat - Linktree] - Central hub for all of Pat Gorman’s social platforms, courses, YouTube channel, and other professional links.[InfoSec Pat - Official Website] - Pat Gorman’s official website featuring cybersecurity tutorials, online courses, certifications, and resources for professionals looking to enter or grow in the cybersecurity field.[InfoSec Pat - Merchandise Store] - Official online merchandise store offering InfoSec Pat branded apparel and accessories, designed for fans and members of the cybersecurity community.[InfoSec Pat - Facebook Group: Learn Together with InfoSec Pat] - A public Facebook group led by InfoSec Pat, created for cybersecurity learners and professionals to network, share knowledge, and grow their skills together through community support.
In this conversation, FIlipi Pires shares his journey into cybersecurity, reflecting on his experiences at HackSpaceCon and discussing the importance of community and continuous learning. He emphasizes the critical issue of misconfigurations in identity management and the need for organizations to understand their vulnerabilities, particularly with legacy systems. Felipe also highlights the evolving nature of threats and the importance of being proactive in security measures. He provides insights into the future of red teaming and offers guidance for aspiring professionals in the field. In this conversation, Filipi Pires discusses the journey of growth in the cybersecurity field, emphasizing the importance of patience and continuous learning. He shares insights about his role at Segura, a company focused on identity solutions, and highlights the significance of community engagement. The discussion also touches on cultural aspects, including Brazilian cuisine and personal preferences, showcasing Filipi's vibrant personality and passion for his work.00:00 Introduction to Filipi Pires02:09 Reflections on HackSpaceCon05:03 Felipe's Journey into Cybersecurity11:01 Learning and Skill Development in Cybersecurity17:02 Current Trends and Misconfigurations in Cybersecurity19:38 Staying Current in Cybersecurity22:52 Understanding Threats and Attack Vectors28:46 The Future of Red Teaming32:46 Guidance for Aspiring Red Teamers36:44 The Journey in Cybersecurity43:59 Understanding Segura and Its Mission45:12 Connecting with the Community50:07 Cultural Insights and Personal PreferencesSYMLINKS[Filipi Pires - Official Website] - https://filipipires.comFilipi Pires’ personal website, showcasing his professional background, speaking engagements, research, and cybersecurity insights. It serves as a central hub for his content, blog posts, and community contributions.[Filipi Pires on GitHub] - https://github.com/philip86Filipi Pires’ GitHub profile where he shares open-source tools, projects, and potentially his upcoming event schedule. It's a place to follow his latest contributions to the cybersecurity community.[Filipi Pires on LinkedIn] - https://www.linkedin.com/in/filipipiresFilipi’s professional profile for connecting with him and following his cybersecurity insights, talks, and global engagements.[Filipi Pires on YouTube] - https://www.youtube.com/@filipi-piresFilipi’s YouTube channel featuring his recorded conference talks and cybersecurity presentations in Portuguese, Spanish, and English.[Burp Suite Academy] - https://portswigger.net/web-securityA free, hands-on learning platform created by PortSwigger that teaches web application security using the Burp Suite tool. Recommended by Filipi Pires as a foundational resource for aspiring red teamers and web security professionals.[TryHackMe] - https://tryhackme.com An interactive platform offering cybersecurity labs and learning paths focused on offensive and defensive security. Filipi recommends it for hands-on practice in red teaming and hacking fundamentals.[Hack The Box] - https://www.hackthebox.comA cybersecurity training platform that allows users to practice penetration testing skills in virtual environments. Mentioned as a useful resource for practical skill development in red teaming and ethical hacking.
In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool’s Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] - https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world’s largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.
In this conversation, Matthew Chavira, CEO of Profits of AI,discusses his journey in the AI industry, particularly focusing on the evolution of humanoid robots like Sophia. He explores the rapid advancements in humanoid robotics, the integration of AI capabilities, and the public's perception of these technologies. Chavira emphasizes the importance of trusted information regarding AI's societal impact and highlights the role of artists in communicating the significance of AI advancements. In this conversation, Matthew Chavira discusses the intersection of art and artificial intelligence, highlighting a unique AI sculpture that allows interaction with the history of African American women. He emphasizes the importance of evaluating AI experts and the need for unique perspectives in the field. The discussion also covers the significance of live events in sharing unconventional ideas, the ethical implications of AI, and concerns regarding transformative AI technologies. The conversation concludes with a light-hearted exchange about unique experiences and aspirations in the AI and cybersecurity landscape. 00:00 Introduction to AI and Humanoid Robotics04:42 The Evolution of Sophia and Humanoid Robots07:46 The Future of Humanoid Robotics10:25 AI and Humanoid Integration13:21 The Challenge of Distinguishing AI from Reality16:01 Public Perception of Humanoids18:47 Profits of AI: Bridging the Gap in AI ThoughtLeadership21:40 The Role of Artists in AI and Society25:11 The Intersection of Art and AI28:41 Evaluating AI Experts and Perspectives31:43 The Importance of Unique Perspectives in AI33:06 The Power of Live Events36:23 Ethics in AI and Cybersecurity38:18 Concerns About Transformative AI41:44 Unique Experiences and Future Aspirations SYMLINKS:[Prophets of AI – Official Website]https://prophetsofai.comThe official site of Prophets of AI, founded by Matthew Chavira. It serves as a platform to connect organizations with leading AI experts across various disciplines, offering insights into the evolving landscape of artificial intelligence. [Matthew Chavira – LinkedIn Profile]https://www.linkedin.com/in/matthewchavira/Matthew Chavira's professional LinkedIn profile, detailing his roles as Founder and CEO of Prophets of AI, Global Director of AI Partnerships at the International Advertising Association, and Head of Strategic Partnerships atHanson Robotics. [Hanson Robotics – Official Website]URL: https://www.hansonrobotics.comThe company behind Sophia the robot. Hanson Robotics is a Hong Kong-based AI and robotics company dedicated to creating socially intelligent machines. Sophia has been presented at over 100 events globally and is a central figurein Chavira’s career.[Time Magazine's 100 Most Influential People in AI 2024]https://time.com/collection/time100-ai-2024/An annual list by Time Magazine highlighting the most influential figures in artificial intelligence, including innovators, leaders, and thinkers shaping the future of AI. [Techstrong TV – Profits of AI Videos]https://techstrong.tv/video-tag/profits-of-aiA collection of videos featuring Matthew Chavira discussing the impact of generative AI on various industries, sustainability, and the rise of virtual avatars. [HOPE Global Forums – Matthew Chavira Speaker Profile]https://hopeglobalforums.org/speaker/matthew-chavira/Matthew Chavira's speaker profile at HOPE Global Forums, detailing his expertise in AI and his role in connecting companies with thought leadership and educational programs. [Thinking Heads – Matthew Chavira Speaker Profile]https://thinkingheads.com/en/speakers/matthew-chavira/A speaker profile highlighting Matthew Chavira's contributions to AI, his leadership at Prophets of AI, and his involvement in strategic partnerships at Hanson Robotics.
In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscussion also delves into thin calculus and the category theory of things, emphasizing the need for an external truth to build sound mathematical systems. In this conversation, the speakers delve into the concepts of agentic calculusand Delta K, exploring their implications for artificial general intelligence (AGI) and the future of the economy. They discuss the observer-dependent nature of reality and how different perspectives can lead to varied interpretations ofthe same phenomena. The conversation also touches on the potential of the agentic economy to revolutionize ownership and economic dynamics, as well as the philosophical implications of waveform collapse in quantum mechanics.Overall, the discussion highlights the need for a new understanding of cognitive processing and the role of agents in shaping future interactions and economies. TIMESTAMPS:00:00 - Introduction to the Guests and Their Expertise02:16 - Recent Developments in AI and Technology04:50 - Understanding Large Language Models10:53 - Delta K and Its Limitations16:24 - Thin Calculus and the Category Theory of Things19:19 - Understanding Agentic Calculus22:27 - Delta K and Its Implications for AGI28:59 - Cognitive Processing and States of Being36:09 - The Agentic Economy: A New Paradigm40:25 - Waveform Collapse and Delta K43:20 The Future of Agentic Interactions SYMLINKS:[LinkedIn - Charlie Northrup] - https://www.linkedin.com/in/charlie-northrup-1b73b051Charlie Northrup is a technology innovator at Neewer Sciences, contributing pioneering research in agentic AI systems, thing calculus, and distributed digital ecosystems. He shares updates and insights about his work on LinkedIn.[LinkedIn - Keenan Hale] - https://www.linkedin.com/in/keenandewayne/Keenan Hale is recognized for his interdisciplinary contributions bridging theoretical mathematics and cryptographic systems. He connects with others inthe AI and cryptography communities through LinkedIn and shares research updates and discussions.[LinkedIn - Mike Elkins] - https://www.linkedin.com/in/elkinsmike/Mike Elkins is the Chief Human and Information Security Officer at Banffist, actively involved in discussions about cybersecurity, digital transformation, and AI-driven enterprise operations. He also speaks at major conferences like BlackHat, RSA, and SecureWorld.
In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements.TIMESTAMPS:00:00 - Introduction to Cybersecurity Journey03:23 - The Path to OSCP Certification06:13 - Transitioning to Consulting in Cybersecurity09:14 - Understanding Client Needs in Cybersecurity11:56 - Leadership in Red Team Village14:32 - NCAE Cyber Games and CTF Design17:26 - Creating Effective CTF Challenges20:04 Resources for Aspiring CTF Participants22:57 Content Development for Cybersecurity Education25:49 Unique Experiences in Cybersecurity Events28:25 Closing Thoughts and Future Engagements SYMLINKS:[Maltek Solutions Website] - https://malteksolutions.com/A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi.[Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends.[Red Team Village (RTV) Website] - https://redteamvillage.ioA nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences.[Red Team Village Discord] - https://discord.com/invite/redteamvillageThe official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities.[Red Team Village X (Twitter)]- https://twitter.com/redteamvillage_RTV's official social media account for announcements, event updates, and cybersecurity-related discussions.[MetaCTF Website] - https://metactf.comA platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges.[CTF Time Website] - https://ctftime.orgA website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors.[Hack The Box Website] - https://www.hackthebox.comA cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills.[TryHackMe Website] - https://tryhackme.comAn interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners.CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com
Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape.Derek Fisher is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today.In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children's books and shares insights on future trends like robotics and quantum computing.TIMESTAMPS:00:00 Introduction to Cybersecurity and Derek Fisher's Background10:09 The Impact of AI and Cloud on Cybersecurity19:19 Understanding Threat Modeling in Cybersecurity27:47 Navigating the Security Hiring Process35:48 Navigating the Job Market in Cybersecurity36:40 Breaking into Cybersecurity: Finding Your Path44:16 Bridging the Gap: Academia vs. Industry47:24 Inspiring the Next Generation: Writing for Kids50:46 The Challenges of Parenting in a Digital Age54:08 Future Trends in Cybersecurity and Technology56:52 Creating a Cybersecurity-Themed Bar: A Fun ConceptSYMLINKS:[Derek Fisher's LinkedIn Profile ]- https://www.linkedin.com/in/derek-fisher-sec-archConnect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity.[Securely Built Website] - https://www.securelybuilt.com/Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. [Secure Work Coach] - https://www.secureworkcoach.com/aboutAccess specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering [Derek Fisher's Udemy Instructor Profile] - https://www.udemy.com/user/derek-fisher-8/Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation.[Ultimate Cybersecurity Course & CISSP Exam Prep] - https://www.udemy.com/course/ultimate-cyber-security-course/Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher.[The Application Security Program Handbook] - https://www.securelybuilt.com/mediaLearn about building an application security program through this comprehensive guide authored by Derek Fisher.[Alicia Connected Series ] - https://www.aliciaconnected.com/Discover the "Alicia Connected" children's book series by Derek Fisher, focusing on safe technology usage for kids.[Securely Built YouTube Channel] - https://www.youtube.com/@securelybuiltWatch cybersecurity tutorials and discussions on the Securely Built YouTube channel.[Derek Fisher's Articles on SecureWorld News] - https://www.secureworld.io/industry-news/author/derek-fisherRead articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.
In this conversation, Perry Carpenter discusses the evolution of misinformation and disinformation in the age of AI and deepfakes. He explores the psychological principles that make individuals susceptible to deception, the ongoing arms race between detection and deception, and theregulatory landscape surrounding these issues. Carpenter emphasizes the importance of understanding narratives and cognitive biases in combating misinformation while also highlighting the challenges posed by rapidlyadvancing technology. In this conversation, Perry Carpenter discusses the implications of deepfakes and AI in cybersecurity, emphasizing the concept ofthe liar's dividend, the need for cognitive awareness training, and the ongoing arms race between AI-generated deception and truth verification. He highlights the erosion of trust in media and the necessity of understanding themotivations behind AI-generated content. Carpenter also shares insights on the future of deepfakes, ethical challenges, and the importance of focusing on the'why' behind AI technologies. TIMESTAMPS:00:00 Introduction to Perry Carpenter and His Work02:37 The Evolution of Misinformation and Disinformation06:42 The Arms Race: Detection vs. Deception12:00 The Impact of Deepfakes on Society17:41 Psychological Principles Behind Deepfakes23:16 Regulatory Landscape and Future Implications34:59 The Liar's Dividend and Its Implications36:09 Defending Against AI-Powered Threats40:06 The Arms Race of AI and Cybersecurity46:17 Erosion of Trust in Media52:38 The Future of Deepfakes and Society57:38 Understanding the Why Behind AI and Deception SYMLINKS:[LinkedIn – Perry Carpenter Profile] - https://www.linkedin.com/in/perrycarpenter/Perry Carpenter’s professional LinkedIn profile details his background in cybersecurity, his work on AI-generated deception, and his industry engagements. It serves as a hub for networking and accessing more informationon his projects.[X (formerly Twitter) – Perry Carpenter Profile] - https://x.com/perrycarpenter?lang=enPerry Carpenter’s profile on X is where he shares real-time insights, commentary on cybersecurity trends, and updates related to his work in AI and digital deception. [Perry Carpenter’s Book “FAIK”] - https://www.thisbookisfaik.com/This global retailer offers Perry Carpenter’s book, Fake:A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deception, which explores modern digital deception andcybersecurity.[YouTube – The Fake Files Channel] - https://www.youtube.com/@theFAIKfilesYouTube hosts Perry Carpenter’s channel, “The Fake Files,” where he shares AI tutorials, deepfake detection tips, and cybersecurity insights related to synthetic media.
In this engaging conversation, Chris Glanden interviews Mariano Mattei, VP of Cybersecurity and AI at Azure Solutions. Mariano shares his extensive background in software engineering and cybersecurity, emphasizing the importance of metrics in communicating security risks to executive teams. He discusses the challenges organizations face in quantifying security effectiveness and adapting metrics to the rapidly evolving threat landscape, particularly with the rise of AI. The conversation also e...
In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understandin...
Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stan...
In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking,...
In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on secu...
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of...
Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Secur...
SESSION TITLE: BCP LIVE on Rendezvous Yacht II RECORDED: 9/26/24 VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/ LOCATION: Philadelphia, PA GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia SPONSOR: Philly Tech Council ABOUT GUESTS: Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previousl...
Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she share...
Comments