DiscoverRealTime Cyber
RealTime Cyber
Claim Ownership

RealTime Cyber

Author: RealTime Cyber

Subscribed: 4Played: 7
Share

Description

We Cover the Cyberspace.

21 Episodes
Reverse
Michael Moore is the Chief Information Security Office for the Arizona Secretary of State which plays a major role in running elections.We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations of voter fraud and voter suppression.
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.
Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Becoming a CISO 5:35 The 5 Year Plan for Collective Defense 13:04 Threat Actors using Artificial Intelligence 15:56 DeepFake T...
Phillip Hinders is a Digital Forensics examiner for the State of Ohio. He supported cybersecurity incident response efforts for the State of Ohio before working as a digital forensics examiner supporting law enforcement, mainly conducting digital forensics with tools like Cellebrite and Grey Key.
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixel? 11:21 Are Data Brokers Actually Affected by New Privacy Laws? 14:33 Some Companies DO Respect your Privacy 18...
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and interference with aircraft here on earth.Chapters:0:00 From U.S Air Force to Satellite Startups3:48 Will Satellites Crash into Each Other?12:45...
Gary Miller from Citizen Lab has made a career Exposing Cyber Threats and Digital Surveillance. He specializes in mobile network threat intelligence and surveillance monitoring. He has testified to Congress, the Department of Justice, as well as been a contributor with the Washington Post and the Intercept. Chapters:0:00 Concerning Discoveries While Working in Telecom 4:57 Why Your Cellphone is so Vulnerable 10:18 The Concerning Observation of Huawei 14:00 NSO Group T...
Trevor Costanzi is a Senior DevSecOps Engineer. He opens up about a wide variety of topics throughout his Cybersecurity and IT Career. He gives unique insights into what made him successful. 0:00 How he Went From Help Desk to Security Engineer 3:49 How the Equifax Breach Changed the Company Security Culture 6:06 How DevOps Changed Software Development 11:48 Should You Use ChatGPT to Write Code? 15:27 Advice for Getting into DevOps/DevSecOps 20:41 Advice for Start...
Recently the SEC pulled a 180 on their policy toward cryptocurrencies and sued Binance and Coinbase. Sam Lyman is a Public Policy Director in Washington who covers Blockchain. He is also a Forbes Contributor, covering Fintech and Digital Assets. He breaks down the historical politics and policy behind crypto and the recent assault against crypto. He can be found at:https://www.forbes.com/sites/samlyman/?sh=79368a3850bb https://twitter.com/@SamLyman33
Michael McLaughlin is a former senior adviser for U.S. Cyber Command (USCYBERCOM), where he was responsible for the coordination of Department of Defense (DOD) counterintelligence operations in cyberspace. He was the Chief of counterintelligence for the Cyber National Mission Force where he supported threat hunting teams (hunt teams) in Ukrainian networks. William Holstein is a journalist who has specialized in technology and China for over a decade. They CoAuthored the Book "Battl...
AnnMarie Giblin is a Cybersecurity Lawyer specializing in Proactive Cybersecurity. She talks about how cybersecurity laws are changing and what you can do to stay ahead. Chapters: 0:00 This Changed Cyber Negligence Law 2:30 The Changing Nature of Cybersecurity Lawsuits 9:47 Supply Chain Breaches are Changing Cybersecurity Law 12:40 You're Liable if You Aren't Doing This 17:59 This is The Cyber Liability Threshold 20:33 These New Data Privacy and Security Law...
Brent Watkins served in the U.S Air Force during the cold war reverse engineering Soviet Technologies before joining the FBI and investigating cyber crimes. Chapters: 0:00 Air Force During the Cold War 1:36 Cyber Crime Investigations with the FBI 17:37 Tracking Terrorists Online 18:25 Investigating Hop Points 20:31 Investigating Cyber Criminal Groups 25:24 Corporate Espionage & Insider Threats 27:57 From FBI to Working in Threat Intelligence 3...
Dallas Clounch, the "AI Surfer, is a former software developer and now AI Guru. He covers all things AI. You can Find More AI insights at: https://www.theaisurfer.com/ Facebook: https://www.facebook.com/theaisurfer?mibextid=LQQJ4dInstagram: https://instagram.com/theaisurfer?igshid=YmMyMTA2M2Y= TikTok (chinese spy app): https://www.tiktok.com/@theaisurfer?_t=8bRgi3AlW3i&_r=1 YouTube: https://www.youtube.com/ @theAIsurfer
Ben Bissantz is a Cryptologic Warfare Officer for the U.S Navy. He's served in Electronic Warfare and Signals Intelligence for U.S Special Operations Command (USSOCOM) and Sealiftcommand. He's also served in the Navy Information Warfare Comminity’s Artificial Intelligence and Machine Learning Task Force. Chapters: 0:00 Announcement and Disclosure 1:00 Background from USSOCOM to Sealift 3:00 Cryptologic, Cyber, & Electronic warfare explained 13:42 Cyber in Ukraine...
Lester Godsey is the Chief Information Officer of Maricopa County Arizona. He has served as the Chief Information Security officer of both Maricopa County and the City of Mesa. We talk about security and cyber threats surrounding the Superbowl, Waste Management Open, Elections, and talk a little Blockchain. Chapters: 0:00 Note and Announcement 1:11 Cyber Threats facing Superbowl and WMO 4:57 The Drone Threat 6:46 CISO of a City vs County 9:31 Massive Influx of Pe...
Ryan Johnson is a data privacy and cyber security Lawyer. He sits on the boards of a few companies providing legal counsel and advising on navigating the increasingly complex world of data privacy and information security. Chapters: 0:00 From IT Admin to Data Privacy Attorney 6:49 The Dirty Secret about Data Breach Lawsuits 11:02 Is Cybersecurity Driving Inflation? 13:26 Cybersecurity Affirmative Defense Laws 18:28 Navigating the Complex Mesh of State Privacy and Brea...
IoT Penetration Tester and IoT Security Expert, Ryan Jones joins the podcast to talk all things IoT Security. IoT's hyper growth is outpacing security and creating a new set of security challenges. We dive into the security of ATMs, Healthcare Devices, Drones, Cars, the Power Grid, and other Operational Technology.
We interviewed crypto developer, product manager, and startup founder Dima Azarenko. He's developed and engineered software, protocols, and NFTs, We talk all things crypto. LEDGER HARDWARE WALLETS: https://shop.ledger.com/?r=e411905c4b6dDima Azarenko Twitter: https://twitter.com/azar3nko RMeta Labs: https://rmetalabs.ai/ Chapters: 0:00 Intro, Bankruptcies & Where to Store Your Crypto? 2:26 Differences Between Engineering Software vs Crypto 6:11 Crypto Securit...
Tim Roemer opens up about cyber threats facing the state and country, managing the border crisis in Arizona, cyber war, Anonymous, how he's created a cyber security culture, his time at the White House and CIA, among a bunch of other topics.
loading