DiscoverCyber Crime Junkies
Cyber Crime Junkies

Cyber Crime Junkies

Author: Cyber Crime Junkies-David Mauro

Subscribed: 85Played: 1,261
Share

Description

Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter,  the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career.

Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

186 Episodes
Reverse
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing.  Key Topics:new ways to reduce cyber risks in financial institutions,ways to prevent account take overs,innovative ways to reduce website spoofing, latest types of phishing, dangers of website spoofing, social engineering attacks against financial institutions,Chapters01:09 The Importance of Brand Protection04:01 The Impact of COVID-19 on Cybercrime06:28 Methods of Website Spoofing08:37 Account Takeover and Phishing09:30 Current Solutions and Challenges20:13 Expanding to Other Industries24:38 Alerting the Original Brand and Customers26:19 Real-Time Detection of Spoofed Sites27:46 Customer Alerts and Integration with Security Operations Centers30:51 Introduction to Memsico and its Integration with Risk and Fraud33:25 Challenges Faced by Organizations in Impersonation Attacks35:38 Focus on Brand Reputation and Customer Trust36:34 The Need for Protection Against Spoofing Attacks46:15 Marking and Tracing Stolen Credentials48:04 Uniqueness of Memsico and Patented Technology49:14 The Three Parts of Memsico's Platform: Detection, Protection, and ActionTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
The US has signed into new law the Ban of Tik Tok effective in January. What does this mean?Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform is a national security threat, how social media platforms are security risks,  laws on social media national security, and national security versus social media.Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder of the Black Swan Group.Key Takeaways  The Importance of Proof of Life in NegotiationUsing Decreasing Incremental Change in BargainingHow Accusation Audits work, How Tactical Empathy and Espionage are used,modern ways to negotiate effectively,how to ask questions better using Never Split the Difference,how to negotiate with an enemy, how to discover unknowns in negotiationnew ways to convince someone of anything,and other secrets behind Never Split the Difference. Chapters00:00 Introduction to the Never Split the Difference Method02:15 Mastering the Never Split the Difference Method of Negotiation03:11 The Power of Active Listening and Tactical Empathy05:31 Uncovering Concealed Motivations and Undisclosed Needs07:22 The Importance of Proof of Life in Negotiations08:44 Using Decreasing Incremental Change in Bargaining10:41 Dealing with Aggressive Individuals and Building Agreement To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UVTo find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/  Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Chris Voss, founder of the Black Swan Group,  joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never split the difference started,Optimal Timing for NegotiationsThe Neuroscience Behind Tactical Empathybest ways to collaborate in negotiations,ways to negotiate like your life depended on it,best ways to collaborate in negotiations,how to practice Never Split the Difference,benefits of using active listening and importance of body language in communications,and other top techniques in Never Split the Difference,Chapters00:00 Introduction to Chris Voss and the Black Swan Method03:34 Chris Voss's Background and the Documentary04:04 Chris Voss's Journey into Law Enforcement06:26 Mentors and Becoming a Hostage Negotiator09:22 The Foundation of the Black Swan Method14:14 Developing Tactical Empathy on a Suicide Hotline21:36 Practicing and Applying the Black Swan Method24:30 Optimal Timing for Negotiations28:22 Tactical Empathy with Adversaries32:40 Defining Tactical Empathy34:41 The Future of Tactical Empathy and NeuroscienceTo grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UVTo find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss:·      ways to grow brands by adapting to emerging tech,·      how to use imagination in brand growth,·      risks in believing you are TOO BIG TO FAIL,·      how AI is effecting brand imagination, ·      how technology has changed society, Chapters02:44 The Significance of Cybersecurity and Cybercrime05:04 Exploring Web3 and Digital Ownership08:23 The State of Web3 and the Metaverse12:21 Digital Assets and NFTs15:08 Apple's Vision Pro and Avatar Technology19:20 Challenges and Risks in the Metaverse20:41 Convergence of Technologies and Convergence Literacy24:27 Emerging Technologies and Strategic Advisory Services26:46 The Importance of Convergence Literacy27:15 Navigating Exponential Advancements27:44 The Need for Packaging Solutions30:19 The Imagination Dilemma33:01 The Impact of Emerging Technologies36:16 Packaging and the Circular Economy40:08 The Imagination Dilemma: Explained52:49 Reimagining Business Focus53:42 Protecting Competitiveness Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Great discussion with Gabe Gambill. VP with Quorum.Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of data back ups, how to reduce risk of failed data back ups, importance of cyber leadership for brands, and true stories of horrific failed attempts following big disasters.Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: ·      How Cyber Breach Litigation Works·      Why Security Layers Help Defend Against Law Suits·      How Cyber Breach Liability Can Destroy Business·      How To Reduce Your Cyber Breach LiabilityTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
TV Wars and Espionage.

TV Wars and Espionage.

2024-04-1543:071

From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what they wanted.This is the true cyber crime story of TV Wars and Espionage. Pirates, a Dead Hacker.  A Shocking Crime.Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore.SummaryThe conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on Sony and the movie industry, as well as the broader implications for cybersecurity. They delve into the different theories surrounding the attack, including North Korea's involvement, insider activity, and stock manipulation. The conversation raises questions about the role of smaller organizations and the potential vulnerabilities they face. Overall, the discussion emphasizes the need for increased cybersecurity measures and awareness. The conversation explores different theories surrounding the Sony Pictures hack in 2014. The main theories discussed include: 1) North Korea as the sole perpetrator, 2) a disgruntled insider with connections to black hat hackers, 3) hacktivist groups like LulzSec and Anonymous, and 4) stock manipulation. The conversation highlights the inconsistencies and unanswered questions surrounding the official narrative that North Korea was solely responsible for the hack. The participants lean towards the theory that an insider with help from black hat hackers orchestrated the attack. They also discuss the possibility of stock manipulation and the involvement of hacktivist groups. The conversation concludes with the acknowledgment that there may be information that is not publicly available due to national security concerns.Chapters00:00 The Day the Lights Went Out at Sony Pictures13:55 The Lights Get Turned Out: Implications and Theories31:43 The Insider Threat: A Disgruntled Employee with Black Hat Connections43:12 National Security and Unavailable Information Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Kurt Long  CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage.We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom.Chapters01:09 Kurt Long's Work at the Kennedy Space Center10:14 The Importance of Healthcare Security20:45 The Risks and Implications of Deepfake Technology25:51 Introduction to Bunker27:00 Bunker's Pricing and Affordability30:06 Bunker's Architecture and Zero Trust Approach34:33 Issues with Other Messaging Apps36:33 Balancing Privacy, Security, and Accountability44:00 Compliance and Finance49:31 Vision for Privacy, Security, and AccountabilityTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coachNausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/She shares her insights on modern ways to improve presentation skills.From virtual (zoom etc) meetings to live public speaking in person, we touch on many little-known ways you can improve your communications.Topics:• why people fear public speaking, •  is it possible to overcome fear of public speaking?• modern ways to improve communication skills , • little known ways to overcome fear of public speaking,• dangers of certain beverages, lighting errors and sound mistakes,• Methodologies which help build authenticity and clarity Chapters• 00:00 Introduction and Background• 02:57 Discovering a Passion for Public Speaking• 09:00 The Importance of Effective Communication• 13:07 Challenges in Presentation Skills• 21:02 Techniques for Effective Communication• 25:07 Assisting Leaders in Communication• 25:36 The Importance of Authentic Confidence• 26:27 Coaching Introverts in Public Speaking• 28:54 Overcoming Filler Words• 30:00 The Impact of Comfort Level on Delivery• 32:49 The Role of Coffee and Energy Drinks• 34:23 Camera Angles and Gestures for On-Camera Presentations• 41:36 The Importance of PracticeTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Are you real? What will Deepfake do to Security Risk? Shocking Examples. SummaryIn this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in terms of cybercrime. The conversation highlights the use of deepfake in cyberbullying, fraud, and social engineering attacks, as well as its potential to compromise organizations through fake employment interviews. The hosts also touch on the involvement of federal agencies and Congress in addressing the deepfake threat. The conversation emphasizes the need for awareness and vigilance in the face of this rapidly evolving technology.Topics: How Deep Fake Videos Increase Security Risks, why deep fake videos are dangerous, why deep fake videos increase security risks, new ways to reduce risks from deep fakes, dangers of synthetic media, new dangers of synthetic media, artificial intelligence risks in cyber security, new ways to reduce risk from deep fakes, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, how is ai making it harder to detect deep fakes, how ai is making it harder to detect deep fakes, Chapters00:00 Introduction: The Need for Secure Managed File Transfer05:12 Chapter 2: Deepfake's Real-World Applications and Damages12:58 Chapter 3: Deepfake in Fake Employment Interviews  In this episode: Latest News on Deepfake. What We All Need to Know. Synthetic Media. We get into something cutting edge and a new emerging threat to our reality.You may not know the term Synthetic Media but you likely have heard of the phrase DEEPFAKE from social media and TV entertainment news. Today, it’s far beyond Photoshop and celebrity impersonation...there are real cybercrimes which have occurred with devastating consequences in real life. In fact, the US military, Congress and Federal law enforcement have now gotten involved. Today they certainly know all about it and are paying careful attention, monitoring advances in synthetic media/deepfaTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Paul Eckloff was a US Secret Service Agent for 23 years.  Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes.Catch Video Episode with Sample Deep Fakes here: https://youtu.be/1yFFK6uHt0I?si=qP9F1_uIZ7q6qGSSTakeawaysSample deepfakes are played. Can you tell? Over 85% of those tested could not.Deepfake technology, created using techniques like GANs, diffusion models, and VAEs, can convincingly substitute one person's face or voice with another's.The advancement of deepfake technology poses risks such as impersonating executives, enhancing social engineering campaigns, avoiding detection in malware, and conducting reconnaissance for future attacks.The widespread availability and low cost of deepfake technology make it accessible to both legitimate businesses and threat actors, increasing the threat surface for organizations.The potential for deepfakes to manipulate and deceive individuals, especially children, is a grave concern.Chapters00:00 Introduction to Deepfake Technology and its Impact03:27 The Challenges of Detecting Deepfakes08:04 The Erosion of Trust: Seeing is No Longer Believing11:31 The Advancement of Deepfake Technology26:53 The Malicious Uses of Deepfake Technology36:17 The Risks of Deepfake Technology37:42 Consequences of Deepfakes40:38 Limitations of Deepfake Detection44:30 The Need to Get Ahead of Deepfakes45:28 The Rapid Advancement of AI Technologies47:02 Deepfakes in Different Languages50:44 The Impact on Personal Reputation51:59 The Importance of Verification56:09 The Role of Regulations58:44 The Fallacy of Trusting Regulations01:00:06 Applying Occam's Razor01:02:00 The Profound Changes of AI and Deepfakes01:06:17 The Power of AI to Elevate or Tear Down01:09:34 The Catastrophic Potential of DeepfakesTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.KEY TOPICS: ·      how risk appetite effects your cyber security plans, ·      explaining risk appetite in cyber security to leadership, ·      how security planning involves risk appetite, ·      new ways leaders can assess their risk appetite, ·      how cyber insurance works, ·      how cyber insurance is only one part of risk management, ·      and risk management beyond cyber insurance. Chapters·      00:00 Introduction and Role Explanation·      03:26 Transferring Risk and Risk Appetite·      06:01 The Complexity of Insurance and Risk Management·      07:41 Insurance as One Part of Risk·      08:10 The Impact of Breaches Beyond Insurance·      09:48 Career Journey: From Coding to Law Enforcement·      16:32 Concerns of Organizational Leaders·      20:22 Breakdown in Communication between Technology Leadership and the Board·      21:19 Explaining Risk Mitigation and Funding Needs·      22:46 Constantly Evolving Security Programs·      23:02 Challenges and Techniques in Fighting Breaches·      24:07 The Complexity of Cybersecurity Breaches·      25:13 The Priming Process and Research Involved in Breaches·      26:07 Measuring and Quantifying Risk in Cybersecurity·      27:03 Compliance vs. Cybersecurity·      28:03 The Importance of Cyber Risk Quantification·      29:11 The Role of Compliance and Security in the Financial Industry·      30:02 Preparing for a Data Breach: Incident Response Planning·      34:06 The Role of Law Enforcement in Incident Response·      36:22 The Difference Between Compliance and Security·      43:38 The Impact of Poor Preparation on Breach Response·      44:34 Preparing for a Data Breach: Incident Response Plan·      48:28 The Importance of Practice and Preparedness·      49:24 Upcoming Events and Focus on Helping ClientsTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.TakeawaysCybersecurity in higher education faces unique challenges Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.Cyber resiliency and preparedness are crucial in mitigating cyber risks Education and awareness are key Collaboration and information sharing between organizations are essential Creating a student-run SOC can be a valuable initiativeBreaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt. Chapters00:00 Introduction and Background01:30 First Experience with Ethical Hacker06:32 Transition to Cybersecurity at Clemson University07:00 Cyber Risks in Higher Education09:04 Cyber Resiliency and Preparedness11:18 Cyber Risks Faced by College Students15:06 Social Engineering and Cyber Education19:48 Collaboration and Information Sharing in Cybersecurity22:12 Challenges of Cybercrime and Law Enforcement28:15 Top Cyber Threats in Higher Education30:11 Threats and Vulnerabilities34:25 Creating a Student-Run SOC38:02 Breaking into Cybersecurity46:03 The Broad Scope of Cybersecurity50:47 Generative AI and its Impact51:32 Upcoming Events and PodcastNews on Clemson University and their Cyber transformationhttps://news.clemson.edu/meet-a-tiger-john-hoyt-director-of-information-security-and-privacy/Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th.Find details at www.CyberCrimeJunkies.comKey topics:Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineering, Importance of visibility into operational risk, Most common hacking tactics, New approach to build a security culture,Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer,  explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps.  Polymer is a data loss prevention platform for Software-as-a-service  platforms.  It leverages AI which automates the protection of sensitive information across SaaS apps like, Salesforce, Google Drive, Slack, Microsoft Teams, and Zoom. We all use these platforms. Did you know there are little known dangers of software as a service platforms?There are many risks. Some intentional  and some created. We explore them today. This is the Story of Start-up CEO and founder Yasir Ali and how he is debunking common cyber security myths about software. TOPICS: hidden cyber security risks in software as a service platforms, innovative ways to reduce risks in software messaging apps, how safe are software as a service platforms, little known dangers of software as a service platforms,new ways to reduce risks in software as a service platforms,TakeawaysAI adoption in SaaS platforms is increasing, and there is a need for AI governance and regulations to address data security concerns.Deepfake technology poses risks to organizations, and Polymer is exploring ways to mitigate these risks.Zero trust architecture and data protection measures are crucial for ensuring the security of sensitive information in SaaS platforms.Chapters01:12 Genesis of Polymer04:11 Data Protection and Control05:37 Risks of Oversharing in SaaS Platforms07:07 Functionality of Polymer08:05 Real-Time Redaction and Data Observability09:28 Customization and Flexibility of Polymer11:20 AI Governance and Concerns22:17 Polymer's Role in Zero Trust Architecture24:24 Myths and Misinformation about Data Security26:21 Yasser Ali's Journey as an Entrepreneur28:14 Future Plans for Polymer30:48 Conclusion and Contact InformationTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime:  data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can get your data back after ransomware. Opinions of Chris are his own, not those of Rubrik. Connect with Chris on LinkedIn: https://www.linkedin.com/in/cmgardner/  Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Fore more see www.cybercrimejunkies.comFind video of this on YouTube @CyberCrimeJunkiesPodcastTry KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explores the costs and consequences of cyber attacks, the sophistication of cyber criminals, and the future of cyber insurance. The speakers stress the importance of engaging with insurance professionals and seeking education and resources to navigate the complex cyber insurance market. They emphasize the need to align with trusted professionals and continue to expand the market for cyber insurance.TakeawaysRisk Transfer is a Great Way to Approach your Cyber PlanningCyber insurance is a crucial risk transfer tool for small businesses.Implementing low-cost measures can significantly reduce cyber risk.The costs and consequences of cyber attacks can be devastating for small businesses.Engaging with insurance professionals and seeking education and resources is essential for navigating the complex cyber insurance market.Chapters00:00 Background and Approach05:18 Understanding Cyber Insurance as Risk Transfer06:12 12 Low-Cost Measures for Small Businesses15:23 Costs and Consequences of Cyber Attacks18:26 The Importance of Cyber Insurance20:46 The Sophistication of Cyber Criminals22:13 The Future of Cyber Insurance24:14 Engaging with Insurance Professionals30:30 Advice for Small Business Owners33:38 The Importance of Education and Resources35:47 Aligning with Trusted Professionals36:26 Continued Growth and Market Expansion Try KiteWorks today at www.KiteWorks.comDon't Miss our Video on this Exciting KiteWorks Offer! Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System.  Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
loading
Comments 
loading
Download from Google Play
Download from App Store