Look for any podcast host, guest or anyone
Showing episodes and shows of

Clear Cut Cyber Ltd

Shows

The Cashflow Show: Entrepreneurship Insights for Founders, CEOs and Business LeadersThe Cashflow Show: Entrepreneurship Insights for Founders, CEOs and Business LeadersAI-Powered Cyber Threats: How Bots Are Taking Over with Tim Ayling - Thales / ImpervaEpisode Summary:In this episode of The Cashflow Show, host Clayton M. Coke is joined by Tim Ayling, Vice-President of Cybersecurity Solutions, EMEA at Thales UK, to unpack the 2025 Imperva Bad Bot Report, which reveals bots now account for 51% of internet traffic. Tim explains what bots are, how AI makes them more dangerous, and their impact on industries like travel and SMEs. From polymorphic bots to denial-of-service attacks, he shares how Thales counters these threats and offers practical steps for businesses to stay secure in an AI-driven cyber landscape.Key Discussion Points: Bot Traffic S...2025-04-3016 minDisorderDisorderEp112. Tariffs and The Divergence of US and EuropeEurope and the US are increasingly having differing approaches to everything from free trade to free speech to combatting disinformation to defence to the role of the judiciary. What does that mean for Global Order? Or rather – in our mad mad mad mad world – what does this mean for the extent of Global Disorder?  In this episode, hosts Alexandra Hall Hall and Jason Pack are reunited in person in DC. Jason talks of his misadventures on Capitol Hill – and relates anecdotes he has picked up about the DOGE sledgehammer, Republicans bullying Canadians, and the post-apocalyptic feeling...2025-04-151h 03DisorderDisorderEp110. Ransomware in our age of Disorder with RUSI’s Jamie MacCollOn 3 June 2024, Synnovis, a provider of pathology services to the NHS in London, detected the first stages of a ransomware attack. The ransomware quickly spread through Synnovis’ networks, encrypting systems and stealing sensitive data. Not for the first time, a ransomware attack had become a matter of life and death.     The attack, which was later claimed by Qilin, a Russian-speaking cybercriminal gang, was a stark example of how cybercrime has become a national security threat. Attacks against hospitals, schools and businesses of all shapes and sizes have normalised what should be intolerable: cybercriminals, in many cases harb...2025-04-0145 minSibylline Insight PodcastSibylline Insight PodcastState-Sponsored Cyber Actors and Cyber Criminals | Sibylline Insight EP. 34In this cyber episode of the Insight Podcast, Lead Analyst Kailyn Johnson and Associate Analyst Denise Schipani, two experts from our Cyber desk, sit down to explore the increasing collaboration between state-sponsored cyber actors and cyber criminals, highlighting the implications for cybersecurity, business risks and attribution challenges. Denise explains the commercialisation of cybercriminal tools and how state actors leverage these resources to enhance their operations. The conversation also delves into the long-term effects of adopting cybercriminal tactics and the future trends in cyber cooperation.   If you enjoyed this special cyber episode, let us know by l...2025-03-2426 minUnderstanding CyberUnderstanding CyberThe Bottom LineThe Bottom Line Cash! We talk about funding cyber security, when you need funding, and top tips on how to secure funding. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-12-0623 minCOVER MagazineCOVER MagazineHow Cyber Risk Is Redefining Business InsuranceSpiros Fatouros, CEO of Marsh Africa, unpacks the evolving landscape of cyber risk and insurance. Spiros discusses key insights from the Marsh McLennan and Zurich report, which highlights that 99% of economic loss from cyber incidents remains uninsured.   With cyberattacks becoming more frequent and costly, Spiros explains the importance of addressing this protection gap and outlines the growing interest in cyber insurance in South Africa.   He also emphasises the need for public-private partnerships to tackle systemic risks. Listen to the podcast to explore the future of cyber risk management in Africa and beyond. 2024-11-0816 minSibylline Insight PodcastSibylline Insight PodcastCyber Risks in Crypto and Healthcare | Sibylline Insight EP. 27In this special episode of the Insight Podcast, Lead Analyst Kailyn Johnson and Associate Analyst Denise Schipani, two experts from our Cyber desk, sit down to discuss trends they’ve observed in recent months that present risks to both businesses and individuals alike. Denise highlights the continuing trend of crypto scams and theft by state and non-state actors and the perennial threat that cyber poses to healthcare infrastructure and organisations.   If you enjoyed this special cyber episode, let us know by liking, subscribing or leaving a review! You can also contact us with any questions or feedback: inf...2024-11-0121 minCOVER MagazineCOVER MagazineThe Rising Threat of Data ExfiltrationThe Allianz Cybersecurity Resilience Report 2024 highlights key trends in cyber risk, with ransomware continuing to dominate large claims over €1 million. Data breaches and class action suits are also on the rise, particularly in the U.S. and Europe. Allianz Cyber Specialist Santho Mohapeloa emphasises that cybercriminals are increasingly shifting from encryption-based ransomware to data theft, making breaches more costly for victims. Best practices for risk mitigation include employee training, multi-factor authentication (MFA), and comprehensive disaster recovery plans. The report serves as an essential tool for brokers and risk managers to stay informed and prepared for future cyber threats.  2024-10-3008 minEpicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed TechnologiesEpicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed TechnologiesKonstantin Lomashuk: '#bitcoin is like a #memecoin' - cyber·FundOutside of BTC’s cypherpunk movement, the early days of crypto were more or less barren in terms of innovation. However, this presented a huge opportunity for visionaries and angel investors to either launch or back bold projects, recognizing the potential of crypto stretching far beyond than just payments. One of them was Konstantin Lomashuk, co-founder of cyber•Fund which was a key actor in bootstrapping the cybernetic economy. Apart from early investments in Ethereum, Polkadot, Cosmos, Solana and many others, Konstantin recognized the potential threats to the core ethos of decentralisation and also co-founded Lido DAO in order to s...2024-10-071h 06Safe TechTalkSafe TechTalkEpisode 19 : Safe TechTalk - From Technical Expertise to Commercial ViabilityJoin Gaurav Ranade, CTO & CISO at RAH Infotech Pvt Ltd, and Pramodh Rai, Co-Founder of Cyber Sierra, as they explore the intricate balance between deep technical knowledge and the commercial demands of today's cybersecurity landscape. Gaurav, drawing on his vast experience, sheds light on: - Identifying and addressing critical infrastructure gaps and misconfigurations.✅ - Understanding the top cyber threats and practical strategies for mitigation.🔍 - How emerging technologies intersect with the need for commercial viability in cybersecurity.💡 - The evolving cybersecurity landscape and what organizations need to stay ahead.🌐 Tune in for an insightful discussion on how technical expertise can be effe...2024-09-1136 minUnderstanding CyberUnderstanding CyberCyber Essentials Update - Part 2Cyber Essentials - Part 2: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and...2024-09-0124 minUnderstanding CyberUnderstanding CyberCyber Essentials Update - Part 1Cyber Essentials - Part 1: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website...2024-08-0120 minUnderstanding CyberUnderstanding CyberHow CISOs sleep at night - aka AssuranceHow CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-07-0137 minUnderstanding CyberUnderstanding CyberRisking it allRisking It All: Episode three of four in our special series on risk. Matt and Tom continue their journey through cyber risk management, and talk about how we might go about accepting certain levels of risk. Exercising, threat modelling, and a good communications plan all feature. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-06-0120 minUnderstanding CyberUnderstanding CyberRisky Tools and TechniquesRisky Tools and Techniques by Clear Cut Cyber Ltd2024-05-0122 minUnderstanding CyberUnderstanding CyberRighting Wrongs on RiskIn the first of a four-part series on risk we examine what risk management means in the cyber world, how people get it wrong, and how to solve it. Featuring special guest, and Clear Cut Cyber risk expert, Matt. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-04-0226 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 4: "Securing Industrial Assets: The Convergence of Cyber Threats and Machinery Safety"In this episode of Keys 2 Your Digital Kingdom, we delve into the critical intersection of cybersecurity and machinery safety in industrial settings. Join us as we welcome back Kevin Kumpf, Chief OT Strategist at Cyolo, to explore the challenges and implications of securing industrial assets.Discover how cyber threats are converging with machinery safety concerns, posing significant risks to industrial operations. Kevin shares insights into the evolving threat landscape facing industrial assets and discusses strategies for safeguarding machinery against cyber attacks.Tune in to gain a deeper understanding of the importance of securing industrial assets...2024-03-2620 minThe Defender\'s JournalThe Defender's JournalA Defender's Journal Spin-Off - Kanika SethWelcome to a new conversational spin-off of the Defender's Journal podcast series!In these bite-sized episodes, we'll highlight perspectives and services to help you upskill and advance your career. We'll also provide tangible steps you can take to improve your chances of succeeding in the cyber security space, no matter what your goal is! Just like our main podcast, we're all about digging deep into individuals' expertise and helping those reflections shape successful journeys in cyber security.This week our guest is the incredible Kanika Seth.  Here's what she had to say...- W...2024-03-1526 minUnderstanding CyberUnderstanding CyberHow to plan cyber incident responseLearn how to plan cyber incident response We explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website https://clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-03-0424 minUnderstanding CyberUnderstanding CyberWhat is a CISO?What is a CISO? In this episode Toby and Tom are joined by a special guest - Dr Andy Grayland. Andy is an experienced CISO, and currently fills that role for Silobreaker. He joins the team to discuss what a CISO is, what the role entails, when you need one, and what he thinks the most important actions and skills are for a new CISO. If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com or to learn more about Silobreaker go to Silobreaker.com. Music is Green Lights by Jahzzar...2024-02-0528 minUnderstanding CyberUnderstanding CyberSecurity AssessmentsSecurity assessments In this episode Toby and Tom discuss what security assessments are, different types of assessment, and how they are conducted. They also talk through some of the assessments they have conducted. If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com. Including free cyber security health checks for charitable organisations. Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2024-01-0223 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 1: "Outsourcing Your Cyber Security: Are Managed Services Right For You?"In the inaugural episode of "The Keys 2 Your Digital Kingdom," hosts Stephan Zimmermann and Philippe Palm explore the realm of Managed Security Services (MSS). They dissect the evolving threat landscape and the proactive measures required to fortify against cyber adversaries.The hosts discuss the benefits and challenges of MSS, shedding light on how it enhances security, streamlines operations, and defends against emerging threats. Practical considerations for selecting an MSS provider are outlined, emphasizing features, customization, and alignment with organizational needs.Join Episode 1 for a captivating exploration of considerations around Managed Security Services—essential for securing yo...2023-12-2722 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastEmbracing Integrated Training in Security - Lee McWhorter & Kevin LewisIn this episode, we deep-dive into the dynamic theme of Integrated Training and how this innovative approach is revolutionizing the way security professionals operate. Discover why mastering both the digital battleground and the physical frontline is no longer a luxury, but a critical necessity. Phelim and Shaun are pleased to welcome Lee McWhorter, CTO and Director of Cybersecurity at Covered Six, and Kevin Lewis, Director of Training also at Covered Six as we take a journey through the cutting-edge intersection of cyber and physical security. Tune in to learn why Integrated Training isn’t just an...2023-12-0351 minUnderstanding CyberUnderstanding CyberFrom Function to FortificationFrom Function to Fortification: identifying and securing critical business functions In this episode Toby and Tom discuss why understanding business impact is key to context for any cyber security programme, and a process for working it out. If you want any cyber security support please get in contact with the team via the website: https://clearcutcyber.com or email info@clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2023-11-2927 minDisorderDisorderEp2. Who Referees Cyberspace?Although the birth of the internet was an interplay between American defense contractors and American tech firms, the US government actively chose to not regulate the commercial aspects of what it had birthed.   From disinformation to cyber warfare, how can we better control the internet and stop it from reinforcing the Global Enduring Disorder? In this episode, former FBI Agent Asha Rangappa helps us understand what makes these new technologies so disruptive and how the West’s adversaries understand the politics of cyberspace. War Correspondent David Patrikarakos tells us about the physical impact of these new t...2023-09-1946 minSkip the Noise PodcastSkip the Noise PodcastEpisode151:Cyber Attacks and Exerting an Undue PresenceCyber attacks on healthcare/ Hunter Biden Legal battle/ Developing Ukrainian conflict/ Brief coverage of UAP hearing (stay tuned for full episode)/ Rest in Peace Pee Wee and much more! Instagram: @skip_the_noise_podcast Twitter: @skipthenoisepo12023-08-081h 04Sibylline Insight PodcastSibylline Insight PodcastWagner and Prigozhin in Belarus, Niger’s coup and more! | Sibylline Insights EP. 15In this episode, Head of Global Intelligence Gareth Westwood is joined by Intelligence Delivery Lead Leo Collins to discuss the recent coup and unrest in Niger, Israel’s controversial legislation regarding the Supreme Court, a missing Chinese minister and a rise in zero-day cyber attacks (brought to us by our Cyber Intelligence Analyst, Kailyn Johnson). Gareth is then joined by Eurasia Intelligence Analyst Layla Guest to discuss Yevgeny Prigozhin and the Wagner Group in Belarus.   Follow us on Twitter: https://twitter.com/Sibyllic Follow us on Instagram: https://www.instagram.com/sibyllineltd/?hl=en...2023-08-0432 minMOATS with George GallowayMOATS with George GallowayIsrael attack on Jenin Camp a War crime? | Biden's cyber attack on American DemocracyOn this Moats, George Galloway debates whether Israel's attack on the Jenin Camp should be seen as a war crime? Meanwhile President Biden has been accused of cyber attacks on American politics by having unfavourable views and news removed from social media like RFK Jr, isn't that election interference?Guests:Niko House: Political Commentator and Founder of MCSC Network- Twitter: https://twitter.com/realnikohouse- YouTube: https://youtube.com/@MCSCNetworkWNikoHouseProfessor Seyed Mohammad Marandi: Professor of English Literature and Orientalism at the University of Tehran 2023-07-061h 10The Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #39 - The Hidden ROI within Cyber SecurityJoin host Josh Ennis in this episode of Evo Cyber Security as he uncovers the hidden return on investment (ROI) within the realm of cybersecurity. Engage with esteemed guests Jonathon Concannon, Group Information Security Manager at Boohoo Group PLC; Martyn Booth, Chief Information Security Officer at Dunnhumby; and Will Palmer, Chief Information Security Officer at Etrading Software Ltd, as they delve into the intricate balance between security measures and business outcomes. Gain valuable insights from these industry leaders as they highlight the often overlooked financial benefits that effective cybersecurity can bring to organizations.2023-06-1655 minWind PowerWind PowerIs the cyber-attack risk for the wind industry growing?The threat of cyber attacks on the wind industry’s remote control systems for turbines and other equipment is all too real and it is growing by the day, with potentially disastrous consequences for companies which do not understand the dangers they face.As the industry becomes increasingly reliant on remote systems to control the operations of offshore wind farms, the so-called ‘attack surface’ grows with them. Meanwhile, the energy transition - in which Europe attempts to pivots away from Russian fossil fuels - brings with it a higher likelihood of cyber attacks which originate from state...2023-05-2528 minLeft to Our Own DevicesLeft to Our Own DevicesEsti Pesin: Flying Cyber (with Guest Host Michael Engstler)We sat down with Esti Peshin, VP, General Manager, Cyber Division at Israel Aerospace Industries - ELTA, and our guest host Michael Engstler, co-founder and CTO of Cybellum, to discuss what flying a plane can teach you about cybersecurity. Under Esti’s management, IAI's cyber activity was expanded from a Directorate to a Division. Esti also served as the Director General of the Israeli Hi-Tech Caucus at the Knesset, the Israeli Parliament, and was a partner in multiple private equity firms. Esti is also a licensed pilot, as shown in the fantastic videos she shares on social media.2023-05-2428 minSouth West Cyber BeatSouth West Cyber BeatRoss Brown talking to Prof. John Goodacre University of Manchester talking about the UK Research and InnovationThis podcast is led by Prof. John Goodacre: University of Manchester who is here to tell us all about the UK Research and Innovation John is Professor of Computer Architectures at the Department of Computer Science, The University of Manchester in the UK having previously spent 17 years with Arm Ltd as the Director of Technology and Systems where he defined and introduced the first multicore processors and other core technologies. He is also appointed by UK government's Research & Innovation agency as the Director of the Digital Security by Design Challenge Fund, a £200M programme to enable industry an...2023-02-2725 minThe LoadstarThe Loadstar2M implications; cyber-attack legal action; extreme weather logistics risksIn Part 1 of this episode host Mike King and his various guests discuss the latest news including the latest on ocean and air rates, what next for MSC and Maersk, why the legal fallout from cyber-attacks is increasing, and where and why container lines are cutting capacity. In Part 2, Mike speaks to two thought leaders whose business is understanding the link between more severe weather patterns and logistics risks. They explain how much more volatile storms are already adding to the cost of trade and the price of new port infrastructure.   Guests 2023-02-1543 minFortune Favours The BraveFortune Favours The BraveCyber: What you need to know, 2022 and beyond (Part 1)In this episode of Fortune Favours The Brave, Shay Simkin and Dan Leahy of Howden sit down with Philippa Berry, Cyber Product Leader at CFC Underwriting and Andrew Maher, Head of Cyber and Technology at AXIS to take a look at risk controls and resilience, pricing and capacity and the market as we look towards 2023. 2023-01-1634 minRam Charan Co Pvt LtdRam Charan Co Pvt LtdRam Charan Co Pvt Ltd - Industry 4.0 to the Chemical Industry WorldRam Charan Co Pvt Ltd says the development of cyber-physical systems (CPS) and a wide range of technological breakthroughs are all aided by industry 4.0 technology. The objective of Industry 4.0 is to create intelligent products using intelligent processes and techniques.2022-12-2108 minThe Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #23 - The Human Factors Of Application SecurityToday's host is: Gareth Davies And today's guests are: Dustin Lehr - Senior Director - Platform Security @ Fivetran Keith Batterham - Application Security Lead @ Kontex Marius Poskus - Senior Security Engineer (SecDevOps)@ Glow Financial Services Ltd Irene Michlin - Application Security Lead @ Ne04j2022-12-0150 minThe Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #19 - The Challenges Of Being A CISOToday's host is: Rob Wall And today's guests are: Jim Woodcock - CISO - Finyx Consulting Ltd James Blake - CISO - Rubrik Liz Banbury - Chief Information Security Officer - Hiscox Bronwyn Boyle - CISO - Mambu2022-11-2446 minThe Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #17 - Cyber Threats In OTToday's host is: Rob Wall And today's guests are: Richerd Fowler - CISO - Royal Mint Andy Edwards - CISO - Butterfield Group Paul Baird - UK Chief Technical Security Officer - Qualys Robin Smith - Head of Cyber and Information Security - Aston Martin Lagonda Ltd2022-11-2439 minThe Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #12 - Improving Diversity And Inclusion In SecurityToday's host is: Rob Wall And today's guests are: Jim Woodcock - CISO - Finyx Consulting Ltd Sandip Patel - Chief Security Officer - APM Stephen Khan - CISO - ASI Cyber Consulting Liz Banbury - Chief Information Security Officer - Hiscox2022-11-2429 minWAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #660 (QUANTOM Fitness Workout Vol. LIV. Live@ ”ПИРАТСКАЯ СТАНЦИЯ” РАДИО ВОЛНА 107,4 ФМ) [PEAK TIME - DRIVING TECHNO]Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media: instagram.com/iamquantom https://instagram.com/wandeepsessionofficial soundcloud.com/wanderlustrec soundcloud.com/quantomofficialFollow our Spotify Playlist: https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music: https://t.me/wanderlustrecords Listen the new EP " BLACK SUN " by QUANTOM https://open.spotify.com/album/6MqiOaNTEqHYezchtBuMzV?si=dKnLp_qaQTOiF5xVO1mz_w Tracklist: Basstrologe - Somebody To Love (QUANTOM Edit) Demon Noise...2022-11-151h 52The Numbers GameThe Numbers GameThe Cost Of Cyber Crime - Reading The PlayWelcome to episode  74 of The Numbers Game. On today's show, we're talking cyber security and the impact it's having on business'.On this episode, we discuss:Reading The play:Cyber securityThe Optus and Medibank hackThe impact on Medibank stock priceInvesting in cyber securityRed Piranha data securityThe cost of a Cyber AttackCyber insuranceRed flags to look out forCheck out the free resources from Inovayt here.Send us an email: hello@thenumbersgamepodcast.com.auThe Numbers Game is brought to you by Future Advisory & Inovayt.Hosts:Nick Reil...2022-11-0624 minNorthon\'s Media PR & Marketing LtdNorthon's Media PR & Marketing LtdYou, Me & IP - WIPF Thailand Conference Special BroadcastHost:Carlos NorthonFounder & CEO at Northon's Media PR & Marketing Ltd - UK Guest:Supriya Mitra Majumunder Founder & CEO at Clarios Business Consulting PVT Ltd – India Simba MakahamadzeFounder & CEO at All Things IP Africa (ATIPA) – Africa Sanjaykumar PatelFounder & Principal IP Attorney at Excelon IP – India Nourhan N. Moussa LLB, LLM, PhD.Partner at AGM Consultancy - Egypt Richard NugentBusiness Consultant at Mathys...2022-11-0456 minBetter Business, Better LifeBetter Business, Better LifeCyber SecurityIn today's episode, we discuss cyber security with RightWay's IT specialist Callum! We delve into the types of attacks that are frequently becoming problematic for business owners, such as ransomware, comprised business emails, and phishing scams. We also look into ways to protect yourself from an insider threat and how to protect your data from a breach. Filled with practical tips and advice from both ex-business owners and our IT guru this episode is not to be missed! During the episode we reference the following: https://www.cert.govt.nz/ BBC World...2022-10-2738 minWAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #639 (QUANTOM Fitness Workout Vol. L.(50) Live @ RADIO DEEJAY IT) [PEAK TIME - DRIVING TECHNO]Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media: instagram.com/iamquantom instagram.com/wanderlustrec soundcloud.com/wanderlustrec soundcloud.com/quantomofficialFollow our Spotify Playlist: https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music: https://t.me/wanderlustrecords Listen the new album " V I R T U A L I T Y " by QUANTOM & Deni Blaq: https://open.spotify.com/album/2IFgd78KAjOrgr0cUZHkSa?si=VzLIs7MLRG-yYZOZy8Mq6A Tracklist: 2022-10-032h 01The Evolution Exchange Cyber Security PodcastThe Evolution Exchange Cyber Security PodcastEvo Cyber Security #6 - Cyber InsuranceToday's host is: James Price And today's guests are: Lee Williamson - CISO - EIP Limited Andy Cocallis - Head of Information Security - UK Biobank Vlad Jirasek - Founder & CEO - Foresight Cyber Ltd2022-09-2838 minCLOUD 9 LTDCLOUD 9 LTDIT Services ScarboroughWith the right IT services Scarborough, companies can improve communication and collaboration, increase productivity, and drive growth. Here are several IT services that can help organizations achieve their goals: 1) Cloud Computing 2) Data and Analytics 3) Data Backup And Data Recovery 4) Managed IT Services 5) Cyber Security Official Website: https://www.ridecloud9.com/ Click here for more Information: https://www.ridecloud9.com/it-services-scarborough Contact Us: Cloud9 | Reliable IT management and optimization Address: 96 Main Street North, Markham, Ontario, Canada L3P 1x8 Phone: +128937864632022-09-2102 minWAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #621 (QUANTOM Live @ Stardust Performance Event.) [PEAK TIME - DRIVING TECHNO]Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/iamquantominstagram.com/wanderlustrecsoundcloud.com/wanderlustrecsoundcloud.com/quantomofficialFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecords Listen new single "Chimera":https://open.spotify.com/track/1bKWaxn5GxyXToOeJrHERr?si=56e84c37fd8f45a4 Tracklist: Jeremy Wahab - Go MOTVS - Fade To Grey Bouras - Euphoria [EXCLUSIVE]2022-08-222h 04WAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #615 (QUANTOM Fitness Workout Vol. XXXXV.) [PEAK TIME - DRIVING TECHNO]Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/iamquantominstagram.com/wanderlustrecsoundcloud.com/wanderlustrecsoundcloud.com/quantomofficialFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecords Listen new single "Chimera":https://open.spotify.com/track/1bKWaxn5GxyXToOeJrHERr?si=56e84c37fd8f45a4 Tracklist: DIMENSION 9 & ALVES (PT) - In My Face Lautaro Ibañez & Nahum Korm - Distored Bass [TRACK O...2022-08-091h 43WAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #611 (QUANTOM Live @ ПИРАТСКАЯ СТАНЦИЯ FM РАДИО) [PEAK TIME - DRIVING TECHNO] Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/iamquantominstagram.com/wanderlustrecsoundcloud.com/wanderlustrecsoundcloud.com/quantomofficialFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecords Listen new single "Chimera":https://open.spotify.com/track/1bKWaxn5GxyXToOeJrHERr?si=56e84c37fd8f45a4 Tracklist: ID - ID (Unreleased) The Yellowheads - Galaga AKKI (DE...2022-07-311h 30WAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #610 (Projekt Malik ”Fire In The Hole” Guestmix) [PEAK TIME - DRIVING TECHNO]Brand new episode!Enjoy and subscribe for more!!! Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/iamquantominstagram.com/wanderlustrecsoundcloud.com/wanderlustrecsoundcloud.com/quantomofficialFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecords Listen new single "Chimera":https://open.spotify.com/track/1bKWaxn5GxyXToOeJrHERr?si=56e84c37fd8f45a4 Tracklist: QUANTOM - Dignified Hardwell - INTO THE UNKNOWN (Extended Mix) 2022-07-302h 08Food Manufacture PodcastFood Manufacture PodcastPreparing for cyber attacks in the food and drink industry: exclusive podcastIn this exclusive podcast interview, 1898 & Co. global director for utilities (power & water) and manufacturing Eric Ervin discussed cybersecurity in manufacturing and how to prepare the sector for potential cyber-attacks. 2022-06-2016 minWAN DEEP SESSIONWAN DEEP SESSIONWAN DEEP SESSION #587 (QUANTOM Fitness Workout Vol. XXXX.) [PEAK TIME - DRIVING TECHNO] [QUANTOM Cyber World EP Premiere]Brand new episode!Enjoy and subscribe for more!!!Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/iamquantominstagram.com/wanderlustrecfacebook.com/wanderlustrecsoundcloud.com/wanderlustrecFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecords World premiere of upcoming EP "QUANTOM - Cyber World" included (Available July 1st) Listen WAN DEEP SESSION Live on Infinity Radio every Saturday 7PM-9PMhttps://infinityradioireland.com If you want to have a guestmix in our session, just send...2022-06-151h 31South West Cyber BeatSouth West Cyber BeatRoss Brown SWCRC and Craig Wooldridge IASME talk about Maritime Cyber SecurityRoss talks to Craig Wooldridge from the IASME Consortium Ltd about the place of Cyber Security in the Maritime arena.Craig is the Maritime Cyber Baseline & Counter Fraud Fundamentals Certifications Manager for IASME Consortium Ltd  IASME work alongside a network of over 280 Certification Bodies across the UK and Crown Dependencies to help certify organisations of all sizes in both cyber security and counter fraud.We discuss the Maritime Security Baseline assessment and how it will help keep vessels safer whilst at sea. A must for anyone operating in the maritime arena.Thanks to Richard S...2022-06-0119 minLeft to Our Own DevicesLeft to Our Own DevicesFelipe Fernandes: Securing JaguarsFelipe Fernandes from Jaguar Land Rover (JLR) discusses the toughest challenges and most exciting innovations in today's automotive cybersecurity world and reveals what his favorite JLR car is.Felipe is a Cyber Security Manager at Jaguar Land Rover. He is an expert in all things automotive cybersecurity, from RF systems to IoT and embedded hardware design. In the past, he was Head of Vehicle Cyber Security LATAM at Fiat Chrysler.2022-04-0627 minTOCs on the RocksTOCs on the RocksJunten agua. Se vienen el gran apagón y el Gran Reinicio | EP-23¿Qué es el gran apagón, el gran reinicio y cómo se relacionan? ¿Qué tienen que ver con el Foro de Davos, la plandemia, la guera en Ucrania y la llamada "Cuarta Revolución Industrial" de Klaus Schwab? ¿Estaremos condenados a vivir en una distopía global donde Occidente será cada vez más como China? Y lo más importante: ¿será hora de refugiarse en el campo y rodearse de lechugas, tomates y minas antipersonales?• La cuarta revolución industrial de Klaus Schwabhttps://www.amazon.com/-/es/Professor-Dr-Ing-Klaus-Schwab-ebook/dp/B01LX19YUM/• Austria pr...2022-03-3050 minLeft to Our Own DevicesLeft to Our Own DevicesDavid Colombo: Hacking TeslasIn the first episode of "Left to Our Own Devices", David Colombo (aka the "cyber boy wonder") breaks down how he hacked dozens of Teslas in one day, how he became a world-renowned security researcher at the age of 19, and shares his tips and tricks for product security teams.David is the founder of Colombo Technologies. He is a very prolific cyber security researcher who, despite his young age, has managed to build quite a name for himself in multiple industries. During the past few years, he's exposed critical vulnerabilities in government offices, banks, and, most recently...2022-03-2325 minSouth West Cyber BeatSouth West Cyber BeatRoss Brown SWCRC and Lucy C3iA Solutions on Cyber Threats when Home WorkingAs so many of us are still working form home Lucy from C3iA Solutions Ltd joins us to talk about the threats when working from home. She introduces social engineering, which is how criminals deceive you into divulging confidential details. She also tells us how to detect suspicious emails and concludes with top tips on how to stay secure when working from home.C3iA Solutions are  a leading provider of secure ICT, technical programme management and information security services and solutions for small to medium businesses.Thanks to Richard Smithson a...2022-03-0706 minHacker TalkHacker TalkThreat intelligence with Dan DemeterDan Demeter, well-known security researcher in the Romanian information-security space.  In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and   is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team. In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.  Topics covered in this episode: Getting into infosec Romania in the early personal internet space, connecting rj4...2022-03-031h 35CISO\'s SecretsCISO's SecretsEp.S3E7 - Julie Talbot Hubbard, SVP, General Manager - Cyber Protections and Identity at OptivIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Julie Talbot Hubbard, SVP, General Manager - Cyber Protection and Identity at OptivOptivSecurity, Inc. is a privately owned information security company based in Denver, Colorado. Optiv defines itself as a security solutions integrator that delivers end-to-end cybersecurity services globally. Optiv has served more than 7,500 clients across 70 countries worldwide Layer 8 Authorized Check Point trainingLayer 8 Training is a leading provider of Authorized Check Point training in North America. Get thRed Education Training & CertificationsGl...2022-01-0642 minCISO\'s SecretsCISO's SecretsEp.S3E5 - Sadie Creese, Professor of Cybersecurity, University of OxfordIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Sadie Creese, Professor of Cybersecurity, University of OxfordCyber Security Oxford brings together the dynamic and vibrant community of researchers and experts working on Cyber Security at the University of Oxford. The network links the wide variety of research and education activities across the University, and provides an easy point of contact for engagement.Red Education Training & CertificationsGlobal Specialist IT Training Company with Award-winning experienced Instructors.Layer 8 Authorized Check Point trainingLayer 8 Trai...2021-12-1641 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastTransitioning from Physical to Cyber Protection | Shaun SouthallPeople often talk about upskilling from a physical security role to becoming a cyber or converged security specialist. But what does that really mean?  On this episode of the podcast, we speak with Shaun Southall, an operator that has expertly and effectively converged the two worlds of physical and cyber together as a working security specialist.Join us this week as we talk about: Shaun’s asymmetric career journey into cyber security.How the ‘uninitiated,’ physical security specialist can augment their skills.What steps to take and what to avoid when breaking into the field.The...2021-12-1534 minCISO\'s SecretsCISO's SecretsEp.S3E2- Emily Mossburg , Global Cyber Leader at DeloitteIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts    Emily Mossburg , Global Cyber Leader at DeloitteDeloitte provides industry-leading audit and assurance, tax and legal, consulting, financial advisory, and risk advisory services to nearly 90% of the Fortune Global 500® and thousands of private companies. Our more than 345,000 professionals deliver measurable and lasting results that help reinforce public trust in capital markets, enable clients to transform and thrive, and lead the way toward a stronger economy, a more equitable society and a sustainable world. Building on its 175-plus year history...2021-11-2448 minBetter ROI from Software DevelopmentBetter ROI from Software Development#103: Security Briefing - Why cyber security matters to youIn this first of a mini-series on security, I look at why cyber security is so critical. ----- Find this episodes show notes at: https://red-folder.com/podcasts/103 Have an idea for an episode topic, or want to see what is coming up: https://red-folder.com/podcasts/roadmap2021-10-0620 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastWar Gaming - Does it Have a Place in Executive Protection? | Nick DrageThere aren’t many second chances in the security industry. If you fail on the job, there's a good chance that you won't work again.At best, this creates the conditions where everyone is on their A-game all the time but the flip is a high-pressure environment where mistakes and the likelihood of failure are more prone.Given the high stakes, shouldn’t we be more invested in preparing for the career-threatening situations that we may encounter?This week we're talking to Nick Drage, a professional wargamer, about whether this is a viable way...2021-09-2250 minGrow A Small Business PodcastGrow A Small Business PodcastExpert on cybersecurity, helping small to large organizations understand cyber risk and managing their outsourced business process. Shutting digital doors to cyber-attacks, ensuring a sustainable and high-performing business. (Mariae Leckie)In this episode, I interview Mariae Leckie, the Interim CEO, and Senior Consultant of The Project Lab, a consulting and advisory firm based in Hobart, Tasmania. They are experts on cyber security and they work with small to large organizations to ensure the safety and security of their assets. Mariae Leckie was also the former CEO of Crime Stoppers Tasmania. Together with the team, they help their clients build and grow; understand; and change their organizations to ensure their high-performing businesses and keep their sustainability. Managing outsourced business processes and cyber risk is services they offer to...2021-09-1918 minWork Is Not A PlaceWork Is Not A PlaceEpisode 17 - Cyber Resilience - Establishing national collaborationIn the latest episode,  chats to  CEO, , , Commercial Director and , Executive Chair at  (Business Resilience International Management). They discuss the current state of play with cyber security and the progress in setting up nine regional business resilience centres in England and Wales. The conversation then looks at the impending launch of a National Cyber Resilience Group. Mandy explains the reasoning behind the new national group and how it will accommodate greater collaboration between the private sector and the police. She explains how they will share knowledge, experience, and resources at a national level to understand better what businesses need and what issu...2021-09-1535 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastThreat Intelligence - Advanced Skill or Industry Standard? | Chris StoryIs threat intelligence the only language that physical protection and cyber security can use to effectively communicate the how, the why and the where? Do the cyber and physical realms even have any reason to communicate other than to exchange threat Intel?This week, we're going to be talking with Risk intelligence expert and trainer, Chris Story, familiar to many as the co-host of the Conversations in Close Protection Podcast. Chris has a military intelligence background and currently serves on the board of the IPSB. In this revealing interview, we ask Chris…Where does his...2021-09-0834 minCISO\'s SecretsCISO's SecretsEp.S2E6 - Patrick Benoit, VP Global Cyber Governance & Security Officer at CBREIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts  Patrick Benoit VP Global Cyber Governance Security Officer at CBRE. CBRE is the world’s largest commercial real estate services and investment company, with the #1 global market position in leasing, property sales, outsourcing, property management and valuation. CBRE is also the largest commercial property developer in the United States, and has $129.1B of Assets Under Management .CISO's Secrets Podcast is powered by Infinity Global Services (IGS).Visit CISO ACADEMY to access additional learning opportunities for C level executives2021-08-0529 minCISO\'s SecretsCISO's SecretsEp.S2E3 - Ruben Chacon, CISO at CDWIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts  Ruben Chacon, CISO at CDW, Joins the episode to discuss Cyber Security challenges and best practices at CDW, the provider of technology products and services for business, government and education.CISO's Secrets Podcast is powered by Infinity Global Services (IGS).Visit CISO ACADEMY to access additional learning opportunities for C level executives2021-07-1450 minCISO\'s SecretsCISO's SecretsEp.S2E1 - Robin Smith, CISO at Aston MartinIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Robin Smith, CISO at Aston Martin. Joins the episode to discuss Cyber Security challenges and best practices at Aston Martin, the iconic luxury British sports car manufacturer. CISO's Secrets Podcast is powered by Infinity Global Services (IGS).Visit CISO ACADEMY to access additional learning opportunities for C level executives2021-06-2745 minCISO\'s SecretsCISO's SecretsEp.S2E2 - Harris Schwartz, Vice President, Security Advisory Services at AONIn this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Ep.S2E2 - Harris Schwartz, Vice President, Security Advisory Services at AON, Joins the episode to discuss Cyber Security challenges and best practices at AON,  leading global professional services firm providing a broad range of risk, reinsurance, retirement and health solutions.CISO's Secrets Podcast is powered by Infinity Global Services (IGS).Visit CISO ACADEMY to access additional learning opportunities for C level executives2021-06-2142 minAanakaryam ChenakaryamAanakaryam ChenakaryamIn conversation with Dhanya MenonDhanya Menon is India's first female cyber crime investigator and an accomplished dancer. Her lifelong passion and goal was to become a professional dancer but a chance work event got Dhanya interested in the world of cyber crime. Thanks to a grandfather who was forward thinking, a mentor and Dhanya's biggest supporter she entered this field when there was no one to look to show the way. Now she is setting the standards and has several acknowledgements and awards under her belt including the Presidents awards in 2018  for being the First Women Cyber Crime Investigator of India and the M...2021-06-0938 minSibylline Insight PodcastSibylline Insight PodcastCyber threats to critical infrastructure and potential next steps The ransomware attack on US energy firm Colonial Pipeline last week caused significant disruptions to fuel delivery on the East Coast, as the firm suspended most of its operations in a bid to stem the spread of malware. With Colonial pipeline transporting nearly half of US East Coast's fuel supply, this incident highlights the growing threat that cyber attacks pose to critical infrastructure. Our latest analysis examines how this activity compares with the perpetrators' (the DarkSide operators) previous activity and what Colonial Pipeline and Washington's response towards this incident could mean for America's energy security.   T...2021-05-1423 minSibylline Insight PodcastSibylline Insight PodcastThe cyber security landscape in the wake of the SolarWinds operationThe Covid-19 pandemic has forced many businesses across the globe to rely more on cloud computing and third-party technology to support remote working arrangements. In this week's podcast, Amy Reynolds, Deputy Insight Manager, is joined by Hans Horan, Cyber Analyst, and Guo Yu, lead ASPAC Analyst, to unpack how this increased inter-connectivity has also provided cyber threat actors with a myriad of new avenues through which to target businesses. The most notable of these vectors has been the targeting of software supply chains, which is best exemplified by the Russia-led SolarWinds attack that resulted in the compromise of nine US...2021-04-2318 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastThe Human Hacker: People Manipulation in Cyber | Jenny RadcliffeWhen we think of a “hacker” we have an image of someone behind a computer wearing a black hoodie. But today’s guest, Jenny Radcliffe, is here to expand the definition of a hacker to include human hacking or social engineering. According to Jenny, every human can be hacked. In fact, 95% of cyber-attacks are human-based or exploit some kind of human error or manipulation. And Jenny would know since she has been doing social engineering and physical infiltration for her whole life. As a human hacker or social engineer, Jenny shares her knowledge and expertise on how to avoid...2021-04-2131 minUnderstanding CyberUnderstanding CyberCyber Essentials Part 2 - ScopeCyber Essentials In this second part of the cyber essentials scheme we examine what the scope of it is, how you define your scope, and what is not in scope. Further reading: NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2021-04-0919 minUnderstanding CyberUnderstanding CyberCyber EssentialsCyber Essentials The UK has a certification scheme called Cyber Essentials to help improve cyber security. In this podcast we help you understand what the cyber essentials and cyber essentials plus schemes are, and why you should follow the advice contained in the essentials. This podcast provides and overview of the scheme, and later podcasts will go into the detail of them. Further reading: NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2021-03-0111 minThe Circuit Magazine PodcastThe Circuit Magazine PodcastPhysical/Cyber Convergence - Live from Dubai w/Brian Seeley & Nathan SwainThis week Phelim goes to Dubai to attend GISEC - an actual live, in-person cybersecurity event! That’s right, folks. It’s not a typo. So… is this a sign that things are returning to normal or are we jumping the gun here, people?  Listen in to find out how it all went as Phelim chats with two of the top speakers from the event. One is a U.S. Marine, Brian Seely, who is the only person EVER to hack into and wiretap the U.S. Secret Service and FBI. And the other, Nathan Swain has a li...2021-02-1036 min8-4 Play8-4 Play8-4 Play 2/5/2021: MAIDEN VOYAGEWhat do the RE8 and Balan demos, Cyber Shadow, Evangelion, Xbox Live Pricing, Switch LTD Sales and Sega politics all have in common? We talk about them on this podcast. Duh. This is always a list of the stuff we talk about. It was a rhetorical question. Time – Topic Discussed: 00:46 – Nicknames 04:58 – Cyber Shadow 11:01 – Some Evangelion chat 19:31 – Resident Evil Village Visual Showcase 43:14 – The Medium 59:31 – News: PS5 Chaos in Japan, Nintendo Switch sales surpass the 3DS, Stadia's New Direction, GameStop at the last minute (literally), and more!2021-02-051h 40Understanding CyberUnderstanding CyberHoneypots and DeceptionHoneypots and Deception Ever wondered what honeypots have to do with cyber security and how to use them to give high quality alerts about an attack? Listen to understand. Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2021-02-0113 minWork Is Not A PlaceWork Is Not A PlaceEpisode14 - Cyber Resilience: Buzz words or business cultureEpisode 14 is an engaging and highly topical conversation with podcast host, ,  CEO, , and .   Justin is Director of . As an experienced Senior Investigating Officer (SIO), having managed large scale investigations and as an accredited Kidnap & Extortion manager Detective Superintendent Justin Torgout has 25 years of policing experience.  Justin outlines the purpose and objectives of the Cyber Resilience network and highlights how they work in partnership with regional Policing, Academia, Businesses, Third and Public Sector organisations to deliver various cybersecurity services. The conversation explains why many businesses, even small retail operations, are cyber businesses and susceptible to online attacks. This highlights the need for great...2021-01-2732 minRail Technology Magazine PodcastRail Technology Magazine PodcastEp 24. Cyber security on our rail network, Paul Appleton & George BearfieldOn this week’s episode of RTM’s Track Talk, host Ailsa Cowen is joined by two guests. Paul Appleton, Deputy Director of Railway Safety and HM Deputy Chief Inspector of Railways at ORR and George Bearfield, Health and Safety Director at Rock Rail. They discuss the increasing awareness of cyber safety in the rail world and why our cyber security is vital.Paul spoke of how all our new modern trains are all heavily software-based. He explained how we’ve moved away from the electromechanical based systems meaning we need to make sure that we’re all read...2021-01-0531 minThe CPOstrategy PodcastThe CPOstrategy PodcastBitesize: Can we be complacent when it comes to cybersecurity?In another episode of The Digital Insight Bitesize, we take a look at  cybersecurity. With a recent  report indicating that leading retailers across the EU and US are running outdated applications, leaving them vulnerable to cyber attacks, we ask: Can you be complacent when it comes to your approach to cyber security? Traditionally such matters would be placed on the desk of the CIO and the IT teams, but Is it their responsibility to focus on cyber security?  There's certainly an argument that the wider organization could and should be more involved.In a...2020-12-1408 minSibylline Insight PodcastSibylline Insight PodcastIsraeli-Arab relations and China's new socio-economic strategy and its implications on cyber securityJoin Sibylline's CEO, Justin Crump, as he hosts this week's podcast with Phil Riding, Lead EMEA Analyst; Eloise Scott, MENA Analyst; Dr Hugo Yu, Lead ASPAC Analyst; and Hans Horan, Cyber Analyst. Our speakers examine Israeli-Arab relations and the potential impact of the US election and China's new socio-economic strategy and its implications on cyber security. Amy Reynolds, our Deputy Insight Manager, also joins to discuss some of the other key issues to watch in the coming weeks. There is more than one election taking place… 2020-11-061h 07Understanding CyberUnderstanding CyberUnderstanding Apps and Web AppsEpisode 23 - Understanding Apps and Web Apps We understand: What is an App? When did they start being called apps? How do they work? Whats a web app and why are apps much more reliant on the internet today? How might an app be compromised? Further reading: https://en.wikipedia.org/wiki/Mobile_app https://edu.gcfglobal.org/en/computerbasics/understanding-applications/1/ https://www.consumer.ftc.gov/articles/0018-understanding-mobile-apps Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-09-0324 minUnderstanding CyberUnderstanding CyberEpisode 22 - Artificial IntelligenceEpisode 22 - AI We understand: What is AI, how does it work, its history and future, use cases, and potential vulnerabilities Further reading: Wikipedia: https://en.wikipedia.org/wiki/Artificial_intelligence Oxford uni paper: http://www.fhi.ox.ac.uk/Reports/2008-3.pdf Code bullet youtube: https://www.youtube.com/c/CodeBullet/ ZDNet: https://www.zdnet.com/article/what-is-ai-everything-you-need-to-know-about-artificial-intelligence/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-08-1033 minUnderstanding CyberUnderstanding CyberEpisode 21 - RansomwareEpisode 20 - The Ransomware We understand what ransomware is, how it works, some notable examples and what to do it you suffer it. Further reading here: NCSC https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks NCA https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/cyber-crime Action fraud https://www.actionfraud.police.uk/ US Cert https://www.us-cert.gov/ FBI https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/ransomware No more ransom https://www.nomoreransom.org/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-07-0838 minUnderstanding CyberUnderstanding CyberEpisode 20 - DarkwebEpisode 20 - The Darkweb We explore what the Darkweb is, who uses it, how to access it, and why you should be careful of it. Further reading here: https://en.wikipedia.org/wiki/Dark_web https://us.norton.com/internetsecurity-how-to-how-can-i-access-the-deep-web.html Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-06-0315 minUnderstanding CyberUnderstanding CyberQuestion and Answer 1Episode 19 - Question and Answer - Q&A We cover a large number of questions that you are asked in this episode, including: Whats more secure Android or iPhone? Do I need AV on my phone? Why is hacking illegal? How do I know if a wifi network is safe? What is End to End Encryption? What is the blockchain? and more. Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-05-0837 minUnderstanding CyberUnderstanding CyberEpisode 18 - Working from homeEpisode 18 - working from home We cover the basics of security when working from home, specifically: protecting yourself from scams, protecting your network, how to securely access the office, and what happens if something goes wrong. Further reading: Resources SANS guide https://www.sans.org/security-awareness-training/sans-security-awareness-work-home-deployment-kit NCSC Guide https://www.ncsc.gov.uk/guidance/home-working Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2020-03-2612 minThe Daily Talk ShowThe Daily Talk Show#626 - Susie Jones On Building Your Cyber FitnessSusie Jones - Director, Co-founder & CEO of Cynch SecurityIn 2018, Susie, alongside Adam Selwood, co-founded Cynch Security, a Melbourne-based company that partners with business owners, and continuously profiles their cyber risks, providing them with information on how to improve their Cyber Fitness.Susie has worked in some of the largest organisations in Australia, heading up Cyber Security Business Services at AusPost, and has won the 2017 Risk Revolution Delegate Award from RiMS Australasia.On today's episode of The Daily Talk Show, we discuss: - Cyber Fitness- Using a VPN...2020-03-031h 05CISO TalksCISO TalksThe Cyber Land of Confusion | CISO TalksThere are a multitude of vendors within the cybersecurity industry. There are roughly 4000+ emerging organizations who all want to be heard. Therefore creating this land of confusion where CISOs and I.T. directors etc. have immense difficulty cutting through the noise. We discuss with Tinesh Chhaya (CEO & founder of Decipher Cyber ltd), ways in which CISOs and organizations can in fact cut through the noise and target an appropriate solution. What is real and what is just 'marketing'? Check out Tinesh's article on the cybersecurity land of confusion: https://www.linkedin.com/pulse/you-lost-cyber-land-confusion-tinesh-chhaya/ Tinesh Chhaya - CEO & founder of...2019-12-0411 min