Look for any podcast host, guest or anyone
Showing episodes and shows of

Cyber Podcast

Shows

The Med Device Cyber PodcastThe Med Device Cyber PodcastWebinar: Mastering Threat Modeling for Medical Device CybersecurityChristian Espinosa, CEO of Blue Goat Cyber, and Trevor Slattery, Director of Medical Device Cybersecurity, explore the critical topic of threat modeling in medical device cybersecurity. This session covers essential practices and frameworks that ensure the safety and security of medical devices, aligning with FDA guidelines.We cover the DFD3 standard for threat diagramming and the STRIDE framework for identifying potential threats. Learn how to visualize and assess risks effectively, understand trust boundaries, and implement robust security measures to protect sensitive patient data.Blue Goat Cyber is...2025-07-3143 minDTF Cyber PodcastDTF Cyber PodcastCyber Chaos: VPN Hacks, Breaches & Chatbot Blunders! #DTF013In this episode of the DTF Cyber Podcast (DTF013 v1), hosts Damian Chung, Troy, and Fern Rojas dive deep into the latest cybersecurity headlines, unpacking real-world incidents and sharing actionable insights to help you strengthen your defenses. From VPN breaches to third-party risks and AI chatbot vulnerabilities, we explore the common threads of identity management and zero-trust strategies that every security pro needs to know.Key Topics Covered:• Ingram Micro VPN Attack: Analyzing a credential compromise that highlights the dangers of weak MFA and lateral movement in networks. Learn why zero-trust access and user education ar...2025-07-281h 01The Med Device Cyber PodcastThe Med Device Cyber PodcastWebinar: Risk Management Frameworks For Medical Device Safety & SecurityJoin Trevor Slattery, Director of Cybersecurity, and Christian Espinosa, CEO of Blue Goat Cyber, for a comprehensive webinar on medical device cybersecurity. Trevor and Christian explore the critical interplay between safety and security risk management, offering guidance on conducting effective risk assessments that address vulnerabilities across both domains. This presentation will give you a deeper understanding of key standards like ISO 14971 and AAMI TIR57 and learn how to implement robust risk management frameworks. Equip yourself with the knowledge needed to ensure both patient safety and data security in medical devices!2025-07-2443 minDTF Cyber PodcastDTF Cyber PodcastCybersecurity Skills Shortage: Landing Jobs for New Grads #DTF012Welcome to Episode 12 of the DTF Cyber Podcast! 🎙️ Join hosts Damian, Troy, and Fern as they dive into the hottest topic in cybersecurity: breaking into the industry. 🛡️In this episode, we tackle the cybersecurity skills gap, exploring why hiring managers struggle to find talent while many with cyber degrees face challenges landing roles. From the importance of networking and building trust to overcoming imposter syndrome, we share practical advice for job seekers and hiring managers alike. 🌐Key topics include:➡ Navigating the skills gap and unrealistic job requirements (3-5 years for "e...2025-07-211h 02The Med Device Cyber PodcastThe Med Device Cyber Podcast5 Key FDA Cybersecurity Standards with Jordan JohnHow can you integrate relevant cybersecurity standards early in your medical device development process? Also, how do FDA cybersecurity standards help reduce the time to market for new medical devices?In this episode, Trevor Slattery, CTO of Blue Goat Cyber, and Jordan John, Director of Regulatory Affairs and Compliance at Blue Goat Cyber, explore: * The importance of integrating standards into the QMS from the start.* How TIR57 complements ISO 14971 for security risk management.* Why cybersecurity must be operational, not just documented.* IEC 62304 and its role in secure software lifecycle p...2025-07-1749 minDTF Cyber PodcastDTF Cyber PodcastWhy Did the DOJ Go After a Ransomware Negotiator? #DTF011#Cybersecurity #GoogleFine #Ransomware #EthicsInTech #Overemployment #RemoteWork #DTFCyberPodcast #Defcon2025🎙️ DTF Cyber Podcast – Episode 011Check out this week's episode of the DTF Cyber Podcast! On Monday, July 14th, hosts Damian, Troy, and Fern are joined by their very first special guest, Mike Manrod (CISO at Grand Canyon Education), also known as "DoubleM."The team dives into the complex world of tech ethics with three major stories:First, they tackle the news that Google has been ordered to pay $314 million for misusing Android users' cellular data. Is this a major...2025-07-151h 08XY MagazineXY MagazineStratégie cyber-sécurité de la FranceStratégie cyber-sécurité de la France est bien définie. La France a élaboré et fait évoluer sa stratégie nationale en matière de cyber-sécurité face à l’amplification et à la sophistication des cyber-menaces, ainsi qu’en réponse au cadre réglementaire européen. Stratégie cyber-sécurité de la France Origine et Évolution La lutte contre les cyber-menaces a été organisée en France dès 2004, puis renforcée après l’attaque informatique subie par l’Estonie en 2007. La Nouvelle Stratégie Nationale de Cyber-sécurité (2024) La nouvelle stratégie nationale de cy...2025-07-0508 minDTF Cyber PodcastDTF Cyber PodcastHacking a Company to Sell to Them? What??? #DTF010What are some of the cyber risks to small mid-sized businesses? The latest report is out! There was also someone hacking into these small companies then trying to sell them cyber services. Is that ethical? We also cover the IntelBroker getting caught even though he was using Monero privacy coins. And finally we touch on Whatsapp being banned. What about other unauthorized encrypted communications apps? Checkout #DTF01000:00 - Intro01:22 - SMB Threat Report 20:43 - Unethical Hacking39:30 - IntelBroker caught?56:43 - WhatsApp banned on US GOV devices 2025-06-301h 10DTF Cyber PodcastDTF Cyber PodcastIs this the end of Bitcoin? Quantum Computing vs Crypto #DTF009Google Outage, Quantum Computing vs Crypto, North Korean Fake IT Workers, How to get a Cyber Job! DTF Cyber Podcast EP009What can we learn from the massive Google outage? Some really good discussion on trying to prepare for feature changes and potential issues. Change control? A big topic lately is Quantum Computing vs Bitcoin. Does this spell out the end of cryptocurrencies as we know it? Should you still invest in crypto? And finally for everyone looking for a new cyber job, how did Troy land his new role? What are some of his tips to...2025-06-301h 05DTF Cyber PodcastDTF Cyber PodcastAirlines Selling Traveler Data? Security Leader Burnout! #DTF008DTF Cyber Podcast EP008Airlines selling your travel data to the government. Is this a privacy concern? Should they be allowed to sell your information? The government already has the travel data for no-fly lists, but should they even need to "buy" this info? What about the news article on smartwatches breaching air gapped systems? Are devices spying on you? And for the Security Leaders and CISOs.... Are you burning out earlier than normal? This latest article says most CISOs are looking to leave their jobs. Check out this week's cyber news commentary!0:00 - Intro2025-06-301h 04DTF Cyber PodcastDTF Cyber PodcastDid Reddit Just Get Fooled By AI Bots? Fake AI Company? #DTF006DTF Cyber Podcast EP006Was it ethical for researchers to us AI on reddit in conversations without letting users know? This AI successfully persuaded users. Should we be worried in the the information wars with AI bots? We also discuss the Getty lawsuit against an AI platform for using their images to train their LLM. What about an AI company that used real developers vs the AI they said they were using? Check out this episode of the DTF Cyber Podcast!00:00 - Intro01:00 - Reddit AI Experiment14:00 - Getty Lawsuit2025-06-091h 02DTF Cyber PodcastDTF Cyber PodcastChatGPT Privacy Concerns? AT&T Data Breach! #DTF007DTF Cyber Podcast EP007Recent news highlights how OpenAI must retain ChatGPT logs, raising concerns about user privacy. Additionally, the AT&T hack from 2021 has resurfaced, potentially exposing sensitive information again. These events underscore the importance of data privacy and cybersecurity in the digital age. #OpenAI #ChatGPT #DataPrivacy #ATTHack #sensitiveinformation Use code: cyberpodcast10Get 10% off the registration for CruiseCon West, the Flagship of Cybersecurityhttps://cruisecon.com/2:00- Open AI Court Order26:00 - AT&T Breach Data Released40:30...2025-06-091h 07The Med Device Cyber PodcastThe Med Device Cyber PodcastAI in Medical Devices: Opportunities & Regulation with Matt LemayWhat does responsible AI implementation look like in medical devices?This episode explores the intersection of AI, cybersecurity, and medical device regulation with guest Matt Lemay, CEO of Lemay.ai. Hosts Christian Espinosa and Trevor Slattery of Blue Goat Cyber dig into how AI models are trained, certified, and deployed in clinical contexts—and what can go wrong. Key points: (7:29) Data, Security, and Deployment Risks* Training data inconsistencies and data drift in AI models.* Cybersecurity concerns tied to cloud deployment and version control.2025-06-0342 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastEssential Software Documentation for Med Device ManufacturersWhat documents should engineers prepare to get ready for submitting a medical device to the FDA? In this episode, Christian and Trevor dig into the underestimated role software documentation plays in cybersecurity, especially in the medical device space. They highlight how incomplete or contextless documentation can hinder everything from SBOM utility to regulatory compliance. With sharp insights and real-world examples, they make the case for elevating documentation as a strategic priority.Key points: (00:43) The Real Purpose of Documentation* Software documentation is often seen as a checklist item rather...2025-05-2727 minDTF Cyber PodcastDTF Cyber PodcastIs Your Browser Safe From Dangerous Extensions? $400M Cyber Incident! #DTF005DTF Cyber Podcast EP005What's up with these chrome extensions? 100s of malicious ones removed by Google. What are the threats and how should you protect your organization? Marks and Spencer in the UK also reported losses of $400M due to a cyber incident. How much should a cyber program spend to protect against this type of risk? Check out the full episode!00:00:00 - Topics Intro00:01:21 - Google Chrome Extensions Hijacking your information00:17:30 - Marks and Spencer $400M Incident00:37:40 - Text Scams around Toll Road Fees00:48:59...2025-05-2654 minDTF Cyber PodcastDTF Cyber PodcastCoinbase Data Exfiltrated: $20M Hacker Bounty. AI is changing cyber careers #DTF004DTF Cyber Podcast EP004Coinbase has insiders exfiltrate data and someone tries to make $20M off the data via extortion/ransom. Coinbase turns the tables and offers $20M for a bounty on the hackers! There is a discussion on what happened to cause the data loss in the first place and how we rate the Coinbase response.There is a study suggesting that AI will change jobs. How does AI impact cyber jobs for anyone in growing their career, or looking to graduate soon?The FBI issues a deepfake voice...2025-05-261h 11The Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - From Window Fabricator to SOC Analyst with Caleb Matthews - Episode 62Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Caleb, a former student who successfully transitioned from window fabrication to cybersecurity.Caleb shares his journey from spending seven years in window fabrication to landing his dream role as a Level 1 SOC Analyst at Triskel Labs. He discusses the challenges of changing careers, the intense training process, and how his previous leadership experience has helped him adapt to his new role in a 24/7 Security Operations Center.If you're considering a...2025-05-2221 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastEarly Cyber Strategies for MedTech TrailblazersWhat are some strategies founders can use to incorporate cybersecurity into the early stages of developing a medtech product? In this episode, Christian and Trevor break down the critical role of cybersecurity in early-stage medtech startups. They explore why cybersecurity is often overlooked, what the real-world consequences are, and how startups can shift left to avoid costly pitfalls. From VC funding to FDA requirements, they offer a roadmap for founders who want to get it right from the start.Key points: (0:33) The Cybersecurity Awareness Gap* Many early-stage medtech st...2025-04-2927 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - Overcoming Career Change Anxiety with Akhil George - Episode 60Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Akhil George, a former warehouse worker who successfully transitioned into cybersecurity.Akhil shares his inspiring journey from working in a warehouse to landing his first role as an Information Security Consultant, focusing on Governance, Risk, and Compliance (GRC). With a small IT background from his time in India, Akhil explains how he recognized security vulnerabilities in his warehouse workplace and developed a passion for contributing to the cybersecurity industry.If...2025-04-2431 minDTF Cyber PodcastDTF Cyber PodcastDTF#001 -Espionage, Insider Threats & Why Zero Trust Still Isn't TrustedDTF on a Podcast EP001:The crew dives headfirst into the gritty realities of cybersecurity—spanning corporate espionage, insider threats, tariffs, and why zero trust architecture isn’t as widely adopted as it should be. Listen in to the stories and lessons learned from over 65 years of technology experience and how those shape the course modern leaders are taking today while accounting for current events. 00:00:00 - Intros. Who are these dudes?00:10:11 - Alleged Corporate espionage at Rippling. What's the deal at Deel? 00:20:37 - Malware, Zero Trust Failure, and the cost of oper...2025-04-211h 02The Med Device Cyber PodcastThe Med Device Cyber PodcastThe Growing Importance of Interoperability and Third-Party Component SecurityWhy is interoperability increasing cybersecurity risks in healthcare, and what can we do about it?Interoperability is making healthcare more efficient but also more vulnerable to cyber threats. In this episode, Christian and Trevor discuss how second-order attacks, misconfigured cloud systems, and poor data integrity controls can compromise medical devices. They also share practical steps manufacturers can take to protect their devices and networks.Key points: (02:00) Understanding Interoperability Risks* The increasing number of connected medical devices and their security challenges.* How interoperability expands...2025-03-2537 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - From Teaching to Tech with Brett Leikas - Episode 58This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Brett, a former student who successfully transitioned from a 14-year teaching career into cybersecurity.Brett shares his journey, from discovering Cyber Revolution through a Facebook ad to landing his first cybersecurity role as an Associate Cybersecurity Consultant at Vectra, just two weeks before Christmas of 2024. He discusses the challenges of changing careers, the learning process, and the importance of a growth mindset.Key Takeaways from this Episode:Why Brett decided to leave the...2025-03-2023 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsMuleSoft Co-Pilot – Revolutionizing API Management | Royal Cyber PodcastWelcome to Royal Cyber's official podcast, where we dive into the latest technologies, innovations, and concepts shaping the future of enterprise operations.In this episode, we explore MuleSoft Co-Pilot, an AI-driven automation tool transforming API management and infrastructure workflows. Join our host Humza Tareen as he speaks with Syed Owais Ali, an expert in AI-driven automation, to discuss:✅ The challenges traditional enterprises face in API management ✅ How MuleSoft Co-Pilot enhances efficiency, visibility, and reduces manual workloads ✅ Real-world benefits, including 40-50% cost reduction and 80% manual workload reduction ✅ ROI insights and how businesses can seamlessly implement MuleSoft C...2025-03-1407 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsThe Hidden Costs of Poor Product Data & How to Fix It | Blue Meteor x Royal Cyber PodcastBad product data is costing businesses more than they realize! Delayed product launches, lost sales, and frustrated customers—these are just some of the hidden costs. In this podcast, we explore how companies can overcome these challenges with smarter product data management. 🎙️ Join Aditya Bharti from Royal Cyber and Cherag Rana from Blue Meteor as they discuss: ✅ Why poor product data is a major issue for brands and retailers ✅ The risks of using spreadsheets for product information management ✅ How PIM, PXM, and AI-powered solutions improve efficiency and accuracy ✅ Solutions for better collaboration between suppliers, distributors, and retailers ✅ A real-life success story of...2025-03-0514 minCyber Insurance News & Information PodcastCyber Insurance News & Information PodcastEpisode #2 - Cyber Insurance News & Information Podcast - Understanding Cybersecurity InsuranceIn this episode of the Cyber Insurance News and Information Podcast, host Martin Hinton discusses the complexities of cybersecurity insurance with experts Craig Sekowski with thetechcollective.net and Ralph Pasquariello with care-report.com. They explore the challenges small businesses face in understanding cyber insurance, the importance of building cyber resilience, and the various cyber threats, such as business email compromise and ransomware. The conversation emphasizes the need for businesses to invest in cybersecurity insurance and security measures to protect against potential attacks, highlighting the evolving nature of cyber threats and the necessity for adaptable cyber insurance policies.2025-02-1734 minCyber Crime JunkiesCyber Crime JunkiesWhen Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for BusinessesCyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all need to know, most recent top cyber security news, new cyber crime news, new...2025-01-1727 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastThe Evolution of Medical Device Cyber Threats: Past, Present, and FutureHow do medical device vulnerabilities pose life-threatening risks?In this episode, Christian and Trevor again explore the fascinating and critical world of medical device cybersecurity. Specifically, they discuss past attacks, present challenges, and future risks, from vulnerable pacemakers to autonomous surgical robots. They highlight the importance of transparency, proactive security design, and responsible research in protecting the devices we trust with our lives.Key points: * The 2007 cybersecurity concerns surrounding Dick Cheney’s pacemaker.* Barnaby Jack’s insulin pump and pacemaker hacking demonstrations....2024-12-2424 minCyber Crime JunkiesCyber Crime JunkiesHigher Education under Cyber Attack. Clemson CISO John Hoyt.John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new...2024-12-2057 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsThe Future of Headless CMS & DXM | Crown Peak Insights | Royal Cyber Podcast In this episode of the Royal Cyber Partner Podcast, hosted by Aditya, we’re joined by Paul, VP of Solutions Engineering at Crown Peak, to discuss the future of Headless CMS, Digital Experience Management (DXM), and the shift toward Omni-Channel Commerce. Paul shares insights on how businesses can create agile digital ecosystems, deliver personalized content across multiple touchpoints, and stay compliant with evolving data privacy laws.🔹 Key Topics: How composable solutions enhance flexibility and scalability The power of Crown Peak’s hybrid headless CMS for seamless content delivery Delivering consistent, personalized experiences across websites, apps, kiosks, an...2024-12-0311 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastTrailer - The Med Device Cyber PodcastYou rely on a medical device to stay healthy, but what if that device could be hacked? What if someone, miles away, could manipulate it, putting your loved one’s life at risk? Welcome to the trailer for The Med Device Cyber Podcast, the podcast dedicated to medical device cybersecurity. Join Christian Espinosa, CEO of Blue Goat Cyber, and Trevor Slattery, Director of Medical Device Cybersecurity, as they reveal the hidden risks and solutions to protect our health. Every fortnight, Christian and Trevor bring you insights from industry experts, healthcare professionals, and cybersecurity leaders who ar...2024-10-0101 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsExploring SAP Omni-Channel Pricing & Promotion Service | Royal Cyber Podcast | EP - 01 Join us as we dive into SAP Omni-Channel Pricing & Promotion Service with Royal Cyber's Senior Solution Architect, Bupesh Kumar. Discover how centralized pricing and promotions help streamline complex calculations across multiple sales channels, ensuring a unified customer experience and increased brand loyalty. Learn about key components, integrations, and benefits in this insightful discussion. 2024-09-1026 minKaram PradhanKaram PradhanCyber Security | HINDI mein | Definition QnAIn this episode of 'Cyber Security', Host 'Kashish Gambhir' is in conversation with well-known Cyber Security expert 'Vandna Guliya'. Vandna shares everything about Cyber Security , all questions answered. This is Part-1 of the episode. ©KashishGambhir 2024 All QUestions mentioned below - Cyber security meaning Cyber security news Cyber security ppt Cyber security course Cyber security jobs Cyber security define Cyber security salary Cyber security definition Cyber security companies Cyber security pdf Cyber security awareness Cyber security i...2024-08-3139 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep14: +971 Cyber SecurityLet's Talk Cyber Ep14: +971 Cyber SecurityHost: Thomas McCarthy, Cyber News GlobalGuest: Hassan Hariry, Co-Founder, +971 Cyber SecurityJoin host Tommy and guest Hassan as they discuss collaborations and partnerships, staying ahead of cyber threats, and how +971 Cyber Security can make a difference to your organisation.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai.Contact ceo@cybernewsglobal.com if you have any questions about this podcast or others in the Let's Talk Cyber Series!Rather listen on your favourite...2024-05-2711 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber EP12: We Fight FraudLet's Talk Cyber Ep12: We Fight FraudHost: Thomas McCarthy, Cyber News GlobalGuest: Dr. Nicola Harding, CEO, We Fight FraudJoin host Tommy and guest Nicola as they discuss recognising your weaknesses, how We Fight Fraud can help, and what to expect at GISEC.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai.Contact ceo@cybernewsglobal.com if you have any questions about this podcast or others in the Let's Talk Cyber Series!Rather listen on your favourite podcast...2024-05-2710 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep13: The Failure of Appropriate TOMSLet's Talk Cyber Ep13: The Failure of Appropriate TOMSHost: Thomas McCarthy, Cyber News GlobalGuest: Stuart Anderson, Founder, Xpert DPOJoin host Tommy and guest Stuart as they discuss the importance of TOMS,  the role of governance in effective data security, and how to implement a tailored approach to TOMS.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai.Contact ceo@cybernewsglobal.com if you have any questions about this podcast or others in the Let's Talk Cyber Series!R...2024-05-2715 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep15: CISO Versus vCISO: Navigating Cybersecurity LeadershipLet's Talk Cyber Ep15: CISO Versus vCISO: Navigating Cybersecurity LeadershipHost: Thomas McCarthy, Cyber News GlobalGuest: Kurtis Toy, Founder & CEO Onca TechnologiesJoin host Tommy and guest Kurtis as they discuss the role of the CISO, the benefits of a vCISO, and how to navigate cybersecurity leadership.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai.Contact ceo@cybernewsglobal.com if you have any questions about this podcast or others in the Let's Talk Cyber Series!Rather listen on...2024-05-2716 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsUnveiling Business Analysis Trends: Royal Cyber Podcast Episode 1 with IIBA Join us for the premiere episode of the Royal Cyber Business Analysis Podcast, where we dive deep into the evolving landscape of business analysis. In collaboration with the International Institute of Business Analysis (IIBA), we explore modern techniques, trends, and best practices shaping the industry in 2024. Discover the pivotal role of IIBA in advancing business analysis and their invaluable contributions to the field. Whether you're a seasoned analyst or just starting your journey, this podcast provides invaluable insights to stay ahead in the ever-changing world of business analysis. 2024-05-221h 15Cyber MinutesCyber Minutes31. Big Cyber Attacks.This week we've got 3 fairly big cyber attacks to discuss, Pubs NSW, and their Poor handling of customer data, Change Healthcare, a massive company brought to their knees, and Barnett's Couriers, whos lack of backups has caused them to apparantly go bust. Tune in for some opinions, facts, and an overview of these recent events! #CyberSecurity #Cyber #Podcast #CyberAttack #ChangeHealthcare #PubsNSW2024-05-1923 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep11: Data Privacy and it's Role in the Cyber RealmLet's Talk Cyber Ep11: Data Privacy and it's Role in the Cyber RealmHost: Thomas McCarthy, Cyber News GlobalGuest: Susanne Bitter, Certified Information Security And Data Governance Professional, Cyber Security Forum InitiativeJoin host Tommy and guest Susanne as they discuss why data privacy matters, risks of poor data management, and best practices for data collection.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion...2024-04-1821 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep10: Bridging Compliance, Forging True Security Through UnityLet's Talk Cyber Ep10: Bridging Compliance, Forging True Security Through UnityHost: Thomas McCarthy, Cyber News GlobalGuest: Shannon Noonan, HiNoon ConsultingJoin host Tommy and guest Shannon as they discuss security compliance, strategies for collaborative approaches, and unified fronts for risk management.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!Contact ceo@cybernewsglobal.com if you have any questions...2024-04-1513 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep9: Cyber Queens Shaping the Future of SecurityLet's Talk Cyber Ep9: Cyber Queens Shaping the Future of SecurityHost: Thomas McCarthy, Cyber News GlobalGuest: Col. Francel Margareth Padilla-Taborlupa, First Female AFP SpokespersonJoin host Tommy and guest Col. Francel as they discuss digitalization in the Army, challenges for women in military, and the value of women in cyber.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!...2024-04-1214 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep8: Secret Service Agent Busts International Cyber CrimeLet's Talk Cyber Ep8: Secret Service Agent Busts International Cyber CrimeHost: Thomas McCarthy, Cyber News GlobalGuest: Matt O'Neill, Former U.S. Secret Service AgentJoin host Tommy and guest Matt as they discuss Worldwide Cyber Collaboration, the case surrounding the Vietnamese cyber criminal Minh Ngo, and cautionary notes for future cyber hackers.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!...2024-04-0913 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsEpisode 1 Unleashing the Power of GoTestPro for ServiceNow Testing | Royal Cyber Podcast Welcome to the GoTestPro podcast, where we delve into the transformative capabilities of GoTestPro (GTP) for testing ServiceNow applications. Join Archana and Harish Kanta from Royal Cyber as they discuss how GTP revolutionizes testing processes, integrates Out-of-the-Box (OOTB) test cases for ServiceNow modules, and ensures continuous testing effectiveness. Discover how GTP empowers organizations to enhance software quality, reduce time-to-market, and streamline testing workflows effortlessly. Don't miss out on valuable insights and learn how GTP can elevate your ServiceNow testing experience. Website: https://www.royalcyber.com/company/contact-us/?smp=YoutubeChannel LinkedIn: https://www.linkedin.com/company/royal-cyber-inc- X: https://twitter...2024-04-0819 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep7: Cyber Security in the UAELet's Talk Cyber Ep7: Cyber Security in the UAEHost: Thomas McCarthy, Cyber News GlobalGuest: H.E. Dr. Mohamed Al-Kuwaiti, CEO Cyber Security Council UAEJoin host Tommy and His Excellency Doctor Mohamed Al-Kuwaiti as they discuss Cyber Security in the UAE, International Collaboration in fighting Cybercrime, and Initiatives at this years GISEC Global 2024.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!2024-04-0809 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurity2024 Unleashes Unprecedented Cyber Breaches - Ep 82Mother of All Breaches. The Midnight Blizzard attack. Nation state cyber conflicts. January 2024 has seen a blitz in cyber  attacks. In this week's episode, hosts Stan Wisseman and Rob Aragao delve into the alarming start to the new year.1.    Mother of All Breaches (MOAB):·       Unprecedented Scale: Over 26 billion records compromised, impacting major platforms like Twitter, LinkedIn, Adobe, and Dropbox, along with government agencies worldwide.·       Data Complexity: The breach includes not only credentials but also sensitive data, creating substantial value for malicious actors.·       Organization: The breach was meticulously organized, posing...2024-01-3115 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityWEF's 2024 Cyber Landscape - Ep 81In this episode, hosts Rob and Stan explore the World Economic Forum's Global Cybersecurity Outlook 2024, a favorite annual report providing valuable insights into the cybersecurity landscape. Released early in the new year, the episode looks at the key themes, findings, and implications outlined in the report.Main Themes:1.    Geopolitical and Technological Environment:·       Report highlights dynamic changes and advancements in geopolitics and technology.·       Emphasis on impacts of geopolitical tensions, economic uncertainties, and technological advancements, especially in AI.2.    Cyber Skill Shortage:·       Discussion on persistent challeng...2024-01-2420 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurity2024 Cyber Trends & Threats - Ep 78In this episode, hosts Stan Wisseman and Rob Aragao reflect on the cybersecurity landscape of 2023 and discuss its potential impacts on the upcoming year, 2024. They delve into the alarming increase in incidents and breaches, noting a 30% rise. The conversation covers major breaches, such as the MOVEit and Okta incidents, emphasizing the growing threat of ransomware across various sectors.The hosts highlight the interconnectedness of organizations, raising concerns about dependency on common platforms and the resulting ripple effect during security breaches. They stress the importance of reevaluating security controls and adopting a layered approach to mitigate vulnerabilities.2024-01-0315 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastUnwrapping the Best of 2023’s Cyber Revolution PodcastAs we say goodbye to 2023 and welcome the new year, join me on a quick journey through the Cyber Revolution Podcast's top 5 moments. From inspiring career shifts to a mum’s awe-inspiring journey, these stories have made our podcast special. So, let's relive the highlights that shaped our year! Ben's story serves as a powerful motivator, reminding us that every career change is within reach. Listen or watch the full ep here: https://open.spotify.com/episode/7c2on607V6YsxT8VorE8kH. Michael's incredible 90-day hustle is a testament to the transformative power of ha...2023-12-1827 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityProtecting Your Business and Wallet from Cybersecurity Risks on Black Friday and Cyber MondayWelcome to another compelling episode of the Reimagining Cyber podcast, where your knowledgeable hosts, Rob and Stan, explore the intricate landscape of Black Friday and Cyber Monday and the associated cybersecurity challenges that intensify during this festive shopping season.Stan sheds light on the colossal scale of holiday spending, revealing that last year's Black Friday soared to an impressive 9 billion, while Cyber Monday skyrocketed to nearly 11 billion. With an astounding 197 million U.S. shoppers in the mix, the stakes are undeniably high, and the threats are alarmingly real.The hosts pivot to the consumer side...2023-11-2213 minPodcast Radio Business InterviewsPodcast Radio Business InterviewsWHY SMALL BUSINESSES ARE A GROWING TARGET FOR CYBER CRIMINALS | Eddie LambEddie Lamb, Director, Cyber Education and Advisory from Hiscox speaks to Clayton M. Coke of Podcast Radio Business to discuss WHY SMALL BUSINESSES ARE A GROWING TARGET FOR CYBER CRIMINALSBusinesses with less than 10 employees have been hit harder by cyber attacks over the last three years, and despite battling high inflation and the cost-of-living crisis, cyber attacks are a top business risk for companies in five of eight countries. That’s according to the new Hiscox Cyber Readiness Report, which has revealed many small business owners with less than 250 employees do not feel confident on...2023-10-0928 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastHow One Military Veteran Transformed Into a Successful Cyber Pro - Episode 34Ready to start an exciting journey into the world of cybersecurity? Cyber Revolution is your go-to guide for exploring careers in cybersecurity. Discover the incredible transformation of Tim Jensen, a military veteran, as he shifted from dreams of working in law enforcement to becoming a successful cybersecurity professional. His journey reminds us that unexpected paths can lead to remarkable opportunities.  Surprisingly, many things he learned in the ADF turned out to be useful in the world of cybersecurity. In this field, you never stop learning. New trends, threats, and hacks pop up all the time. C...2023-09-2717 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastThe Lucrative New Career Path Into The Booming Industry of Cyber Security- Episode 24Crack into the exciting world of cybersecurity and unlock its full potential with us. Embarking on a new professional journey and paving the way for a successful career through our expertise. Meet Zhara, a prime illustration of success who secured her first cybersecurity job after our transformative training program at Cyber Revolution. She's one of the many success stories from our prestigious institute. But let's address the issue at hand. Despite our curiosity about cybersecurity, misconceptions and a lack of knowledge often hold us back. At Cyber Revolution, we aim to demolish those barriers, answer...2023-07-1919 minCyber Crime JunkiesCyber Crime JunkiesUndercover In a Cyber Crime Gang. Shocking LOCKBIT Reveal.Legendary Security Researcher Jon Dimaggio takes Cyber Crime Junkies undercover in a cyber crime gang. Exposing Inside a cyber crime gang LOCKBIT 3.0 and its leaders. Covering how intelligence gathering is critical to security, how to expose secrets of cyber crime gangs, Latest insight on cyber crime gangs, his newest findings on ransomware cyber crime gangs, how stolen data is sold by cyber criminals, under cover investigation ransomware, undercover findings on ransomware cyber crime gangs, undercover in cyber crime gangs, undercover inside ransomware cyber crime gangs, understanding the people behind ransomware groups, what its like undercover inside cyber crime gang...2023-04-3049 minCyber Crime JunkiesCyber Crime JunkiesComing Next on our Cyber Crime Podcast. What to know.Upcoming episodes for cyber crime podcast. Whats New on Cyber Crime Podcast. Enjoy the benefits of subscribing to top cybersecurity podcast.New Episodes coming! Top security tips we all want to know, and covering topics like: Impact Of New Us Security Strategy on AI, how a think tank benefits cybersecurity, how a think tank benefits cybersecurity, think tank ai and cybersecurity information sharing, How Will The Us Regulate Artificial Intelligence, Ai And Cybersecurity Information Sharing, and practical ways to protect yourself from scams, ways to protect from insider threats. 📲 📲 PLEASE CONSIDER SUBSCRIBING. It's FREE and it will...2023-03-0703 min