podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Dewayne Hart
Shows
Chief of Cybersecurity
Cybersecurity Leadership: How to Become a Business Champion and Strategize
In today’s digital landscape, every business is a target. Cyber threats are evolving, and businesses need champions. Are you ready to step up and become the Cybersecurity Business Champion?Imagine leading your organization with confidence, knowing you have the strategies and tools to combat cyber threats. As a champion, one will not only protect the business but also drive innovation and growth, and play a pivotal role in steering an organization’s cybersecurity strategy. They are responsible for advocating the importance of cybersecurity at all levels of the organization, from the boardroom to the...
2024-12-27
21 min
Chief of Cybersecurity
Cybersecurity Leadership: Tips to Measure Security Capabilities and Protect the Enterprise
Security capabilities are the backbone of any effective defense system. They encompass a range of tools and practices designed to protect assets, information, and people from threats. At their core, security capabilities help organizations identify vulnerabilities and mitigate risks. This proactive approach is essential in today’s fast-evolving threat landscape, where cyber-attacks and physical breaches are increasingly sophisticated.One powerful aspect of security capabilities is their ability to integrate various technologies. From firewalls and intrusion detection systems to biometric authentication, these tools work together to create a robust defense. Additionally, security capabilities empower teams th...
2024-12-18
22 min
Chief of Cybersecurity
Cybersecurity Leadership: Ways to Develop Your Organization's Cybersecurity Culture
In today's digital landscape, it is crucial to develop a strong cybersecurity culture within your organization to protect sensitive data and fend off hackers. This podcast explores essential strategies for cybersecurity leadership that will empower your team and create a culture of security awareness. Discover how to foster collaboration, promote best practices, and instill a proactive mindset among your employees.We’ll discuss practical steps organizations can take to cultivate a cybersecurity-first approach, ensuring that everyone from the top down is engaged and committed to safeguarding valuable information. Join us to learn how to ma...
2024-10-02
30 min
COCKTAILS & JERK PODCAST
Caleb Hart
For the final episode of this year's Cocktails N Jerk Podcast, we go out with a bang and talk to the king of Island Soul ...Caleb Hart. He will be taking the stage on Saturday, September 7th bringing the good vibes along with island sounds and soulful songs. In the meantime check out this episode where we learn a bit more about how he started, his rise to the top, and what you can expect from his show this weekend.
2024-09-02
29 min
Chief of Cybersecurity
Cybersecurity Leadership: Your Role and Responsibilities
Today, it is particularly important to understand job duties and responsibilities in the fast-paced cybersecurity landscape due to the many threats we face. Cybersecurity leaders encounter similar challenges. They are often required to effectively communicate, build resilience, and become advocates for the business.However, to do this, they must first understand their role and how it impacts security, as well as earn the trust of the boardroom with their leadership. Join us as we examine key leadership responsibilities and offer advice on excelling in the cybersecurity domain. Whether you are an experienced professional or...
2024-09-02
22 min
Chief of Cybersecurity
Why Norfolk State University (NSU) Cyber Curriculum Is A Blueprint for HBCUs
Interested in pursuing a career in cybersecurity? Look no further than Norfolk State University\'s Cyber Curriculum! As a blueprint for other Historically Black Colleges and Universities, NSU\'s comprehensive program covers everything from network security to ethical hacking. With the increasing demand for cybersecurity professionals, it\'s more important than ever for HBCUs to equip their students with the necessary tools to succeed in this fast-growing field. NSU\'s Cyber Curriculum has been designed to meet industry standards and prepare students for real-world challenges. By modeling their program, other HBCUs can provide their students with the knowledge and skills...
2024-05-10
30 min
Chief of Cybersecurity
Why Norfolk State University (NSU) Cyber Curriculum Is A Blueprint for HBCUs
Interested in pursuing a career in cybersecurity? Look no further than Norfolk State University's Cyber Curriculum! As a blueprint for other Historically Black Colleges and Universities, NSU's comprehensive program covers everything from network security to ethical hacking. With the increasing demand for cybersecurity professionals, it's more important than ever for HBCUs to equip their students with the necessary tools to succeed in this fast-growing field. NSU's Cyber Curriculum has been designed to meet industry standards and prepare students for real-world challenges. By modeling their program, other HBCUs can provide their students with the knowledge and skills needed to excel in...
2024-05-10
30 min
Chief of Cybersecurity
From the National Cyber Director: No Degree Required
The new National Cyber Director, Harry Coker, stated that the White House intends "to reduce unnecessary barriers" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a cybersecurity workforce without needing a traditional four-year degree. The benefit is that individuals can gain valuable skills and experience through alternative pathways such as apprenticeships, certifications, and on-the-job training. This initiative opens up opportunities for people from diverse backgrounds to enter the cybersecurity field and contribute to national security. Join us on this podcast as we dissect the strategy's rationale, impact, and outcomes. Will...
2024-04-19
20 min
Chief of Cybersecurity
From the National Cyber Director: No Degree Required
The new National Cyber Director, Harry Coker, stated that the White House intends \"to reduce unnecessary barriers\" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a cybersecurity workforce without needing a traditional four-year degree. The benefit is that individuals can gain valuable skills and experience through alternative pathways such as apprenticeships, certifications, and on-the-job training. This initiative opens up opportunities for people from diverse backgrounds to enter the cybersecurity field and contribute to national security. Join us on this podcast as we dissect the strategy\'s rationale, impact, and outcomes...
2024-04-19
20 min
Chief of Cybersecurity
Why AI and Hackers Are Becoming Closer
With technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and the potential threats they pose to our digital security. Throughout this eye-opening video, we will explore the various ways hackers exploit AI algorithms, machine learning, and automation to infiltrate systems, steal sensitive data, and compromise online privacy. From AI-powered botnets to autonomous malware, the hacker's toolkit has evolved, requiring us to stay vigilant and well-informed about the potential risks lurking behind our screens. Furthermore, we...
2024-04-12
20 min
Chief of Cybersecurity
Why AI and Hackers Are Becoming Closer
With technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and the potential threats they pose to our digital security. Throughout this eye-opening video, we will explore the various ways hackers exploit AI algorithms, machine learning, and automation to infiltrate systems, steal sensitive data, and compromise online privacy. From AI-powered botnets to autonomous malware, the hacker\'s toolkit has evolved, requiring us to stay vigilant and well-informed about the potential risks lurking behind our screens. Furthermore...
2024-04-12
20 min
Chief of Cybersecurity
Unveiling The Dark Side of AI: It\'s About Business
As AI continues to evolve and revolutionize traditional practices, it\'s crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask the business implications of AI, which often remain obscured by its mesmerizing abilities. Discover how AI can reshape market dynamics, disrupt industries, and challenge conventional business models. Moreover, we expose the potential risks associated with AI implementation, including job displacement, data privacy concerns, and ethical dilemmas. It\'s important for businesses to navigate these obstacles while embracing AI\'s potential, striking a delicate balance between innovation and responsibility. Join...
2024-04-03
23 min
Chief of Cybersecurity
Unveiling The Dark Side of AI: It's About Business
As AI continues to evolve and revolutionize traditional practices, it's crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask the business implications of AI, which often remain obscured by its mesmerizing abilities. Discover how AI can reshape market dynamics, disrupt industries, and challenge conventional business models. Moreover, we expose the potential risks associated with AI implementation, including job displacement, data privacy concerns, and ethical dilemmas. It's important for businesses to navigate these obstacles while embracing AI's potential, striking a delicate balance between innovation and responsibility. Join us as we...
2024-04-03
23 min
Chief of Cybersecurity
CISA Has Healthcare Covered, This Podcast Tells You Why
In this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...
2024-02-26
20 min
Chief of Cybersecurity
CISA Has Healthcare Covered, This Podcast Tells You Why
In this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...
2024-02-26
20 min
Chief of Cybersecurity
We can Improve Healthcare Cybersecurity, Please Listen
The healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological dependence, sensitive data, and vulnerability to disruptions. Cyber incidents affecting hospitals and health systems have led to extended care disruptions caused by multi-week outages, patient diversion to other facilities, and strain on acute care provisioning and capacity, causing canceled medical appointments, non-rendered services, and delayed medical procedures (particularly elective procedures). More importantly, they put patients\' safety at risk and impact local and surrounding communities that depend on...
2024-02-20
22 min
Chief of Cybersecurity
We can Improve Healthcare Cybersecurity, Please Listen
The healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological dependence, sensitive data, and vulnerability to disruptions. Cyber incidents affecting hospitals and health systems have led to extended care disruptions caused by multi-week outages, patient diversion to other facilities, and strain on acute care provisioning and capacity, causing canceled medical appointments, non-rendered services, and delayed medical procedures (particularly elective procedures). More importantly, they put patients' safety at risk and impact local and surrounding communities that depend on the...
2024-02-20
22 min
Chief of Cybersecurity
How Does The Federal Government Modernization Strategy Affect Cybersecurity?
Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have strategized and optimized their cyber protection programs based on modernization standards. Are we safe, and where does the federal government stand? Are there additional practices that can improve its modernization efforts? Newer tools and legacy systems are being discussed, and agencies are making significant progress. Despite the growth, cybersecurity plays a vital role in how modernization achieves its milestones and how the government approaches cybersecurity. We...
2024-01-23
24 min
Chief of Cybersecurity
How Does The Federal Government Modernization Strategy Affect Cybersecurity?
Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have strategized and optimized their cyber protection programs based on modernization standards. Are we safe, and where does the federal government stand? Are there additional practices that can improve its modernization efforts? Newer tools and legacy systems are being discussed, and agencies are making significant progress. Despite the growth, cybersecurity plays a vital role in how modernization achieves its milestones and how the government approaches cybersecurity. We...
2024-01-23
24 min
Chief of Cybersecurity
Will AI Provide Value or Added Risks for Government IT Systems?
Due to stored data and security classification, the federal government's IT systems are more critical and sensitive. Over the years, many agencies have been challenged to protect and ensure proper safeguards are implemented. Now, AI has surfaced and created answers as well as concerns. What do we know - The added value for rapid data analysis and efficiency has created a need for AI. The news outlets have presented views and concerns about AI, but will the businesses and end users cease using or developing AI? How will the government address the change and need for AI? Some have even...
2024-01-09
24 min
Chief of Cybersecurity
Will AI Provide Value or Added Risks for Government IT Systems?
Due to stored data and security classification, the federal government\'s IT systems are more critical and sensitive. Over the years, many agencies have been challenged to protect and ensure proper safeguards are implemented. Now, AI has surfaced and created answers as well as concerns. What do we know - The added value for rapid data analysis and efficiency has created a need for AI. The news outlets have presented views and concerns about AI, but will the businesses and end users cease using or developing AI? How will the government address the change and need for AI? Some have...
2024-01-09
24 min
Chief of Cybersecurity
Secrets and Value To Cybersecurity Authoring and Writing
Many technical professionals have vast knowledge and desire to be heard. Some have resorted to podcasting, writing, or authoring publications. As someone who has done each, I believe they all provide the chance to market careers and business. Beyond a podcaster, writing, and authoring books, the value extends into many ventures. One was the chance to deliver written content on topics such as AI for the Forbes Technology Council. Join me on this podcast as Rich Casanova of Global Podcast Studios moderates and asks critical questions concerning being an author, speaker, and enthusiast for cybersecurity.
2023-12-26
30 min
Chief of Cybersecurity
Secrets and Value To Cybersecurity Authoring and Writing
Many technical professionals have vast knowledge and desire to be heard. Some have resorted to podcasting, writing, or authoring publications. As someone who has done each, I believe they all provide the chance to market careers and business. Beyond a podcaster, writing, and authoring books, the value extends into many ventures. One was the chance to deliver written content on topics such as AI for the Forbes Technology Council. Join me on this podcast as Rich Casanova of Global Podcast Studios moderates and asks critical questions concerning being an author, speaker, and enthusiast for cybersecurity.
2023-12-26
30 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 3 - Building Cyber Connectors Platforms
Critical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, attacks, and risk states should be known. Shifting blame is not an option, which forces resiliency to become active and responsive. With an absent resilient strategy, organizations are risk-prone! When \"Mastering the Cybersecurity Mindset,\" readers can develop early indications and strategies to connect security to real-world requirements. Each will learn how the connected technologies, roadmaps, and holistic defense methodology operate and correlate them to continual engagement, proactive defense, and disruption. It\'s...
2023-12-12
30 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 3 - Building Cyber Connectors Platforms
Critical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, attacks, and risk states should be known. Shifting blame is not an option, which forces resiliency to become active and responsive. With an absent resilient strategy, organizations are risk-prone! When "Mastering the Cybersecurity Mindset," readers can develop early indications and strategies to connect security to real-world requirements. Each will learn how the connected technologies, roadmaps, and holistic defense methodology operate and correlate them to continual engagement, proactive defense, and disruption. It's so...
2023-12-12
30 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 2 – Maturing Cybersecurity for Your Enterprise
Every genre of business and public agencies strives for maturity. The core requires practical and fundamental approaches following a simple methodology: \"Increase Protection and Lower Risk.\" As simple as it sounds, many have failed. These deficiencies are developed through failing to understand where risk operates and what actionable steps or actions are required with governmental requirements such as CMMI. Realizing that maturity grades effort and indicates where you stand within the security domain is imperative. The Cybersecurity Mindset illustrates various concepts and security approaches to mature and drive cyber readiness.
2023-11-28
22 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 2 – Maturing Cybersecurity for Your Enterprise
Every genre of business and public agencies strives for maturity. The core requires practical and fundamental approaches following a simple methodology: "Increase Protection and Lower Risk." As simple as it sounds, many have failed. These deficiencies are developed through failing to understand where risk operates and what actionable steps or actions are required with governmental requirements such as CMMI. Realizing that maturity grades effort and indicates where you stand within the security domain is imperative. The Cybersecurity Mindset illustrates various concepts and security approaches to mature and drive cyber readiness.
2023-11-28
22 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate Programs
Do you know what\'s on your network? That\'s a serious question that many cannot answer. When invoking \"The Cybersecurity Mindset,\" the reader can relate cyber visibility as a threat reduction tool. Many enterprises have \"blindspots,\" misconfigured systems, and have loss tracking of their cybersecurity programs. When continuous visibility is at its peak, organizations can discover untreated systems and where true risk operates. With various programs such as Asset, Configuration, and Vulnerability Management, cyber leaders must invoke a security mindset that can detect, prevent, and reduce \"blind spots.\" When \"Mastering the Cybersecurity Mindset\" and focusing on situational awareness, risk-based...
2023-11-14
23 min
Chief of Cybersecurity
Mastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate Programs
Do you know what's on your network? That's a serious question that many cannot answer. When invoking "The Cybersecurity Mindset," the reader can relate cyber visibility as a threat reduction tool. Many enterprises have "blindspots," misconfigured systems, and have loss tracking of their cybersecurity programs. When continuous visibility is at its peak, organizations can discover untreated systems and where true risk operates. With various programs such as Asset, Configuration, and Vulnerability Management, cyber leaders must invoke a security mindset that can detect, prevent, and reduce "blind spots." When "Mastering the Cybersecurity Mindset" and focusing on situational awareness, risk-based concepts, and...
2023-11-14
23 min
Chief of Cybersecurity
Secret Tips To Master IT Certifications
Many well-to-do professionals struggle to understand IT certifications and how to pass their examinations. Some have resorted to trial and error to pass. Others have studied and still have no success. Would there be a secret code for the examinations? In this podcast, I explain tips and tricks to help you master IT certifications. If you\'re looking for a new career or hope to advance your current one, mastering IT certifications is essential! Please join my Youtube channel as well.
2023-09-18
26 min
Chief of Cybersecurity
Secret Tips To Master IT Certifications
Many well-to-do professionals struggle to understand IT certifications and how to pass their examinations. Some have resorted to trial and error to pass. Others have studied and still have no success. Would there be a secret code for the examinations? In this podcast, I explain tips and tricks to help you master IT certifications. If you're looking for a new career or hope to advance your current one, mastering IT certifications is essential! Please join my Youtube channel as well.
2023-09-18
26 min
Chief of Cybersecurity
Secrets to Mastering Effective Cybersecurity Skills
With all the changes and technologies surfacing, cybersecurity teams must become the best and gather valuable skill sets. The time had changed when we spoke of cybersecurity; now it\'s about the required skill sets. You can spend time, energy, and resources determining what skill sets are needed, but the truth is actual. If you\'re searching for a cybersecurity job, you must master the skills necessary to succeed. Listed and join me on YouTube as I share some secrets to mastering practical cybersecurity skills in this podcast.
2023-09-11
25 min
Chief of Cybersecurity
Secrets to Mastering Effective Cybersecurity Skills
With all the changes and technologies surfacing, cybersecurity teams must become the best and gather valuable skill sets. The time had changed when we spoke of cybersecurity; now it's about the required skill sets. You can spend time, energy, and resources determining what skill sets are needed, but the truth is actual. If you're searching for a cybersecurity job, you must master the skills necessary to succeed. Listed and join me on YouTube as I share some secrets to mastering practical cybersecurity skills in this podcast.
2023-09-11
25 min
Chief of Cybersecurity
How To Choose The Perfect Cybersecurity Job
As cyber criminals regularly launch more sophisticated attacks and with fewer barriers to entry, cybersecurity professionals are more in demand than ever before. Security engineers are becoming increasingly hard to find and expensive to hire. Because of this, there has never been a better time for you to turn your IT passion into a career in cybersecurity. Think you have what it takes to become the next data-protecting cybersecurity expert? If you\'re looking for more ways to level up your skill set, check out this podcast and learn what jobs best suit your passion.
2023-09-04
24 min
Chief of Cybersecurity
How To Choose The Perfect Cybersecurity Job
As cyber criminals regularly launch more sophisticated attacks and with fewer barriers to entry, cybersecurity professionals are more in demand than ever before. Security engineers are becoming increasingly hard to find and expensive to hire. Because of this, there has never been a better time for you to turn your IT passion into a career in cybersecurity. Think you have what it takes to become the next data-protecting cybersecurity expert? If you're looking for more ways to level up your skill set, check out this podcast and learn what jobs best suit your passion.
2023-09-04
24 min
Chief of Cybersecurity
Cracking the Code: Your Guide to Entering Cybersecurity
There has been a great discussion concerning strategies to break into cybersecurity. Many interested people have spent time wondering about the proper steps and requirements. They have also resorted to various platforms with broken promises. This sounds all too familiar and requires an in-depth discussion. By the end of this podcast, you\'ll know everything you need to start working in cybersecurity. If you want to learn more about this exciting field, join my YouTube channel today!
2023-08-28
27 min
Chief of Cybersecurity
Cracking the Code: Your Guide to Entering Cybersecurity
There has been a great discussion concerning strategies to break into cybersecurity. Many interested people have spent time wondering about the proper steps and requirements. They have also resorted to various platforms with broken promises. This sounds all too familiar and requires an in-depth discussion. By the end of this podcast, you'll know everything you need to start working in cybersecurity. If you want to learn more about this exciting field, join my YouTube channel today!
2023-08-28
27 min
Chief of Cybersecurity
ChatGPT and the new AI are wreaking havoc on cybersecurity
Generative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale. And defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI has helped bad actors innovate and develop new attack strategies, enabling them to stay one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with various geographic regions and demographics, allowing them to target a broader range of potential victims across different countries. Cybercriminals adopted the technology to create...
2023-05-29
34 min
Chief of Cybersecurity
ChatGPT and the new AI are wreaking havoc on cybersecurity
Generative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale. And defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI has helped bad actors innovate and develop new attack strategies, enabling them to stay one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with various geographic regions and demographics, allowing them to target a broader range of potential victims across different countries. Cybercriminals adopted the technology to create...
2023-05-29
34 min
Chief of Cybersecurity
California's vulnerable water system faces many cyber infrastructure threats
"Water systems, like other public utility systems, are part of the nation's critical infrastructure and can be vulnerable targets when someone desires to affect public safety adversely. In California, where epic Sierra Nevada snowpack and "the big melt" have substantially increased the stakes for reservoir managers, officials say they're taking steps to protect the state's water systems from hackers, terrorist attacks, and natural disasters, such as the flooding that temporarily severed the Los Angeles Aqueduct — the city's water lifeline that connects to the Owens Valley. But experts say the challenges are numerous. Many of the systems in California and nationwide ar...
2023-05-22
37 min
Chief of Cybersecurity
California\'s vulnerable water system faces many cyber infrastructure threats
\"Water systems, like other public utility systems, are part of the nation\'s critical infrastructure and can be vulnerable targets when someone desires to affect public safety adversely. In California, where epic Sierra Nevada snowpack and \"the big melt\" have substantially increased the stakes for reservoir managers, officials say they\'re taking steps to protect the state\'s water systems from hackers, terrorist attacks, and natural disasters, such as the flooding that temporarily severed the Los Angeles Aqueduct — the city\'s water lifeline that connects to the Owens Valley. But experts say the challenges are numerous. Many of the systems in...
2023-05-22
37 min
Chief of Cybersecurity
Toyota Vulnerability Management Practices Are Weak
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota says the breach resulted from a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This code included an access key to the data server that hosted the email addresses and customer management numbers of T-Connect users. The publicly available source code was found on September 15th, 2022, when Toyota changed the access key. We will explain why the lapse in remediating vulnerabilities can lead to many risks, which may later...
2023-05-15
32 min
Chief of Cybersecurity
Toyota Vulnerability Management Practices Are Weak
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota says the breach resulted from a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This code included an access key to the data server that hosted the email addresses and customer management numbers of T-Connect users. The publicly available source code was found on September 15th, 2022, when Toyota changed the access key. We will explain why the lapse in remediating vulnerabilities can lead to many risks, which may later...
2023-05-15
32 min
Chief of Cybersecurity
How Does AI Affect Public Safety During The 2024 Olympics
Public safety has drawn a new wave of concern from many 2024 Olympics and government officials in France. AI can help bolster protection and rapidly determine threat actors and terrorists. Still, citizens worry about public safety and privacy. In this episode, we will breakdown AI and public safety concerns and also include its benefits and risks. As a listener, you will better understand why public safety and AI operate best when balance security is applied.
2023-05-08
29 min
Chief of Cybersecurity
How Does AI Affect Public Safety During The 2024 Olympics
Public safety has drawn a new wave of concern from many 2024 Olympics and government officials in France. AI can help bolster protection and rapidly determine threat actors and terrorists. Still, citizens worry about public safety and privacy. In this episode, we will breakdown AI and public safety concerns and also include its benefits and risks. As a listener, you will better understand why public safety and AI operate best when balance security is applied.
2023-05-08
29 min
Chief of Cybersecurity
How Cybersecurity Can Unlock Business Success
Cybersecurity is now a must-have for any business, and it's no longer a matter of if but when a cyberattack will impact its operations. The emergence of cyberattacks and various exploits has changed our cybersecurity engagements. Often, when we hear of business disruption and cybersecurity, it's an after-situation. Proactive engagements, planning, operational resilience, and cyber protection strategies are foundational to accelerating business operations. In this episode, we discuss how cybersecurity can unlock business success. The podcast will highlight a few scenarios businesses must require, design, and implement to counter risks and cyberattacks. By following these secret strategies, corporations can become m...
2023-04-17
34 min
Chief of Cybersecurity
How Cybersecurity Can Unlock Business Success
Cybersecurity is now a must-have for any business, and it\'s no longer a matter of if but when a cyberattack will impact its operations. The emergence of cyberattacks and various exploits has changed our cybersecurity engagements. Often, when we hear of business disruption and cybersecurity, it\'s an after-situation. Proactive engagements, planning, operational resilience, and cyber protection strategies are foundational to accelerating business operations. In this episode, we discuss how cybersecurity can unlock business success. The podcast will highlight a few scenarios businesses must require, design, and implement to counter risks and cyberattacks. By following these secret strategies, corporations c...
2023-04-17
34 min
Chief of Cybersecurity
How Cyber Insurance Costs Impacts The Healthcare Industry!
As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay afloat in the face of rising costs. Every citizen depends on healthcare – so what's the connection? You have heard of telemedicine, remote surgeries, and robotic medical inventions, but who is responsible when they fail? The product owner, healthcare system, and surgical professional are all affected. Downstream liability and risks are sometimes silent. In this session, we'll discuss cyber insurance's impact; and connect how operational commitment and risk trade-offs balance a defense strategy.
2023-04-10
31 min
Chief of Cybersecurity
How Cyber Insurance Costs Impacts The Healthcare Industry!
As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay afloat in the face of rising costs. Every citizen depends on healthcare – so what\'s the connection? You have heard of telemedicine, remote surgeries, and robotic medical inventions, but who is responsible when they fail? The product owner, healthcare system, and surgical professional are all affected. Downstream liability and risks are sometimes silent. In this session, we\'ll discuss cyber insurance\'s impact; and connect how operational commitment and risk trade-offs balance a defense strategy.
2023-04-10
31 min
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 2
While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve become accustomed to dealing with organizations online, the potential for trickery has grown exponentially.This podcast extends information on cybercrime towards scams, criminals stealing information, and persistent criminals.
2023-01-09
28 min
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 2
While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve become accustomed to dealing with organizations online, the potential for trickery has grown exponentially.This podcast extends information on cybercrime towards scams, criminals stealing information, and persistent criminals.
2023-01-09
28 min
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 1
In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate security programs and infrastructure advances. The end state makes a firm determination whether cybercrime is outperforming cyber protection.This podcast provides insights that reflect the ever-changing aspects of technology and system disruption through cybercrime and examines how human behavior can become solid defensive shields.
2023-01-03
27 min
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 1
In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate security programs and infrastructure advances. The end state makes a firm determination whether cybercrime is outperforming cyber protection.This podcast provides insights that reflect the ever-changing aspects of technology and system disruption through cybercrime and examines how human behavior can become solid defensive shields.
2023-01-03
27 min
Chief of Cybersecurity
Online Scams Target Veterans and Active Duty Members
Online Scams Target Veterans and Active Duty Members The U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the military, you have a young population on the web. Service members are targeted by websites that claim to offer special military discounts on everything from cars to apartments for rent. But the low-priced car never arrives, and the easy-to-find apartment they rented is already occupied. This podcast will focus on safety measures and protection standards for military personnel.
2022-12-14
38 min
Chief of Cybersecurity
Online Scams Target Veterans and Active Duty Members
Online Scams Target Veterans and Active Duty Members The U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the military, you have a young population on the web. Service members are targeted by websites that claim to offer special military discounts on everything from cars to apartments for rent. But the low-priced car never arrives, and the easy-to-find apartment they rented is already occupied. This podcast will focus on safety measures and protection standards for military personnel.
2022-12-14
38 min
Chief of Cybersecurity
How to Protect Your Church From Hackers & Cyber Attacks
With so many important concerns occupying the time of church leaders, issues related to church computers can quickly become vulnerable. Cyber threats pose significant challenges for churches and other organizations. Any church that uses computer systems to conduct business operations should consider managing cyber risks. These attacks could create risks that mostchurches are unprepared to confront. Some incidents may lead to temporary frustration, such as its website availability. The most serious could cause a data breach for employees and members. Identity theft, disclosure of personal information like medical records, and simple embarrassment are all potential problems that can result from a cybe...
2022-11-14
36 min
Chief of Cybersecurity
How to Protect Your Church From Hackers & Cyber Attacks
With so many important concerns occupying the time of church leaders, issues related to church computers can quickly become vulnerable. Cyber threats pose significant challenges for churches and other organizations. Any church that uses computer systems to conduct business operations should consider managing cyber risks. These attacks could create risks that mostchurches are unprepared to confront. Some incidents may lead to temporary frustration, such as its website availability. The most serious could cause a data breach for employees and members. Identity theft, disclosure of personal information like medical records, and simple embarrassment are all potential problems that can result from a cybe...
2022-11-14
36 min
Chief of Cybersecurity
Secret Tips to Keep Your Cryptocurrency Safe From Cybercrime
Bitcoin and other types of cryptocurrencies have exploded onto the market in recent years, and based on virtual currency's popularity, it seems to be here to stay. Cryptocurrencies are digital or virtual currencies secured by cryptography, with many using decentralized networks based on blockchain technology – an open, distributed ledger that records transactions in code. Crypto is stored in a digital "wallet" on a website, computer, or an external hard drive. To put it simply, Investopedia defines cryptocurrencies as systems that allow for secure online payments denominated in virtual "tokens." The first cryptocurrency launched a little over a decade ago, was cr...
2022-11-02
30 min
Chief of Cybersecurity
Secret Tips to Keep Your Cryptocurrency Safe From Cybercrime
Bitcoin and other types of cryptocurrencies have exploded onto the market in recent years, and based on virtual currency\'s popularity, it seems to be here to stay. Cryptocurrencies are digital or virtual currencies secured by cryptography, with many using decentralized networks based on blockchain technology – an open, distributed ledger that records transactions in code. Crypto is stored in a digital \"wallet\" on a website, computer, or an external hard drive. To put it simply, Investopedia defines cryptocurrencies as systems that allow for secure online payments denominated in virtual \"tokens.\" The first cryptocurrency launched a little over a decade ago, wa...
2022-11-02
30 min
Chief of Cybersecurity
How To Transition Cybersecurity Awareness Month Into A Common Practice
Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Although it's done in October, there is a need to extend and continually practice cyber safety. This interview session brings into attention on why cyber awareness is important and how to extend learning outside of October.
2022-10-17
31 min
Chief of Cybersecurity
How To Transition Cybersecurity Awareness Month Into A Common Practice
Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Although it\'s done in October, there is a need to extend and continually practice cyber safety. This interview session brings into attention on why cyber awareness is important and how to extend learning outside of October.
2022-10-17
31 min
Enterprise Podcast Network – EPN
Why Do We Need A Cybersecurity Mindset?
Dewayne Hart, a recent author of a new book called Cybersecurity Mindset, a 20-year veteran of the US Navy and owner of a consulting firm named SEMAIS joins Enterprise Radio.This episode of Enterprise Radio is on association with the Cyber Security Channel.Listen to host Eric Dye & guest Dewayne Hart discuss the following:* What is the most simplistic definition of cybersecurity?* What was your purpose for writing the Cybersecurity Mindset?* What are the most critical trends shaping and driving cybersecurity discussions?* Why would humans be considered the weakest link for cybersecurity?* How c...
2022-10-12
22 min
Chief of Cybersecurity
Improving Businesses Cybersecurity Engagements
Business engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing risk profiles and attack surfaces. The management strategies may invoke defense tactics, but unless they have an accurate indicator of their landscape, they are prone and subject to failure.This podcast discusses several gaps, security visibility, and concerns businesses must address for cyber resilience and risk reduction. Listeners will gain insight into business engagements and their cybersecurity relationships.
2022-10-10
25 min
Chief of Cybersecurity
Improving Businesses Cybersecurity Engagements
Business engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing risk profiles and attack surfaces. The management strategies may invoke defense tactics, but unless they have an accurate indicator of their landscape, they are prone and subject to failure.This podcast discusses several gaps, security visibility, and concerns businesses must address for cyber resilience and risk reduction. Listeners will gain insight into business engagements and their cybersecurity relationships.
2022-10-10
25 min
Chief of Cybersecurity
Cybersecurity in the School System
The shift to remote education and online learning has prompted many schools to increase their digital protection. Before COV19, online education entities and K-12 learned through classroom instructions. Since the change, many K-12 students are learning from home, and college students\' enrollment has increased. Both come at a cybersecurity cost, but there is a need for remote learning. How safe are our educational systems? Well, this podcast will dissect some of the events and issues that cause concerns; and highlight protection standards. Our youths should feel safe!
2022-09-20
23 min
Chief of Cybersecurity
The Automobile Industry is Facing Cybersecurity Risks.
We drive our cars daily and enjoy the luxury of the many features, but security risks are embedded. The cybersecurity landscape has no boundaries, and just as if healthcare, financial, and educational entities face risk – so does the automotive industry. Increasing demand for connected and semi-autonomous vehicles has led to a growing demand for connected vehicle devices in automobiles.This increased the complexity of vehicle architecture and software codings, which made cars more vulnerable to cyber-attack. The market for automotive cybersecurity solutions has been developing rapidly to safeguard vehicles from such attacks. This interview brings into focus how automobiles are at...
2022-09-12
31 min
Chief of Cybersecurity
Supply Chain Management and Cybersecurity
Supply chain management (SCM) is the active management of supply chain activities to maximize customer value and achieve sustainable competitive advantage. It represents a conscious effort by the supply chain firms to develop and run supply chains in the most effective & efficient ways possible. Supply chain activities cover everything from product development, sourcing, production, and logistics to the information systems needed to coordinate these activities. Many risks exist where 3rd part vendors are risks but can be controlled through active security and managing protocols that outline vendor relationships.
2022-08-29
26 min
Chief of Cybersecurity
TikTok Says It\'s Putting New Limits on Chinese Workers\' Access to U.S. User Data
TikTok is working on a deal with the Biden administration that would \"fully safeguard\" the app in the U.S. and quell fears about the Chinese government\'s accessing Americans\' data, according to a letter TikTok sent to nine Republican senators. This issue raises concern about having information sharing, privacy, and data protection as critical control across social media accounts. This interview considers why data protection and privacy is a business risk but can be remediated with safe practices.
2022-08-22
29 min
Chief of Cybersecurity
COVID-19 has transformed how companies operate today.
With 50 percent to 90 percent of staff working remotely, organizations are now looking at remote work as the new working style in the future. While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems. Remote working has a lot of benefits, including increased productivity, improved employee mental health, and reduced costs in office space. But it also has its challenges. Your remote employees may be unknowingly putting your company\'s data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences. This interview sessions brings...
2022-08-02
22 min
Chief of Cybersecurity
Technology is integral to a child’s life
They will see it everywhere from birth and will inevitably grow up using it. It can be extremely educational, help build skills, and be a creative outlet. It can also be dangerous — predators, hackers, and other threats use technology to hurt others. We’ll teach you how to protect your children from the wide variety of threats out there, including the over-usage of technology itself. By knowing the risks and having the tools available, you can make technology work for you and your youngsters. This interview session will make digital parenting a success!
2022-07-26
26 min
Chief of Cybersecurity
Cybersecurity programs gain popularity with veterans
As the U.S. military continues to expand its IT ranks, many employers have stepped up efforts to recruit military talent into their IT teams to better secure networks. As a result, online cybersecurity courses such as those at Western Governors University (WGU) have witnessed a growing interest among active-duty military students who are either looking to advance their training for military work or to break into civilian IT careers, according to Rick Benbow, a regional vice president at WGU.This interview will expand the thoughts and projections for veterans\' transition into the cybersecurity career field based on industry...
2022-07-11
18 min
Chief of Cybersecurity
Developing An End-to-End Vulnerability Management Process
One of the critical programs that shape cybersecurity risks is having a process that helps remediates vulnerabilities. Most users and organizations utilize various tools, analytical platforms, reporting, and various teams to help reduce risks associated with CVEs, advisories, configuration management, and asset inventories – which can become challenging. With the increasing number of vulnerable applications, systems, and advancements in AI and cloud, Vulnerability Management has surfaced as a critical element when reducing exploits and risks.In this podcast, the discussion will dissect a vulnerability management program and its lifecycle process. Listeners will gain information on the E2E process related to ident...
2022-07-04
31 min
Chief of Cybersecurity
Cyber Agency: Voting Software Vulnerable in Some States
Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed. These vulnerabilities, for the most part, are not ones that could be easily exploited by someone who walks in off the street, but they are things that we should worry could be exploited by sophisticated attackers, such as hostile nation states, or by election insiders, and they would carry very serious consequences. This interview session will align how the vulnerabilities exist and what security controls are required to remediate issues outlined by the U.S. Cybersecurity and...
2022-06-28
26 min
Chief of Cybersecurity
Cybersecurity Challenges for The Healthcare Sector
Since data requirements and information sharing emerged, cybersecurity has undergone numerous developments. Policies and laws for privacy and information resource protection have transitioned the technology space to secure a variety of sectors, including healthcare corporations and government agencies. The increased need for healthcare information sharing has fueled interest in modernizing applications, clouds, data, infrastructure, and networking technologies.This podcast will discuss how the healthcare sector\'s security requirements have become more critical as information storage has shifted to electronic rather than hard copy. Various government agencies and healthcare organizations practices and standards will be discussed and aligned with security best pract...
2022-06-21
25 min
Chief of Cybersecurity
Building Security Engagements Into The Cyber Workforce
Every security steward has been challenged to obtain multiple certifications, gain professional experience, and further their knowledge by attending educational institutions. Each resume includes various titles and certifications that demonstrate the cybersecurity professionals motivation and drive to succeed. Beyond the accolades and achievements, many stewards fail to roadmap and carry out project tasks.This podcast discusses those concerns by demonstrating workforce practices and their overall cybersecurity relationships. The podcast focuses on engaging security from initial employee onboarding to career progression. The outcome will balance learning, education, and career paths as a single contributor to career success.
2022-06-13
33 min
Chief of Cybersecurity
Developing A Successful Cybersecurity Maturity Model
Many security environments will need to modernize and transform their cybersecurity programs. The need is driven by technological advancements, maturity requirements, and security readiness. Organizations, security auditors, assessors, and compliance teams can benefit from various frameworks, policies, and standards. Each is distinct and offers similar but distinct cybersecurity maturation strategies. The government has implemented CMMI and other frameworks. However, some industries have yet to adopt or are evaluating whether traditional practices can achieve cybersecurity maturity. This podcast explores how cybersecurity maturity can help advance technology while assisting readiness programs. Each listener will gain firsthand knowledge of cybersecurity maturity through enablers s...
2022-06-06
31 min
Chief of Cybersecurity
A Cultural Shift Defeats The Zero Risk Mentality
Numerous challenges have been aimed at technologies and their security culture, ranging from risk reduction to determining security readiness. The risk profiles are evaluated and matured to compliance in each situation. Despite their progress and success, many organizations struggle to communicate that \"Zero Risk\"is a nebulous and risk-enabling concept. Various professionals grade risk based on events and compliance indicators. A precise and functional security culture remediates events and expands compliance. This podcast explains why and how \"Zero Risk\" cultures are prone to failure. Listeners will better understand risk profiling and effective strategies to evaluate visual and non-visual data. The...
2022-05-31
34 min
Chief of Cybersecurity
Securing and Protecting The Cloud Environments
The security involvement and protection standards align with various technology platforms, including the cloud. Many businesses and institutions have modernized and adopted cloud technologies and services. The underlying architect has made significant progress and overcome challenges, with security being a major discussion point.This podcast will examine cloud environments and their operational characteristics and highlight the cybersecurity position. Listeners will gain a more defined awareness of how cloud security operates; and be better positioned to understand its blueprint, operations, use, and protection requirements.
2022-05-24
29 min
Chief of Cybersecurity
Critical Infrastructure Protection and Cybersecurity
Sustaining protection for the nation\'s infrastructure is a critical component that shapes our Quality of Life (QOL). The dire need to prevent infrastructure risks is evident based on historical challenges and ransomware attacks against the energy sector. Beyond the energy sector, the nation\'s infrastructure also depend on chemical, water, dams, healthcare, IT, transportation, and other sectors for the country. This podcast discusses and reinforces how the Department of Homeland Security, protection strategies, and government intervention have been challenged to remediate many weaknesses and sustain the nation\'s ability to operate. Listeners gain valuable information and awareness of the...
2022-05-16
28 min
Chief of Cybersecurity
Interview with Dewayne Hart about the \"Cybersecurity Mindset.\"
This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset\'s direction and goals. You can get a sense of my overall thoughts and the motivation behind why the publication was written. This is a must-hear episode!
2022-05-09
30 min
Chief of Cybersecurity
Interview with Dewayne Hart about the "Cybersecurity Mindset."
This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset's direction and goals. You can get a sense of my overall thoughts and the motivation behind why the publication was written. This is a must-hear episode!
2022-05-09
30 min
StarTalk Radio
Cosmic Queries – Stoner Edition with Janna Levin
Is anything real? Is time just a construct? On this episode, Neil deGrasse Tyson and comic co-host Matt Kirshen answer your far-out questions about black holes, dark matter, and the universe with astrophysicist Janna Levin. NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: https://www.startalkradio.net/show/cosmic-queries-stoner-edition-with-janna-levin/Thanks to our Patrons Ivan Masjuk, c, Nathan Mitchell, Conner Kemmsies, Dustin Dewayne Hart, Kyle Reinsberg, Andrew Magri, Virginia Cohen, Cathleen Corrie, and David Claassenfor supporting us this week.Photo Credit: Les Bossinas (Cortez III Service C...
2022-03-08
49 min
Chief of Cybersecurity
Lets Deploy Cybersecurity - Its Time See How It Operates
This podcast session summaries Season I and bring some high-level discussion points into the format. Listeners gain insight and information to develop the cybersecurity picture and learn how security operates. The information discussed prepares listeners to understand the cybersecurity mindset and its relationship to cybersecurity and strategies to drive their solutions. It furthers an understanding and connection into Season II: Activating Cybersecurity.
2022-01-03
28 min
Chief of Cybersecurity
How To Build A Successful Cybersecurity Career
There have been many concepts and information distributed concerning how to build a successful cybersecurity career. Some have had success, while others have left cybersecurity career-minded professionals with unanswered questions. This podcast session takes a high-level view of the cybersecurity career path and successful steps, actions, or strategies to become successful. It dissects resume writing, employment type, role assignments, and ideas to shape careers and perform as a security professional.
2021-12-30
34 min
Chief of Cybersecurity
How Does Human-Behavior Affect Cybersecurity Success
This podcast session examines users\' risk contribution and behavior patterns that can cause significant disruption to enterprise cybersecurity practices. It also mentions how cyber awareness programs can succeed when positive behavioral techniques are integrated. The discussion points examine values, morals, and how the cybersecurity mindset aligns with behavioral norms. Listeners can gain information advantage in resolving negative behavioral traits before they become a risk.
2021-12-21
29 min
Chief of Cybersecurity
How To Effectively Use Cybersecurity Tools - It\'s Beyond Reporting
Every security team has used cybersecurity tools to produce or analyze data feeds. Tools such as Splunk, Nessus, Arsigsight, McAfee ePO (Antivirus), End-Point Detection, and Response applications are available. However, the proper and efficient use outside of reporting is overlooked. This podcast session examines common pitfalls and gaps deployed that end-users and management teams deploy for in-house tools. The discussion focuses on different policy tuning, employee usage, and why users can collect hygiene data and drive defense strategies when adequately using cybersecurity tools.
2021-12-15
27 min
Chief of Cybersecurity
Utilizing A Holistic Defense Approach To Secure Your Environment
Holistic defense is a traditional but rarely spoken concept when cybersecurity practices are introduced. This podcast session extracts the elements and knowledge required to drive system thinking as a holistic defense strategy. The discussions focus on the security development lifecycle and combining security integration and engineering as a defense strategy. Listeners gain an understanding of how the \"Security Puzzle\" and thinking holistically operate together.
2021-11-29
29 min
Chief of Cybersecurity
Cybersecurity for Small Businesses - What Do you Need to Know?
Small businesses possess an individual brand and hold responsibility for protecting internal information and clients\' data. This podcast session outlines the importance of protecting information assets, clients, and vendor information and projecting behavioral practices that ensure employees\' buy-in to cyber awareness. Listeners and business owners gain the advantage in understanding why \"Brand Protection\" is a top-down approach.
2021-11-22
26 min
Chief of Cybersecurity
Transferring Digital Modernization Into the Cyber Security Mode of Thinking
This podcast addresses the growing need for digital modernization and its key objectives for cybersecurity. The discussion points outline how legacy systems and modernization concepts can reduce cyber threats and transform business operations. The critical areas discussed are automation, adaptive technology research, digitalization into the workforce, and transformation practices.
2021-11-16
29 min
Chief of Cybersecurity
What Transferrable Skillsets Do Military Veteran Offer To Cybersecurity
The military veteran workforce brings advanced skillsets and aligned training that models the cybersecurity culture. This podcast examines and brings to attention how their skillsets are designed with a \"Cybersecurity Seed,\" and much of their experience is transferrable and relatable to cybersecurity. The concepts of information secrecy, intelligence gathering, and human firewall theories are discussed.
2021-11-09
26 min
Chief of Cybersecurity
How Can AI and Machine Learning Benefit Cybersecurity
In the growing age of technology Artificial Intelligence (AI) has matured and contributed to many advances. This podcast session discusses some of those benefits and how they may transform cybersecurity and create valuable solutions. The discussion points address intelligence gathering, predictive analytics, and data process requirements used for AI platforms.
2021-11-02
28 min
Chief of Cybersecurity
What is Wrong With Your Vulnerability Management Program?
Vulnerable organizations may have varying security risks when their Vulnerability Management program lacks maturity and effectiveness. This podcast session aligns the operational standards required to administer vulnerability management taskings such as policy development, asset discovery, compliance scanning, metrics development, risk scoring, and Patch and Vulnerability Remediation P&VR standards.
2021-10-25
27 min
Chief of Cybersecurity
Security Compliance and Risk Management – Why Are They Failing?
The technology industry engages challenges and concerns when compliance and risk management initiatives are developed. This podcast session brings into attention and outlines why security compliance and risk management programs are failing; and what tradeoffs, security processes, and solutions are required to ensure both are successful.
2021-10-19
28 min
Chief of Cybersecurity
Everyone Is Trying To Protect Themselves - Are You Doing The Same?
Individual protection standards are sometimes misunderstood and carry varying practices that are confusing. This podcast session brings into attention user-base security standards and processes required to protect information. Listeners gain a first-hand knowledge base and critical steps needed to remain cyber-safe.
2021-10-12
27 min
Chief of Cybersecurity
Information Privacy, information sharing and individual responsibility
The Information Privacy podcast session focus on how privacy, safeguards, and information sharing operate as a collective methodology to protect personal, business, and critical information. Listeners gain the informational advantage at understanding protection schemes, security measures, and individual responsibility when engaging information privacy.
2021-09-28
26 min
Chief of Cybersecurity
Cybersecurity Mindset
This podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners to see how their engagement and thinking process is either successful or failing best-security practices. Information relating to the inclusive culture, risk-based-thinking, hackers mindset, and situational awareness are highlighted.
2021-09-20
30 min
Chief of Cybersecurity
Dissecting Cybersecurity
This podcast session provides an overview and discussion into learning the basic functions and use of cybersecurity. Listeners gain a first-hand opportunity to see how cybersecurity operates and ideas to protect personal information. The discussion points address cybersecurity history, sectors that use its programs, and the importance of individual responsibility.
2021-09-10
26 min
Hart aber Fail - Der Podcast übers Scheitern
Hart aber Fail - Don't Wait For Heroes (mit Patrick Dewayne)
Wir sagen danke für das schöne Feedback aus der letzten Woche und stellen fest, dass Saltatio Mortis in der Tat wahnsinnig tolle Fans hat! Außerdem danken wir dem "Flugshow"-Podcast, die uns lobend erwähnt haben, nachdem Julia einen Review über sie geschrieben hat. Also eine Runde Dankbarkeit gleich zu Beginn! Das hört auch gar nicht mehr auf, wir sind nämlich auch dankbar, dass sich unser Gast so viel Zeit für uns genommen hat! Diese Woche ist Patrick Dewayne bei uns zu hören. Patrick ist Schauspieler, Musiker, Moderator, Wirtschaftsjournalist und Bestsellerautor. Nach einer erfolgreic...
2021-02-22
58 min
WTF Was That Podcast!?
WTF was That 22: Unstable and Unclaimed
This week we are coast to coast! On the west coast we talk about the Winchester Mystery House- house built under the influence of spirits or just by a lonely crazy woman? You can be the judge. On the east coast we talk about Hart Island, NY also known as the Island of the Dead. This is the largest taxpayer funded cemetery in the country but it isn't open to the public! Those that are unclaimed after death or their family can't afford burial utilize Hart Island for their final resting place. It also has a long history of other...
2020-07-29
1h 01
Get New Full Audiobooks in Fiction, Action & Adventure
Hostile Takeovers by Michael A. Black
Please visithttps://thebookvoice.com/podcasts/1/audiobook/248324to listen full audiobooks. Title: Hostile Takeovers Author: Michael A. Black Narrator: Gene Engene Format: Unabridged Audiobook Length: 13 hours 39 minutes Release date: August 15, 2010 Genres: Action & Adventure Publisher's Summary: Something\'s happening in the underworld of Cook County. Tensions are rising between two rival drug lords, and the streets are their battleground. Sergeant Frank Leal and his former partner, Olivia \"Ollie\" Hart, get involved when one of their informants turns up dead with his ear cut off. When one drug lord decides it\'s time to eliminate the competition completely, the takeover becomes very hostile...
2010-08-15
1h 39