Look for any podcast host, guest or anyone
Showing episodes and shows of

Dewayne Hart

Shows

Chief of CybersecurityChief of CybersecurityCybersecurity Leadership: How to Become a Business Champion and StrategizeIn today’s digital landscape, every business is a target. Cyber threats are evolving, and businesses need champions. Are you ready to step up and become the Cybersecurity Business Champion?Imagine leading your organization with confidence, knowing you have the strategies and tools to combat cyber threats. As a champion, one will not only protect the business but also drive innovation and growth, and play a pivotal role in steering an organization’s cybersecurity strategy. They are responsible for advocating the importance of cybersecurity at all levels of the organization, from the boardroom to the...2024-12-2721 minChief of CybersecurityChief of CybersecurityCybersecurity Leadership: Tips to Measure Security Capabilities and Protect the EnterpriseSecurity capabilities are the backbone of any effective defense system. They encompass a range of tools and practices designed to protect assets, information, and people from threats. At their core, security capabilities help organizations identify vulnerabilities and mitigate risks. This proactive approach is essential in today’s fast-evolving threat landscape, where cyber-attacks and physical breaches are increasingly sophisticated.One powerful aspect of security capabilities is their ability to integrate various technologies. From firewalls and intrusion detection systems to biometric authentication, these tools work together to create a robust defense. Additionally, security capabilities empower teams th...2024-12-1822 minChief of CybersecurityChief of CybersecurityCybersecurity Leadership: Ways to Develop Your Organization's Cybersecurity CultureIn today's digital landscape, it is crucial to develop a strong cybersecurity culture within your organization to protect sensitive data and fend off hackers. This podcast explores essential strategies for cybersecurity leadership that will empower your team and create a culture of security awareness. Discover how to foster collaboration, promote best practices, and instill a proactive mindset among your employees.We’ll discuss practical steps organizations can take to cultivate a cybersecurity-first approach, ensuring that everyone from the top down is engaged and committed to safeguarding valuable information. Join us to learn how to ma...2024-10-0230 minCOCKTAILS & JERK PODCASTCOCKTAILS & JERK PODCASTCaleb HartFor the final episode of this year's Cocktails N Jerk Podcast, we go out with a bang and talk to the king of Island Soul ...Caleb Hart. He will be taking the stage on Saturday, September 7th bringing the good vibes along with island sounds and soulful songs. In the meantime check out this episode where we learn a bit more about how he started, his rise to the top, and what you can expect from his show this weekend.2024-09-0229 minChief of CybersecurityChief of CybersecurityCybersecurity Leadership: Your Role and ResponsibilitiesToday, it is particularly important to understand job duties and responsibilities in the fast-paced cybersecurity landscape due to the many threats we face. Cybersecurity leaders encounter similar challenges. They are often required to effectively communicate, build resilience, and become advocates for the business.However, to do this, they must first understand their role and how it impacts security, as well as earn the trust of the boardroom with their leadership. Join us as we examine key leadership responsibilities and offer advice on excelling in the cybersecurity domain. Whether you are an experienced professional or...2024-09-0222 minChief of CybersecurityChief of CybersecurityWhy Norfolk State University (NSU) Cyber Curriculum Is A Blueprint for HBCUsInterested in pursuing a career in cybersecurity? Look no further than Norfolk State University\'s Cyber Curriculum! As a blueprint for other Historically Black Colleges and Universities, NSU\'s comprehensive program covers everything from network security to ethical hacking. With the increasing demand for cybersecurity professionals, it\'s more important than ever for HBCUs to equip their students with the necessary tools to succeed in this fast-growing field. NSU\'s Cyber Curriculum has been designed to meet industry standards and prepare students for real-world challenges. By modeling their program, other HBCUs can provide their students with the knowledge and skills...2024-05-1030 minChief of CybersecurityChief of CybersecurityWhy Norfolk State University (NSU) Cyber Curriculum Is A Blueprint for HBCUsInterested in pursuing a career in cybersecurity? Look no further than Norfolk State University's Cyber Curriculum! As a blueprint for other Historically Black Colleges and Universities, NSU's comprehensive program covers everything from network security to ethical hacking. With the increasing demand for cybersecurity professionals, it's more important than ever for HBCUs to equip their students with the necessary tools to succeed in this fast-growing field. NSU's Cyber Curriculum has been designed to meet industry standards and prepare students for real-world challenges. By modeling their program, other HBCUs can provide their students with the knowledge and skills needed to excel in...2024-05-1030 minChief of CybersecurityChief of CybersecurityFrom the National Cyber Director: No Degree RequiredThe new National Cyber Director, Harry Coker, stated that the White House intends "to reduce unnecessary barriers" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a cybersecurity workforce without needing a traditional four-year degree. The benefit is that individuals can gain valuable skills and experience through alternative pathways such as apprenticeships, certifications, and on-the-job training. This initiative opens up opportunities for people from diverse backgrounds to enter the cybersecurity field and contribute to national security. Join us on this podcast as we dissect the strategy's rationale, impact, and outcomes. Will...2024-04-1920 minChief of CybersecurityChief of CybersecurityFrom the National Cyber Director: No Degree RequiredThe new National Cyber Director, Harry Coker, stated that the White House intends \"to reduce unnecessary barriers\" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a cybersecurity workforce without needing a traditional four-year degree. The benefit is that individuals can gain valuable skills and experience through alternative pathways such as apprenticeships, certifications, and on-the-job training. This initiative opens up opportunities for people from diverse backgrounds to enter the cybersecurity field and contribute to national security. Join us on this podcast as we dissect the strategy\'s rationale, impact, and outcomes...2024-04-1920 minChief of CybersecurityChief of CybersecurityWhy AI and Hackers Are Becoming CloserWith technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and the potential threats they pose to our digital security. Throughout this eye-opening video, we will explore the various ways hackers exploit AI algorithms, machine learning, and automation to infiltrate systems, steal sensitive data, and compromise online privacy. From AI-powered botnets to autonomous malware, the hacker's toolkit has evolved, requiring us to stay vigilant and well-informed about the potential risks lurking behind our screens. Furthermore, we...2024-04-1220 minChief of CybersecurityChief of CybersecurityWhy AI and Hackers Are Becoming CloserWith technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and the potential threats they pose to our digital security. Throughout this eye-opening video, we will explore the various ways hackers exploit AI algorithms, machine learning, and automation to infiltrate systems, steal sensitive data, and compromise online privacy. From AI-powered botnets to autonomous malware, the hacker\'s toolkit has evolved, requiring us to stay vigilant and well-informed about the potential risks lurking behind our screens. Furthermore...2024-04-1220 minChief of CybersecurityChief of CybersecurityUnveiling The Dark Side of AI: It\'s About BusinessAs AI continues to evolve and revolutionize traditional practices, it\'s crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask the business implications of AI, which often remain obscured by its mesmerizing abilities. Discover how AI can reshape market dynamics, disrupt industries, and challenge conventional business models. Moreover, we expose the potential risks associated with AI implementation, including job displacement, data privacy concerns, and ethical dilemmas. It\'s important for businesses to navigate these obstacles while embracing AI\'s potential, striking a delicate balance between innovation and responsibility. Join...2024-04-0323 minChief of CybersecurityChief of CybersecurityUnveiling The Dark Side of AI: It's About BusinessAs AI continues to evolve and revolutionize traditional practices, it's crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask the business implications of AI, which often remain obscured by its mesmerizing abilities. Discover how AI can reshape market dynamics, disrupt industries, and challenge conventional business models. Moreover, we expose the potential risks associated with AI implementation, including job displacement, data privacy concerns, and ethical dilemmas. It's important for businesses to navigate these obstacles while embracing AI's potential, striking a delicate balance between innovation and responsibility. Join us as we...2024-04-0323 minChief of CybersecurityChief of CybersecurityCISA Has Healthcare Covered, This Podcast Tells You WhyIn this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...2024-02-2620 minChief of CybersecurityChief of CybersecurityCISA Has Healthcare Covered, This Podcast Tells You WhyIn this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...2024-02-2620 minChief of CybersecurityChief of CybersecurityWe can Improve Healthcare Cybersecurity, Please ListenThe healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological dependence, sensitive data, and vulnerability to disruptions. Cyber incidents affecting hospitals and health systems have led to extended care disruptions caused by multi-week outages, patient diversion to other facilities, and strain on acute care provisioning and capacity, causing canceled medical appointments, non-rendered services, and delayed medical procedures (particularly elective procedures). More importantly, they put patients\' safety at risk and impact local and surrounding communities that depend on...2024-02-2022 minChief of CybersecurityChief of CybersecurityWe can Improve Healthcare Cybersecurity, Please ListenThe healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological dependence, sensitive data, and vulnerability to disruptions. Cyber incidents affecting hospitals and health systems have led to extended care disruptions caused by multi-week outages, patient diversion to other facilities, and strain on acute care provisioning and capacity, causing canceled medical appointments, non-rendered services, and delayed medical procedures (particularly elective procedures). More importantly, they put patients' safety at risk and impact local and surrounding communities that depend on the...2024-02-2022 minChief of CybersecurityChief of CybersecurityHow Does The Federal Government Modernization Strategy Affect Cybersecurity?Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have strategized and optimized their cyber protection programs based on modernization standards. Are we safe, and where does the federal government stand? Are there additional practices that can improve its modernization efforts? Newer tools and legacy systems are being discussed, and agencies are making significant progress. Despite the growth, cybersecurity plays a vital role in how modernization achieves its milestones and how the government approaches cybersecurity. We...2024-01-2324 minChief of CybersecurityChief of CybersecurityHow Does The Federal Government Modernization Strategy Affect Cybersecurity?Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have strategized and optimized their cyber protection programs based on modernization standards. Are we safe, and where does the federal government stand? Are there additional practices that can improve its modernization efforts? Newer tools and legacy systems are being discussed, and agencies are making significant progress. Despite the growth, cybersecurity plays a vital role in how modernization achieves its milestones and how the government approaches cybersecurity. We...2024-01-2324 minChief of CybersecurityChief of CybersecurityWill AI Provide Value or Added Risks for Government IT Systems?Due to stored data and security classification, the federal government's IT systems are more critical and sensitive. Over the years, many agencies have been challenged to protect and ensure proper safeguards are implemented. Now, AI has surfaced and created answers as well as concerns. What do we know - The added value for rapid data analysis and efficiency has created a need for AI. The news outlets have presented views and concerns about AI, but will the businesses and end users cease using or developing AI? How will the government address the change and need for AI? Some have even...2024-01-0924 minChief of CybersecurityChief of CybersecurityWill AI Provide Value or Added Risks for Government IT Systems?Due to stored data and security classification, the federal government\'s IT systems are more critical and sensitive. Over the years, many agencies have been challenged to protect and ensure proper safeguards are implemented. Now, AI has surfaced and created answers as well as concerns. What do we know - The added value for rapid data analysis and efficiency has created a need for AI. The news outlets have presented views and concerns about AI, but will the businesses and end users cease using or developing AI? How will the government address the change and need for AI? Some have...2024-01-0924 minChief of CybersecurityChief of CybersecuritySecrets and Value To Cybersecurity Authoring and WritingMany technical professionals have vast knowledge and desire to be heard. Some have resorted to podcasting, writing, or authoring publications. As someone who has done each, I believe they all provide the chance to market careers and business. Beyond a podcaster, writing, and authoring books, the value extends into many ventures. One was the chance to deliver written content on topics such as AI for the Forbes Technology Council. Join me on this podcast as Rich Casanova of Global Podcast Studios moderates and asks critical questions concerning being an author, speaker, and enthusiast for cybersecurity.2023-12-2630 minChief of CybersecurityChief of CybersecuritySecrets and Value To Cybersecurity Authoring and WritingMany technical professionals have vast knowledge and desire to be heard. Some have resorted to podcasting, writing, or authoring publications. As someone who has done each, I believe they all provide the chance to market careers and business. Beyond a podcaster, writing, and authoring books, the value extends into many ventures. One was the chance to deliver written content on topics such as AI for the Forbes Technology Council. Join me on this podcast as Rich Casanova of Global Podcast Studios moderates and asks critical questions concerning being an author, speaker, and enthusiast for cybersecurity.2023-12-2630 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 3 - Building Cyber Connectors PlatformsCritical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, attacks, and risk states should be known. Shifting blame is not an option, which forces resiliency to become active and responsive. With an absent resilient strategy, organizations are risk-prone! When \"Mastering the Cybersecurity Mindset,\" readers can develop early indications and strategies to connect security to real-world requirements. Each will learn how the connected technologies, roadmaps, and holistic defense methodology operate and correlate them to continual engagement, proactive defense, and disruption. It\'s...2023-12-1230 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 3 - Building Cyber Connectors PlatformsCritical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, attacks, and risk states should be known. Shifting blame is not an option, which forces resiliency to become active and responsive. With an absent resilient strategy, organizations are risk-prone! When "Mastering the Cybersecurity Mindset," readers can develop early indications and strategies to connect security to real-world requirements. Each will learn how the connected technologies, roadmaps, and holistic defense methodology operate and correlate them to continual engagement, proactive defense, and disruption. It's so...2023-12-1230 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 2 – Maturing Cybersecurity for Your EnterpriseEvery genre of business and public agencies strives for maturity. The core requires practical and fundamental approaches following a simple methodology: \"Increase Protection and Lower Risk.\" As simple as it sounds, many have failed. These deficiencies are developed through failing to understand where risk operates and what actionable steps or actions are required with governmental requirements such as CMMI. Realizing that maturity grades effort and indicates where you stand within the security domain is imperative. The Cybersecurity Mindset illustrates various concepts and security approaches to mature and drive cyber readiness.2023-11-2822 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 2 – Maturing Cybersecurity for Your EnterpriseEvery genre of business and public agencies strives for maturity. The core requires practical and fundamental approaches following a simple methodology: "Increase Protection and Lower Risk." As simple as it sounds, many have failed. These deficiencies are developed through failing to understand where risk operates and what actionable steps or actions are required with governmental requirements such as CMMI. Realizing that maturity grades effort and indicates where you stand within the security domain is imperative. The Cybersecurity Mindset illustrates various concepts and security approaches to mature and drive cyber readiness.2023-11-2822 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate ProgramsDo you know what\'s on your network? That\'s a serious question that many cannot answer. When invoking \"The Cybersecurity Mindset,\" the reader can relate cyber visibility as a threat reduction tool. Many enterprises have \"blindspots,\" misconfigured systems, and have loss tracking of their cybersecurity programs. When continuous visibility is at its peak, organizations can discover untreated systems and where true risk operates. With various programs such as Asset, Configuration, and Vulnerability Management, cyber leaders must invoke a security mindset that can detect, prevent, and reduce \"blind spots.\" When \"Mastering the Cybersecurity Mindset\" and focusing on situational awareness, risk-based...2023-11-1423 minChief of CybersecurityChief of CybersecurityMastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate ProgramsDo you know what's on your network? That's a serious question that many cannot answer. When invoking "The Cybersecurity Mindset," the reader can relate cyber visibility as a threat reduction tool. Many enterprises have "blindspots," misconfigured systems, and have loss tracking of their cybersecurity programs. When continuous visibility is at its peak, organizations can discover untreated systems and where true risk operates. With various programs such as Asset, Configuration, and Vulnerability Management, cyber leaders must invoke a security mindset that can detect, prevent, and reduce "blind spots." When "Mastering the Cybersecurity Mindset" and focusing on situational awareness, risk-based concepts, and...2023-11-1423 minChief of CybersecurityChief of CybersecuritySecret Tips To Master IT CertificationsMany well-to-do professionals struggle to understand IT certifications and how to pass their examinations. Some have resorted to trial and error to pass. Others have studied and still have no success. Would there be a secret code for the examinations? In this podcast, I explain tips and tricks to help you master IT certifications. If you\'re looking for a new career or hope to advance your current one, mastering IT certifications is essential! Please join my Youtube channel as well.2023-09-1826 minChief of CybersecurityChief of CybersecuritySecret Tips To Master IT CertificationsMany well-to-do professionals struggle to understand IT certifications and how to pass their examinations. Some have resorted to trial and error to pass. Others have studied and still have no success. Would there be a secret code for the examinations? In this podcast, I explain tips and tricks to help you master IT certifications. If you're looking for a new career or hope to advance your current one, mastering IT certifications is essential! Please join my Youtube channel as well.2023-09-1826 minChief of CybersecurityChief of CybersecuritySecrets to Mastering Effective Cybersecurity SkillsWith all the changes and technologies surfacing, cybersecurity teams must become the best and gather valuable skill sets. The time had changed when we spoke of cybersecurity; now it\'s about the required skill sets. You can spend time, energy, and resources determining what skill sets are needed, but the truth is actual. If you\'re searching for a cybersecurity job, you must master the skills necessary to succeed. Listed and join me on YouTube as I share some secrets to mastering practical cybersecurity skills in this podcast.2023-09-1125 minChief of CybersecurityChief of CybersecuritySecrets to Mastering Effective Cybersecurity SkillsWith all the changes and technologies surfacing, cybersecurity teams must become the best and gather valuable skill sets. The time had changed when we spoke of cybersecurity; now it's about the required skill sets. You can spend time, energy, and resources determining what skill sets are needed, but the truth is actual. If you're searching for a cybersecurity job, you must master the skills necessary to succeed. Listed and join me on YouTube as I share some secrets to mastering practical cybersecurity skills in this podcast.2023-09-1125 minChief of CybersecurityChief of CybersecurityHow To Choose The Perfect Cybersecurity JobAs cyber criminals regularly launch more sophisticated attacks and with fewer barriers to entry, cybersecurity professionals are more in demand than ever before. Security engineers are becoming increasingly hard to find and expensive to hire. Because of this, there has never been a better time for you to turn your IT passion into a career in cybersecurity. Think you have what it takes to become the next data-protecting cybersecurity expert? If you\'re looking for more ways to level up your skill set, check out this podcast and learn what jobs best suit your passion.2023-09-0424 minChief of CybersecurityChief of CybersecurityHow To Choose The Perfect Cybersecurity JobAs cyber criminals regularly launch more sophisticated attacks and with fewer barriers to entry, cybersecurity professionals are more in demand than ever before. Security engineers are becoming increasingly hard to find and expensive to hire. Because of this, there has never been a better time for you to turn your IT passion into a career in cybersecurity. Think you have what it takes to become the next data-protecting cybersecurity expert? If you're looking for more ways to level up your skill set, check out this podcast and learn what jobs best suit your passion.2023-09-0424 minChief of CybersecurityChief of CybersecurityCracking the Code: Your Guide to Entering CybersecurityThere has been a great discussion concerning strategies to break into cybersecurity. Many interested people have spent time wondering about the proper steps and requirements. They have also resorted to various platforms with broken promises. This sounds all too familiar and requires an in-depth discussion. By the end of this podcast, you\'ll know everything you need to start working in cybersecurity. If you want to learn more about this exciting field, join my YouTube channel today!2023-08-2827 minChief of CybersecurityChief of CybersecurityCracking the Code: Your Guide to Entering CybersecurityThere has been a great discussion concerning strategies to break into cybersecurity. Many interested people have spent time wondering about the proper steps and requirements. They have also resorted to various platforms with broken promises. This sounds all too familiar and requires an in-depth discussion. By the end of this podcast, you'll know everything you need to start working in cybersecurity. If you want to learn more about this exciting field, join my YouTube channel today!2023-08-2827 minChief of CybersecurityChief of CybersecurityChatGPT and the new AI are wreaking havoc on cybersecurityGenerative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale. And defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI has helped bad actors innovate and develop new attack strategies, enabling them to stay one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with various geographic regions and demographics, allowing them to target a broader range of potential victims across different countries. Cybercriminals adopted the technology to create...2023-05-2934 minChief of CybersecurityChief of CybersecurityChatGPT and the new AI are wreaking havoc on cybersecurityGenerative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale. And defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI has helped bad actors innovate and develop new attack strategies, enabling them to stay one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with various geographic regions and demographics, allowing them to target a broader range of potential victims across different countries. Cybercriminals adopted the technology to create...2023-05-2934 minChief of CybersecurityChief of CybersecurityCalifornia's vulnerable water system faces many cyber infrastructure threats"Water systems, like other public utility systems, are part of the nation's critical infrastructure and can be vulnerable targets when someone desires to affect public safety adversely. In California, where epic Sierra Nevada snowpack and "the big melt" have substantially increased the stakes for reservoir managers, officials say they're taking steps to protect the state's water systems from hackers, terrorist attacks, and natural disasters, such as the flooding that temporarily severed the Los Angeles Aqueduct — the city's water lifeline that connects to the Owens Valley. But experts say the challenges are numerous. Many of the systems in California and nationwide ar...2023-05-2237 minChief of CybersecurityChief of CybersecurityCalifornia\'s vulnerable water system faces many cyber infrastructure threats\"Water systems, like other public utility systems, are part of the nation\'s critical infrastructure and can be vulnerable targets when someone desires to affect public safety adversely. In California, where epic Sierra Nevada snowpack and \"the big melt\" have substantially increased the stakes for reservoir managers, officials say they\'re taking steps to protect the state\'s water systems from hackers, terrorist attacks, and natural disasters, such as the flooding that temporarily severed the Los Angeles Aqueduct — the city\'s water lifeline that connects to the Owens Valley. But experts say the challenges are numerous. Many of the systems in...2023-05-2237 minChief of CybersecurityChief of CybersecurityToyota Vulnerability Management Practices Are WeakAutomobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota says the breach resulted from a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This code included an access key to the data server that hosted the email addresses and customer management numbers of T-Connect users. The publicly available source code was found on September 15th, 2022, when Toyota changed the access key. We will explain why the lapse in remediating vulnerabilities can lead to many risks, which may later...2023-05-1532 minChief of CybersecurityChief of CybersecurityToyota Vulnerability Management Practices Are WeakAutomobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota says the breach resulted from a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This code included an access key to the data server that hosted the email addresses and customer management numbers of T-Connect users. The publicly available source code was found on September 15th, 2022, when Toyota changed the access key. We will explain why the lapse in remediating vulnerabilities can lead to many risks, which may later...2023-05-1532 minChief of CybersecurityChief of CybersecurityHow Does AI Affect Public Safety During The 2024 OlympicsPublic safety has drawn a new wave of concern from many 2024 Olympics and government officials in France. AI can help bolster protection and rapidly determine threat actors and terrorists. Still, citizens worry about public safety and privacy. In this episode, we will breakdown AI and public safety concerns and also include its benefits and risks. As a listener, you will better understand why public safety and AI operate best when balance security is applied.2023-05-0829 minChief of CybersecurityChief of CybersecurityHow Does AI Affect Public Safety During The 2024 OlympicsPublic safety has drawn a new wave of concern from many 2024 Olympics and government officials in France. AI can help bolster protection and rapidly determine threat actors and terrorists. Still, citizens worry about public safety and privacy. In this episode, we will breakdown AI and public safety concerns and also include its benefits and risks. As a listener, you will better understand why public safety and AI operate best when balance security is applied.2023-05-0829 minChief of CybersecurityChief of CybersecurityHow Cybersecurity Can Unlock Business SuccessCybersecurity is now a must-have for any business, and it's no longer a matter of if but when a cyberattack will impact its operations. The emergence of cyberattacks and various exploits has changed our cybersecurity engagements. Often, when we hear of business disruption and cybersecurity, it's an after-situation. Proactive engagements, planning, operational resilience, and cyber protection strategies are foundational to accelerating business operations.  In this episode, we discuss how cybersecurity can unlock business success. The podcast will highlight a few scenarios businesses must require, design, and implement to counter risks and cyberattacks. By following these secret strategies, corporations can become m...2023-04-1734 minChief of CybersecurityChief of CybersecurityHow Cybersecurity Can Unlock Business SuccessCybersecurity is now a must-have for any business, and it\'s no longer a matter of if but when a cyberattack will impact its operations. The emergence of cyberattacks and various exploits has changed our cybersecurity engagements. Often, when we hear of business disruption and cybersecurity, it\'s an after-situation. Proactive engagements, planning, operational resilience, and cyber protection strategies are foundational to accelerating business operations.  In this episode, we discuss how cybersecurity can unlock business success. The podcast will highlight a few scenarios businesses must require, design, and implement to counter risks and cyberattacks. By following these secret strategies, corporations c...2023-04-1734 minChief of CybersecurityChief of CybersecurityHow Cyber Insurance Costs Impacts The Healthcare Industry!As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay afloat in the face of rising costs. Every citizen depends on healthcare – so what's the connection? You have heard of telemedicine, remote surgeries, and robotic medical inventions, but who is responsible when they fail?  The product owner, healthcare system, and surgical professional are all affected. Downstream liability and risks are sometimes silent. In this session, we'll discuss cyber insurance's impact; and connect  how operational commitment and risk trade-offs balance a defense strategy.2023-04-1031 minChief of CybersecurityChief of CybersecurityHow Cyber Insurance Costs Impacts The Healthcare Industry!As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay afloat in the face of rising costs. Every citizen depends on healthcare – so what\'s the connection? You have heard of telemedicine, remote surgeries, and robotic medical inventions, but who is responsible when they fail?  The product owner, healthcare system, and surgical professional are all affected. Downstream liability and risks are sometimes silent. In this session, we\'ll discuss cyber insurance\'s impact; and connect  how operational commitment and risk trade-offs balance a defense strategy.2023-04-1031 minChief of CybersecurityChief of CybersecuritySecret Tips On Addressing The Cybercrime Growth Part 2While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve become accustomed to dealing with organizations online, the potential for trickery has grown exponentially.This podcast extends information on cybercrime towards scams, criminals stealing information, and persistent criminals.2023-01-0928 minChief of CybersecurityChief of CybersecuritySecret Tips On Addressing The Cybercrime Growth Part 2While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve become accustomed to dealing with organizations online, the potential for trickery has grown exponentially.This podcast extends information on cybercrime towards scams, criminals stealing information, and persistent criminals.2023-01-0928 minChief of CybersecurityChief of CybersecuritySecret Tips On Addressing The Cybercrime Growth Part 1In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate security programs and infrastructure advances. The end state makes a firm determination whether cybercrime is outperforming cyber protection.This podcast provides insights that reflect the ever-changing aspects of technology and system disruption through cybercrime and examines how human behavior can become solid defensive shields.2023-01-0327 minChief of CybersecurityChief of CybersecuritySecret Tips On Addressing The Cybercrime Growth Part 1In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate security programs and infrastructure advances. The end state makes a firm determination whether cybercrime is outperforming cyber protection.This podcast provides insights that reflect the ever-changing aspects of technology and system disruption through cybercrime and examines how human behavior can become solid defensive shields.2023-01-0327 minChief of CybersecurityChief of CybersecurityOnline Scams Target Veterans and Active Duty MembersOnline Scams Target Veterans and Active Duty Members The U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the military, you have a young population on the web. Service members are targeted by websites that claim to offer special military discounts on everything from cars to apartments for rent. But the low-priced car never arrives, and the easy-to-find apartment they rented is already occupied. This podcast will focus on safety measures and protection standards for military personnel.2022-12-1438 minChief of CybersecurityChief of CybersecurityOnline Scams Target Veterans and Active Duty MembersOnline Scams Target Veterans and Active Duty Members The U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the military, you have a young population on the web. Service members are targeted by websites that claim to offer special military discounts on everything from cars to apartments for rent. But the low-priced car never arrives, and the easy-to-find apartment they rented is already occupied. This podcast will focus on safety measures and protection standards for military personnel.2022-12-1438 minChief of CybersecurityChief of CybersecurityHow to Protect Your Church From Hackers & Cyber AttacksWith so many important concerns occupying the time of church leaders, issues related to church computers can quickly become vulnerable. Cyber threats pose significant challenges for churches and other organizations. Any church that uses computer systems to conduct business operations should consider managing cyber risks. These attacks could create risks that mostchurches are unprepared to confront. Some incidents may lead to temporary frustration, such as its website availability. The most serious could cause a data breach for employees and members. Identity theft, disclosure of personal information like medical records, and simple embarrassment are all potential problems that can result from a cybe...2022-11-1436 minChief of CybersecurityChief of CybersecurityHow to Protect Your Church From Hackers & Cyber AttacksWith so many important concerns occupying the time of church leaders, issues related to church computers can quickly become vulnerable. Cyber threats pose significant challenges for churches and other organizations. Any church that uses computer systems to conduct business operations should consider managing cyber risks. These attacks could create risks that mostchurches are unprepared to confront. Some incidents may lead to temporary frustration, such as its website availability. The most serious could cause a data breach for employees and members. Identity theft, disclosure of personal information like medical records, and simple embarrassment are all potential problems that can result from a cybe...2022-11-1436 minChief of CybersecurityChief of CybersecuritySecret Tips to Keep Your Cryptocurrency Safe From CybercrimeBitcoin and other types of cryptocurrencies have exploded onto the market in recent years, and based on virtual currency's popularity, it seems to be here to stay. Cryptocurrencies are digital or virtual currencies secured by cryptography, with many using decentralized networks based on blockchain technology – an open, distributed ledger that records transactions in code. Crypto is stored in a digital "wallet" on a website, computer, or an external hard drive. To put it simply, Investopedia defines cryptocurrencies as systems that allow for secure online payments denominated in virtual "tokens." The first cryptocurrency launched a little over a decade ago, was cr...2022-11-0230 minChief of CybersecurityChief of CybersecuritySecret Tips to Keep Your Cryptocurrency Safe From CybercrimeBitcoin and other types of cryptocurrencies have exploded onto the market in recent years, and based on virtual currency\'s popularity, it seems to be here to stay. Cryptocurrencies are digital or virtual currencies secured by cryptography, with many using decentralized networks based on blockchain technology – an open, distributed ledger that records transactions in code. Crypto is stored in a digital \"wallet\" on a website, computer, or an external hard drive. To put it simply, Investopedia defines cryptocurrencies as systems that allow for secure online payments denominated in virtual \"tokens.\" The first cryptocurrency launched a little over a decade ago, wa...2022-11-0230 minChief of CybersecurityChief of CybersecurityHow To Transition Cybersecurity Awareness Month Into A Common PracticeSince 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.  Although it's done in October, there is a need to extend and continually practice cyber safety. This interview session brings into attention on why cyber awareness is important and how to extend learning outside of October.2022-10-1731 minChief of CybersecurityChief of CybersecurityHow To Transition Cybersecurity Awareness Month Into A Common PracticeSince 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.  Although it\'s done in October, there is a need to extend and continually practice cyber safety. This interview session brings into attention on why cyber awareness is important and how to extend learning outside of October.2022-10-1731 minEnterprise Podcast Network – EPNEnterprise Podcast Network – EPNWhy Do We Need A Cybersecurity Mindset?Dewayne Hart, a recent author of a new book called Cybersecurity Mindset, a 20-year veteran of the US Navy and owner of a consulting firm named SEMAIS joins Enterprise Radio.This episode of Enterprise Radio is on association with the Cyber Security Channel.Listen to host Eric Dye & guest Dewayne Hart discuss the following:* What is the most simplistic definition of cybersecurity?* What was your purpose for writing the Cybersecurity Mindset?* What are the most critical trends shaping and driving cybersecurity discussions?* Why would humans be considered the weakest link for cybersecurity?* How c...2022-10-1222 minChief of CybersecurityChief of CybersecurityImproving Businesses Cybersecurity EngagementsBusiness engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing risk profiles and attack surfaces. The management strategies may invoke defense tactics, but unless they have an accurate indicator of their landscape, they are prone and subject to failure.This podcast discusses several gaps, security visibility, and concerns businesses must address for cyber resilience and risk reduction. Listeners will gain insight into business engagements and their cybersecurity relationships.2022-10-1025 minChief of CybersecurityChief of CybersecurityImproving Businesses Cybersecurity EngagementsBusiness engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing risk profiles and attack surfaces. The management strategies may invoke defense tactics, but unless they have an accurate indicator of their landscape, they are prone and subject to failure.This podcast discusses several gaps, security visibility, and concerns businesses must address for cyber resilience and risk reduction. Listeners will gain insight into business engagements and their cybersecurity relationships.2022-10-1025 minChief of CybersecurityChief of CybersecurityCybersecurity in the School SystemThe shift to remote education and online learning has prompted many schools to increase their digital protection. Before COV19, online education entities and K-12 learned through classroom instructions. Since the change, many K-12 students are learning from home, and college students\' enrollment has increased. Both come at a cybersecurity cost, but there is a need for remote learning. How safe are our educational systems? Well, this podcast will dissect some of the events and issues that cause concerns; and highlight protection standards. Our youths should feel safe!2022-09-2023 minChief of CybersecurityChief of CybersecurityThe Automobile Industry is Facing Cybersecurity Risks.We drive our cars daily and enjoy the luxury of the many features, but security risks are embedded. The cybersecurity landscape has no boundaries, and just as if healthcare, financial, and educational entities face risk – so does the automotive industry. Increasing demand for connected and semi-autonomous vehicles has led to a growing demand for connected vehicle devices in automobiles.This increased the complexity of vehicle architecture and software codings, which made cars more vulnerable to cyber-attack. The market for automotive cybersecurity solutions has been developing rapidly to safeguard vehicles from such attacks. This interview brings into focus how automobiles are at...2022-09-1231 minChief of CybersecurityChief of CybersecuritySupply Chain Management and CybersecuritySupply chain management (SCM) is the active management of supply chain activities to maximize customer value and achieve sustainable competitive advantage. It represents a conscious effort by the supply chain firms to develop and run supply chains in the most effective & efficient ways possible. Supply chain activities cover everything from product development, sourcing, production, and logistics to the information systems needed to coordinate these activities. Many risks exist where 3rd part vendors are risks but can be controlled through active security and managing protocols that outline vendor relationships.2022-08-2926 minChief of CybersecurityChief of CybersecurityTikTok Says It\'s Putting New Limits on Chinese Workers\' Access to U.S. User DataTikTok is working on a deal with the Biden administration that would \"fully safeguard\" the app in the U.S. and quell fears about the Chinese government\'s accessing Americans\' data, according to a letter TikTok sent to nine Republican senators. This issue raises concern about having information sharing, privacy, and data protection as critical control across social media accounts. This interview considers why data protection and privacy is a business risk but can be remediated with safe practices.2022-08-2229 minChief of CybersecurityChief of CybersecurityCOVID-19 has transformed how companies operate today.With 50 percent to 90 percent of staff working remotely, organizations are now looking at remote work as the new working style in the future. While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems. Remote working has a lot of benefits, including increased productivity, improved employee mental health, and reduced costs in office space. But it also has its challenges. Your remote employees may be unknowingly putting your company\'s data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences.  This interview sessions brings...2022-08-0222 minChief of CybersecurityChief of CybersecurityTechnology is integral to a child’s lifeThey will see it everywhere from birth and will inevitably grow up using it. It can be extremely educational, help build skills, and be a creative outlet. It can also be dangerous — predators, hackers, and other threats use technology to hurt others. We’ll teach you how to protect your children from the wide variety of threats out there, including the over-usage of technology itself. By knowing the risks and having the tools available, you can make technology work for you and your youngsters. This interview session will make digital parenting a success!2022-07-2626 minChief of CybersecurityChief of CybersecurityCybersecurity programs gain popularity with veteransAs the U.S. military continues to expand its IT ranks, many employers have stepped up efforts to recruit military talent into their IT teams to better secure networks. As a result, online cybersecurity courses such as those at Western Governors University (WGU) have witnessed a growing interest among active-duty military students who are either looking to advance their training for military work or to break into civilian IT careers, according to Rick Benbow, a regional vice president at WGU.This interview will expand the thoughts and projections for veterans\' transition into the cybersecurity career field based on industry...2022-07-1118 minChief of CybersecurityChief of CybersecurityDeveloping An End-to-End Vulnerability Management ProcessOne of the critical programs that shape cybersecurity risks is having a process that helps remediates vulnerabilities. Most users and organizations utilize various tools, analytical platforms, reporting, and various teams to help reduce risks associated with CVEs, advisories, configuration management, and asset inventories – which can become challenging. With the increasing number of vulnerable applications, systems, and advancements in AI and cloud, Vulnerability Management has surfaced as a critical element when reducing exploits and risks.In this podcast, the discussion will dissect a vulnerability management program and its lifecycle process. Listeners will gain information on the E2E process related to ident...2022-07-0431 minChief of CybersecurityChief of CybersecurityCyber Agency: Voting Software Vulnerable in Some StatesElectronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed. These vulnerabilities, for the most part, are not ones that could be easily exploited by someone who walks in off the street, but they are things that we should worry could be exploited by sophisticated attackers, such as hostile nation states, or by election insiders, and they would carry very serious consequences. This interview session will align how the vulnerabilities exist and what security controls are required to remediate issues outlined by the U.S. Cybersecurity and...2022-06-2826 minChief of CybersecurityChief of CybersecurityCybersecurity Challenges for The Healthcare SectorSince data requirements and information sharing emerged, cybersecurity has undergone numerous developments. Policies and laws for privacy and information resource protection have transitioned the technology space to secure a variety of sectors, including healthcare corporations and government agencies. The increased need for healthcare information sharing has fueled interest in modernizing applications, clouds, data, infrastructure, and networking technologies.This podcast will discuss how the healthcare sector\'s security requirements have become more critical as information storage has shifted to electronic rather than hard copy. Various government agencies and healthcare organizations practices and standards will be discussed and aligned with security best pract...2022-06-2125 minChief of CybersecurityChief of CybersecurityBuilding Security Engagements Into The Cyber WorkforceEvery security steward has been challenged to obtain multiple certifications, gain professional experience, and further their knowledge by attending educational institutions. Each resume includes various titles and certifications that demonstrate the cybersecurity professionals motivation and drive to succeed. Beyond the accolades and achievements, many stewards fail to roadmap and carry out project tasks.This podcast discusses those concerns by demonstrating workforce practices and their overall cybersecurity relationships. The podcast focuses on engaging security from initial employee onboarding to career progression. The outcome will balance learning, education, and career paths as a single contributor to career success.2022-06-1333 minChief of CybersecurityChief of CybersecurityDeveloping A Successful Cybersecurity Maturity ModelMany security environments will need to modernize and transform their cybersecurity programs. The need is driven by technological advancements, maturity requirements, and security readiness. Organizations, security auditors, assessors, and compliance teams can benefit from various frameworks, policies, and standards. Each is distinct and offers similar but distinct cybersecurity maturation strategies. The government has implemented CMMI and other frameworks. However, some industries have yet to adopt or are evaluating whether traditional practices can achieve cybersecurity maturity.  This podcast explores how cybersecurity maturity can help advance technology while assisting readiness programs. Each listener will gain firsthand knowledge of cybersecurity maturity through enablers s...2022-06-0631 minChief of CybersecurityChief of CybersecurityA Cultural Shift Defeats The Zero Risk MentalityNumerous challenges have been aimed at technologies and their security culture, ranging from risk reduction to determining security readiness. The risk profiles are evaluated and matured to compliance in each situation. Despite their progress and success, many organizations struggle to communicate that \"Zero Risk\"is a nebulous and risk-enabling concept. Various professionals grade risk based on events and compliance indicators. A precise and functional security culture remediates events and expands compliance. This podcast explains why and how \"Zero Risk\" cultures are prone to failure. Listeners will better understand risk profiling and effective strategies to evaluate visual and non-visual data. The...2022-05-3134 minChief of CybersecurityChief of CybersecuritySecuring and Protecting The Cloud EnvironmentsThe security involvement and protection standards align with various technology platforms, including the cloud. Many businesses and institutions have modernized and adopted cloud technologies and services. The underlying architect has made significant progress and overcome challenges, with security being a major discussion point.This podcast will examine cloud environments and their operational characteristics and highlight the cybersecurity position. Listeners will gain a more defined awareness of how cloud security operates; and be better positioned to understand its blueprint, operations, use, and protection requirements.2022-05-2429 minChief of CybersecurityChief of CybersecurityCritical Infrastructure Protection and CybersecuritySustaining protection for the nation\'s infrastructure is a critical component that shapes our Quality of Life (QOL). The dire need to prevent infrastructure risks is evident based on historical challenges and ransomware attacks against the energy sector. Beyond the energy sector, the nation\'s infrastructure also depend on chemical, water, dams, healthcare, IT, transportation, and other sectors for the country. This podcast discusses and reinforces how the Department of Homeland Security, protection strategies, and government intervention have been challenged to remediate many weaknesses and sustain the nation\'s ability to operate. Listeners gain valuable information and awareness of the...2022-05-1628 minChief of CybersecurityChief of CybersecurityInterview with Dewayne Hart about the \"Cybersecurity Mindset.\"This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset\'s direction and goals. You can get a sense of my overall thoughts and the motivation behind why the publication was written. This is a must-hear episode!2022-05-0930 minChief of CybersecurityChief of CybersecurityInterview with Dewayne Hart about the "Cybersecurity Mindset."This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset's direction and goals. You can get a sense of my overall thoughts and the motivation behind why the publication was written. This is a must-hear episode!2022-05-0930 minStarTalk RadioStarTalk RadioCosmic Queries – Stoner Edition with Janna LevinIs anything real? Is time just a construct? On this episode, Neil deGrasse Tyson and comic co-host Matt Kirshen answer your far-out questions about black holes, dark matter, and the universe with astrophysicist Janna Levin. NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: https://www.startalkradio.net/show/cosmic-queries-stoner-edition-with-janna-levin/Thanks to our Patrons Ivan Masjuk, c, Nathan Mitchell, Conner Kemmsies, Dustin Dewayne Hart, Kyle Reinsberg, Andrew Magri, Virginia Cohen, Cathleen Corrie, and David Claassenfor supporting us this week.Photo Credit: Les Bossinas (Cortez III Service C...2022-03-0849 minChief of CybersecurityChief of CybersecurityLets Deploy Cybersecurity - Its Time See How It OperatesThis podcast session summaries Season I and bring some high-level discussion points into the format. Listeners gain insight and information to develop the cybersecurity picture and learn how security operates. The information discussed prepares listeners to understand the cybersecurity mindset and its relationship to cybersecurity and strategies to drive their solutions. It furthers an understanding and connection into Season II: Activating Cybersecurity.2022-01-0328 minChief of CybersecurityChief of CybersecurityHow To Build A Successful Cybersecurity CareerThere have been many concepts and information distributed concerning how to build a successful cybersecurity career. Some have had success, while others have left cybersecurity career-minded professionals with unanswered questions. This podcast session takes a high-level view of the cybersecurity career path and successful steps, actions, or strategies to become successful. It dissects resume writing, employment type, role assignments, and ideas to shape careers and perform as a security professional.2021-12-3034 minChief of CybersecurityChief of CybersecurityHow Does Human-Behavior Affect Cybersecurity SuccessThis podcast session examines users\' risk contribution and behavior patterns that can cause significant disruption to enterprise cybersecurity practices. It also mentions how cyber awareness programs can succeed when positive behavioral techniques are integrated. The discussion points examine values, morals, and how the cybersecurity mindset aligns with behavioral norms. Listeners can gain information advantage in resolving negative behavioral traits before they become a risk.2021-12-2129 minChief of CybersecurityChief of CybersecurityHow To Effectively Use Cybersecurity Tools - It\'s Beyond ReportingEvery security team has used cybersecurity tools to produce or analyze data feeds. Tools such as Splunk, Nessus, Arsigsight, McAfee ePO (Antivirus), End-Point Detection, and Response applications are available. However, the proper and efficient use outside of reporting is overlooked. This podcast session examines common pitfalls and gaps deployed that end-users and management teams deploy for in-house tools. The discussion focuses on different policy tuning, employee usage, and why users can collect hygiene data and drive defense strategies when adequately using cybersecurity tools.2021-12-1527 minChief of CybersecurityChief of CybersecurityUtilizing A Holistic Defense Approach To Secure Your EnvironmentHolistic defense is a traditional but rarely spoken concept when cybersecurity practices are introduced. This podcast session extracts the elements and knowledge required to drive system thinking as a holistic defense strategy. The discussions focus on the security development lifecycle and combining security integration and engineering as a defense strategy. Listeners gain an understanding of how the \"Security Puzzle\" and thinking holistically operate together.2021-11-2929 minChief of CybersecurityChief of CybersecurityCybersecurity for Small Businesses - What Do you Need to Know?Small businesses possess an individual brand and hold responsibility for protecting internal information and clients\' data. This podcast session outlines the importance of protecting information assets, clients, and vendor information and projecting behavioral practices that ensure employees\' buy-in to cyber awareness. Listeners and business owners gain the advantage in understanding why \"Brand Protection\" is a top-down approach.2021-11-2226 minChief of CybersecurityChief of CybersecurityTransferring Digital Modernization Into the Cyber Security Mode of ThinkingThis podcast addresses the growing need for digital modernization and its key objectives for cybersecurity. The discussion points outline how legacy systems and modernization concepts can reduce cyber threats and transform business operations. The critical areas discussed are automation, adaptive technology research, digitalization into the workforce, and transformation practices.2021-11-1629 minChief of CybersecurityChief of CybersecurityWhat Transferrable Skillsets Do Military Veteran Offer To CybersecurityThe military veteran workforce brings advanced skillsets and aligned training that models the cybersecurity culture. This podcast examines and brings to attention how their skillsets are designed with a \"Cybersecurity Seed,\" and much of their experience is transferrable and relatable to cybersecurity. The concepts of information secrecy, intelligence gathering, and human firewall theories are discussed.2021-11-0926 minChief of CybersecurityChief of CybersecurityHow Can AI and Machine Learning Benefit CybersecurityIn the growing age of technology Artificial Intelligence (AI) has matured and contributed to many advances. This podcast session discusses some of those benefits and how they may transform cybersecurity and create valuable solutions. The discussion points address intelligence gathering, predictive analytics, and data process requirements used for AI platforms.2021-11-0228 minChief of CybersecurityChief of CybersecurityWhat is Wrong With Your Vulnerability Management Program?Vulnerable organizations may have varying security risks when their Vulnerability Management program lacks maturity and effectiveness. This podcast session aligns the operational standards required to administer vulnerability management taskings such as policy development, asset discovery, compliance scanning, metrics development, risk scoring, and Patch and Vulnerability Remediation P&VR standards.2021-10-2527 minChief of CybersecurityChief of CybersecuritySecurity Compliance and Risk Management – Why Are They Failing?The technology industry engages challenges and concerns when compliance and risk management initiatives are developed. This podcast session brings into attention and outlines why security compliance and risk management programs are failing; and what tradeoffs, security processes, and solutions are required to ensure both are successful.2021-10-1928 minChief of CybersecurityChief of CybersecurityEveryone Is Trying To Protect Themselves - Are You Doing The Same?Individual protection standards are sometimes misunderstood and carry varying practices that are confusing. This podcast session brings into attention user-base security standards and processes required to protect information. Listeners gain a first-hand knowledge base and critical steps needed to remain cyber-safe.2021-10-1227 minChief of CybersecurityChief of CybersecurityInformation Privacy, information sharing and individual responsibilityThe Information Privacy podcast session focus on how privacy, safeguards, and information sharing operate as a collective methodology to protect personal, business, and critical information. Listeners gain the informational advantage at understanding protection schemes, security measures, and individual responsibility when engaging information privacy.2021-09-2826 minChief of CybersecurityChief of CybersecurityCybersecurity MindsetThis podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners to see how their engagement and thinking process is either successful or failing best-security practices. Information relating to the inclusive culture, risk-based-thinking, hackers mindset, and situational awareness are highlighted.2021-09-2030 minChief of CybersecurityChief of CybersecurityDissecting CybersecurityThis podcast session provides an overview and discussion into learning the basic functions and use of cybersecurity. Listeners gain a first-hand opportunity to see how cybersecurity operates and ideas to protect personal information. The discussion points address cybersecurity history, sectors that use its programs, and the importance of individual responsibility.2021-09-1026 minHart aber Fail - Der Podcast übers ScheiternHart aber Fail - Der Podcast übers ScheiternHart aber Fail - Don't Wait For Heroes (mit Patrick Dewayne)Wir sagen danke für das schöne Feedback aus der letzten Woche und stellen fest, dass Saltatio Mortis in der Tat wahnsinnig tolle Fans hat! Außerdem danken wir dem "Flugshow"-Podcast, die uns lobend erwähnt haben, nachdem Julia einen Review über sie geschrieben hat. Also eine Runde Dankbarkeit gleich zu Beginn!  Das hört auch gar nicht mehr auf, wir sind nämlich auch dankbar, dass sich unser Gast so viel Zeit für uns genommen hat! Diese Woche ist Patrick Dewayne bei uns zu hören. Patrick ist Schauspieler, Musiker, Moderator, Wirtschaftsjournalist und Bestsellerautor. Nach einer erfolgreic...2021-02-2258 minWTF Was That Podcast!?WTF Was That Podcast!?WTF was That 22: Unstable and UnclaimedThis week we are coast to coast!  On the west coast we talk about the Winchester Mystery House- house built under the influence of spirits or just by a lonely crazy woman?  You can be the judge.  On the east coast we talk about Hart Island, NY also known as the Island of the Dead.  This is the largest taxpayer funded cemetery in the country but it isn't open to the public!  Those that are unclaimed after death or their family can't afford burial utilize Hart Island for their final resting place.  It also has a long history of other...2020-07-291h 01Get New Full Audiobooks in Fiction, Action & AdventureGet New Full Audiobooks in Fiction, Action & AdventureHostile Takeovers by Michael A. BlackPlease visithttps://thebookvoice.com/podcasts/1/audiobook/248324to listen full audiobooks. Title: Hostile Takeovers Author: Michael A. Black Narrator: Gene Engene Format: Unabridged Audiobook Length: 13 hours 39 minutes Release date: August 15, 2010 Genres: Action & Adventure Publisher's Summary: Something\'s happening in the underworld of Cook County. Tensions are rising between two rival drug lords, and the streets are their battleground. Sergeant Frank Leal and his former partner, Olivia \"Ollie\" Hart, get involved when one of their informants turns up dead with his ear cut off. When one drug lord decides it\'s time to eliminate the competition completely, the takeover becomes very hostile...2010-08-151h 39