Look for any podcast host, guest or anyone
Showing episodes and shows of

Dr. Stan Stahl And Julie Morris

Shows

Live on CyberLive on Cyber56: "Business is more afraid of the sheriff than the cybercriminal."OH NO. "Business is more afraid of the sheriff than we are the cybercriminal." Overheard in our ongoing LACybersecure work from an attendee.  The point of entry isn't HELP - It's getting into TROUBLE. What are we DOING??  For SMBs, the cavalry isn't coming. Even after a crime, the sheriff is going after the criminals. Don't count on asset recovery. You have to take your security seriously, and get the guidance you need. If you're in Los Angeles, apply today to join us in our #LACybersecure pilot program for SMBs, nonprofits, IT-MSPs.   Outside of L.A.? The Cy...2024-02-2414 minLive on CyberLive on Cyber55: Do you have something cybercriminals want?“For every complex problem there is an answer that is clear, simple, and wrong.” - H.L. Mencken We humans want simple solutions to complex problems. It's built into our neurology. And it makes it harder to manage cybersecurity. The computer and telecommunications revolution that we’re in the middle of is upending our world. A simple cybercrime example: In the old days at the end of the last century, if a criminal wanted to rob a bank, the criminal had to go to the bank.  No more. Now t...2024-02-1109 minLive on CyberLive on Cyber54: When policy is YEARS behind today's digital world“Unfortunately, the technology underpinning our critical infrastructure is inherently insecure because of DECADES of software developers NOT BEING HELD LIABLE for defective technology. That has led to incentives where FEATURES and SPEED to market have been prioritized AGAINST SECURITY, leading our nation VULNERABLE to cyber invasion. That has to stop,” Jen Easterly, CISA The policy we need is YEARS behind the current technology, and utterly inadequate to protect citizens against threats and scams. We lack protections and bear the brunt of the damage. Two clear examples - 1: SIM swapping. A ba...2024-02-0312 minLive on CyberLive on Cyber53. Cybercrime costs HOW MUCH?Not a game we want to play - but let's do it anyway! Take a guess: (reported) Cybercrime rakes in more $ than how many U.S. states do in TAX REVENUE annually? (FY22 per Statista - and of course, this is only REPORTED crime). I think you know where we're going with this. It's bad - and getting worse. Policy won't stop it. It's on us. Benjamin Franklin said, "Distrust and caution are the...2024-01-2710 minLive on CyberLive on Cyber52: Know Your Enemy“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu, The Art of War. We can’t control everything. We can, however, manage the things around threats to our digital security - and we must! Your awareness and keeping current is a crucial ingredient to success in 2024. Subscribe to SecureTheVilllage’s News of the Week, our top cybersecurity digest w...2024-01-2008 minLive on CyberLive on Cyber51: The Cybersecurity Hall of Shame’s newest membersAre you a disaster movie fan? If you’re reading this, it’s likely you work in the cybersecurity field, or are interested in cybersecurity as a right-now issue. You may be a CTO, a CISO, an entrepreneur, a lawyer, a CEO. And it might be YOU that prevents the movie that we never want to see: Iran targets a local water district. A hacker accesses equipment through default password. A sanitation chemical level is increased in the water supply. “Of all the country's critical infrastructure, water might be the most vulnerable to hackers: the hardest in which to guarantee everyo...2024-01-1416 minLive on CyberLive on Cyber50 Episodes! Happy 2024. Let's do this.If you haven't watched the video trailers of Live on Cyber on LinkedIn, you're missing out on Julie having difficulty looking serious. Once, someone asked, "why is Julie smiling so much, talking about this very difficult, complex stuff?" And it's because SecureTheVillage has found a mission point where we can powerfully affect change. We are here to encourage and mobilize those with cybersecurity knowledge to do more to build the cyber resilience of our community. Because our communities have no clue what awaits them in 2024. How can you help? 2024-01-0613 minLive on CyberLive on Cyber49: Cybersecurity - This is How We Survive 2024 What is resilience? It's like the old Timex ads, to "take a licking and keep on ticking." As we sit here looking at 2024, it's not pretty what's coming our way: * Our own SEC sued a CISO. (Didn't see that one coming.) * We're facing burnout of our best and brightest in the cybersecurity sector. * The attacks are intense. Infrastructure, schools, hospitals. * Cybercrime? So lucrative. It's coming at us on every conceivable front. What does...2023-12-2311 minLive on CyberLive on Cyber48: The newest member of cybersecurity's Hall of Shame"This company should be in the Hall of Shame."A major trucking company software vendor has developed such readily exploitable software that it could create a shutdown that would be felt nationwide.We write the software. Russia and China exploit it.There are cyber-nots in our supply chain. Our enemies know it, too.Are we fostering a lucrative market for cybercrime?In this #LiveOnCyber episode with Stan Stahl, PhD and Julie Michelle Morris, we talk about simple ways to join the fight for online safety!Let's press for better standards and adoption so small...2023-12-1608 minLive on CyberLive on Cyber47: 🚨 When Iran can look up your password on Google...🚨 When Iran can look up your password on Google... "Think your default password is harmless? Think again," warns Julie Michelle Morris. In this episode of #LiveOnCyber, Stan Stahl, PhD unpacks jaw-dropping cyber blunders, tiny oversights that lead to serious breaches, and must-do security tips for businesses flying solo on tech. What are you doing to help secure the last mile? Where are we sitting ducks for hacks and scams? Check out our 1-min episode preview 👇 and share your thoughts! Join Julie...2023-12-0911 minLive on CyberLive on Cyber46: Are We Just Talking to Ourselves in Cybersecurity?Smaller organizations, families, and individuals are on the wrong side of the digital divide, and they're getting eaten alive by scammers and cybercriminals. How do we bridge the information gap from the experts to small businesses and nonprofits? Are we just talking to ourselves in cybersecurity? In this #LiveOnCyber episode, hear what brought Julie, a thought leadership expert, to SecureTheVillage and how SecureTheVillage is addressing security for those without big IT teams. Want to join the fight for online safety? Learn...2023-12-0210 minLive on CyberLive on Cyber45: Nicole Perlroth presented by SecureTheVillageIn our special replay episode, we revisit an essential May 2022 conversation with Nicole Perlroth, a leading cybersecurity journalist and New York Times bestselling author. This frank and alarming conversation is as relevant as ever: Nation-state cybercrime dynamics and retaliation strategies The alarming shift of hacker targets to smaller entities The evolving landscape of cybersecurity collaboration and legislation Strategies for future-proofing against cyber threats Nicole Perlroth spent a decade as the lead cybersecurity reporter at The New York Times. Her reporting uncovered a host of cyber vulnerabilities in the U.S. for which there were no policy responses...2023-11-251h 27Live on CyberLive on CyberEp 44 | After the Hack: Fallout of a Small Business Cyber Attack"It's a brutal reality check," says Dr. Stan. "Small businesses are especially vulnerable and the consequences can be crippling." Julie notes, "This story isn't just alarming, it's a wake-up call. Protecting your business online is not optional, it's essential." Dive into a real-life cyber horror story with in this episode of Live on Cyber. They discuss the devastating impact a single cyberattack had on a small business, offering a stark warning to others. Key highlights: 🔴 The downfall of a small business due to an overlooked security flaw in Remote Desktop Protocol (RDP). 🔴 No business is too small to escape the radar...2023-11-1809 minLive on CyberLive on CyberEp 43 | SEC vs. SolarWinds: The Fallout for American CorporationsWhat are the implications when a nation-state attacks a private company? 🟢 At the same time we see the #Biden-Harris administration, #NIST, #CISA, #DoJ and other government entities - along with non-government organizations like #CIS, #CRI, Sightline Security, #DDN, and SecureTheVillage - in a concerted, intentional effort to help equip American corporations - ❌ We see the #SEC send exactly the wrong message in its lawsuit against #SolarWinds and its Chief Information Security Officer (#CISO). 👉 What could the #SEC do to help, rather than blame? If you're a CISO, board member, or just interested in the evolving world of cybersecurity governance, join Stan Sta...2023-11-1110 minLive on CyberLive on CyberEp 42 | The Top 4 Security Steps every Small Business NeedsIf you're starting your journey to secure your business, you're in the right place! Learn the Top 4 security steps every small business needs from the Cyber Readiness Institute's Starter Kit! Small and micro-businesses, build a strong foundation to prevent loss with these Four Core Cyber Issues: ✅ Super strong passwords that guard your personal and client data ✅ Backups that catch you if you fall ✅ Training to keep tricks and scams at bay ✅ A secure place for all your important info. If you’re ready to get started: 1️⃣ Appoint a leader 2️⃣ Implement the four policies 3️⃣ Train your staff 4️⃣ Prepare for a cybersecurity incident Mak...2023-11-0413 minLive on CyberLive on CyberEp 41 | Cybersecurity for Small & Micro Businesses: What You Really Need to Do at Your SizeWhat happens when your admin's email gets hacked? You don't want to guess or waste time. Cybersecurity for the small and micro-business is crucial. But it has to fit YOU. Think you're too small to be a target? Join us this week as we debunk myths and provide actionable insights specifically for small and micro-businesses. We'll break down what you really need to do to keep your business safe, without overburdening you or your team. Don't leave your business vulnerable—learn what you can do today to start your cybersecurity journey. --- ...2023-10-2814 minLive on CyberLive on CyberEp 40 | The Hidden Costs of Convenience: Why 'Easy Access' Means 'Easy Target'In the name of convenience, are we compromising security? This week on #LiveOnCyber, Dr. Stan reveals how 'easy access' WiFi at a hotel exposed a glaring gap in their cybersecurity measures. Don't let the danger of unmonitored network traffic be the downfall of your digital safety. Learn through this example why your organization should be patching and implementing robust #cybersecurity controls (hint - a #breachreport doesn't make for good PR).  Be part of the proactive community by learning more about SecureTheVillage's LA Cybersecure pilot program for small and mid-sized organizations, nonprofits, and IT MSPs in Los Angeles: https://securethevillage.org/la...2023-10-2114 minLive on CyberLive on CyberEp 39 | The 23andMe Breach: Critical Accounts Unguarded When MFA is OptionalThe ⁠23andMe⁠ security lapse repercussions go beyond just the user's personal genetic data. With this breach, their relatives are at risk.The data taken from 23andMe, likely through credential stuffing⁠ could cover more than HALF of the company’s 14 million customers, based on the number of people who have opted to make their data visible to relatives, including distant cousins (Washington Post).Dive into a new episode of #LiveonCyber with Stan Stahl, PhD, and Julie Michelle Morris on the shortcomings of optional multi-factor authentication for critical online accounts. Is the industry doing enough?Plus, get updates on LA Cyber...2023-10-1413 minLive on CyberLive on CyberEp 38 | Unleashing ISPs & MSPs: Allies in Cyber Defense!We believe that #MSPs and #ISPs are crucial players in securing our digital world. They are on the front lines with small to midsize businesses - how can we partner to equip them with the business development and security skills to better secure their clients? What is their role in the LA CyberSecure Pilot, an initiative elevating the cyber readiness of small to midsize organizations with support from the Center for Internet Security (CIS)? (Even though we were interrupted mid-podcast by the new federal alert system text messages, we carry on!) Dive into...2023-10-0712 minLive on CyberLive on CyberEp 37 | Cyber Haves, Have-nots & Announcing LA Cybersecure!ANNOUNCEMENT: Are small businesses and nonprofits ready for battle, or sitting ducks in cyber warfare? #Cybersecurity isn’t just about money - it’s about talent, time, and foundational cybersecurity measures. How do we bridge this digital divide of #cyberhaves and #cybernots? This #LiveonCyber episode unveils LA Cybersecure! A groundbreaking pilot program funded by the Center for Internet Security's Alan Paller Laureate Program, LA Cybersecure led by SecureTheVillage will enable 50 small to midsize organizations to measurably improve their cybersecurity readiness. Be part of the revelation, the movement, the solution. Learn more about the LA Cybersecure pilo...2023-09-3015 minLive on CyberLive on CyberEp 36 | The Breaches of Titans: How Reasonable was the Security Failure?The iconic casinos MGM and Caesars become the latest victims of cyber warfare. A question: Was it reasonable for the security of such giants to falter? From social engineering tactics, deepfakes, the future of AI in cyber warfare, the pressing need for businesses—both big and small—is a posture of proactivity in their defenses. #CyberCitizens, the digital realm is a double-edged sword. As technology advances, so do the threats. How do we stay vigilant? How do we ensure that our defenses are adequate? Tune in, subscribe, and be a part of t...2023-09-2313 minLive on CyberLive on CyberEp 35 | Driving into a Privacy Abyss: The Unchecked Harvesting of Our DataMost (84%) of car manufacturers SHARE or SELL your data (Mozilla). The modern world has turned our vehicles into data-harvesting machines. With startling revelations from The Mozilla Foundation's new report, we learn that almost every major car brand's new internet-connected models have become a data privacy nightmare.  But the threat doesn't stop at our driveway. Join Stan Stahl, PhD and Julie Michelle Morris for this week's episode of #LiveonCyber as they delve into the alarming findings on car data collection, the perils of data brokers, and the urgent need for stronger data protection measures. #C...2023-09-1611 minLive on CyberLive on CyberEp 34 | Botnet Takedown: Decoding a Major Cyber WinIn a landmark collaboration, the F.B.I. and international partners have dismantled a formidable botnet responsible for a staggering 30% of cybercrime, affecting businesses worldwide, from financial sectors to critical infrastructures. Hear about Dr. Stan's 'urgent HELP!' text message from family, illustrating our collective need for cyber vigilance. Tune into this episode of #LiveonCyber with Dr. Stan Stahl and Julie Michelle Morris for commentary on the latest in cybersecurity and insights for business leaders navigating this complex landscape. #CyberCitizens, awareness is key. Every alert is a signal. Stay informed, subscribe, and...2023-09-0911 minLive on CyberLive on CyberEp 33 | Navigating the Minefield of Truth Decay: Misinformation, AI, and the Looming ElectionIn a world grappling with what the RAND Corporation calls 'Truth Decay,' the stakes for discerning truth from misinformation have never been higher. Social media platforms are retreating from their watchdog roles. Geopolitical foes like Russia and China are intensifying their AI-driven disinformation campaigns. As the 2024 elections loom, the burden is increasingly on us. Are we prepared? In this episode of #LiveonCyber, Dr. Stan Stahl and Julie Morris tackle the disconcerting rise of misinformation and its far-reaching implications on cybersecurity and society. Learn how to sift through the noise and fortify your...2023-09-0214 minLive on CyberLive on CyberEp 32 | The Silent War on Small Organizations: From Stealthy Ransomware to AI ThreatsToday’s #cyber landscape is evolving, and so is the threat to small organizations. The balance of power has shifted, and the bad actors are increasingly sophisticated. From the 'Play' Ransomware Group targeting Managed Service Providers (#MSPs) and thereby endangering midsized businesses across the globe, to hackers seamlessly integrating into platforms like Slack and Trello—small organizations find themselves at the frontline of an escalating digital battle. And if that wasn't enough, the rise of generative AI technologies now poses newer, unpredictable threats. But with knowledge, comes power.  Join Stan Stahl, PhD and Julie Michelle Morris in this e...2023-08-2614 minLive on CyberLive on CyberEp 31 | Big Changes in Cyber Standards: NIST's Game-Changing Framework 2.0The National Institute of Standards and Technology (NIST) Cyber Security Framework 2.0 will make waves in the cyber world, for all the right reasons.  The integration of a novel 6th function—Governance—and a spotlight on cybersecurity supply chain risk management are transformational.  With action-guided Implementation Examples, an exclusive Improvement Category, and a spotlight on policy refinement, NIST is setting the stage for an empowered cyber future. Dive into this episode of Live on Cyber with Stan Stahl, PhD, and Julie Michelle Morris as we dissect the Top 3 monumental shifts in the NIST Cybersecurity Framew...2023-08-1914 minLive on CyberLive on CyberEp 30 | The Top 3 in America's Battle Plan Against CybercrimeWhen we leave our digital front doors unlocked, what do we expect will happen?  With 300,000+ cybersecurity roles unfilled nationwide, we're fighting a losing battle against well-funded, highly skilled cybercrime operations. The Biden-Harris Administration's ground-breaking National Cyber Workforce and Education Strategy (NCWES) aims to combat the onslaught - it's not just about filling roles; it's about empowering every American in our digital realm. On this episode of Live on Cyber with Stan Stahl, PhD, and Julie Michelle Morris, we break down the NCWES, its game-changing implications, and the pressing call for cyber-vigilance among organizations and individuals alike. 2023-08-1210 minLive on CyberLive on CyberEp 29 | The Top 3 Egregious Findings in IBM’s Cost of a Data Breach ReportIBM's eye-opening Annual Cost of a Data Breach Report reveals a disturbing trend. Companies often choose to burden their customers with the financial fallout of cybercrime, rather than bolstering their cybersecurity. As #cybercriminals leverage #AI to heighten their attacks and laws increasingly mandate #cybersecurity controls, the risk of ignoring these digital defenses is spiraling.In this episode of Live on Cyber with Stan Stahl, PhD and Julie Michelle Morris, we're shedding light on this appalling strategy, and our Top 3 Egregious Findings in IBM’s annual report.It takes a village to secure the Village™.Rate, subscribe, and s...2023-08-0514 minLive on CyberLive on CyberEp 28 | The China Cyber Espionage Threat: A Clear and Present DangerJoin Dr. Stan Stahl and Julie Morris as they delve into the critical issue of China's alleged cyber espionage activities against the US, including breaches of Department of State and Department of Commerce email systems, and the targeting of high-ranking officials. This seemingly routine espionage by nation-states poses a significant threat to businesses and individuals alike. They advocate for robust cybersecurity practices, including proactive defense strategies and vigilant protection of business IP, to counter the escalating cyber threats. Remember, "It takes a village to secure the Village™." Rate, subscribe, and share our podcast to help ra...2023-07-2910 minLive on CyberLive on CyberEp 27 | The Privacy Crisis: Tax Information Sold to Tech GiantsIn this episode of "Live on Cyber," hosts Dr. Stan Stahl and Julie Morris delve into the alarming issue of personal tax information being sold and sent to tech giants Google and Meta by companies like H&R Block, TaxAct, and Extra Layer. We explore the role of GDPR, the California Privacy Rights Act, and other privacy laws in protecting consumer data, the urgent need for stricter regulations and penalties. Listeners, raise your voices and demand better data protection - privacy should not be compromised for profit. Join Stan and Julie as they...2023-07-2211 minLive on CyberLive on CyberEp 26 | Encryption and PrivacyStan and Julie take a deep dive into the intricate interplay between encryption and privacy in our ever-evolving digital landscape. Taking the  Signal app as an example, they grapple with the conundrum faced by we the people when as we strive to give law enforcement the technology tools they need to prevent crime while we strive to protect our individual privacy rights. Join Stan and Julie as they navigate the complexities of digital privacy, offering invaluable insights and recommendations along the way. Join Stan and Julie as they navigate the complexities of digital privacy, offering invaluable insights and recommendations along...2023-07-1514 minLive on CyberLive on CyberEp 25 | ShamefulSuffering the loss of personal information from a cyber breach is bad. It’s even worse when your information was stolen because someone had installed surveillance software on your phone, software that hid itself from you so you didn’t even know it was there. That’s what happened to the innocent victims of a widely used phone surveillance app called LetMeSpy where a hacker stole victims’ messages, call logs and locations. LetMeSpy is specifically designed to stay hidden on a phone’s home screen, making it difficult to detect and remove. Shameful. As always, Stan and J...2023-07-0714 minLive on CyberLive on CyberEp 24 | We Must Insist on BetterCybercrime is out of control. If you don't believe us just look at the MOVEit disaster. Join Stan and Julie for a no-holds-barred discussion of how the market encourages poor security and the things we the people can do about it.  We're talking market forces, consumer pressure, and the need for sensible regulations. We're talking making "Security by Design" and "Security by Default" requirements for software just like brakes and seat belts are required in the cars we buy.  As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on th...2023-07-0112 minLive on CyberLive on CyberEp 23 | The Vineyard Metaphor: Lessons from CybersecurityDr. Stan Stahl, fresh from Portugal, offers an intriguing comparison: Douro Valley vineyards and cybersecurity. He unpacks their shared complexities and team dynamics. We delve into the recent "MoveIt" breach, a supply chain attack reminding us of the criticality of security protocols such as credit freezing and vendor assessment. We conclude with a call for a technological landscape marked by security by design, privacy by default, and our collective engagement in bolstering national cybersecurity!  It takes a village to secure the Village™. Rate, subscribe, and share the podcast to spread cybersecurity awareness! Sources and...2023-06-2314 minLive on CyberLive on CyberEp 22 | What will solve the workforce gap? With Wendy J. Betts CISSP, CCSIn this episode of Live on Cyber, Julie Morris is joined by Wendy Betts, CISSP, CCSP who shares her journey into cybersecurity and discusses the workforce gap in the industry. She emphasizes the need for a wider path for talent in cybersecurity and challenges the traditional requirements of a bachelor's degree, advocating for a focus on passion and drive instead, and the implementation of apprenticeship programs, highlighting organizations like i.c. stars that successfully train individuals for cybersecurity roles. Stay tuned for more episodes as Julie and special guests while Dr. Stan enjoys his summer break.  2023-06-1710 minLive on CyberLive on CyberEp 21 | Computer Forensics with Kimberly Pease of Maryman & AssociatesJoin Julie in an insightful discussion with Kimberly Pease, CISSP, Partner and Chief Operating Officer at Maryman & Associates, as they explore the world of cybersecurity forensics. Gain practical insights into incident response, protecting valuable information, and effective measures to enhance cybersecurity practices in this engaging episode of "Live on Cyber." Stay tuned for more episodes as Julie and special guests while Dr. Stan enjoys his summer break.  It takes a village to secure the Village™. Rate, subscribe, and share the podcast to spread cybersecurity awareness! Sources and Websites: ...2023-06-1012 minLive on CyberLive on CyberEp 20 | Invasion of the Body & Mind (Data) SNATCHERSDiscover the alarming truth about the unauthorized collection and sale of your private physical health, mental health, genetics, and fitness data. This event sheds light on the concerning practices of profiling and targeted marketing, as well as the potential weaponization of personal data without consent. This episode is an enlightening discussion that lasts 90 minutes, featuring expert insights and a Q&A session. Gain essential knowledge about the following key aspects: Data Collection: Understand who has access to your data and its widespread distribution. Data Monetization: Learn about the entities profiting...2023-06-021h 30Live on CyberLive on CyberEp 19 | From Awareness to Action: Cybersecurity & 50/50 Women on BoardsIn this special episode of Live on Cyber, Julie Morris interviews Heather Spilsbury, the Chief Operating Officer of 50/50 Women on Boards. Explore the inspiring journey of 5050 Women on Boards, a nonprofit dedicated to advancing women in corporate board service. Learn how the organization prioritizes safeguarding digital assets and data protection, and gain insights into practical cybersecurity measures and the importance of behavior change and awareness from their board of directors to staff and volunteers. Stay tuned for more episodes as Julie and special guests explore cybersecurity issues, while Dr. Stan enjoys his summer break.  It t...2023-05-2714 minLive on CyberLive on CyberEp 18 | Bridging the Cybersecurity Gap: SecureTheVillage's Mission and VisionJoin Dr. Stan and Julie this week as they take a deep dive into the origin and purpose of SecureTheVillage, born out of a need to enhance cybersecurity practices among small and mid-sized organizations.  Stan and Julie outline the pressing need for improved cybersecurity practices and discuss SecureTheVillage's approach towards combating cybercrime, one that is built on community cooperation and active involvement, and the vital role of personal behavior change and awareness.    We explore SecureTheVillage’s upcoming launch of a new cybersecurity pilot program to address the challenges facing individuals and businesses, funded by an inaugural grant from the Center for I...2023-05-2013 minLive on CyberLive on CyberEp 17 | SecureTheVillage to Launch Cybersecurity Pilot ProgramThis week Stan and Julie announce some exciting news. SecureTheVillage is a recipient of an inaugural grant of the Center for Internet Security’s Alan Paller Laureate Program. The grant will be used to launch a Cybersecurity Pilot Program to measurably improve the cybersecurity practices of small to mid-sized organizations in the greater Los Angeles area.  Join Stan and Julie as they look back on Alan Paller's vital role in information security and how proud they are of the opportunity SecureTheVillage has to build on his legacy.  2023-05-1314 minLive on CyberLive on CyberEp 16 | Invasion of the Body & Mind (Data) SnatchersWhile Julie’s away, Stan and his guest SecureTheVillage Board Member Alexa McCulloch, riff on the security of our health and wellness information. Whether it’s the data on your Fitbit or the search terms you enter on a hospital’s website, a lot of our private health and wellness information isn’t protected by HIPAA … and even what is, may still end up in the hands of the data brokers. This week’s podcast is a preview of a hard-hitting webinar Alexa will be moderating on May 25th titled Invasion of the Body & Mind (Data) Snatchers.  With her gues...2023-05-0513 minLive on CyberLive on CyberEp 15 | Waiting for securityThis week  Stan and Julie riff on a key component of the National Cybersecurity Strategy: Secure by design. Secure by default. How it’s a long-term strategy. How we don’t have time to wait. Someday security will be built into our computers and applications the way safety is built into cars. But not now. Not yet. Now we’re back in the 1930s without seatbelts, without collapsible steering wheels, without padded dashboards. Even without safety glass. The lack of built-in security in our digital lives pushes security responsibility on to us, the end users. CISA he...2023-04-2714 minLive on CyberLive on CyberEp 14 | What’s in your cyber-control?This week Stan and Julie riff on the cybersecurity and privacy things individuals can control. Application developers can issue an update but it’s of no value unless the user installs it. The update - and the vulnerability it protects against - is outside the user’s control. Updating that program is within the user’s control. Stan and Julie discuss this and other ways users can make them less hackable by taking control of the things that they are in control of Keeping software up to date; freezing your credit; being careful on email; backing...2023-04-2112 minLive on CyberLive on CyberEp 13 | Private information isn’t privateThis week’s news brought another story that our private health information is far less private than we might think.  Join Stan and Julie as they riff on how the use of third-party tracking code on hospital websites ends up with our personal health information in the databases of Alphabet, Meta, and an unknown number of data brokers who buy and sell our extremely sensitive private information for their profit. We the people have neither privacy nor transparency.  As always, Stan and Julie provide actionable tips and thoughtful wisdom in an engaging conversation on the comp...2023-04-1414 minLive on CyberLive on CyberEp 12 | Danger and OpportunityJohn F. Kennedy said that a crisis represents both danger and opportunity. And so it is with the rush to embed large language models into everything.  What a great opportunity for Stan and Julie to riff on the complex challenges of the cyber-incunabula. An example: In the old days - like last year - we warned people to look for spelling errors as a sign of a phishing attack. What was once good advice is now no-where-near sufficient as ChatGPT can write grammatically correct phishing emails structured to appeal to the reader’s emotions. As we discussed in...2023-04-0714 minLive on CyberLive on CyberEp 11 | TikTok. TikTok. The clock is ticking.TikTok has been all over the news this week as their CEO testified to a hostile Congress amid increasingly loud calls to ban it.  What a great opportunity for Stan and Julie to riff on the complex challenges of the cyber-incunabula.  The opportunity TikTok gives the Chinese government to spy on Americans, even people who don’t use it. TikTok’s opportunity to deliver misinformation and disinformation to affect the 2024 election. The impact of TikTok and other social media platforms on the well-being of our youth. The First Amendment.  Stan and Julie discuss the cha...2023-04-0114 minLive on CyberLive on CyberEp 10 | The Parents of Security.Ben Franklin famously said, “Distrust and caution are the parents of security.” Join Stan and Julie as they riff on distrust and caution. In Ben’s time, among the residents in his town of Philadelphia. Among the alliances required to unite the colonies in our war of Independence, while weeding out the spies amongst them. And as Ben also said, “Be civil to all; sociable to many; familiar with few; friend to one; enemy to none.” We have the same need for “distrust and caution” in our own time when identities on the Internet are so easy to fak...2023-04-0109 minLive on CyberLive on CyberEp 9 | The FBI’s Internet Crime ReportThe FBI Internet Crime Complaint Center (IC3) released its annual Internet crime report last week. Not surprisingly the report continued to show continued growth in cybercrime .  Join Stan and Julie as they riff on the IC3 report. What it says. What it means … both to the nation’s economy and to its victims. And how cybercrime is an inevitable unintended consequence of the cyber-incunabula, just like the increases in fraud and misinformation resulting from the invention of the printing press. As always, Stan and Julie provide actionable tips and thoug...2023-03-1717 minLive on CyberLive on CyberEp 8 | Cyber-ResponsibilityThe White House released its National Cybersecurity Strategy this week. The most controversial part of the strategy revolves around the needs for shifting liability for software products and services.   Glenn Gerstell, the former general counsel of the National Security Agency, described it as follows. “In the rush to market you can’t cut corners on safety. That’s why builders of apartment houses that collapse and makers of baby strollers that crumple are liable when people get hurt. Now we’re doing that for cyber.” Join Stan and Julie as they riff on the need to shift responsibili...2023-03-1013 minLive on CyberLive on CyberEp. 7 | The SecureTheVillage BHAGSecureTheVillage is on a mission to make Los Angeles the cyber-safest city in America. Join Stan and Julie as they riff on SecureTheVillage’s big hairy audacious goal. Why it’s needed … from the Boardroom to the living room … and how SecureTheVillage is organizing the village to accomplish it. This episode is somewhat more personal than most as Stan shares parts of his own life’s journey that brought him to founding SecureTheVillage more than seven years ago. As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on the com...2023-03-0711 minLive on CyberLive on CyberEp. 6 | The Blind Men and the Cyber-ElephantDescribing cybersecurity can look a lot like the story of the blind men and the elephant. One grabs the trunk and says “This is a snake." Another reaches to the elephant’s ear and says it’s a fan. One feels the tusk and says it’s a spear. And so on, each believing that they - and only they - know the elephant.. To many, cybersecurity is IT managing the network. To others, it’s complying with laws and legal obligations. Others see it as a risk management matter to be managed with insurance. Others see it as an o...2023-03-0710 minLive on CyberLive on CyberEp. 5 | A New Level of ThinkingAlbert Einstein famously said: “We can not solve our problems with the same level of thinking that created them” Bill Gates clearly articulated the thinking that got us into our cybersecurity mess when he wrote in his 1999 book Business@The Speed of Thought: “How you gather, manage, and use information will determine whether you win or lose.” Where are cybersecurity and privacy in Bill’s prediction, you ask? Exactly!! They’re not. They’re missing. Cybersecurity and privacy did not make it into Bill’s level of thinking until 2002. Join Stan and Julie as they riff on...2023-02-1714 minLive on CyberLive on CyberEp. 4 | A Failure to Communicate“What we have here is a failure to communicate.”   Strother Martin to Paul Newman in Cool Hand Luke. A related quote often attributed to George Bernard Shaw “The single biggest problem in communication is the illusion that it has taken place.” Join Stan and Julie as they riff on this all-too common challenge that what we say doesn’t always convey what we mean. In cybersecurity the failure to communicate finds a home in leadership failures and technology mishaps. The leader who sends mixed messages, telling staff to take security seriously while starving the security...2023-02-0811 minLive on CyberLive on CyberEp. 3 | Clear, Simple, and WrongNoted author and satirist H.L. Mencken is famous for pointing out that  “For every complex problem there is an answer that is clear, simple, and wrong.” Join Dr. Stan and Julie as they riff on this all-too-common human desire for simple solutions to complex problems. How it’s built into our neurology. How it makes it harder to manage cybersecurity. And even how it manifests in the conspiracy theories that drive our political discontent. The computer and telecommunications revolution that we’re in the middle of is upending our world in ways we haven’t begun to...2023-01-2614 minLive on CyberLive on CyberEp. 2 | The Best Possible Time to be AliveTom Stoppard, in his play "Arcadia" describes the scientific ferment of the 1820s as follows: "A door like this has cracked open five or six times since we got up on our hind legs. It's the best possible time to be alive, when almost everything you thought you knew is wrong."  This is part of the way I feel about where we are today.… Everything we thought we knew is wrong.  • What are facts? What is true?  • The implications of climate change  • The permanence of "government of the people, by the people, and...2023-01-1815 minLive on CyberLive on CyberEp. 1 | Cybersecurity and the Breakdown of TrustIn cybersecurity, We're being told "Don't trust. Verify." This makes the cybersecurity industry an unwilling active participant in the breakdown of trust in society.And yet, Francis Fukuyama, award-winning Stanford Professor, contends in his book “Trust: The Social Virtues and the Creation of Prosperity” that “in an era when social capital may be as important as physical capital, only those societies with a high degree of social trust will be able to create the flexible, large-scale business organizations that are needed to compete in the new global economy.”Simply...2023-01-1214 min