podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Jeff Sorensen
Shows
The Juice with Jeff
The Juice with Jeff #291
On this episode Mac McKoy facilitates and co-produces a fantastic and conversational interview with me thru Zoom. This is Mac's third time on the podcast. This entire episode focuses on the "Legendary Iowa Broadcasters" theme, and we talked about various Central Iowa broadcasting legends such as Steve Gibbons (may he rest in peace), Roger Summit, Michael Libbie, Clutch, Andy Elliott, Ron Sorensen, and a couple others. This episode of the podcast was recorded on Friday May 16, 2025 and it runs 36 minutes long. Our opening and closing theme music is provided by Oleg Ky...
2025-05-19
36 min
Footy Prime The Podcast
FP 837: CS Sporting Director and #VWFC's Jesper Sørensen
Sharms, Craig, Wonger and Dubs chat Canada Soccer beginning their search for a Sporting Director and then welcome for the first time to Footy Prime, Vancouver Whitecaps head coach, Jesper Sørensen! Sørensen talks about football reflecting the culture of the country, whether that's Denmark, Canada, or Mexico-like their next opponents in #ConcaChampions, Cruz Azul.He also chats about the greatest footballing Danes, the 'Caps remarkable run of form, and indulges Wonger in a very raw and revealing "get to know me" rapid-fire round.GET IN!!!(and happy birthday to our very ow...
2025-05-08
50 min
Cocker Chronicles
EP 5 // Orland, CA trial with Page Sorensen
I bring on Page Sorensen to talk about her recent success in Orland, CA. Page is relatively new to field trialing and gives a newbies perspective on the game. Results for Green Valley trial and news on next weeks podcast.Fighter by Aylex | https://freetouse.com/music/aylexFree To Use | https://freetouse.com/musicMusic promoted by https://www.free-stock-music.com
2025-03-20
52 min
The Great and Secret Knowledge
Piranesi, Part 7: Matthew Rose Sorensen (and Recap)
Beverly Crusher challenges the universe We wrap up the final chapter and then talk about the entire book. Then we look at One Star Goodreads reviews! Next time on: X-Files! Watch the pilot and join us with your ears! Please join our Discord server and get to know the fam! https://discord.gg/vtJnpkhd Below you'll find our plugs, links, recommendations, and links to stuff from this week's episode! Lindsey's podcasts The Kurt Locker Cool Breeze over the Mountains Historical Hotties Jeff's podcasts...
2024-09-17
2h 28
Unbeatable
Ep. 151: Diane Sorensen - The Gift of Being Exposed
When Diane Sorensen's 17-year-old daughter began self-harming, Diane confronted their generational trauma. Growing up constantly scrutinized, Diane sought approval through performance, a pattern she carried into adulthood. Now a certified transformational life coach, she emphasizes self-love and acceptance. Founder of the Beautiful Behavior Coaching Programs and host of the Beautiful Behavior Podcast, Diane helps others break free from destructive patterns and embrace authenticity. Tune in to hear her inspiring story of transformation.You’ll hear:Find out how to break free from inherited behaviors and cycles that have shaped your life.See how understanding your actions as...
2024-08-02
59 min
How’d You Do It? Stories of Resilience
Episode 14. From the Depths of Suffering to Empowerment with Jeff Sorensen
Episode 14. From the Depths of Suffering to Empowerment with Jeff SorensenIn this episode, we chat with Jeff Sorensen, founder of breathARMY. Jeff shares his incredible journey from a life of complex trauma, to becoming a transformational coach. Once aspiring to be a neurosurgeon, Jeff's life took a drastic turn due to addiction, leading him down a harrowing road involving a Mexican cartel and multiple out-of-body, near-death experiences.Jeff eventually turned his life around, becoming a paramedic and now helping others through breathwork and body awareness. He overcame severe mental health struggles, including...
2024-07-25
1h 28
Transcripts
Ask Great Questions with Jeff Wetzler
Jeff Wetzler on how to tap into the hidden wisdom of people around you for unexpected breakthroughs in leadership and life.
2024-05-01
00 min
Psychologists Off the Clock
Ask Great Questions with Jeff Wetzler
Ever think about how powerful asking questions can be? It's kinda mind-blowing when you think about all the insights, knowledge, and experiences we can tap into just by asking. So in this episode, we’ve got Jeff Welzer on board to talk about his book ASK: Tap Into the Hidden Wisdom of People Around You for Unexpected Breakthroughs in Leadership and Life. Jeff enlightens us on how asking thoughtful and well-crafted questions that seek to learn can unlock a treasure trove of wisdom, ideas, and deep understanding. And it can even help you achieve your goals in both your pe...
2024-05-01
1h 05
Chasing Greatness with Ben Sorensen
Episode 27 - Jeff Vierling
Jeff Vierling is the founder of Tailwind Nutrition and an ultra endurance athlete. In this episode Ben and Jeff discuss starting a business from scratch (literally), the science behind nutrition and endurance sports, the importance of building a healthy company culture, how to deal with competition, and so much more! Production by - http://ascentdigitalagency.com/ Book Ben- https://chasing-greatness.com/
2024-02-21
1h 15
Chasing Greatness with Ben Sorensen
Episode 27 - Jeff Vierling
Jeff Vierling is the founder of Tailwind Nutrition and an ultra endurance athlete. In this episode Ben and Jeff discuss starting a business from scratch (literally), the science behind nutrition and endurance sports, the importance of building a healthy company culture, how to deal with competition, and so much more! Production by - http://ascentdigitalagency.com/ Book Ben- https://chasing-greatness.com/ #sportsscience #nutrition #endurance #enduranceathlete #competition #culture #companyculture
2024-02-21
1h 15
Pacific Northwest Fungo Banter
Part 2 with CJ Baker and Jeff Calhoon
Part 2 with CJ Baker and Jeff Calhoon
2024-01-31
1h 16
Pacific Northwest Fungo Banter
CJ Baker and Jeff Calhoon
CJ Baker Minnesota Twins MiLB Hitting Coach and Jeff Calhoon Houston Astros MiLB Assistant Coach
2024-01-25
1h 05
Chasing Greatness with Ben Sorensen
Episode 23 - Jeff Walker
Ben catches up with Jeff Walker, author of: Launch: An Internet Millionaire's Secret Formula To Sell Almost Anything Online, Build A Business You Love, And Live The Life Of Your Dreams. Find out Jeff's formula and listen behind the scenes as it all comes together in this week's episode. Production by - http://ascentdigitalagency.com/ Book Ben- https://chasing-greatness.com/
2024-01-24
57 min
Security Breach
New Strategies for Old-School Hacks
Coordinating patches, covering the basics and not falling for 'pinky promises.'Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron.You can check that episode out in our archives. In addition to his extensive knowledge on threat actors like Lockbit, Erich also has a tremendous amount of insight on a number of cybersecurity challenges that continue to plaque the industrial sector, including the human el...
2024-01-09
29 min
Security Breach
Learning from the Dark Side
A former black hat offers insight on defending against hackers that "go for the throat every time."One of the mindsets shared by hackers and their corporate victims is the desire to put a successful bow on the calendar year. For you this could mean hitting a collection of shipping dates, production quantities or equipment implementations. What many are beginning to realize is that the black hat community has a number of year-end targets to hit as well. The focus on closing out orders, dealing with holiday-related slowdowns and potentially fewer employees on the plant...
2023-12-20
42 min
Security Breach
The Growing Impact of Hacktivists and State-Sponsored Groups
Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.Amongst the traditional threats to manufacturing enterprises and industrial control systems are the escalating roles of state-sponsored hacker groups. Refined through recent hostilities in the Ukraine and Gaza Strip, more and more cyber attacks against critical infrastructure around the world has cybersecurity experts looking beyond independent RaaS groups and malware drops.What makes these organizations so concerning is that they are more focused on stealing data and manipulating operations than extorting funds. This means the challenges associated with dwell time and...
2023-12-13
43 min
Security Breach
Walking the Line
Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.In what might be legendary singer Johnny Cash's most famous song, he speaks of keeping his eyes wide open all the time, and those tasked with OT security responsibilities are finding that they too need to walk the line. In the cybersecurity world this means balancing between the priorities of different operational environments, selecting tools and technologies that best match these priorities, and then understanding how all these investments can be intertwined to carry out your strategy. U...
2023-12-01
30 min
Security Breach
Breaking Down the Boeing Hack
Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.Recently, one of the most high-profile manufacturers in the world – Boeing – suffered what they’re describing as a “cyber incident”, which resulted in a large, but unknown quantity of data being stolen and held for ransom by the notorious Russian RaaS group, Lockbit.Lockbit, which is highly recognized as one of the most prolific threat actors targeting the industrial sector, obtained what is currently assessed as Citrix cloud files, security controls, email backups and corporate emails. The leak is potentiall...
2023-11-21
26 min
Security Breach
Turning Up the Cat & Mouse Game
Staying ahead of hackers as they look to infiltrate every new connection point.The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split between focusing on known internal weaknesses or harnessing a better understanding of the external black hat organizations wanting to shut them down, steal data or extort payments.One stat that helps demonstrate this dynamic comes from the IBM Security X Force Threat Intelligence Index, which shows a 94 percent reduction in the average time for the deployment of ransomware attacks. What took attackers over two months...
2023-11-16
26 min
Security Breach
This is the Way ... to Beat Hackers
There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer. The first is speed. Once an exploit is detected by the bad guys, they will work as quickly as possible to take advantage of it, hopefully beating the deployment of any patches. The second element is manipulation. Most commonly, hackers take advantage of well-established systems that have unextraordinary access points, legacy connections or human management dynamics that are easily manipulated by alt...
2023-11-10
40 min
Security Breach
Patches, PLCs and Making it Harder for Hackers
The little things that can shore up cyber defenses and protect against evolving attack groups.When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has become less about identifying possible sources of attack, and more about prioritizing them. Protection from external sources gets a lot of attention, and rightfully so. However, another source of these threats, which can be just as detrimental, lies within the walls of your facility.Joining us today to discuss some of these internal vulnerabilities, and a tremendous report that details them, is Carlos Buenano, the...
2023-10-26
36 min
Security Breach
Why AI is Your Biggest Threat and Most Powerful Ally
Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on Security Breach, but no topic generates greater consternation than Artificial Intelligence, and all the questions it brings to the table. According to an IBM report, the average cost for a data breach was just under $5 million last year. But going a step further, organizations that deployed an AI-based security tools saw their breach cost over $3 million less than those without such a tool. The...
2023-10-19
29 min
Security Breach
The Ransomware Roller Coaster
How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of ransomware attacks. One of the latest updates comes via Kovrr and their Ransomware Threat Landscape report for the first half of 2023. The firm found that while the number of reported ransomware attacks was down, manufacturing remains atop the most attacked sectors – with nearly one out of every five ransomware attacks focusing on the industrial sector, and nearly 60 percent of targeted companies registering less than $50 millio...
2023-10-11
25 min
Security Breach
'There's A Train Wreck Coming'
Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.Instead of setting things up with data about recent attacks or stats from industry reports, we're going to dive right into this episode's topic - Quantum Computing, and its short and long-term impact on every piece of personal, intellectual and operational data your enterprise values.Join us as we welcome Skip Sanzeri (Co-Founder) and Paul Fuegner (Director of Corporate Communications) from QuSecure as we discuss what Quantum Computing is, how its cryptographic capabilities currently impact...
2023-10-04
35 min
Security Breach
'They're Hitting Everyone They Can'
How and why hackers are targeting smaller enterprises, and one organization's efforts to defend manufacturing.We all know that cyberattacks in the industrial sector continue to rise and create new production, supply chain and data management challenges throughout the industrial sector.And conversations on this podcast have covered numerous reasons as to why these numbers continue to grow, ranging from vulnerabilities being created by new IoT-based connection points and a lack of visibility within the OT infrastructure, to an insufficient number of OT security specialists and the constantly evolving nature of hackers and cyber gangs...
2023-09-29
37 min
Security Breach
How Hackers are Targeting Vehicles and Fleets
EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.Typically, when we talk about the expanding attack surface being created by new, exciting and efficiency-driven technology, we’re referencing digital transformation’s impact on the plant floor and throughout the manufacturing enterprise.Today, pun intended, we’re shifting gears to examine another operational technology environment that will continue to have a huge impact on cybersecurity strategies and vulnerabilities throughout manufacturing – the automotive sector. Advancements in Bluetooth and other connectivity-driven functionality has turned your vehicle into a hub for communications, entertainment, commerce, and more – a...
2023-09-20
41 min
Security Breach
Doubling Down to Beat the Hackers
How the Industry IoT Consortium's new security framework offers a 'belt and suspenders' approach to cybersecurity.One cybersecurity topic that gets me up on the soapbox quicker than most is the need for stakeholders within the industrial sector to collaborate and share more information on cyber attacks, hacker tactics and best practices for both in warding off intrusions and understanding how to respond to them.Thankfully, more local, national and international organizations are growing in notoriety and impact to help address these evolving concerns, including this episode's guests from the Industry IoT Consortium T...
2023-09-14
33 min
Security Breach
Inside the Summer's Biggest Industrial Hacks
Takeaways from two unique, yet similarly damaging attacks.This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing and responding to OT cyberattacks, we’re going to dive into a couple of recent hacks that impacted the manufacturing sector. We’re going to start off with Matt Radolec. He’s an incident response team lead at Varonis and host of the State of Cybercrime podcast. Matt is going to share some insights on the recent attack of watch manufacturer Seiko. Then we’re going to...
2023-09-07
37 min
Security Breach
Avoiding 'Shiny New Objects'
Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of which were referenced by more than 50 percent of those surveyed. Cyolo also reported on the most highly implemented solutions, which survey respondents identified as defense in depth, network segmentation and m...
2023-08-31
34 min
Security Breach
Knowing 'What is Good'
Using data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use of cyber tools as one of their leading challenges. Additionally, of those who have experienced a large security incident, significant stress to the SecOps team and major attrition from these teams were identified as the most significant impacts of a cyber attack – outranking network downtime and data loss. These findings seem to indicate how important processes, and not just tools, have become in defending an...
2023-08-23
38 min
Security Breach
Security Breach: 'The Edge Always Goes to the Attacker'
Embracing the 'not if, but when' mindset.Cybersecurity solutions provider Trellix recently unveiled their 2023 Voice of the CISO report. Among other topics, it explored the top 5 challenges cited by Chief Information Security Officers who responded to the Trellix survey. In order, they included:Too many different sources of information.A growing attack surface created by remote workers, increasingly complex supply chains and other social and business factors.Changing regulatory mandates.Difficulties retaining and recruiting staff with the necessary security skills.A lack of buy-in from other parts of the company.These results not only help...
2023-08-18
49 min
Security Breach
Phishing Lessons and 'Shifting the Target'
How a global manufacturer learned from past attacks, and the most critical benefit of security tools.IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2021-2022. Of those, according to IBM, 44 percent occurred because industrial companies failed to apply the appropriate software patches. With this in mind, it’s not a surprise that additional data from The 2023 OpenText Cybersecurity Threat Report found that manufacturing is the leader in terms of rate of malware infection – coming in at a rate that is more than 55 percent higher than the average for all industry verticals, incl...
2023-08-10
53 min
Security Breach
The Growing Problem of 'Insecure by Design'
"It just boggles the mind that things that are so important to how our world works are so shockingly unprotected."According to ABI Research, less than five percent of critical industrial infrastructure is monitored for threats. The company also reports that by 2030 industrial environments will house more than 1.2 billion connection points for machines and production systems. So, while it’s impossible to be in all places at all times, this growth in connectivity will place a greater strain on security resources even after prioritizing data and network assets, and focusing on the most pressing potential vu...
2023-08-04
41 min
Security Breach
Cloud Apps are Elevating Malware Threats
Netskope Threat Labs, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent Threat Labs Report. Findings specific to manufacturing include:Cloud-delivered malware increased from 32 percent to 66 percent in the past twelve months, led by downloads from popular apps like Microsoft OneDrive, Google Drive and Gmail.The report showed that 94 percent of users downloaded data from an average of 17 different cloud apps each month.Over the past twelve months, the number of users uploading to cloud apps in manufacturing increased 27 percent.Emotet, AgentTesla, and BlackBasta were among the top malware...
2023-07-25
35 min
Security Breach
The Best Way to Identify, Defeat Hackers
Vital defensive tactics that go beyond the attacker.The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as well as a potentially debilitating cyber defense vulnerability for the industrial sector. The issues stem from a combination of internal failures and the evolution of highly innovative criminals, which was recently assessed in Cyolo’s State of Industrial Secure Remote Access report Their report shows that larger industrial organizations can have over 50 remote users every day. This quantity of off-site employees logging into industrial co...
2023-06-29
42 min