Look for any podcast host, guest or anyone
Showing episodes and shows of

WISE Law Cyber Consulting

Shows

Cyber Crime JunkiesCyber Crime JunkiesHow Business Can Transfer Cyber RiskIn this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explores the costs and consequences of cyber attacks, the sophistication of cyber criminals, and the future of cyber insurance. The speakers stress the importance of engaging with insurance professionals and seeking education and resources to navigate the complex cyber insurance market. They emphasize the need to align with t...2025-07-2839 minCyber Crime JunkiesCyber Crime JunkiesFBI vs Cyber CrimeScott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the fbi and cyber crime, fbi vs cyber crime, truth about fbi vs cyber crime, how the fbi helps cyber crime victims Come join us this year as we celebrate the 20th anniversary of the importance...2025-07-1124 minCyber Crime JunkiesCyber Crime JunkiesHow to Measure Cyber Risk Today: Guidelines for LeadersWhat can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to KnowRyan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experience as a Cyber Expert for McKinsey & Company and was formerly with the US De...2025-06-251h 02Business Leaders Cyber BriefingBusiness Leaders Cyber Briefing2025 UK Cyber Breaches Survey: What need to know - What you need to doBusiness Leaders Cyber Briefing - Episode 12: Key TakeawaysWhat You'll Learn from This EpisodeTrish and Tom from Cool Waters Cyber break down the 2025 Cyber Security Breaches Survey findings to help UK financial services leaders understand their current risk landscape and improve their cyber defenses.Critical Insights for Business LeadersYour Risk Profile is Higher Than You Think74% of large businesses and 67% of medium businesses experienced cyber incidentsFinance and digitally intensive sectors face elevated risksRansomware attacks have doubled, now affecting 1% of all businesses (19,000 organizations)Phishing Remains...2025-06-0320 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastMaster Medical Device Cybersecurity: Avoid FDA Delays | Blue Goat Cyber WebinarHow can medical device manufacturers meet FDA cybersecurity requirements the first time around?What are the most significant challenges medical device manufacturers face in ensuring FDA cybersecurity compliance?In this webinar, Trevor Slattery, CTO of Blue Goat Cyber, dives into what it takes to master medical device cybersecurity and avoid costly delays with the FDA. He outlines common pitfalls companies face, including poor documentation, lack of threat modeling, and mismatched security controls. Watch this webinar for practical, actionable advice for navigating FDA expectations and building more secure, compliant devices.Topics...2025-05-1333 minBusiness Leaders Cyber BriefingBusiness Leaders Cyber BriefingHow to fast-track the UK Cyber Governance Code of Practice using IASME Cyber AssuranceImplementing the UK Cyber Governance Code of Practice with IASME Cyber AssuranceIn this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response, the UK government (via DSIT and NCSC) has introduced the voluntary Cyber Governance Code of Practice to guide boards and directors.The Code distils five key principles2025-05-0820 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastEarly Cyber Strategies for MedTech TrailblazersWhat are some strategies founders can use to incorporate cybersecurity into the early stages of developing a medtech product? In this episode, Christian and Trevor break down the critical role of cybersecurity in early-stage medtech startups. They explore why cybersecurity is often overlooked, what the real-world consequences are, and how startups can shift left to avoid costly pitfalls. From VC funding to FDA requirements, they offer a roadmap for founders who want to get it right from the start.Key points: (0:33) The Cybersecurity Awareness Gap* Many early-stage medtech st...2025-04-2927 minBusiness Leaders Cyber BriefingBusiness Leaders Cyber BriefingUnpacking the UK Cyber Governance Code of PracticeTune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation.By listening, you will gain insights into:• Why cyber governance is essential for modern businesses and organisations. Digital technologies are deeply embedded in most businesses, and critical operations often rely on them. Cyber risk is a material risk for almost all organisations.• The critical role of boards and directors in managing digital risks and p...2025-04-2812 minCyber Insurance News & Information PodcastCyber Insurance News & Information PodcastEpisode #4 - Cyber Insurance News & Information Podcast - The personal side of cybersecurity and cyber insuranceIn this episode, Cyber Insurance News Executive Editor Martin Hinton discusses the personal side of cybersecurity with Trinity Davis and Chuck Randolph from 360 Privacy. They explore the threats individuals face in the digital age, the importance of reducing one's digital footprint, and practical advice for enhancing personal cybersecurity. The conversation also explores the role of AI in addressing cyber threats, the value of personal data, and the implications of deepfakes. The episode highlights the importance of cybersecurity, insurance, and general cyber hygiene as a means of resilience against potential data breaches.During the podcast...2025-04-2853 minCyber Crime JunkiesCyber Crime JunkiesAre you at Risk? Personal Liability Cyber Breaches.We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of c...2025-04-2853 minCyber Defense RadioCyber Defense RadioCyber Defense Radio – Adam Bennett – Red Piranha – Hotseat Podcast – 2025Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this power-packed episode of Cyber Defense Radio features Adam Bennett, Founder & CEO of Red Piranha — Australia’s award-winning cybersecurity company behind the groundbreaking Crystal Eye XDR platform.In this exclusive interview, Adam shares the origin story of Red Piranha and how his vision to simplify and unify cybersecurity led to the creation of an end-to-end, single-pane-of-glass platform that spans cloud, network, and endpoint.💡 “Our mission has always been to consolidate, innovate, and empower — enabling MSPs to deliver world-class security without the complexity.”Interview Highlights: ✅ What i...2025-04-1724 minCyber Insurance News & Information PodcastCyber Insurance News & Information PodcastEpisode #3 - Cyber Insurance News & Information Podcast. Exploring cybersecurity insurance.In this episode, Martin Hinton speaks with Ryan Mimmo, head of underwriting at Converge Insurance, about the evolving landscape of cyber insurance. They discuss the challenges of underwriting in a rapidly changing environment, the importance of cybersecurity education for businesses, and the need for comprehensive coverage. The conversation also touches on the role of government in regulating cyber insurance and the significance of continuous training to mitigate risks. A case study on the CDK breach highlights the far-reaching impacts of cyber attacks on industries.00:00 - Introduction to Cyber Insurance and Converge03:04 - The Evolving Cybersecurity...2025-04-1435 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - From Teaching to Tech with Brett Leikas - Episode 58This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Brett, a former student who successfully transitioned from a 14-year teaching career into cybersecurity.Brett shares his journey, from discovering Cyber Revolution through a Facebook ad to landing his first cybersecurity role as an Associate Cybersecurity Consultant at Vectra, just two weeks before Christmas of 2024. He discusses the challenges of changing careers, the learning process, and the importance of a growth mindset.Key Takeaways from this Episode:Why Brett decided to leave the...2025-03-2023 minBusiness Leaders Cyber BriefingBusiness Leaders Cyber BriefingFrom Hard Hats to Firewalls: Why Cyber Safety is the Next Big Construction Risk🔹 Episode Overview:For decades, the construction industry has made physical safety a top priority. Over time, mental well-being has also been recognised as a critical part of workplace safety. But now, a new challenge is emerging—one that many construction businesses aren’t prepared for: Cyber Safety.In this episode, we discuss the findings of our latest white paper on the evolution of safety culture in construction, revealing how cyber risks are becoming just as important as traditional workpla...2025-03-1919 minCyber Crime JunkiesCyber Crime JunkiesAI Exposed. Latest Social Engineering Business Cyber Risk.Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish  nick@thenetdefender.com  https://thenetdefender.com/ Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions. Chapters 2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Traini...2025-03-141h 09Business Leaders Cyber BriefingBusiness Leaders Cyber BriefingCyber Essentials - all the changes coming in 2025Join Trish and Tom as they explain what the UK Cyber Essentials scheme is, how it will benefit your business and the changes coming to the scheme from April 2025.Whether you already have Cyber Essentials and will need to renew after the changes come into effect or are considering going for the certification for the first time - this is essential listening.Always in plain English, always short and to the point - this is the Business Leaders Cyber Briefing from Cool Waters Cyber.Need help with Cyber Security? Speak to...2025-03-1119 minCyber Insurance News & Information PodcastCyber Insurance News & Information PodcastEpisode #2 - Cyber Insurance News & Information Podcast - Understanding Cybersecurity InsuranceIn this episode of the Cyber Insurance News and Information Podcast, host Martin Hinton discusses the complexities of cybersecurity insurance with experts Craig Sekowski with thetechcollective.net and Ralph Pasquariello with care-report.com. They explore the challenges small businesses face in understanding cyber insurance, the importance of building cyber resilience, and the various cyber threats, such as business email compromise and ransomware. The conversation emphasizes the need for businesses to invest in cybersecurity insurance and security measures to protect against potential attacks, highlighting the evolving nature of cyber threats and the necessity for adaptable cyber insurance policies.2025-02-1734 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - Brandon’s Journey from PT to Vulnerability Analyst - Episode 56This week on The Cyber Revolution Podcast, we chat with Brandon, a former fitness industry professional who successfully transitioned into cybersecurity—without any prior IT experience! Brandon shares his journey, from discovering Cyber Revolution through a social media ad to landing his first cybersecurity job as an Associate Vulnerability Analyst at Triscoll Labs. He dives into the challenges of upskilling, the interview process, and the mindset needed to switch industries. If you’re considering a career change but feel overwhelmed, Brandon’s story is proof that with the right training, support, and dedication, you CAN break int...2025-02-0523 minBusiness Leaders Cyber BriefingBusiness Leaders Cyber BriefingCyber Security for Charities - what trustees and managers need to knowThis episode explains Cyber Essentials, a UK government-backed scheme that helps charities protect themselves against common cyber attacks. Trustees and leaders are responsible for ensuring their charity's IT systems and data are secure. This is essential for maintaining public trust, protecting beneficiaries, and securing funding.Cyber Essentials certification demonstrates a commitment to cyber security, helping charities meet the increasing requirements of grant-making bodies and public sector contracts.Key actions for trustees:Understand the five technical controls: firewalls, secure configuration, security update management, user access...2025-01-2413 minCyber Crime JunkiesCyber Crime JunkiesWhen Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for BusinessesCyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all need to know, most recent top cyber security news, new cyber crime news, new...2025-01-1727 minBusiness Leaders Cyber BriefingBusiness Leaders Cyber BriefingUpcoming Cyber Regulations and Cyber ThreatsThis episode explores the evolving landscape of cybersecurity legislation in the EU and the UK, examining key initiatives aimed at fortifying digital defences against an increasingly sophisticated threat environment.The EU's Cyber Resilience Act, now in force, establishes mandatory cybersecurity standards for all products with digital elements sold in the EU market. The act aims to ensure that manufacturers prioritise cybersecurity throughout a product's lifecycle, from design and development to maintenance, and requires products to meet specific cybersecurity requirements before receiving the CE marking.Complementing the Cyber Resilience Act, the EU's Digital...2025-01-0918 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastThe Evolution of Medical Device Cyber Threats: Past, Present, and FutureHow do medical device vulnerabilities pose life-threatening risks?In this episode, Christian and Trevor again explore the fascinating and critical world of medical device cybersecurity. Specifically, they discuss past attacks, present challenges, and future risks, from vulnerable pacemakers to autonomous surgical robots. They highlight the importance of transparency, proactive security design, and responsible research in protecting the devices we trust with our lives.Key points: * The 2007 cybersecurity concerns surrounding Dick Cheney’s pacemaker.* Barnaby Jack’s insulin pump and pacemaker hacking demonstrations....2024-12-2424 minCyber Crime JunkiesCyber Crime JunkiesHigher Education under Cyber Attack. Clemson CISO John Hoyt.John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new...2024-12-2057 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityMastercard’s Take on Cyber Defense Innovation and Collaboration - Ep 109In this episode, we dive deep into the world of cybersecurity with Jon Brickey, Senior Vice President at Mastercard. With extensive experience across military, government, and corporate sectors, Jon offers unique insights into the evolving landscape of cyber threats and defenses.Jon shares how Mastercard is at the forefront of fostering a culture of collaboration and partnership in cybersecurity. He highlights the company's commitment to collective defense, emphasizing the need for global consistency and innovation in building a future-ready cyber workforce. Learn about Mastercard’s pivotal role in organizing the tri-sector cyber defense exercise, which un...2024-08-0731 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep14: +971 Cyber SecurityLet's Talk Cyber Ep14: +971 Cyber SecurityHost: Thomas McCarthy, Cyber News GlobalGuest: Hassan Hariry, Co-Founder, +971 Cyber SecurityJoin host Tommy and guest Hassan as they discuss collaborations and partnerships, staying ahead of cyber threats, and how +971 Cyber Security can make a difference to your organisation.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai.Contact ceo@cybernewsglobal.com if you have any questions about this podcast or others in the Let's Talk Cyber Series!Rather listen on your favourite...2024-05-2711 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep11: Data Privacy and it's Role in the Cyber RealmLet's Talk Cyber Ep11: Data Privacy and it's Role in the Cyber RealmHost: Thomas McCarthy, Cyber News GlobalGuest: Susanne Bitter, Certified Information Security And Data Governance Professional, Cyber Security Forum InitiativeJoin host Tommy and guest Susanne as they discuss why data privacy matters, risks of poor data management, and best practices for data collection.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion...2024-04-1821 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep9: Cyber Queens Shaping the Future of SecurityLet's Talk Cyber Ep9: Cyber Queens Shaping the Future of SecurityHost: Thomas McCarthy, Cyber News GlobalGuest: Col. Francel Margareth Padilla-Taborlupa, First Female AFP SpokespersonJoin host Tommy and guest Col. Francel as they discuss digitalization in the Army, challenges for women in military, and the value of women in cyber.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!...2024-04-1214 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep8: Secret Service Agent Busts International Cyber CrimeLet's Talk Cyber Ep8: Secret Service Agent Busts International Cyber CrimeHost: Thomas McCarthy, Cyber News GlobalGuest: Matt O'Neill, Former U.S. Secret Service AgentJoin host Tommy and guest Matt as they discuss Worldwide Cyber Collaboration, the case surrounding the Vietnamese cyber criminal Minh Ngo, and cautionary notes for future cyber hackers.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!...2024-04-0913 minLet\'s Talk CyberLet's Talk CyberLet's Talk Cyber Ep7: Cyber Security in the UAELet's Talk Cyber Ep7: Cyber Security in the UAEHost: Thomas McCarthy, Cyber News GlobalGuest: H.E. Dr. Mohamed Al-Kuwaiti, CEO Cyber Security Council UAEJoin host Tommy and His Excellency Doctor Mohamed Al-Kuwaiti as they discuss Cyber Security in the UAE, International Collaboration in fighting Cybercrime, and Initiatives at this years GISEC Global 2024.This Let's Talk Cyber Podcast Episode is part of the CNG GISEC Special Edition in Dubai. If you are attending GISEC Global in May, please visit CNG and the rest of the UK Pavilion in Hall 4, J1!2024-04-0809 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Review - Ben's 18-Month Insightful Exploration in Cybersecurity- Episode 47Explore powerful strategies and insider insights that will give you a unique edge as you step into the world of cybersecurity. Join us as Ben, a former Cyber Revolution student who went from a beginner to an expert cyber professional in just 18 months. He started small, landed his first job, and is now in the Queensland Government's cybersecurity team! Ben's secret? He's all about learning, networking, and grabbing every opportunity that comes his way. And he's here to share his tips and tricks with you. Thinking about switching careers?  From networking t...2024-03-2728 minCyberVersedCyberVersedEpisode 24 – Regional Centre Focus - The Eastern Cyber Resilience CentreIn episode 24, Mandy Haeburn-Little takes a deep dive into the work of one of the Regional Centres—the Eastern Cyber Resilience Centre. During her conversation with the centre Director, Detective Superintendent Paul Lopez, she highlights again how Eastern CRC differs from the other centres, particularly in the type of companies and industry sectors it supports.   Paul begins by explaining how he arrived in cyber and why he thinks this role is the most important and impactful job he has done in all of his years in policing. Paul also outlines his ambitions and goals for the fu...2024-03-2033 minCyberVersedCyberVersedEpisode 23 - Diversity in Cyber - GenderThis is the first of a series of Cyber Versed podcasts looking at diversity in cyber. And to start the series, we're looking at women in policing to coincide with International Women's Day. And who better to host this series than Mandy Haebrurn-Little, who was named Cyber Woman of the Year in 2021.  Mandy is joined by an impressive panel of women for the podcast; they are Fiona Bail, Detective Chief Inspector and Cyber PATH Lead for the National Cyber Resilience Centre; Leanne Alleyne, Chief Inspector, NPCC Cybercrime Programme, and Mary-Anne Dickson, Detective Constable NPCC Cybercrime Programme. It is an...2024-03-0731 minCyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...CyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...Ep134: Commanding Cyber Resilience: Is Your C-Suite an Asset or a Liability (2024.02.26)🔒 Is Your C-Suite a Cyber Resilience Command Center or a Vulnerability? #CyberBoardCast Ep 134 dives into transforming C-Suite strategy into frontline defense. 🎙️ Discover key actions for operational readiness and swift incident response. Listen in for insights beyond the below cliff notes!   🚀 Essential Takeaways:   1.     C-Suite-specific operational checks 2.     Streamlined incident response 3.     In-depth, ongoing, Board-down cyber education 4.     Real-time threat detection 5.     Collaborative cyber defense   🌐 The C-Suite’s role is pivotal in cyber resilience. Learn how to be an asset, not a liability in the fight against cyber threats. For compre...2024-02-2604 minCyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...CyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...Ep131: How Should Boards & C-Suites Jointly Measure Their Organizational and Individual Cyber Health and Resilience (2024.02.23)Is your Board & C-Suite’s cyber resilience strategy proactive or just talk? 🎙️ CyberBoardCast™ Ep 131 unveils a crucial discussion: How should Boards & C-Suites measure and enhance their organizational and individual cyber health and resilience collectively? Listen in for insights beyond the below cliff notes!   🔒 From the Norton Healthcare breach learnings to proactive steps, we outline essential actions for corporate cyber wellness:   1.     Craft a Joint Cyber Resilience Scorecard - A unified measure of readiness and response. 2.    Cyber Education for Strategic Thinking - Elevate your cyber acumen together. 3.    Metrics for a Cyber-Secure Culture - W...2024-02-2304 minCyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...CyberBoardCast™: Daily Board & C-Suite Cyber Strategy with Andrzej Cetnarski & Cyber Nation ...Ep125: Boards, C-Suites, and Cyber Terrorists - Is Your Leadership Shielded From Digital Extortion or Living on a Prayer (2024.02.17)As a Board Director or Executive, are you safeguarded against the chaos that cyber terrorists aim to inflict? #CyberBoardCast125 dives deep into why these digital extortionists target your leadership and what you can do about it. Listen in for the playbook and reference the cliff notes below.   As leaders, you're not just figures of influence but prime targets for cyber terrorists aiming to cause chaos and disrupt markets. 🎯   🌐 Cyber terrorists leverage your standing to maximize the impact of their attacks, seeking to create fear and manipulate narratives for ideological gains. Your strategi...2024-02-1703 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurity2024 Unleashes Unprecedented Cyber Breaches - Ep 82Mother of All Breaches. The Midnight Blizzard attack. Nation state cyber conflicts. January 2024 has seen a blitz in cyber  attacks. In this week's episode, hosts Stan Wisseman and Rob Aragao delve into the alarming start to the new year.1.    Mother of All Breaches (MOAB):·       Unprecedented Scale: Over 26 billion records compromised, impacting major platforms like Twitter, LinkedIn, Adobe, and Dropbox, along with government agencies worldwide.·       Data Complexity: The breach includes not only credentials but also sensitive data, creating substantial value for malicious actors.·       Organization: The breach was meticulously organized, posing...2024-01-3115 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityWEF's 2024 Cyber Landscape - Ep 81In this episode, hosts Rob and Stan explore the World Economic Forum's Global Cybersecurity Outlook 2024, a favorite annual report providing valuable insights into the cybersecurity landscape. Released early in the new year, the episode looks at the key themes, findings, and implications outlined in the report.Main Themes:1.    Geopolitical and Technological Environment:·       Report highlights dynamic changes and advancements in geopolitics and technology.·       Emphasis on impacts of geopolitical tensions, economic uncertainties, and technological advancements, especially in AI.2.    Cyber Skill Shortage:·       Discussion on persistent challeng...2024-01-2420 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution, Student Review - Saul- Episode 44Embark on a profound exploration with Cyber Revolution Student Review as Saul's story unfolds, challenging preconceptions and sparking contemplation on the transformative power of education. Join Saul, a former chef turned Cybersecurity professional, as he provides insights into the essential qualities for success in the industry.  Discover the challenges and opportunities of transitioning into cybersecurity, emphasizing the importance of specialized certifications for personal and professional growth.  Whether contemplating a career change or aiming to boost your cybersecurity skills, this podcast is your invaluable guide. Tune in for concise and actionable insights from Saul's jo...2024-01-1720 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurity2024 Cyber Trends & Threats - Ep 78In this episode, hosts Stan Wisseman and Rob Aragao reflect on the cybersecurity landscape of 2023 and discuss its potential impacts on the upcoming year, 2024. They delve into the alarming increase in incidents and breaches, noting a 30% rise. The conversation covers major breaches, such as the MOVEit and Okta incidents, emphasizing the growing threat of ransomware across various sectors.The hosts highlight the interconnectedness of organizations, raising concerns about dependency on common platforms and the resulting ripple effect during security breaches. They stress the importance of reevaluating security controls and adopting a layered approach to mitigate vulnerabilities.2024-01-0315 minDarnley\'s Cyber CaféDarnley's Cyber CaféMajor Cyber Attacks Against Critical InfrastructureIn this gripping episode, we delve into the high-stakes realm of cyber warfare, focusing on the intense rivalry between China, Russia, and the United States. Join us as we unravel the stories behind major cyber attacks against critical infrastructure and explore the intricate dynamics of these digital battlegrounds.💻 Major Cyber Attacks: We dissect some of the most notorious cyber attacks targeting critical infrastructure. From sophisticated ransomware campaigns to state-sponsored intrusions, we outline the tactics used to infiltrate and compromise vital systems.🔒 National Security Implications: Examine the ripple effects of these cyber assaul...2023-12-1926 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastUnwrapping the Best of 2023’s Cyber Revolution PodcastAs we say goodbye to 2023 and welcome the new year, join me on a quick journey through the Cyber Revolution Podcast's top 5 moments. From inspiring career shifts to a mum’s awe-inspiring journey, these stories have made our podcast special. So, let's relive the highlights that shaped our year! Ben's story serves as a powerful motivator, reminding us that every career change is within reach. Listen or watch the full ep here: https://open.spotify.com/episode/7c2on607V6YsxT8VorE8kH. Michael's incredible 90-day hustle is a testament to the transformative power of ha...2023-12-1827 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecuritySEC Cyber Rules Just Got Real - Ep 69Dive into the latest episode of "Reimagining Cyber" with Stan Wisseman and Rob Aragao as they discuss the imminent implementation of SEC cyber rules in December. Join the conversation as they revisit the key aspects, including the four-day disclosure period for cyber incidents deemed material, the evolving role of cybersecurity experts on boards, and insights from the Clorox cyberattack—a potential test case for the SEC cyber ruling.Explore the financial implications and operational impacts of cyber incidents, with a focus on companies like Clorox, MGM, and Caesars, who have already navigated the disclosure process. Gain valuable pe...2023-11-0118 minCyberVersedCyberVersedEpisode 18 - Roundtable Discussion - Working with cyber studentsIn Episode 18, Mandy Haeburn-Little hosts a roundtable discussion focusing on Cyber PATH; all that policing is doing nationally to support students, innovation and new skills, and making sure those skills are available to the business community. Joining Mandy on the podcast are: Fiona Bail, National Cyber PATH lead, National Cyber Resilience Centre Group Sharif Gardner, Head of Defence, Military and Law Enforcement, UK, Ireland & Nordics, SANS Institute James Duncan, Security Cloud Solutions Architect, Microsoft Rania Hindy, Studying Physics/Computer Science and current Cyber PATH Student, National Cyber Resilience Centre Group Matt T...2023-10-1836 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecuritySustainable Cyber (Protecting Sustainability Projects from Cybersecurity Threats) - Ep 67Live from Las Vegas*,  Reimagining Cyber is back.In this episode Rob and Stan find out how CISOs can battle the cybersecurity challenges in sustainability and transformation projects.Their guest is Edward  Amoroso one of the world’s first ever CISOs. Ed spent over 30 years at AT&T and since retiring in 2016 he has founded TAG Cyber LLC.  TAG concentrates on global cybersecurity, artificial intelligence and sustainability, making him the ideal guest for this episode: “[TAG] pick topics that we think are consequential to the world, things that have existential consequence if we get it w...2023-10-1829 minCyber Crime JunkiesCyber Crime JunkiesFace to Face with Cyber Criminals.Robert Cioffi, CEO of Progressive Computing, a leading NY MSP, shares the emotional effects from cyber attacks and his experiences involved in the massive KASEYA Breach effecting over 800+ of his clients. he went Face To Face With Cyber Criminals.Topics: face to face with cyber criminals, effects from real-life cyber crime attacks , emotional toll from cyber crime, cyber  crime news we all need to know, examples of cyber crime gang activities, exposing cyber crime gang activities, Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month 2023-10-1155 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsNavigating the Composable Commerce Landscape with Royal Cyber: Your Salesforce Partner Guide Embark on a journey with us as we dive deep into Salesforce's cutting-edge Composable Commerce solution. In this series, we'll explore its architecture, migration options, and the expansive Salesforce Partner Ecosystem. Plus, we'll shed light on the crucial difference between Headless Commerce and Composable Commerce. Welcome to the Royal Cyber Salesforce Podcast Series, where we delve into the dynamic world of Composable Commerce, and why Royal Cyber stands as your trusted Salesforce Ridge, LINK, and Implementation Partner. 🌐 Royal Cyber: Salesforce Ridge and LINK Partner Discover how Royal Cyber's expertise and innovation create the backbone your business needs for...2023-10-0517 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastStopping Hackers in Their Tracks: Your Guide to Cyber Knowledge and Data Safety- Episode 35Discover strategies for transitioning career to mastering cybersecurity essentials, and understand the medium of this rewarding profession. Learn all about Floyd Te’s journey to pursue a career in the cutting-edge field of cybersecurity. Hear how he transitioned from sales and consulting, his approach to studying cybersecurity topics, why he decided on it as his new profession and other exciting takeaways!  With an increasing volume of cyber threats across all sectors today, knowledge of security fundamentals is becoming more important than ever - making it easier for you to become more valuable in this highly com...2023-10-0418 minCyber Crime JunkiesCyber Crime JunkiesNegotiating with Cyber Criminals. Expert Eric Taylor.A compassionate spiritual technology leader, Eric Taylor leads a ransomware SWAT team and he illustrates great stories to share and learn from. Topics: Negotiating with Cyber Criminals, how to negotiate with cyber crime gangs, ways to negotiate with cyber crime gangs, who has to negotiate with cyber crime gangs, negotiating with cyber crime gangs, cyber crime first responders, how to respond to cyber criminals, how to communicate with cyber criminals, best ways to communicate with cyber criminals, behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, cyber security mindset, effective...2023-10-0427 minCyber Crime JunkiesCyber Crime JunkiesBehind Scenes of LOCKBIT. Cyber Crime. Jon DiMaggio Interview.Legendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss LOCKBIT and his latest Ransomware Diaries Vol3 release and the fall of a cyber crime gang. Topics: behind scenes of cyber crime, rise and fall of a cyber crime gang, betrayal in cyber crime , fall of a cyber crime gang, take down of a cyber crime gang, when a cyber crime gang implodes, when cyber crime turns on each other, when cyber crime does not pay, when cyber crime gangs get breached, how cyber crime gangs hack each other, when cyber crime gangs hack...2023-10-0227 minCyber Crime JunkiesCyber Crime JunkiesExperts Who Hunt Cyber Criminals. Legendary John Hammond Interview.John Hammond interview. Topics: experts who hunt cyber criminals, behind scenes cyber criminals, behind the mask cyber crime gangs, best ways to limit cyber attack liability, breaking cyber crime news, breaking cyber crime stories we need to know, cyber crime gang discussions, cyber crime gang under cover, cyber crime gangs under cover, cyber crime news we all need to know, examples of cyber crime gang activities, exposed secrets of cyber crime gangs, exposing cyber crime gangs. Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month!  2023-10-0125 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastHow One Military Veteran Transformed Into a Successful Cyber Pro - Episode 34Ready to start an exciting journey into the world of cybersecurity? Cyber Revolution is your go-to guide for exploring careers in cybersecurity. Discover the incredible transformation of Tim Jensen, a military veteran, as he shifted from dreams of working in law enforcement to becoming a successful cybersecurity professional. His journey reminds us that unexpected paths can lead to remarkable opportunities.  Surprisingly, many things he learned in the ADF turned out to be useful in the world of cybersecurity. In this field, you never stop learning. New trends, threats, and hacks pop up all the time. C...2023-09-2717 minCyber Crime JunkiesCyber Crime JunkiesCommon Sense Cyber Security. Innovative Ways To Stop Cyber Crime.Pat McGarry is CTO of ThreatBlockr and is one the top technical voices in cyber security today. He has more than 25 years of commercial cybersecurity experience as well as several years in US federal govt Cyber security space. He has been granted 3 US patents and is a well-sought after public speaker at key security and industry conferences. He has vast experience in advanced network testing, cybersecurity, deployable machine learning, artificial intelligence, as well as internet of things.Topics: Innovative Ways to stop Cyber Crime, How to protect people online, How intelligence gathering is critical to...2023-09-0858 minCyber Crime JunkiesCyber Crime JunkiesFall of a Cyber Crime GangLegendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss LOCKBIT and his latest Ransomware Diaries Vol3 release and the fall of a cyber crime gang. Key Topics: rise and fall of a cyber crime gang, betrayal in cyber crime , fall of a cyber crime gang, take down of a cyber crime gang, when a cyber crime gang implodes, when cyber crime turns on each other, when cyber crime does not pay, when cyber crime gangs get breached, how cyber crime gangs hack each other, when cyber crime gangs hack each other, why cyber c...2023-08-2751 minCyber Crime JunkiesCyber Crime JunkiesNegotiating with Cyber Criminals. Behind Scenes.Negotiating with Cyber Criminals. Expert Eric J. Taylor. A compassionate spiritual technology leader, Eric Taylor leads a team of security experts into the heart of ransomware defense, negotiating directly with cyber crime gangs to save organizations. His experience and leader of a ransomware SWAT team illustrates great stories to share and learn from. A compassionate spiritual technology leader, Eric Taylor leads a team of security experts into the heart of ransomware defense, negotiating directly with cyber crime gangs to save organizations. His experience and leader of a ransomware SWAT team illustrates great stories to...2023-08-081h 01The Cyber Revolution PodcastThe Cyber Revolution PodcastThe Lucrative New Career Path Into The Booming Industry of Cyber Security- Episode 24Crack into the exciting world of cybersecurity and unlock its full potential with us. Embarking on a new professional journey and paving the way for a successful career through our expertise. Meet Zhara, a prime illustration of success who secured her first cybersecurity job after our transformative training program at Cyber Revolution. She's one of the many success stories from our prestigious institute. But let's address the issue at hand. Despite our curiosity about cybersecurity, misconceptions and a lack of knowledge often hold us back. At Cyber Revolution, we aim to demolish those barriers, answer...2023-07-1919 minSafe TechTalkSafe TechTalkEpisode 3: Safe TechTalk - Securing Your Company: A CTO’s Journey in Cyber SecurityGet actionable insights on growing cyber resilience in your business! Join Silvia Thom, former CTO of ZALORA Group and a prominent tech as well as start-up advisor, and  Pramodh Rai, co-founder of Cyber Sierra, as they discuss the intricacies of cyber compliance and regulatory requirements. Tune in for practical insights and expert guidance to protect your organization's digital assets from evolving cyber threats. 🚀 What can you expect from this episode? ✔️ Listen to and learn from the experiences of a CTO on managing cyber risk ✔️ Dis...2023-05-2942 minCyber Crime JunkiesCyber Crime JunkiesNew Approaches to Enter Security. Deidre Diamond, Cyber SNDeidre Diamond, founder of CyberSN (Cyber SN: https://cybersn.com/) shares new approaches to enter cybersecurity. Full Video Episode: https://youtu.be/1tnS3MdXSN0We discuss: advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, benefits of subscribing to top cyber security podcast, best practices for leveraging linkedin for your personal brand, best ways to keep up to date on security news, breaking into offensive cyber security, careers in insider threats, cybersecurity careers for military, gender gap in cyber security, how important are certs in security career, how to choose the right bootcamps...2023-05-1455 minCyber Crime JunkiesCyber Crime JunkiesQuick Update. Coming Soon. Breaking Cyber Crime Stories We Need to Know.Breaking Cyber Crime Stories We Need to Know. Exciting new true cyber crime stories and special guests. Plus NEW Special Offer for Viewers. VISA GIFT CARD Give-away.VIDEO To WATCH: https://youtu.be/_I1uaSv2urITopics: cyber crime global news today, cyber crime real life cases, cyber security news this week, most recent top cyber security news, ransomware impact on real life individuals, ransomware impact on small business, ransomware-as-a-service. what it's really all about., real cyber crime stories, top cybersecurity news stories, top recent cyber security stories, top ways to protect business from cybercrime2023-05-0703 minCyber Crime JunkiesCyber Crime JunkiesUndercover In a Cyber Crime Gang. Shocking LOCKBIT Reveal.Legendary Security Researcher Jon Dimaggio takes Cyber Crime Junkies undercover in a cyber crime gang. Exposing Inside a cyber crime gang LOCKBIT 3.0 and its leaders. Covering how intelligence gathering is critical to security, how to expose secrets of cyber crime gangs, Latest insight on cyber crime gangs, his newest findings on ransomware cyber crime gangs, how stolen data is sold by cyber criminals, under cover investigation ransomware, undercover findings on ransomware cyber crime gangs, undercover in cyber crime gangs, undercover inside ransomware cyber crime gangs, understanding the people behind ransomware groups, what its like undercover inside cyber crime gang...2023-04-3049 minReimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityAll Aboard! Next Stop The Future of Cyber Resilience - Ep 58The guest this week is Dr Ron Ross,  Fellow at the National Institute of Standards and Technology.  He currently leads the NIST System Security Engineering Project (SSE) The jumping off point for this episode are two of his special publications-- SP 810-160 Volume 1 (updated Nov 22) , ‘Engineering Trustworthy Systems’ which describes a basis for establishing principles, concepts, activities & tasks for engineering trustworthy secure systems.-  SP 810-160 Volume 2 – ‘Developing Cyber-Resilient Systems: A Systems Security Engineering Approach’ which focuses on cyber resiliency engineeringKey quotes:"We live and die by information technology, whether that...2023-03-0824 minCYBER SECURITY SUMMITCYBER SECURITY SUMMITCyber Security Summit > 12/29/22 > AT SUMMIT Podcast Conversation with Sean Costigan and Eileen ManningCyber Security Summit > 12/29/22 > AT SUMMIT Podcast Conversation with Sean Costigan Professor; Director and Co-Founder, George C. Marshall European Center for Security Studies; ITL Security and Eileen Manning, Founding Partner, Executive Producer,  Cyber Security Summit #css12 During the 12th Annual Cyber Security Summit,  leading Cyber Professionals connected and shared their insights with us. We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on...2022-12-2903 minCYBER SECURITY SUMMITCYBER SECURITY SUMMITCyber Security Summit > 12/15/22 > AT SUMMIT Podcast Conversation with Ben Corll of Zscaler > Podcast Host Wendy Meadley, Next Phase Studio > #css12During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us. We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit Today's Glimpse is with Ben Corll Business Executive, CISO of Zcsaler hosted by Wendy Meadley, Next  Phase Studio for the Cyber Security S...2022-12-1507 minCYBER SECURITY SUMMITCYBER SECURITY SUMMITCyber Security Summit > 12/1/22 > AT SUMMIT Podcast Conversation with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed > Podcast Host Dr. Shayla Treadwell, VP GRC ECSDuring the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professionals to share their Cyber Security Solutions and insights with us. We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit Today's Glimpse is with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed hosted by Dr. Shayla Treadwell, Vice President of Governance...2022-12-0103 minThe Cyber Security Matters PodcastThe Cyber Security Matters PodcastThe Cyber Sector From a Female General Manager's Perspective - Episode 7 - Karla Reffold, General Manager at Orpheus CyberIn this podcast we discuss two main topics – diversity in cyber and how the cyber sector is evolving. Great insights from Karla Reffold, General Manager at Orpheus Cyber, Board Advisor, and American Cyber Awards judge. Karla was one of the top 3 finalists in the “Entrepreneur of the Year” category at the Cybersecurity Women of the Year awards in 2022 among many other awards. Tune in for an insightful episode! The Cyber Security Matters Podcast was created by neuco, a global talent acquisition company that specialises in the space and technology sectors. To lea...2022-11-0918 minAsk A CISOAsk A CISOThe Importance of Good Cyber HygieneSo you’ve made the transition to the cloud, but you’re wondering how it is that your cloud costs are so high. Is it supposed to be that way when the cloud promises competitive advantages and cost savings? It’s all down to cloud sprawl and practicing good cyber hygiene, according to Nick Lumsden, our guest this week. Join host Jeremy Snyder as he speaks with Nick Lumsden, co-founder, and CTO at Tenacity Cloud to understand how cyber hygiene is key to reducing cloud sprawl, cloud costs, and perhaps even more importantly, reducing your attack surfaces. ...2022-10-2628 minThe Cyber Security Matters PodcastThe Cyber Security Matters PodcastA Woman's Place At The Cyber Security Table - Episode 4 - Isabel Bardsley-Garcia, Director of Information Security & Technology at HelionHaving led and driven the transformation and automation of national cyber security consulting services for over 18 years, Isabel knows what she’s talking about when it comes to the Cyber sector. An experienced and successful woman, Isabel discusses her take on the cyber world as a woman and a leader. In this episode, we discuss why cyber security isn't just for missiles, how vendors are trying to redress the gender balance, Isabel's thoughts on day-to-day cyber and much more. Enjoy! The Cyber Security Matters Podcast was created by ne...2022-09-2835 minSecurity Happy HourSecurity Happy HourWhole Cyber Human InitiativeWhole Cyber Human Initiative launched a 25k fundraiser. The proceeds go towards the procurement of up to 50 $400.00 cert test vouchers that will be awarded in a first-of-its-kind certification Scholarship and through our Community Challenge. We have a direct donate option at https://www.paypal.com/donate/?hosted_button_id=CB4LWDGUELC3YWe are listed on Amazon SmileYou can purchase any of our swag or coffees.And,Companies can find us on Brevity Each of these options feed the scholarship funds directly. Become a su...2022-09-231h 07Security Happy HourSecurity Happy HourThe Cyber Queens PodcastFrom red team to blue team and everything in between, The Cyber Queens are a formidable group. This week we talk to the ladies of The Cyber Queens podcast. Their why, how, and what makes them tick!Tonight's guests are Maril Vernon, Erika Eakins, and Nathalie BakerBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.link...2022-09-021h 15Ask A CISOAsk A CISOWeb3, The Metaverse, and Cyber Risk ManagementWhat are the unique challenges that Web3, the Metaverse, and in particular, crypto and NFTs present with regards to trust? Michael Lew, CEO of Rajah and Tann Technologies and Chairman of the Cyber Risk sub-committee of the Singapore Fintech Association, sits down with host Paul Hadjy to discuss this and how companies should approach cyber risk management. Tune in to this episode of Ask A CISO to hear: 👉 What is e-Discovery? 👉 Cyber Risk Management and building trust in Web3, the Metaverse, and decentralized spaces like cryptocurrency and NFTs 👉 What drives and decides the value of...2022-07-0622 minSecurity Happy HourSecurity Happy HourCyber Career Talk with Mike MillerNavigating the cyber world and finding a career can be difficult. Tonight we will discuss Mike's journey and how you can best find your path to the field.Tonight's guest is Mike MillerBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Mike Millerhttps://twitter.com/totalmikedotcomhttps://linkedin.com/in/mikesportfolio/Bio Links:2022-05-171h 11Security Happy HourSecurity Happy HourSecurity Happy Hour: Benefits of Legacy Tech in a Cyber WorldThis week on Security Happy Hour we are discussing the Benefits of Legacy Tech in a Cyber World.Tonight's guest is Mike Jones.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Mike Jones: Twitter: https://twitter.com/H4unt3dHLinkedIn: https://linkedin.com/in/mikejonesnotanaliasH4unt3dHacker YouTube: https://www.youtube.com/channel/U...2022-03-171h 07Security Happy HourSecurity Happy HourSecurity Happy Hour: Recruiting in CyberThis week on Security Happy Hour we are discussing Recruiting in Cyber.Tonight's guest is Demond Cook.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Demond Cook: Twitter: https://twitter.com/ccgdemondBio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast R...2022-02-281h 00Security Happy HourSecurity Happy HourSecurity Happy Hour: All About CyberThis week on Security Happy Hour Cyber Warrior and Cyber Papa sit down with Neal Bridges to discuss All Things Cyber.Today's special guest is Neal BridgesTwitter:https://www.twitter.com/ITJunkieLinkedin:https://www.linkedin.com/in/nealbridgesBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkPodcast...2022-02-021h 30The Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 78 | The latest cyber news and resilience insights: 2/11/21In this week’s cyber security news we explore the confirmation that the Russian SolarWinds hackers breached 14 of Microsoft’s resellers and service providers, we discuss the Cyber Ready Program recently announced by the Australian Federal government to support the next generation of cyber security experts, we explore why there has been a decline in insurance claims for ransomware and the implications this could have for the cyber insurance space, and the 2022 big budget increase for cyber security predicted by Gartner’s annual survey. Questacon’s Cyber Ready Program: https://bit.ly/3muu3kJ For the late...2021-11-0132 minCyber Sound BytesCyber Sound BytesA year on the cyber front lineIn this episode, head of the MOD Cyber Awareness, Behaviour and Culture project Simon Pavitt sits down with Cyber Confident spokesperson CeCe to discuss all things Cyber Awareness Month! CeCe talks about her experience as a female in cyber, some of the main tactics that cyber criminals prey upon and the importance of strong cyber security behaviours. 2021-10-2223 minSecurity Happy HourSecurity Happy HourSecurity Happy Hour: Cyber Communities & GatekeepingThis week on Security Happy Hour we are discussing the importance of Cyber Communities & Overcoming Gatekeeping.Tonight's guests are Naomi Buckwalter, Kelly Sharadin, & Leo Serrano.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Naomi Buckwalter: Twitter: https://twitter.com/ineedmorecyberLinkedIn: https://www.linkedin.com/in/naomi-buckwalter/Kelly Sharadin:Twitter: https://www.twitter.c...2021-10-211h 10Security Happy HourSecurity Happy HourSecurity Happy Hour: The Journey, Women in Cyber, Time ManagementThis week on Security Happy Hour we are discussing the journey of Lola Kureno into Cybersecurity, Women in Cyber, and Time Management. Lola is a former ballerina turned into Cybersecurity Engineer/ Penetration tester that got her dream job at INE.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors meaningful connections and discussions.Connect with our guests:Lola Kureno: Twitter: https://twitter.com/KurenoLolaLinkedIn: https://ww...2021-08-271h 04Cyber Security Grey Beard®Cyber Security Grey Beard®S3E5 Cyber Security Grey Beard Information Security Book ReviewsBook reviews of four cyber security books published between 2019-2020. Dark Mirror: Edward Snowden and the American Surveillance State by Barton Gellman 2020, The Hacker and The State by Ben Buchanan, 2020, Sandworm by Andy Greenberg, 2019 and The Coming Cyber War by Marc Crudgington, 2020.  These books provide great insight to where we are in the cyber security profession.  They discuss history, technology, and attacks.  Cyber security professionals need to understand the threat landscape.  These books all help with that in their own way.Dark Mirror: https://www.barnesandnoble.com/w/dark-mirror-barton-gellman/1122928803?ean=9780143110477Hacker and The State: https://www.barn...2021-08-1821 minSecurity Happy HourSecurity Happy HourSecurity Happy Hour: Cyber Supply Drop, Cybersecurity Training, and CertificationsThis week on Security Happy Hour we are discussing Cyber Supply Drop, Cybersecurity training opportunities, and certifications with Josh Mason. As a fellow veteran Josh has done a lot not only for his country but for the cyber community. As the founder of Cyber Supply Drop, he has been working to make sure that all people have the same opportunities for training. It has been an amazing experience getting to watch this dream come to fruition and I look forward to what more he does within the cyber community.Become a supporter and let out y...2021-08-161h 05The Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 57 | The latest cyber news and resilience insights: Meat-giant cyber-attack, NYC subway hack, and NSW councils lacking basic cyber controls.Our resident cyber experts dive into the latest hacks and cyber news from Australia and around the globe - the attack that shut down Australia’s largest meat processor, the hack that compromised the New York transit authority, the audit that showed dozens of NSW local councils are without basic cyber security controls, and what the ABC and SBS are doing to boost their security following the infamous cyber-attack on Channel 9. For the latest cyber news and insights head to www.getcyberresilient.com2021-06-0736 minSecurity Happy HourSecurity Happy HourSecurity Happy Hour: Eric "Cyber Papa" Belardo and Mary CubaWelcome back to Cyber Warrior Studios Presents Security Happy Hour Live. Tonight we are bringing to you Eric "Cyber Papa" Belardo and Mary Cuba.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors meaningful connections and discussions. Connect with our guests:Eric "Cyber Papa" Belardo:Twitter: https://www.twitter.com/ebelardo73Mary Cuba:Twitter: https://www.twitter.com/marylizcubaPodcast Version: Is currently a...2021-06-071h 13The Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 55 | The latest cyber news and resilience insights: Colonial Pipeline hack, cyber insurance premiums, and stolen identitiesIn our latest cyber news update our team of resident cyber experts talk through the latest cyber developments and hacks including the Colonial Gas Pipeline hack over in the US, analyse the shifting view of cyber insurance, and discuss stolen identities and where your details might be used. For the latest cyber news and insights head to www.getcyberresilient.com2021-05-2430 minUnderstanding CyberUnderstanding CyberCyber EssentialsCyber Essentials The UK has a certification scheme called Cyber Essentials to help improve cyber security. In this podcast we help you understand what the cyber essentials and cyber essentials plus schemes are, and why you should follow the advice contained in the essentials. This podcast provides and overview of the scheme, and later podcasts will go into the detail of them. Further reading: NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/2021-03-0111 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 31 | Cyber security vs cyber resilience and 8 attributes of a healthy cyber culture - with Andrew Bycroft, CEO of iResilienceGar is joined this week by Andrew Bycroft, CEO of iResilience and author of ‘The Cyber Intelligent  Executive — Securing the Future of your Organisation’. Andrew has had an interesting career progression, moving from studying the ionosphere as a physicist to following his passion and becoming an IT manager. From IT manager, Andrew then moved towards security and did managed security services, operations consulting, architecture and even went to the dark side to work in sales. Six years ago, Andrew started his own company to work with execs and boards to help them understand the difference between cyber securit...2020-09-1541 minintelligence updatesintelligence updatesCyber News Update 56Welcome to the CyberCure Bi-Weekly podcast. You can read the full transcript at: https://blog.cybercure.ai/2020/07/31/cyber-news-update-31-7-20/ This podcast will give you a summary of the latest news related to cyber intelligence and proactive cyber security in only a few minutes. The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber world. The focus of this podcast will be on the latest cyber events for non-technical people; anyone can listen and understand. ---- Life Healthcare...2020-07-3103 minBusiness of CyberBusiness of CyberBoC #5: Investing in Cybersecurity Startups w/ the Former Head of Cyber for the Israeli Defense ForcesZohar Rozenberg is the CSO & Head of Cyber Investments at Elron, a venture capital firm in Tel Aviv. Prior to joining Elron, Zohar was the head of the Israeli Defense Forces’s (IDF) cyber department, so he’s been heavily involved in Israel's national cyber bureau and formalization of the Israeli national cyber strategy as they’ve become a global powerhouse of cyber security. On today's episode we explore: What experience does Zohar look for when he's meet with cyber founders? How did a career in the IDF prepare him for th...2020-06-2525 minCyber Security Course Arabic - الأمن الإلكترونيCyber Security Course Arabic - الأمن الإلكترونيCyber Security Arabic Hacking (Cyber security Data Security Steganography arabic) Cyber Security Arabic Course - الأمن الإلكتروني ArabicCyber Security  Arabic Hacking  (Cyber security Data Security Steganography arabic) Cyber Security Arabic Course - الأمن الإلكتروني Arabic Cyber Security Course Arabic - الأمن الإلكتروني يمكنكم دعمنا بتحميل و تثبيت المتصفح بريف مجانا مع خاصية حجب الإعلانات و شبكة خفية تور و تورنت و درع حماية لتصفح الإنترنت بدون إعلانات مزعجة بسرعة و أمان https://brave.com/pla467 كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 كيفية شراء البيتكوين في المملكة العربية السعودية باستخدام بطاقة الائتمان الخاصة بك بأسرع طريقة في ثواني يرتفع سعر البيتكوين في كل ثانية و باستخدام بطاقة الائتمان أو بطاقة الخصم المباشر، يمكنك شراء بيتكوين بسرعة في ثواني بأحدث سعر البيتكون مقابل الدولار الأمريكي اليوم ، أو فتح محفظة أو بيع البيتكوين في ماكينة الصراف الآلي في المملكة العربية السعودية. الأهم هو أن البيتكوين حلال شرعا ويجوز للزكاة. الله أكبر أن يعطينا الله تكنولوجيا بدون فوائد وبدون خسارة القيمة. حسنا! كيف تشتري بيتكوين في المملكة العربية السعودية ؟! ستكون قادرًا على شراء البيتكوين في المملكة العربية السعودية والإمارات العربية المتحدة في ثلاث خطوات فقط: الخطوة الأولى: قم بإنشاء حساب بيانس وهو الطريقة الأكثر أمانًا وأرخص طريقة تذكر الاشتراك عبر هذا الرابط ، حتى تحصل على 10٪ خصم على كل رسوم شراء البيتكوين الخاصة بك على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 اتبع الخطوات على موقع بيانس وسجل أفضل بريد الإلكتروني لديك بالضغط على رابط التأكيد. من المهم استخدام بريد إلكتروني جيد لهذه الخطوة. إذا كنت ترغب في شراء بيتكوين في المملكة العربية السعودية بشكل مجهول و دون الكشف عن هويتك ، فليس عليك تأكيد هويتك على بيانس. الخطوة الثانية: قم بشراء البيتكوين المتوقع ارتفاع سعره في المملكة العربية السعودية باستخدام بيانستصرف بسرعة و اشتري سعر البيتكوين مقابل الدولار الأمريكي الذي تريد فورًا على بيانس. الخطوة الثالثة: كيف تبيع بيتكوين على بيانس؟ سعرالبيتكوين مقابل الدولار الأمريكي مرتفع للغاية ، هل تريد بيع بيتكوين بسرعة وتحقيق ربح جيد؟ فقط اضغط على سعر السوق. اضغط على 100٪ ثم اضغط على بيع! انتهينا! تهانينا! جزاكم الله خيرا على التصرف بعدل و جزاكم الله خيرا على استخدام الكود F2IKGVD8 الذي يفيدنا أيضا. كلانا يحصل على خصم 10٪ من رسوم شراء البيتكوين. https://www.binance.com/en/register?ref=F2IKGVD8 شكرا لك! إذا كنت ترغب في شراء المزيد من البيتكوين ، فما عليك سوى إضافة المزيد من الأموال على بيانس وشراء المزيد من البيتكوين كما هو موضح في الخطوتين 2 و 3. تذكر الاشتراك عبر هذا الرابط ، حتى تحصل على خصم 10٪ على جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD82020-06-1710 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 19 | The human and organisational aspects of cyber security - with Dr. Cate Jerram, Cyber Security Academic at the University of AdelaideGar’s guest this week is Dr. Cate Jerram, principle researcher and lead academic on cyber security at the University of Adelaide Business School. Cate’s background in adult education led her to information systems research and the human and organisational aspects of cyber security. Cate also helps design and teach cyber security courses and programs as well as supervise PhD students.  Cate and Gar talk broadly on the human aspects of cyber security and the delay in organisations understanding its importance, how cyber posturing is playing into VCs desire to put money into startups, and discuss Cate’...2020-06-1640 minCyber Security Course Arabic - الأمن الإلكترونيCyber Security Course Arabic - الأمن الإلكترونيCyber Security Arabic Hacking (Cyber security Data Security Cryptography arabic) Cyber Security Arabic Course - الأمن الإلكتروني ArabicCyber Security  Arabic Hacking  (Cyber security Data Security Cryptography arabic) Cyber Security Arabic Course - الأمن الإلكتروني Arabic Cyber Security Course Arabic - الأمن الإلكتروني يمكنكم دعمنا بتحميل و تثبيت المتصفح بريف مجانا مع خاصية حجب الإعلانات و شبكة خفية تور و تورنت و درع حماية لتصفح الإنترنت بدون إعلانات مزعجة بسرعة و أمان https://brave.com/pla467 كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 كيفية شراء البيتكوين في المملكة العربية السعودية باستخدام بطاقة الائتمان الخاصة بك بأسرع طريقة في ثواني يرتفع سعر البيتكوين في كل ثانية و باستخدام بطاقة الائتمان أو بطاقة الخصم المباشر، يمكنك شراء بيتكوين بسرعة في ثواني بأحدث سعر البيتكون مقابل الدولار الأمريكي اليوم ، أو فتح محفظة أو بيع البيتكوين في ماكينة الصراف الآلي في المملكة العربية السعودية. الأهم هو أن البيتكوين حلال شرعا ويجوز للزكاة. الله أكبر أن يعطينا الله تكنولوجيا بدون فوائد وبدون خسارة القيمة. حسنا! كيف تشتري بيتكوين في المملكة العربية السعودية ؟! ستكون قادرًا على شراء البيتكوين في المملكة العربية السعودية والإمارات العربية المتحدة في ثلاث خطوات فقط: الخطوة الأولى: قم بإنشاء حساب بيانس وهو الطريقة الأكثر أمانًا وأرخص طريقة تذكر الاشتراك عبر هذا الرابط ، حتى تحصل على 10٪ خصم على كل رسوم شراء البيتكوين الخاصة بك على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 اتبع الخطوات على موقع بيانس وسجل أفضل بريد الإلكتروني لديك بالضغط على رابط التأكيد. من المهم استخدام بريد إلكتروني جيد لهذه الخطوة. إذا كنت ترغب في شراء بيتكوين في المملكة العربية السعودية بشكل مجهول و دون الكشف عن هويتك ، فليس عليك تأكيد هويتك على بيانس. الخطوة الثانية: قم بشراء البيتكوين المتوقع ارتفاع سعره في المملكة العربية السعودية باستخدام بيانستصرف بسرعة و اشتري سعر البيتكوين مقابل الدولار الأمريكي الذي تريد فورًا على بيانس. الخطوة الثالثة: كيف تبيع بيتكوين على بيانس؟ سعرالبيتكوين مقابل الدولار الأمريكي مرتفع للغاية ، هل تريد بيع بيتكوين بسرعة وتحقيق ربح جيد؟ فقط اضغط على سعر السوق. اضغط على 100٪ ثم اضغط على بيع! انتهينا! تهانينا! جزاكم الله خيرا على التصرف بعدل و جزاكم الله خيرا على استخدام الكود F2IKGVD8 الذي يفيدنا أيضا. كلانا يحصل على خصم 10٪ من رسوم شراء البيتكوين. https://www.binance.com/en/register?ref=F2IKGVD8 شكرا لك! إذا كنت ترغب في شراء المزيد من البيتكوين ، فما عليك سوى إضافة المزيد من الأموال على بيانس وشراء المزيد من البيتكوين كما هو موضح في الخطوتين 2 و 3. تذكر الاشتراك عبر هذا الرابط ، حتى تحصل على خصم 10٪ على جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD82020-06-1304 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 16 | Cyber savvy workforces and getting cyber security strategy right - with Phil Zongo, Co-founder of the Cyber Leadership InstituteGar O’Hara is joined this week by Phil Zongo, author of The Five Anchors of Cyber Resilience. Phil has over 15 years experience in risk management and cyber security working with some of the biggest companies out there. His focus these days is on cyber resilience and his work within the Cyber Leadership Institute which he co-founded with Jan Schreuder and Darren Argyle.  Gar and Phil dive into a range of topics over the course of this episode with some terrific insights provided by Phil on how to achieve cyber savvy workforces, key pain points for CISO’s, ho...2020-05-2641 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 14 | Cyber threat intelligence and holistic cyber security strategy - with Kendal Watt, Senior Executive at Recorded FutureGar O’Hara catches up with his old colleague and cyber threat intelligence specialist, Kendal Watt. Kendal is a Senior Account Executive at Recorded Future, a company that provides businesses with real-time threat intelligence to help them proactively defend against cyber attacks.  Kendal’s impressive cyber security career spans over 20 years and 3 continents. He has worked with a range of companies from startups to multi-nationals and advised on holistic cyber security strategy, governance and compliance including recommending the most appropriate tools to fit requirements.  During this podcast, Gar and Kendal explore the exciting threat intelligence space...2020-05-1236 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 11 | Cyber security leadership and the state of the industry in APAC - with Shamane Tan, Cyber Risk Meetups founder and Executive Advisor at PrivasecIn a very special catchup episode, Garrett O’Hara sits down to speak with possibly the busiest person in cyber security, Shamane Tan. Shamane is the author of Cyber Risk Leaders, founder of Cyber Risk Meetups and an Executive Advisor for Privasec. Gar and Shamane discuss her journey from IT to cyber security, the success of her meetups and the mega (virtual) c-suite series she’s running, and the state of the cyber security industry throughout APAC.  Addendum: Shamane spotted that she mentioned 120 mitre attack techniques and that it's actually now over 170 (PRE-ATT &CK techniques... things move fast in the worl...2020-04-2124 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 10 | The ins, outs and ‘gotchas’ of cyber insurance - with Blake Deakin, Director and Principal Broker at Cyber Insurance AustraliaHost Garrett O’Harra catches up with Blake Deakin, Director and Principal Broker at Cyber Insurance Australia to discuss how cyber insurance is growing in popularity as the world adapts to large scale cyber attacks. Blake provides some insights into how cyber insurance works, what it covers and to what extent, the ‘gotchas’ you need to be aware of in policies, and shares tales from his extensive career in cyber insurance. If you have any questions regarding cyber insurance, you can get in touch with Blake by visiting www.cyberinsuranceaustralia.com.au2020-04-1428 minLex Cybernetica PodcastLex Cybernetica PodcastLex Cybernetica E15 - Cyber InsuranceWhile cyber threats have been around for decades, cyber insurance is still a fledgling, mainly American, $4-6 bn industry, that's estimated to grow to $20 bn by 2025.  In Israel, only 13% of local companies have cyber insurance, according to a June 2019 survey of executives, decision makers and insurance companies by the Israel National Cyber Directorate (Hebrew press release). The main reasons for not having such insurance are lack of awareness to cyber threats and a lack of financial viability. Many executives in the industry, agriculture, construction and retail said they didn’t know cyber insurance even existed. Wha...2020-04-0532 minNo Password RequiredNo Password RequiredCyber Forensics – Fighting Cybercrime with Digital EvidenceWith the rise of cybercrime comes the need for cyber forensics, and this episode’s guest, Dr. LeGrande Gardner has been in the field of digital evidence for more than 30 years. Currently, he is an instructor in the Criminology Department at the University of South Florida, where he also serves as the Director of the MS in Cybercrime degree program and administrates the Graduate Certificate Program in Digital Forensics.  Co-hosts Bill McQueen and Ernie Ferraresso joined Dr. Gardner for a discussion about digital evidence, its role in the justice community, and opportunities for the future. The field of...2020-03-1347 minNo Password RequiredNo Password RequiredHow is Artificial Intelligence Changing Cyber Crime?Cyber threat intelligence is a conceptual term with an international impact. Agencies around the world are racing to identify and stop cybercriminals from infecting and infiltrating networks to use our data against us. In this episode of No Password Required, Dr. Sagar Samtani, assistant professor of information systems and decision sciences at the University of South Florida, explains the cyber threat intelligence (CTI) life cycle and what you and/or your organization should do to help protect data assets and prevent cyberattacks.Data is the prime target of many cybercriminals, yet what data they are searching depends...2020-01-1737 minThe Get Cyber Resilient ShowThe Get Cyber Resilient ShowEp 4 | Digital twins and driving cyber resilience through rapid response - with Safi Obeidullah, CTO at Citrix APJIn this episode, Gregor Jeffery and Garrett O'Hara discuss downtime due to Office 365 disruption, cyber awareness training for the general public and Black Friday. Garret catches up with Safi Obeidullah, Field CTO of Citrix APJ, to talk about the concept of digital twins and driving cyber resilience through rapid response. If you enjoyed The Get Cyber Resilient Show, head over to GetCyberResilient.com, a new online destination for cyber professionals in Australia and New Zealand. Related articles: Customers are the target of cybercrime this Black Friday, but your business could...2019-12-1758 minLex Cybernetica PodcastLex Cybernetica PodcastLex Cybernetica E12 – The Human Factor in Cyber Crime and Cyber Security Mitigation Clone this book pageHacker Kevin Mitnick’s infamous social engineering escapades, where he’d call up companies and convince employees to surrender information he would later use to hack their systems, took advantage of people’s, rather than computer systems’, weaknesses. Cybersecurity is not a purely technical issue, but also, and arguably, mostly, a social one. One of the missions cyber criminologists have is to understand why some people become hacking victims while others don’t, and why hackers hack. Take, for example, the rudimentary system of password protection. If a service provides an initial default password and doesn’t require changing it, many people...2019-10-2223 minLex Cybernetica PodcastLex Cybernetica PodcastLex Cybernetica E11 – Ecosystem and Cyber ConflictsA healthy innovation ecosystem is crucial for states to handle cybersecurity threats. Traditional methods and procedures simply will not do. “After a couple of years, if you're successful, you'll have a solution, for example the Iron Dome”, explains Dr. Amit Sheniak of the Federmann Cyber Security Center, the Truman Institute, and the Davis Institute. “Until you did that long process, went through all the bureaucracy – the change already evolved, moved on, inflicted harm, and you couldn't mitigate it. Hence, governments understand today that the way to tackle those threats in terms of research and development is to create some kind of outso...2019-09-0127 minCyber Senate PodcastCyber Senate PodcastIndustry 4.0: Cyber Securing Legacy Systems across the BusinessPodcast: Cyber Senate PodcastEpisode: Industry 4.0: Cyber Securing Legacy Systems across the BusinessEpisode pub date: 2019-08-01Cyber Senate discusses Industry 4.0: Cyber Securing Legacy Systems across the Business with Andrew Kling, Director Cybersecurity and Software Practices, Schneider Electric. Andrew has been one of our guest speakers on our Industrial Control Cybersecurity USA conference for several years and brings a wealth of information to our community of subject matter experts. In this podcast, Cyber Senate and Andrew Kling dive deeper into the new ISA Global Strategic A...2019-08-0436 min