Player FM - Internet Radio Done Right
22 subscribers
Checked 12d ago
Aggiunto cinque anni fa
Contenuto fornito da Chris Glanden. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Chris Glanden o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !
Vai offline con l'app Player FM !
Podcast che vale la pena ascoltare
SPONSORIZZATO
S
State Secrets: Inside The Making Of The Electric State


Host Francesca Amiker sits down with directors Joe and Anthony Russo, producer Angela Russo-Otstot, stars Millie Bobby Brown and Chris Pratt, and more to uncover how family was the key to building the emotional core of The Electric State . From the Russos’ own experiences growing up in a large Italian family to the film’s central relationship between Michelle and her robot brother Kid Cosmo, family relationships both on and off of the set were the key to bringing The Electric State to life. Listen to more from Netflix Podcasts . State Secrets: Inside the Making of The Electric State is produced by Netflix and Treefort Media.…
H4unt3d Hacker
Manage episode 351768373 series 2798298
Contenuto fornito da Chris Glanden. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Chris Glanden o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Mike Jones AKA the H4unt3d hacker, is a security researcher who formerly hacked underGROUND groups. He served in the military for several years within SIGINT operations. Mike started the H4unt3d hacker podcast from scratch, wanting to give people a unique point of view about cybersecurity. He has built a global community of members from different walks of life, religions, backgrounds and disciplines. Mike transends into BarCode to discuss his origins, Hacktivism, SIGNIT, in the military, pod...
…
continue reading
123 episodi
Manage episode 351768373 series 2798298
Contenuto fornito da Chris Glanden. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Chris Glanden o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Mike Jones AKA the H4unt3d hacker, is a security researcher who formerly hacked underGROUND groups. He served in the military for several years within SIGINT operations. Mike started the H4unt3d hacker podcast from scratch, wanting to give people a unique point of view about cybersecurity. He has built a global community of members from different walks of life, religions, backgrounds and disciplines. Mike transends into BarCode to discuss his origins, Hacktivism, SIGNIT, in the military, pod...
…
continue reading
123 episodi
Tutti gli episodi
×In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements. TIMESTAMPS: 00:00 - Introduction to Cybersecurity Journey 03:23 - The Path to OSCP Certification 06:13 - Transitioning to Consulting in Cybersecurity 09:14 - Understanding Client Needs in Cybersecurity 11:56 - Leadership in Red Team Village 14:32 - NCAE Cyber Games and CTF Design 17:26 - Creating Effective CTF Challenges 20:04 Resources for Aspiring CTF Participants 22:57 Content Development for Cybersecurity Education 25:49 Unique Experiences in Cybersecurity Events 28:25 Closing Thoughts and Future Engagements SYMLINKS: [Maltek Solutions Website] - https://malteksolutions.com/ A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi. [Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/ Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends. [Red Team Village (RTV) Website] - https://redteamvillage.io A nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences. [Red Team Village Discord] - https://discord.com/invite/redteamvillage The official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities. [Red Team Village X (Twitter)] - https://twitter.com/redteamvillage_ RTV's official social media account for announcements, event updates, and cybersecurity-related discussions. [MetaCTF Website] - https://metactf.com A platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges. [CTF Time Website] - https://ctftime.org A website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors. [Hack The Box Website] - https://www.hackthebox.com A cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills. [TryHackMe Website] - https://tryhackme.com An interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners. CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com…
B
BarCode

1 Silent War 1:03:08
1:03:08
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto1:03:08
Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape. Derek Fisher is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today. In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children's books and shares insights on future trends like robotics and quantum computing. TIMESTAMPS: 00:00 Introduction to Cybersecurity and Derek Fisher's Background 10:09 The Impact of AI and Cloud on Cybersecurity 19:19 Understanding Threat Modeling in Cybersecurity 27:47 Navigating the Security Hiring Process 35:48 Navigating the Job Market in Cybersecurity 36:40 Breaking into Cybersecurity: Finding Your Path 44:16 Bridging the Gap: Academia vs. Industry 47:24 Inspiring the Next Generation: Writing for Kids 50:46 The Challenges of Parenting in a Digital Age 54:08 Future Trends in Cybersecurity and Technology 56:52 Creating a Cybersecurity-Themed Bar: A Fun Concept SYMLINKS: [Derek Fisher's LinkedIn Profile ]- https://www.linkedin.com/in/derek-fisher-sec-arch Connect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity. [Securely Built Website] - https://www.securelybuilt.com/ Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. [Secure Work Coach] - https://www.secureworkcoach.com/about Access specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering [Derek Fisher's Udemy Instructor Profile] - https://www.udemy.com/user/derek-fisher-8/ Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation. [Ultimate Cybersecurity Course & CISSP Exam Prep] - https://www.udemy.com/course/ultimate-cyber-security-course/ Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher. [The Application Security Program Handbook] - https://www.securelybuilt.com/media Learn about building an application security program through this comprehensive guide authored by Derek Fisher. [Alicia Connected Series ] - https://www.aliciaconnected.com/ Discover the "Alicia Connected" children's book series by Derek Fisher, focusing on safe technology usage for kids. [Securely Built YouTube Channel] - https://www.youtube.com/@securelybuilt Watch cybersecurity tutorials and discussions on the Securely Built YouTube channel. [Derek Fisher's Articles on SecureWorld News] - https://www.secureworld.io/industry-news/author/derek-fisher Read articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.…
B
BarCode

1 Reality Defaced 1:02:14
1:02:14
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto1:02:14
In this conversation, Perry Carpenter discusses the evolution of misinformation and disinformation in the age of AI and deepfakes. He explores the psychological principles that make individuals susceptible to deception, the ongoing arms race between detection and deception, and theregulatory landscape surrounding these issues. Carpenter emphasizes the importance of understanding narratives and cognitive biases in combating misinformation while also highlighting the challenges posed by rapidlyadvancing technology. In this conversation, Perry Carpenter discusses the implications of deepfakes and AI in cybersecurity, emphasizing the concept ofthe liar's dividend, the need for cognitive awareness training, and the ongoing arms race between AI-generated deception and truth verification. He highlights the erosion of trust in media and the necessity of understanding themotivations behind AI-generated content. Carpenter also shares insights on the future of deepfakes, ethical challenges, and the importance of focusing on the'why' behind AI technologies. TIMESTAMPS: 00:00 Introduction to Perry Carpenter and His Work 02:37 The Evolution of Misinformation and Disinformation 06:42 The Arms Race: Detection vs. Deception 12:00 The Impact of Deepfakes on Society 17:41 Psychological Principles Behind Deepfakes 23:16 Regulatory Landscape and Future Implications 34:59 The Liar's Dividend and Its Implications 36:09 Defending Against AI-Powered Threats 40:06 The Arms Race of AI and Cybersecurity 46:17 Erosion of Trust in Media 52:38 The Future of Deepfakes and Society 57:38 Understanding the Why Behind AI and Deception SYMLINKS: [LinkedIn – Perry Carpenter Profile] - https://www.linkedin.com/in/perrycarpenter/ Perry Carpenter’s professional LinkedIn profile details his background in cybersecurity, his work on AI-generated deception, and his industry engagements. It serves as a hub for networking and accessing more informationon his projects. [X (formerly Twitter) – Perry Carpenter Profile] - https://x.com/perrycarpenter?lang=en Perry Carpenter’s profile on X is where he shares real-time insights, commentary on cybersecurity trends, and updates related to his work in AI and digital deception. [Perry Carpenter’s Book “FAIK”] - https://www.thisbookisfaik.com/ This global retailer offers Perry Carpenter’s book, Fake:A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deception , which explores modern digital deception andcybersecurity. [YouTube – The Fake Files Channel] - https://www.youtube.com/@theFAIKfiles YouTube hosts Perry Carpenter’s channel, “The Fake Files,” where he shares AI tutorials, deepfake detection tips, and cybersecurity insights related to synthetic media.…
B
BarCode

In this engaging conversation, Chris Glanden interviews Mariano Mattei, VP of Cybersecurity and AI at Azure Solutions. Mariano shares his extensive background in software engineering and cybersecurity, emphasizing the importance of metrics in communicating security risks to executive teams. He discusses the challenges organizations face in quantifying security effectiveness and adapting metrics to the rapidly evolving threat landscape, particularly with the rise of AI. The conversation also e...…
B
BarCode

In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understandin...…
Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stan...…
B
BarCode

1 Ghost Protocol 1:04:18
1:04:18
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto1:04:18
In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking,...…
B
BarCode

In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on secu...…
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of...…
Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Secur...…
SESSION TITLE: BCP LIVE on Rendezvous Yacht II RECORDED: 9/26/24 VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/ LOCATION: Philadelphia, PA GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia SPONSOR: Philly Tech Council ABOUT GUESTS: Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previousl...…
B
BarCode

Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she share...…
B
BarCode

Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era. Len shares his personal and professional evolution, describing...…
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub. The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From ...…
B
BarCode

A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements. We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation. TIMESTAMPS: 00:16:00 - Nav...…
Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.