Artwork

Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Top Cyber Risks in Higher Education

58:17
 
Condividi
 

Manage episode 409288719 series 3370503
Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks
  • Education and awareness are key
  • Collaboration and information sharing between organizations are essential
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

Chapters

  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Information Sharing in Cybersecurity
  • 22:12 Challenges of Cybercrime and Law Enforcement
  • 28:15 Top Cyber Threats in Higher Education
  • 30:11 Threats and Vulnerabilities
  • 34:25 Creating a Student-Run SOC
  • 38:02 Breaking into Cybersecurity
  • 46:03 The Broad Scope of Cybersecurity
  • 50:47 Generative AI and its Impact
  • 51:32 Upcoming Events and Podcast

News on Clemson University and their Cyber transformation

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.


  continue reading

187 episodi

Artwork
iconCondividi
 
Manage episode 409288719 series 3370503
Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks
  • Education and awareness are key
  • Collaboration and information sharing between organizations are essential
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

Chapters

  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Information Sharing in Cybersecurity
  • 22:12 Challenges of Cybercrime and Law Enforcement
  • 28:15 Top Cyber Threats in Higher Education
  • 30:11 Threats and Vulnerabilities
  • 34:25 Creating a Student-Run SOC
  • 38:02 Breaking into Cybersecurity
  • 46:03 The Broad Scope of Cybersecurity
  • 50:47 Generative AI and its Impact
  • 51:32 Upcoming Events and Podcast

News on Clemson University and their Cyber transformation

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.


  continue reading

187 episodi

Alle episoder

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida