show episodes
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Loading …
show series
 
Amanda Berlin is the Lead Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author of a Blue Team best practices book called "Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O'Reilly Media. She is a co-host on the Brakein…
 
Discussion on Mergers and acquisitions processes On being acquired, but also if you’re acquiring a company Best Practices Best Practices of Mergers and Acquisitions (workforce.com) Best Practices In Merger Integration - Institute for Mergers, Acquisitions and Alliances (IMAA) (imaa-institute.org) The Role of Information Security in a Merger/Acquisi…
 
Danny Akacki is just a storyteller perpetually looking for a stage. He loves nothing more than attending conferences, giving talks, writing blogs, and finding new ways to reach as many people as he can to educate about cybersecurity. For him, there is no greater satisfaction than community building. Danny has been fortunate enough to spend his care…
 
Stories in this episode: -Untitled - Listener named A. -Be Careful Who You Rent A Room From - Calm_Traveler. -Untitled - Andrea. -The Scariest Six Months Of My Teenage Life - Ashley McGlothren. Check Out Ashley's podcast Southern Haunts at podpage.com/southern-haunts or wherever you get your podcasts. Check True Crime Obsessed truecrimeobsessed.com…
 
There may instances where it may not be right to pursue a collaboration. In this episode, you will learn the circumstances, the times, the moments when you should decide if it is the right time to collaborate with others. Typically, I share about all of the reasons why one of the most powerful ways to [...] The post [Solocast] Is Collaboration Ever…
 
Secure RPC issue - Netlogon Domain Controller Enforcement Mode is enabled by default beginning with the February 9, 2021 Security Update, related to CVE-2020-1472 – Microsoft Security Response Center How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (microsoft.com) Netlogon Domain Controller Enforcement …
 
Ryan K. Louie, MD, Ph.D. is a board-certified psychiatrist focusing on the mental health impact of cybersecurity, and the psychiatry of entrepreneurship. Ryan received his MD and Ph.D. degrees from the Stanford University School of Medicine and completed residency training in psychiatry at the University of Hawaii Department of Psychiatry. Ryan com…
 
Stories in this episode: -God Will Spite You - Charrlotte. -Date From Hell: Break and Enter - Savannah. -Ex Boyfriend From Hell - Anonymous. -Untitled - Shreethigha. -About A Creepy Cop - JulesAwe. -Encounter With A Spree Killer - Anonymous. -The Grey Truck - Mama Craft. All of the stories you've heard this week were narrated and produced with the …
 
Shannyn Lee is the Win Without Pitching Director of Coaching. She spent a decade in senior marketing and communication roles in Fortune 500 companies before moving to a business development leadership role at a well-regarded Seattle design firm. She also spent four years at Catapult New Business where she worked with agencies of various disciplines…
 
Dream Doxxed: Minecraft YouTuber Dream Doxxed Following Speedrun Controversy (screenrant.com) Def Noodles on Twitter: "STANS TAKING IT TOO FAR: Dream doxed after posting a picture of his kitchen on his 2nd Twitter account. Dream has not published statement about situation yet in his public accounts. https://t.co/QuKpIYRODQ" / Twitter Osint issues… …
 
Stories in this episode: -Huge Man Broke Into My House - Ashley. -My Downstairs Neighbor Almost Killed Me - Ronda Churchill. -Whatever Happened In That House - DaisyCats. -I Got Robbed By The Same People Who Murdered My Friends - Nimrod Pooptart. -911 Dispatcher Almost Kidnapped Me On NYE - Rose. -The Time My Sister And I Almost Got Mugged - Alyssa…
 
It can feel like the PR machine was not built for you, especially as a woman entrepreneur, but there are so many things you can do...so many ways to be visible... that will feel right for you. Listen here for ways to build out your network, build your community and gain new PR insight for [...] The post [Solocast] Why The Current PR Machine Wasn’t …
 
Bill Hudenko, Ph.D. has significant experience in the fields of both mental health and technology. Dr. Hudenko is a licensed psychologist, a researcher, and a professor who holds a joint appointment as a faculty member at Dartmouth's Department of Psychological and Brain Sciences and Dartmouth’s Geisel School of Medicine. His research focuses on th…
 
Stories in this episode: -Cafeteria Troll - Sydney. -Creepy Pedo-Peeper - Delores the Finkasaurus. -Almost Kidnapped - StoneyWall. -The Devil And His Date - Barbie Streusel. -Chased In The Woods - Hannah. All of the stories you've heard this week were narrated and produced with the permission of their respective authors. Let's Not Meet: A True Horr…
 
In this episode, we will dive into the things you DO NOT have to do to move your business forward. The post [Solocast] What You Do NOT Need To Do To Move Your Business Forward {Rebroadcast} appeared first on Amanda Berlin -- Communication Strategy and Business Consulting.By Amanda Berlin, Entrepreneur, Publicity Pro, News Junkie
 
Daniel Wood is the Associate Vice President of Consulting at Bishop Fox, where he leads all service lines, develops strategic initiatives, and has established the Applied Research and Development program. Daniel has over 15 years of experience in cybersecurity and is a subject matter expert in red teaming, insider threat, and counterintelligence. D…
 
Stories in this episode: - He Tapped On The Window - Megan. - A Scary Night In Seattle - Julia. - Untitled - Jenn Knapp. - Run Like Your Life Depends On It - Kaylee. - Come Alone and Don't Tell Anyone Where You're Going - Susan. - Bronco Man - Daphne. All of the stories you've heard this week were narrated and produced with the permission of their …
 
In this episode, we dive into the 5 things to know about your beautiful, unique and life-changing message. The post [Solocast] 5 Things To Know About Your Message {Rebroadcast} appeared first on Amanda Berlin -- Communication Strategy and Business Consulting.By Amanda Berlin, Entrepreneur, Publicity Pro, News Junkie
 
Jasson Casey is the CTO of Beyond Identity, a passwordless identity management provider. He also serves as a Fellow in CyberSecurity with the Center for Strategic and International Studies (CSIS) and the National Security Institute (NSI). Previously, Jasson was CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity, Founder and Execut…
 
Stories in this episode: - Mysterious Trail of Candle Wax - Elliott. - An Inmate Was Convinced I Was His Estranged Wife - Kate. - Mr. C - Ashley. - They Gave Me The Creeps From The Moment I Saw Them - Jaimie. - Creepy Man Tried To Kill Me and My Friend - Anarchistswordfish. - Untitled - Jen. - I'm Not Going To Hurt You - A.B. All of the stories you…
 
Lisa Hesse is a national board certified professional health and wellness coach and yoga instructor. Her main purpose is to help her clients achieve their health and wellness dreams and create sustainable, positive and strength-based super powers of joyful living. Lisa believes that our wellbeing relies on the connection between our physical and em…
 
End of year podcast Blumeria sponsorship NEWS: IT company SolarWinds says it may have been hit in 'highly sophisticated' hack | Reuters FireEye hacked: US cybersecurity firm FireEye hit by 'state-sponsored' attack - BBC News https://krypt3ia.wordpress.com/ - 16 december 2020 Microsoft flexing muscle to shutdown c2: Microsoft unleashes ‘Death Star’ …
 
John Hammond is a Security Researcher at Huntress as well as a cybersecurity instructor, developer, red teamer, and CTF enthusiast. John is a former Department of Defense Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login