show episodes
 
LA’s #1 avant-garde personal development program. Experimental storytelling and comedy. Power, drugs, and mental health. The home of Ask a Sadist, Bite-Sized Erotic Thrillers, and the First Church of the Satanic Buddha. Levity saves lives. Your host is Emerson Dameron of Venice Beach, California., writer, competitive storyteller, occasional comedian, and possibly some sort of performance artist. I'll let the critics decide. Regularly scheduled episodes premiere on the first Wednesday of the ...
  continue reading
 
Artwork
 
Windbreaker is Second Wind's premier gaming podcast hosted by Yahtzee Croshaw, Marty Sliva & Sebastian 'Frost' Ruiz. Join the trio (and occasional guests) weekly to discuss everything industry wide from current news, to recent releases and wider trends. Second Wind is fully independent, employee-owned and fan-funded. Consider supporting us on Patreon for as little as $1/month at patreon.com/SecondWindGroup
  continue reading
 
Are you a people-helper or caregiver feeling overwhelmed, distant, cynical, and crispy around the edges? Join licensed professional counselor and certified coach, Leah Brown, to defeat burnout by learning how to manage stress and create deep, connective relationships with others, so that you can pursue your calling, providing light and warmth to others. In this podcast we cover: ~ Making stress your ally not your enemy (stress management) ~ Finding your voice ~ Developing burnout-resistance ...
  continue reading
 
This isn’t your typical management-skills podcast. Join Nash Consulting’s CEO Ethan Nash (an entitled millennial) and his Dad, the company founder, Mike Nash (a cynical gen X’er) as they sort through the plethora of leadership information out there in order to provide you practical, actionable ways to become a manager rockstar. If you manage people or you aspire to manage people, you should probably listen to this podcast. Since 1996, Nash Consulting has been helping managers not suck. Their ...
  continue reading
 
Artwork

1
Bob 'n Joyce Talk HR 'n OD

Bob Stapleton and Joyce Wilson-Sanford

Unsubscribe
Unsubscribe
Monthly+
 
The Bob 'n Joyce Talk HR 'n OD podcast, hosted by Bob Stapleton and Joyce Wilson-Sanford, is for Human Resources and Organizational Development change-makers committed to bold work in an era that calls for the skills, values and partnership of these two disciplines. Bob and Joyce are former HR and OD C-suite executives who share their successes, failures, and hacks. They believe that it's an exciting time for this work and give specifics around acquisitions, policy nightmares, and grand mome ...
  continue reading
 
Artwork

1
FORVM499

Bill Young

Unsubscribe
Unsubscribe
Monthly
 
True reports, imagined sketches and personal interviews with a common goal: to inspire insights into value creation (or destruction) in supply chains, transactions and behaviours. All borrowed from an unsettled career in sales, marketing, research targeting, product management, supply chains, procurement and consultancy. For obscure and arcane reasons, the average length of episodes is around 499 seconds Key words: eclectic; liberal; catholic; contrarian; provocative; inciteful (sic); divers ...
  continue reading
 
Artwork

1
The Developing Mind

The Developing Mind

Unsubscribe
Unsubscribe
Weekly+
 
Welcome to "The Developing Mind" podcast, hosted by Jaice de Celis and Shaun Wesley Crews. Our goal is to help you unlock your full potential by providing the mindset, skills, and strategies necessary to achieve a fulfilling and purposeful life. Each episode explores a variety of topics, including business, self-improvement, creativity, emotional intelligence, and more. Whether you're just starting your journey or you're already well into it, we invite you to join us as we share practical ti ...
  continue reading
 
A novel that disturbs you 160 years after it first appeared in print, The Picture of Dorian Gray by Oscar Wilde, has so much relevance and resonance even today. Dorian Gray is a strikingly handsome young man whose beauty attracts a debauched aristocrat Sir Henry Wotton. Dorian's picture has been painted by a talented artist Basil Hallward and Sir Henry becomes desperate to meet Dorian, though Basil himself is against it. Sir Henry persuades Dorian to pose for a picture painted by Basil and d ...
  continue reading
 
Loading …
show series
 
“Although we don’t often recognise it, the 21st century is a transhuman era, where everything that currently makes us human, from our brains and bodies, to our values and ways of life, is poised to be transformed or superseded.” In this episode, Caleb and Michael consider a contemporary philosophical issue through the lens of Stoicism. Transhumanis…
  continue reading
 
Dave DeWalt needs no introduction. A four-time CEO and currently the Founder and CEO of NightDragon, Dave collects, analyses, and disseminates more intelligence on the cybersecurity industry in a year than most of us ever will in a lifetime. We've invited Dave to Business Security Weekly to share some of that intelligence with our audience. Specifi…
  continue reading
 
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'…
  continue reading
 
Omkhar Arasaratnam is the General Manager of the Open Source Software Foundation (OpenSSF) and appears on the show to discuss memory safety, why re-writing software isn't always the best option, open-source software supply chains, and more! Segment Resources: https://openssf.org/blog/2024/02/26/openssf-supports-efforts-to-build-more-secure-and-meas…
  continue reading
 
LoveBites is a collection of samples, snippets, nougaty nuggets, gems, jewels, and other delights from Emerson Dameron's Medicated Minutes, LA's #1 avant-garde personal development program. Episodes premiere first Wednesdays of the month on KCHUNG and are then available as the only good podcast. The show is the work of Emerson Dameron, who is solel…
  continue reading
 
When you think of executive protection, you think of work related activities such as security details, travel planning, and other physical security protections. But in the world of Artificial Intelligence and DeepFakes, the risk landscape for executives goes far beyond work and into their personal lives. The home is now the new battle field and fam…
  continue reading
 
A majority of internet traffic now originates from APIs, and cybercriminals are taking advantage. Increasingly, APIs are used as a common attack vector because they’re a direct pathway to access sensitive data. In this discussion, Lebin Cheng shares what API attack trends Imperva, a Thales Company has observed over the past year, and what steps org…
  continue reading
 
In this conversation, Caleb speaks with Donald Robertson about Marcus Aurelius. They dive into what we know about the man and the critical episodes of his life. Donald shares his thoughts on the Marcomannic wars, whether Marcus Aurelius ordered the assassination of one of his top generals, and why he appointed Commodus as his successor. They end by…
  continue reading
 
March 12, 2024 Flourishing Flame: From Burning Out to Burning Bright Ep. 21: Personal Values: Where Did They Come From? Where Do They Go? Where do our personal values come from? How do they help us understand ourselves and others? What are personal values? How are they connected to our experiences? In this episode Leah will discuss some of the fact…
  continue reading
 
In this episode, Bob’nJoyce riffs on pervasive workplace exhaustion and what to do about it. The pressure on organizations for high performance has never been greater despite workers being less engaged and motivated. Bob’nJoyce provide 25 practical ideas that gets us moving and out of the doldrums. A couple of them include: • Eating a meal with peo…
  continue reading
 
Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks? Wait for the annual pen test? Probably not a good idea. In this segment, we'll talk with Michael Mumcuoglu about…
  continue reading
 
Tonight's episode is a tribute to Stanley Milgram—and a reminder to trust the experts, distinguished by their coats and clipboards. It includes: Gems, jewels, and avant-garde life advice to help you become who you are—if not someone far superior Advice from Ask a Sadist, LA's most feared agony columnist How to use meditation for dominance and reven…
  continue reading
 
Public information about exploits and vulnerabilities alone is not enough to inform prioritization, especially with the growing rate and variety of CVEs. Dan DeCloss, founder and CTO of PlexTrac, joins the show to discuss solving the challenges of risk prioritization to drive faster, more strategic assessment cycles. Spoiler: The key is adding cont…
  continue reading
 
The need for vuln management programs has been around since the first bugs -- but lots of programs remain stuck in the past. We talk about the traps to avoid in VM programs, the easy-to-say yet hard-to-do foundations that VM programs need, and smarter ways to approach vulns based in modern app development. We also explore the ecosystem of acronyms …
  continue reading
 
Every person’s uniqueness is shaped by their personality, their experiences, and their values. Over the past few weeks, Leah has explored different personalities in depth. Now we take a look at experiences, and how they can potentially impact each of us. Each of us has a library of experiences as unique to them as a thumbprint. The dynamics of thei…
  continue reading
 
“Everything has two handles, and it may be carried by one of these handles, but not by the other.” In this conversation, Caleb and Michael talk about these lines from Epictetus. They talk about how it points the way towards Stoic creativity, offensive and defensive Stoicism ,and role ethics. It’s a simple passage with a lot of depth. (00:31) Epicte…
  continue reading
 
The SEC's new cyber reporting requirements are forcing organizations to rethink their compliance and risk programs. No longer can compliance and risk be static, point in time assessments. Instead they need to match the speed of security which is dynamic and real-time. Couple the difference in speeds with whistleblowers and attack groups reporting n…
  continue reading
 
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions …
  continue reading
 
Jayson joins us to discuss how he is using, and social engineering, AI to help with his security engagements. We also talk about the low-tech tools he employs to get the job done, some tech tools that are in play, and the most important part of any security testing: Talking to people, creating awareness, and great reporting. The latest attacks agai…
  continue reading
 
"The higher up you go on the org chart, the more important it is that leaders are leading from a mindset of 'I work for you' not 'you work for me.'" In this episode, Mike is joined by Andy Thompson for a fun and enlightening discussion centered on the most important behaviors for executive teams in creating and maintaining healthy organizations. Th…
  continue reading
 
In this episode, Bob’nJoyce riff on ways to build resilience in the midst of significant workplace disruption. This includes everything from a major organizational overhaul to the sudden departure of a popular leader. The question is what practical steps can leaders and HR/OD practitioners do to ground employees and maintain business focus. Disrupt…
  continue reading
 
Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to …
  continue reading
 
In this podcast, Caleb speaks with professor Rob Colter. Rob has extensive experience teaching Stoicism in camps, universities, and prisons. He talks about the powerful idea of Stoic freedom, how he’s seen Stoicism make a difference in people’s lives, and why he calls himself a Socratic. Learn more about Wyoming Stoic Camp here. (00:51) Stoicism (0…
  continue reading
 
Personal development involves a commitment to strengthening areas where we may be lacking. And, for many of us that’s a struggle with conflict. In today’s episode Leah explores how the DISC assessment plays a crucial role in navigating conflicts and fostering personal development. The DISC assessment provides valuable insights into our communicatio…
  continue reading
 
Released on January 26, 2023, the NIST AI RMF Framework was developed through a consensus-driven, open, transparent, and collaborative process that included a Request for Information, several draft versions for public comments, multiple workshops, and other opportunities to provide input. It is intended to build on, align with, and support AI risk …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is…
  continue reading
 
After interviewing a member of the Nepal organizing committee ahead of opening day, I was excited about covering my first ever World Social Forum (WSF). He suggested that at least 30,000 and as many as 50,000 activists from over 90 countries would attend the three-day event. But day 1 disappointed me. The march through the centre of Kathmandu was l…
  continue reading
 
In this episode, Bob and Joyce take on the discomfort, sometimes embarrassment, of learning something new. There is a period where we often go backwards, stumble and fall when learning something new. The expectation of most people is that once the learning process begins, improvement quickly follows. When it doesn't go this way, disappointment and …
  continue reading
 
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021. Chris will discuss the relevance of intelligence and threat hunting today and how they work together. He will also talk about his EASY framework for creating impactful intelligence and its relation to h…
  continue reading
 
On this week’s episode of Windbreaker, Yahtzee, Marty and Frost discuss video game side quests, and how they personally engage with them. Second Wind is fully independent, employee-owned and fan-funded. Consider supporting us on Patreon for as little as $1/month at patreon.com/SecondWindGroupBy Nick Calandra
  continue reading
 
Join us in this illuminating podcast episode as we sit down with Wendy Nather, a distinguished thought leader and cybersecurity strategist, who has left an indelible mark on the ever-evolving landscape of digital security. Wendy's journey in cybersecurity is a narrative woven with expertise, innovation, and a deep understanding of the intersection …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on October 4, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses,…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on October 4, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses,…
  continue reading
 
Loading …

Quick Reference Guide