CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join Brian Contos and John Vecchi twice a month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information ...
…
continue reading
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
…
continue reading
1
Unlocking Resilient Cybersecurity Solutions in Healthcare and Beyond with Jason Taule
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO Jason Taule, who brings a wealth of experience and insights from his diverse career in the field as one of the first CISOs...ever. From working with federal agenci…
…
continue reading
1
Securing Critical Infrastructure: Challenges and Strategies with Sean Tufts
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40
Sean Tufts is in the house, and we ask him to go all the way back. All the way. From his origins to the evolving challenges and security needs in IoT and OT environments, particularly in critical infrastructure. Your hosts, Brian Contos and John Vecchi, engage in a thought-provoking conversation with special guest Sean Tufts from Optiv. The discuss…
…
continue reading
1
The Evolution of Hacking: From Counterculture to Cybersecurity with John Threat
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29
Content Warning: This episode contains explicit language and references to criminal activity. In this episode, Brian and John are joined by a very special guest—John Threat, also known as John Lee, a veteran of the Great Hacker War and known as "Corrupt" from the early 90s hacking group MOD (Masters of Deception). We dive into the fascinating origi…
…
continue reading
1
The "Original Cyber-Physical System": Legacy Devices and Key Trends in OT Cybersecurity
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59
She's no slacker. Danielle Jablanski has been an "expert" — she hates that word — in nuclear policy analysis (the "original Cyber-Physical System"), energy research, and now Nozomi Networks, where she plays the crucial OT cybersecurity strategist role. John Vecchi and Brian Contos pick Danielle's brain on the ever- and never-changing trends and cha…
…
continue reading
1
User-Centric Security: Focusing on UX, Design, and Embedding Security in Daily Routine
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security. Susan Peterson Sturm has dedicated most of her career to the energy industry, where her expertise lies in asset optimization and energy market trading. However, …
…
continue reading
1
Implants, Innovation, and the Human Condition: Embracing the Technological Evolution
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08
Find the line between man and machine with John, Brian, and guest Len Noe, CyberArk technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to a number of augmentations himself, is a self-taught cybersecurity expert with a unique background in the world of black hat and gray hat hacking. For…
…
continue reading
1
The Human Component: Vulnerabilities and Leadership with Patrick Benoit of Brinks
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced stage coaches to the security today, there's a focus on the physical. In today's episode, John and Brian talk to Patrick Benoit about people and Things. People are the solution as well…
…
continue reading
1
Hiding Inside Devices: Unveiling Vulnerabilities in Finance, Retail, and Logistics
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His naturally (self-described) paranoid nature drove him to constantly think about potential vulnerabilities and how to protect against them. Andres was already performing tests on his softw…
…
continue reading
1
Lessons from the Frontlines: Ron Kuriscak's Experiences with IoT Security Breaches
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02
Ron Kuriscak is here to share his extensive knowledge and experiences in the world of IoT security, and has he got some great stories! Ron brings over 20 years of experience in the field to the show. He's been in the trenches on a number of high-profile breaches, giving him a unique perspective on the challenges and importance of securing IoT devic…
…
continue reading
1
Live from Las Vegas: the Black Hat experience
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47
Huddled in a corner, away from the lights and sounds of the slots, John and Brian reminisce about the Black Hat USA conferences gone by and what trends and topics this one already holds. In this mini-sode on location, the dynamic duo discusses AI, xIoT, and the security of slots. But when you end up in Vegas yearly, you also inevitably get up to so…
…
continue reading
1
162: The Solomon Secret: Seven Principles of Financial Success from King Solomon, History’s Wealthiest Man
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30
Welcome to the Solomon Success Show! Listen in as Jason and Bruce Fleet talk about The Solomon Secret: Seven Principles of Financial Success from King Solomon, History’s Wealthiest Man. Using Solomon's life and teachings as a foundation, Bruce Fleet offers today's readers a unique, well-grounded, proven method of wise investing. Solomon was more th…
…
continue reading
1
It Only Takes One: Navigating Vulnerabilities with Dark Reading's EIC
45:28
45:28
Play later
Play later
Lists
Like
Liked
45:28
Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched the cybersecurity industry explode. She brings a unique perspective to the podcast in discussion with Brian and John as they pick apart the challenges faced in industrial environments to the vulnerabilities in healthcare organizations. Just as the world of t…
…
continue reading
1
161: The Ten Commandments of Successful Investing
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32
Welcome to the Solomon Success Show! Listen in as Jason talks about the Ten Commandments of Successful Investing. Follow Jason on TWITTER, INSTAGRAM & LINKEDIN Twitter.com/JasonHartmanROI Instagram.com/jasonhartman1/ Linkedin.com/in/jasonhartmaninvestor/ Call our Investment Counselors at: 1-800-HARTMAN (US) or visit: https://www.jasonhartman.com/ F…
…
continue reading
1
Unmasking Cybersecurity with Dr. Zero Trust: A Conversation with Chase Cunningham
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01
It's cyber all day, every day, with Chase Cunningham, Dr. Zero Trust himself. He joins John and Brian to delve into the complex and ever-evolving world of online security threats. With cyber-attacks becoming increasingly sophisticated and prevalent, understanding the strategies and technologies that can safeguard our digital assets has never been m…
…
continue reading
1
Protecting your network from insider threats with Tammy Hawkins
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07
In this episode, Tammy Hawkins, a fraud specialist with over 20 years of experience, warns of the growing threat of cyberattacks on IoT devices and emphasizes the need for organizations and individuals to take proactive security measures. She offers critical advice and recommendations on how the audience — that's you! — can protect themselves again…
…
continue reading
1
SaaSy Services and Combatting Disruption with Vignesa Moorthy
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23
Brian and John sit down to the mic with Vignesa Moorthy. With a seasoned background in telecommunications and cybersecurity, Vignesa Moorthy is a forward-thinking innovator in the industry. Running a successful Singapore-based telco company, he has expanded operations across Southeast Asia and evolved his company's focus to cybersecurity services. …
…
continue reading
1
The Privacy Paradox with Anna Maria Mandalari
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
Are you tired of feeling helpless and exposed when using IoT devices? Have you been told to simply 'be careful' without any real solutions? In this episode, we get our ears on some expert insights and practical solutions to help you take control of your privacy. From understanding the risks and vulnerabilities to mastering cybersecurity challenges …
…
continue reading
1
The Next Wave: AI, Infrastructure, and IoT with Mark Weatherford
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59
In this episode, John and Brian talk with Mark Weatherford, a skilled cybersecurity veteran with a diverse background in both government and private sectors. Having held positions such as CISO for California and Colorado and serving in the Obama administration as the Deputy Under Secretary for Cybersecurity, Mark has a unique perspective on IoT sec…
…
continue reading
1
Hackers, Researchers, and Industry Tackle Security Challenges with IoT Village
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01
In this episode, Brian and John dive into the world of Capture the Flag competitions in the realm of cybersecurity. Our special guest, Rachael Tubbs from IoT Village, discusses the rise of CTFs and how they are becoming a popular feature at cybersecurity conferences like Defcon. We explore how IoT Village is leading the way in making these conferen…
…
continue reading
1
Mastering IoT Security with Julie Tsai: Lessons from a Cyber Pro
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56
In this episode, Brian and John speak with Julie Tsai. Julie Tsai is a seasoned cybersecurity expert with over 25 years of experience in Silicon Valley, navigating the complex world of securing IoT environments. With a diverse background that includes a liberal arts degree and a minor in economics from Stanford, Julie has honed her skills in system…
…
continue reading
1
Uncovering the Hidden Security Threat of IoT with Jay Leek
38:15
38:15
Play later
Play later
Lists
Like
Liked
38:15
Unlock the secrets to secure your connected world with powerful IoT security solutions. "If you don't assume that there's going to be some level of detect and respond kind of fail back mechanism, then you're going to come up and be very disappointed one day because you didn't build those layers of defense in, but you should 100% lead with preventio…
…
continue reading
1
The IoT Security Challenge: How Steven Edwards Tackles the Extended IoT Attack Surface
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04
When Steven Edwards, an IT Guy turned Security Analyst, discovered the unexpected challenge of securing an expansive attack surface that includes refrigerators, vending machines, and scanners across multiple private address spaces, he had to be tenacious and curious to protect his organization from attack. "No matter what the tragedy is, it's behol…
…
continue reading
1
Getting Our Hands Around IoT Security: Dave Bang's Journey
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38
When tech industry veteran Dave Bang discovers that vendors have been using their phones to gain access to secure networks, he embarks on an urgent mission to secure the OT networks and prevent an attack before it's too late. In this episode, you will learn about leveraging the strengths of OT and IT security to build a comprehensive cybersecurity …
…
continue reading
1
Data Security: Eric Adams' Journey into Fintech and FedRAMP
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35
In this episode, Brian and John speak with Eric Adams, a 25-year security veteran. Eric embarks on a journey to protect data from attackers, navigating the complex process of FedRAMP Authorization and cyber liability insurance to ensure secure access for government and military personnel. "Data is like the new gold. You're able to do a lot of power…
…
continue reading
1
Shifting Left: Vendor Responsibility for Cybersecurity ft. Kathleen Moriarty
44:45
44:45
Play later
Play later
Lists
Like
Liked
44:45
"Discover how to hold vendors accountable for their cybersecurity responsibility and protect your business from attack." In this episode, Brian and John are back, this time with Kathleen Moriarty discussing how to hold vendors accountable for their cybersecurity responsibility and protect your business from attack. Kathleen Moriarty is a cybersecur…
…
continue reading
1
Navigating xIoT Risks with Steve Lodin: A Security Journey
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44
Steve Lodin, a veteran of the cybersecurity industry, embarks on an ambitious mission to protect millions of identities from hackers while his team strives to maintain high-security standards and compliance with regulators. "The more that we can identify, document, and share, the less attacks that are hitting our colleagues and our peers in the ind…
…
continue reading
1
Uncovering the Risks of Nation State xIoT Hacking with Bill Crowell
43:25
43:25
Play later
Play later
Lists
Like
Liked
43:25
Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview! "An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell Bill Crowell is a cybersecurity…
…
continue reading
1
When Ransomware Hits During a Health Emergency
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43
Jeffrey Vinson, Senior VP and CISO at Harris Health System, has held leadership positions for much of his life, from military to federal to state government. It was a natural progression for him to move from IT to what he calls a “Pure Cyber Guy.” Vinson joins Brian and John on the show today to answer the question, “What makes up your special forc…
…
continue reading
1
Convergence of Things: Tech Trends Meet for the Good and the Bad
42:37
42:37
Play later
Play later
Lists
Like
Liked
42:37
Dr. Ulf Lindqvist reports in from the Computer Science Laboratory at SRI International where he’s the Senior Technical Director managing research and development. Focusing on critical infrastructure systems, including specialized systems in the Internet of Things, Dr. Lindqvist established and leads SRI’s infrastructure security research program. Y…
…
continue reading
1
Cybercriminals and Nation-States Look to IoT as the New Frontline
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58
Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestsellin…
…
continue reading
1
Service-Based Cybercrime Seeks Persistence in IoT
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20
DJ Goldsworthy, Vice President of Security Operations and Threat Management at Aflac, joins the podcast for episode number 1. Brian and John dig into DJ’s background in cybersecurity research and development, and his current role at Aflac where he oversees 8 teams. He’s a leader, but he’s really hands-on, keeping his technical edge. How do you make…
…
continue reading
1
IoT Security Podcast from Phosphorus Cybersecurity
1:48
1:48
Play later
Play later
Lists
Like
Liked
1:48
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join Brian Contos and John Vecchi twice a month as they speak with the biggest names and the…
…
continue reading
1
160: Russia’s War on Ukraine: Peter Zeihan & Russian New World Order, NATO, Economic & Agricultural Fallout
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55
Today, Jason welcomes geopolitical expert Peter Zeihan to the show today to discuss the ongoing war between Russia and Ukraine. Peter discusses Putin’s motivations, Russia’s demographics and energy exports and if the response from the West will be enough to stop this conflict. What are the short and long term economic and agricultural implications …
…
continue reading
1
159: Dr. Peter McCullough, Mandates, Misinformation, Censorship & The Thought Police
38:13
38:13
Play later
Play later
Lists
Like
Liked
38:13
Join Jason today as he welcomes Dr. Peter McCullough, MD. Dr. McCullough has over 50 peer-reviewed papers and is an extremely credible person in the medical field. You can also watch the video NOT on YouTube (having been censored) but on Jason’s other video sites: JasonHartman.com/Rumble JasonHartman.com/Bitchute JasonHartman.com/Odysee After recei…
…
continue reading
1
158: Mark Victor Hansen, Ask! The Bridge From Your Dreams to Reality, Jason Hartman University Live Event
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50
Don't forget to register for the Jason Hartman Live virtual event on April 1 & 2! Learn how to optimize your portfolio, evaluate investments like a pro and so much more! Go to JasonHartman.com now! And today, Jason welcomes the legendary Mark Victor Hansen, best selling author, real estate investor and entrepreneur! He talks today about his new boo…
…
continue reading
All things AppSec and Purple Teaming with Tanya Janca, founder of the We Hack Purple community platform. --- Send in a voice message: https://podcasters.spotify.com/pod/show/cyberspeakslive/message
…
continue reading
1
Tribe of Hackers - Blue Team Edition
1:04:54
1:04:54
Play later
Play later
Lists
Like
Liked
1:04:54
In this lively episode we speak with several contributing authors of the wildly popular TRIBE OF HACKERS - BLUE TEAM EDITION book. --- Send in a voice message: https://podcasters.spotify.com/pod/show/cyberspeakslive/message
…
continue reading
1
ICS, DFIR and PancakesCon with Lesley Carhart (Hacks4Pancakes)
1:13:33
1:13:33
Play later
Play later
Lists
Like
Liked
1:13:33
Lesley Carhart (@hacks4pancakes) joins us for the reboot of CyberSpeaksLIVE featuring Alethe Denis (@alethedenis) as our new co-host. Lesley is a Principal Industrial Incident Responder at the industrial cybersecurity company Dragos, Inc. She has spent more than a decade of her 20+ year IT career specializing in information security, with a heavy f…
…
continue reading
1
156: 2021 SMART Goals! 5-Year Investment Plan
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56
New Year, New Goals, Same proven asset class! Jason Hartman invites you to celebrate with him another fantastic year of prosperity for all real estate investors practicing some of Hartman’s proven investment techniques. Following the celebration, we must look for the “what next” plan or goal. How do you build your goals? Do you write them down? Do …
…
continue reading
1
155: Successful Short-Term Rental Location St. Augustine, Self-Driving Cars, Housing Inventory, Rabbi Moffic
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18
Jason Hartman discusses with Rabbi Moffic the successes and fears of Moffic's short-term-rental (STR) purchase, taking place at the outset of the pandemic. The STR market was divided into great success and great struggle through the coronavirus pandemic. The automobile once changed how we lived. As we move into a period where cars are self-driving,…
…
continue reading
1
154: The Price of Panic, The Human Advantage, Infiltrated by Jay W. Richards
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41
Jay W. Richards is an Assistant Research Professor in the Busch School of Business and Fellow of the Institute for Human Ecology at The Catholic University of America. Jay W. Richards talks with Jason Hartman about a few areas of poor practice when dealing with COVID-19. He breaks down how some of the panic began and was then exacerbated by the med…
…
continue reading
1
153: Giving Thanks - The Power of Gratitude
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35
Jason Hartman, Rabbi Moffic, and everyone here in the Hartman Network wish you a Happy Thanksgiving! We thank you all for being devoted listeners, active investors, and top-tier landlords. www.jasonhartman.com pandemicinvesting.com/blackfriday
…
continue reading
1
152: The Politics of Envy, Radical Social Movements by Anne Hendershott
20:55
20:55
Play later
Play later
Lists
Like
Liked
20:55
Do you believe you are supposed to hate rich people? Is this the envy culture that we have moved towards? Anne Hendershott joins Jason Hartman in this discussion on social changes directing how we approach business. Social media is the envy farm, causing tremendous anxiety and fueling the fire of desire that does more harm than good. The Politics o…
…
continue reading
1
Special Announcement: Pandemic Investing Summit
2:52
2:52
Play later
Play later
Lists
Like
Liked
2:52
Zoom Virtual Event: October 17th, 2020 Early Bird Admission: PandemicInvesting.com Get Instant access to Jason Hartman’s newest report, you'll learn… The modified square root shaped recovery Understanding the rare economic malady of supply/demand shock Generational PTSD and what it means to you & society The six lifestyle mega-trends that will chan…
…
continue reading
1
151: Intellectual Dark Web & The New Nationalism Dr. Steve Turley
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26
Jason Hartman is joined by Dr. Steve Turley, NY Times bestselling author of many books including, The New Nationalism, How the Populous Right is Defeating Globalism and Awakening A New Political Order. Dr. Turley discusses the breaking up of the world, and reverting to a cultural appetite that differs from the one size fits all ideology of modernit…
…
continue reading
1
OSINT-Powered Social Engineering with Joe Gray (The Lost Tapes)
1:18:16
1:18:16
Play later
Play later
Lists
Like
Liked
1:18:16
Joe Gray is a passionate Information Security professional, mentor, and public speaker on the topics of OSINT and Social Engineering techniques and methodology. During this episode, Joe shares his insights with our listeners on the tools and techniques to become a social engineering professional using OSINT-powered methods. Please note, this episod…
…
continue reading
1
Giving a Winning Conference Talk with InfosecWar & Ell_o_Punk
1:21:18
1:21:18
Play later
Play later
Lists
Like
Liked
1:21:18
In this episode our hosts, Duncan McAlynn (@infosecwar) and @Ell_o_Punk, discuss what it takes to give a winning talk at industry conferences, along with questions & answers from our live online audience. Topics covered include: Background Story Secrets of a Great Talk Choosing Your Topic Writing a Great Abstract Audience Participation Tips for Sli…
…
continue reading
1
Offensive Security OSCP Exam Review
1:04:27
1:04:27
Play later
Play later
Lists
Like
Liked
1:04:27
CyberSpeaksLIVE with Jim O'Gorman of Offensive Security (@offsectraining) and our panel of #OSCP certified experts discuss everything you need to know to prepare yourself for the exam. Our panel includes: Blind Hacker, @TheBlindHacker John Dorobek, @_zenmaster_ iansecretario, @Iansecretario_ Roger Whyte, @teckkie2k (candidate) Learn about the OffSe…
…
continue reading
1
150: Loneliness Epidemic & THE LIFE YOU WERE BORN TO LIVE, Finding Purpose by Dan Millman
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02
Dan Millman, author of The Life You Were Born To Live, is here to discuss the loneliness epidemic as well as his recent book. The question that surrounds this discussion is, "What do I want to look back on five years from now, when this is behind us?" Dan and Jason discuss the challenges of constraints but the creativity that comes from it. How wil…
…
continue reading
1
Mental Health in InfoSec with Alethe Denis
55:14
55:14
Play later
Play later
Lists
Like
Liked
55:14
::TALKING POINTS:: Mental Health in the Hacking Community and Globally Social Engineering Your Own Mindset Innocent Lives Foundation TraceLabs Mental Health and Wellness for Volunteers Tribe of Hackers Alethe Denis is a social engineer who specializes in open-source intelligence (OSINT) and phishing, specifically voice elicitation or phishing over …
…
continue reading