Podcast by John Izzi
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies and businesses like yours.
…
continue reading
1
BETRAYAL IN BERLIN- OPERATION GOLD- WITH AUTHOR STEVE VOGEL
1:01:38
1:01:38
Play later
Play later
Lists
Like
Liked
1:01:38
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
TIER ONE OPERATOR CHATS WITH MACV SOG DICK THOMPSON
1:41:16
1:41:16
Play later
Play later
Lists
Like
Liked
1:41:16
By Circle Of Insight Productions
…
continue reading
1
US NAVY SAILOR ARRESTED AND CHARGED WITH ESPIONAGE
4:30
4:30
Play later
Play later
Lists
Like
Liked
4:30
By Circle Of Insight Productions
…
continue reading
1
TIERONE OPERATOR SHAUN TAYLOR JOINS ME WITH MACV SOG JOHN STRYKER MEYER1
1:26:34
1:26:34
Play later
Play later
Lists
Like
Liked
1:26:34
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
TIER ONE OPERATOR DISCUSSES OPERATION GOTHIC SERPENT
1:14:52
1:14:52
Play later
Play later
Lists
Like
Liked
1:14:52
By Circle Of Insight Productions
…
continue reading
1
Chief Scapegoat Officer: How to Keep "Fighting the Good Fight" for Ethical Security Standards
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42
What does CSO stand for at your organization? Is it short for Chief Security Officer... or Chief Scapegoat Officer? In this episode, Ivanti CSO Daniel Spicer talks about how he never thought he'd be a CSO, and the unique pressures that security executives face from their own internal leadership teams and external regulations or (worse) insurance co…
…
continue reading
1
THE BATTLE BETWEEN GREEN BERETS AND ALIENS IN AN UNDERGROUND BASE IN DULCE NEW MEXICO2
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02
By Circle Of Insight Productions
…
continue reading
1
THE SPY WHO NEVER WENT HOME- OPERATION ENIGMA
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41
By Circle Of Insight Productions
…
continue reading
1
Security and Employee Investigations: Breaking Down the Big Brother Security Myth
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18
Daniel Spicer is back! Following up on last episode's discussion on the security risks of overemployment, Ivanti's Chief Security Officer returns to clear up the age-old myth of security tools being abused for employee investigations. Join Daniel, Chris and Ashley as they discuss: What is (and most definitely is not) allowed in an employee investig…
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
Overemployment Security Concerns: A Risk Versus Remediation Case Study
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58
Chris and Ashley use the current overemployment media trend as an example case study on evaluating security risks versus potential organizational impact. They cover: How overemployment existed before remote work Weighing the various security implications of overemployment — including shadow IT and insider threats How far an organization should go t…
…
continue reading
1
Vulnerability Patch Prioritization Problems: Cybersecurity Research Results (Part Two)
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
Chris (finally!) adds his insights to the 2023 Press Reset cybersecurity research report, especially how its findings impact vulnerability and patch prioritization processes — do you shoot for mission critical systems, active exploits, or something else first? — and why asset visibility lies at the core of every security framework on the planet. Ne…
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
BRITISH SPY THAT LEAD TO THE DISCOVERY OF THE UNDERGROUND NUCLEAR PLANT IN IRAN3
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39
By Circle Of Insight Productions
…
continue reading
1
Generative AI for Security Teams and Products with JR Robinson from Writer
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49
JR Robinson, Head of Platform at generative AI startup Writer, joins VP of Endpoint Security Product Management Chris Goettl and Ashley Stryker to discuss current generative AI use cases for security teams that go beyond just chat bots. (Please. For everyone’s sanity… go beyond chat bots.) They’ll also preview a deeper webinar discussion with Chief…
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
Death, Taxes and Phishing: Cybersecurity Research Results (Part One)
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54
Daniel and Ashley review the latest research report from Ivanti -- Press Reset: A 2023 Cybersecurity Status Report -- including prioritizing phishing and DDoS attacks, security ROI challenges, and why organizations should never increase their cybersecurity budget by sacrificing their IT allocations. Download the full report at Ivanti.com/Cybersecur…
…
continue reading
1
THE WAY OF THE KNIFE , THE CIA AND SECRET OPERATIONS
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
Vendor Cyber Risk Management 101: Balancing Supply-Chain Risk with Remote Work DEX and IoT Litter Boxes
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34
It's vendor risk versus reward! Chris and Amanda educate Ashley on the core considerations, processes and requirements for robust vendor risk management programs... including when to be afraid of your IoT devices, especially those pesky Roomba vacuums and oh-so-convenient self-cleaning litter boxes. Remember to address these three components, no ma…
…
continue reading
1
IT vs Security: When Hackers Patch for Profit
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49
IT Director Tony Miller goes toe-to-toe with Chief Security Officer Daniel Spicer to justify – or condemn! – IT and cybersecurity posts found on Reddit, featuring a legendary story about hackers that patched endpoints faster than the company itself. #PatchHacks Plus, Ashley frets about the impact of a new security policy on her personal devices, cr…
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
SAS SOLDIER DISCUSSES OPERATION EAGLE CLAW
50:55
50:55
Play later
Play later
Lists
Like
Liked
50:55
By Circle Of Insight Productions
…
continue reading
1
Prisoner Priorities: Why Disclosure Policies Can’t Please Everyone
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14
Daniel, Chris, Amanda and Ashley revisit the coordinated disclosure conversation from Episode 25 and apply the prisoner’s dilemma thought experiment to create a (more?) perfect vendor disclosure policy. Find shownotes for this episode at Ivanti.com/SecurityInsights-30 Next episode going live June 29, 2023! New episodes publish around the second and…
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
1
Women in Cybersecurity: Personal Experiences and Progress
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26
Amanda and Ashley talk about their experiences as women in the cybersecurity and technology industries. (Spoiler alert: it’s on the up-and-up!) Find shownotes for this episode at Ivanti.com/SecurityInsights-29 Next episode going live June 29, 2023! New episodes publish around the second and fourth Thursdays each month. For all show notes, resources…
…
continue reading
1
Cloud Security: Indiana Bob’s Server Closet Versus Data Centers
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05
Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security. Find shownotes for this episode at Ivanti.com/SecurityInsights-28 Next episode going live June 29, 2023! New episodes publish around the s…
…
continue reading
1
WE CHAT WITH CIA OPERATIVE NICHOLAS REYNOLDS ON THE RISE OF INTELLIGENCE
47:20
47:20
Play later
Play later
Lists
Like
Liked
47:20
By Circle Of Insight Productions
…
continue reading
1
See Yourself in Cybersecurity: How 3 Experts Transitioned into InfoSec
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25
Do you want to work in cybersecurity, but not sure how to start? Ashley and Chris talk to three current cybersecurity experts on how they entered the industry – including Ivanti deputy CSO Amanda Wittern. (Also, bonus update on how Ashley pulled off her social engineering assignment from last episode!) Find shownotes for this episode at Ivanti.com/…
…
continue reading
1
Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04
In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action. Referenced materials: The DarkNet Diaries …
…
continue reading
1
SPECIAL OPERATIONS COMBAT CONTROL DAN SCHILLING DISCUSSES BLACK HAWK DOWN AND MORE1
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
By Circle Of Insight Productions
…
continue reading
1
Microsoft's Coordinated Disclosure Discussion from BlackHat & DefCon '22
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26
Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices fo…
…
continue reading
1
LT COL. MANN DISCUSSES OPERATION PINEAPPLE EXPRESS AND HIS TIME AS GREEN TIME
1:07:03
1:07:03
Play later
Play later
Lists
Like
Liked
1:07:03
By Circle Of Insight Productions
…
continue reading
1
DID US MILITARY LEADERS REPORTEDLY PLAN TERRORIST ATTACKS IN THE US TO DRUM UP SUPPORT FOR A WAR AG
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46
By Circle Of Insight Productions
…
continue reading
1
THE CATASTROPHE OF THE BAY OF PIGS INVASION
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31
By Circle Of Insight Productions
…
continue reading
1
Gartner Security & Risk Management Summit Takeaways
18:53
18:53
Play later
Play later
Lists
Like
Liked
18:53
Hello and welcome back to this week’s episode of Ivanti’s Security Insights! Today Chris Goettl and Daniel Spicer go over their takeaways from the recent Gartner Security & Risk Management Summit. Next episode going live June 29, 2023! New episodes publish around the second and fourth Thursdays each month. For all show notes, resources and referenc…
…
continue reading
1
A Spy in Plain Sight The Inside Story of the FBI and Robert Hanssen—America's Most Damaging Russian1
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47
By Circle Of Insight Productions
…
continue reading
1
RETIRED SAS UK SPECIAL FORCES DISCUSSES HIS EXPERIENCES AND OPERATION NIMROD
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52
By Circle Of Insight Productions
…
continue reading
1
Healthcare and Cybersecurity w/ Daniel Brody and Chad Holmes
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13
We’re back and ready to roll with this week’s episode where our host Chris Goettl interviews Chad Holmes and Daniel Brody from Cynario. Today they discuss healthcare and security through EMT devices and much more. Watch to learn more about how cyber security is assisting healthcare innovation! For more information, check out Cynario’s website www.c…
…
continue reading
By Circle Of Insight Productions
…
continue reading