Player FM - Internet Radio Done Right
Checked 28d ago
Added two years ago
Content provided by RealTime Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by RealTime Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
S
Species Unite


1 Richard (Kudo) Couto: The Hidden Horror Behind a Billion-Dollar Brand 42:18
42:18
Play Later
Play Later
Lists
Like
Liked42:18
“I used to be the largest dairy consumer on the planet. I used to eat so much dairy and meat. The more that I looked into the dairy industry, the more that I saw that it was the singular, most inhumane industry on the planet, that we've all been lied to, including myself, for years. I always believed that the picture on the milk carton, the cow standing next to her calf in the green field with the red barn in the back was true. It’s certainly the complete opposite.” – Richard (Kudo) Couto Richard (Kudo) Couto is the founder of Animal Recovery Mission (ARM), an organization solely dedicated to investigating extreme animal cruelty cases. ARM has led high-risk undercover operations that have resulted in the shutdown of illegal slaughterhouses, animal fighting rings, and horse meat trafficking networks. Recently, they released a damning investigation into two industrial dairy farms outside of Phoenix, Arizona supplying milk to Coca-Cola’s Fairlife brand. What they uncovered was systemic animal abuse, environmental violations, and a devastating betrayal of consumer trust. While Fairlife markets its products as being sourced "humanely," ARM’s footage tells a very different story—one of suffering, abuse, and corporate complicity. Despite the evidence, this story has been largely ignored by mainstream media—likely due to Coca-Cola’s massive influence and advertising dollars.…
RealTime Cyber
Mark all (un)played …
Manage series 3422494
Content provided by RealTime Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by RealTime Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
We Cover the Cyberspace.
23 episodes
Mark all (un)played …
Manage series 3422494
Content provided by RealTime Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by RealTime Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
We Cover the Cyberspace.
23 episodes
All episodes
×R
RealTime Cyber

1 Cybersecurity Recruiter/Founder talks Entrepreneurship, Startups, and the state of the Job Market. 38:20
38:20
Play Later
Play Later
Lists
Like
Liked38:20
Josh Keeley is a Co-Founder of Trident Search, a cybersecurity recruiting agency specializing in early state cybersecurity startups. He talks about his journey as an entrepreneur, cybersecurity startups, and the current state of the job market.
R
RealTime Cyber

1 CISO Hot Takes: GRC, AI & Vendor Relations in Healthcare 48:51
48:51
Play Later
Play Later
Lists
Like
Liked48:51
Dan Holland, Deputy CISO of Tampa General Hospital, joins us for a deep dive into a wide range of topics—from GRC and AI to vendor risk management and the unique cybersecurity challenges posed by hurricanes in Florida. We also explore his journey from cybersecurity entrepreneur to his current role at Tampa General.…
R
RealTime Cyber

1 Behind the Scenes of Election Security: CISO of AZ Sec of State 1:04:08
1:04:08
Play Later
Play Later
Lists
Like
Liked1:04:08
Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations of voter fraud and voter suppression.…
R
RealTime Cyber

1 Operation CrytoRunner: The Scam Laundering Takedown Told by Secret Secret Agent 28:17
28:17
Play Later
Play Later
Lists
Like
Liked28:17
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
R
RealTime Cyber

1 CISO of Arizona Talks AI Threats, AI Policy, and His Journey to CISO 39:16
39:16
Play Later
Play Later
Lists
Like
Liked39:16
Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Becoming a CISO 5:35 The 5 Year Plan for Collective Defense 13:04 Threat Actors using Artificial Intelligence 15:56 DeepFake Threats 17:21 Artificial Intelligence In Government 20:50 Chinese Hackers in the Power Grid & Critical Infra 28:16 Things he Believed Before Becoming a CISO 31:14 The Most Stressful Part of Being a CISO 32:54 Building a Cybersecurity Culture…
R
RealTime Cyber

Phillip Hinders is a Digital Forensics examiner for the State of Ohio. He supported cybersecurity incident response efforts for the State of Ohio before working as a digital forensics examiner supporting law enforcement, mainly conducting digital forensics with tools like Cellebrite and Grey Key.
R
RealTime Cyber

Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixel? 11:21 Are Data Brokers Actually Affected by New Privacy Laws? 14:33 Some Companies DO Respect your Privacy 18:08 The End of "Free" 25:30 Companies Collect More Data Than They Think 29:51 What Every Company & Consumer Should Know 33:54 Is it Possible to fix AI Privacy Issues?…
R
RealTime Cyber

1 Former NSA Contractor Talks Quantum Computing 46:28
46:28
Play Later
Play Later
Lists
Like
Liked46:28
R
RealTime Cyber

1 The Space Domain & Electronic Battlefield; from Military to Startups 48:04
48:04
Play Later
Play Later
Lists
Like
Liked48:04
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and interference with aircraft here on earth. Chapters: 0:00 From U.S Air Force to Satellite Startups 3:48 Will Satellites Crash into Each Other? 12:45 Intelligence Collection in Space 22:09 Technical Limitation of Satellites 30:04 You Probably Didn't Know this About GPS 37:12 GPS Jamming & Spoofing Attacks on Airlines 42:34 Electronic Warfare in Space is Happening…
R
RealTime Cyber

1 The Secretive World of Spyware & Digital Surveillance 48:08
48:08
Play Later
Play Later
Lists
Like
Liked48:08
Gary Miller from Citizen Lab has made a career Exposing Cyber Threats and Digital Surveillance. He specializes in mobile network threat intelligence and surveillance monitoring. He has testified to Congress, the Department of Justice, as well as been a contributor with the Washington Post and the Intercept. Chapters: 0:00 Concerning Discoveries While Working in Telecom 4:57 Why Your Cellphone is so Vulnerable 10:18 The Concerning Observation of Huawei 14:00 NSO Group Tries to Buy Access to Cellular Network 18:58 Detecting Pegasus Spyware 24:06 Internet Censorship & Surveillance in Iran 31:37 Internet Behavioral Profiling 33:55 Internet Shutdowns? 36:06 Western Internet Vendors Called out! 40:50 How to Protect Yourself…
R
RealTime Cyber

1 He Went from Help Desk to Cybersecurity Engineer 22:16
22:16
Play Later
Play Later
Lists
Like
Liked22:16
Trevor Costanzi is a Senior DevSecOps Engineer. He opens up about a wide variety of topics throughout his Cybersecurity and IT Career. He gives unique insights into what made him successful. 0:00 How he Went From Help Desk to Security Engineer 3:49 How the Equifax Breach Changed the Company Security Culture 6:06 How DevOps Changed Software Development 11:48 Should You Use ChatGPT to Write Code? 15:27 Advice for Getting into DevOps/DevSecOps 20:41 Advice for Starting a Cybersecurity Career…
R
RealTime Cyber

1 Crypto Crackdown? Washington Insider Breaks it Down. 38:29
38:29
Play Later
Play Later
Lists
Like
Liked38:29
Recently the SEC pulled a 180 on their policy toward cryptocurrencies and sued Binance and Coinbase. Sam Lyman is a Public Policy Director in Washington who covers Blockchain. He is also a Forbes Contributor, covering Fintech and Digital Assets. He breaks down the historical politics and policy behind crypto and the recent assault against crypto. He can be found at: https://www.forbes.com/sites/samlyman/?sh=79368a3850bb https://twitter.com/@SamLyman33…
R
RealTime Cyber

1 Former USCYBERCOM Officer Talks Battlefield Cyber: The War America is Losing. 50:22
50:22
Play Later
Play Later
Lists
Like
Liked50:22
Michael McLaughlin is a former senior adviser for U.S. Cyber Command (USCYBERCOM), where he was responsible for the coordination of Department of Defense (DOD) counterintelligence operations in cyberspace. He was the Chief of counterintelligence for the Cyber National Mission Force where he supported threat hunting teams (hunt teams) in Ukrainian networks. William Holstein is a journalist who has specialized in technology and China for over a decade. They CoAuthored the Book "Battlefield Cyber". You can find it here: https://www.amazon.com/Battlefield-Cyber-Undermining-Democracy-National/dp/1633889017 They talk about how America’s adversaries are fully engaged in a cyber war against the U.S. McLaughlin and Holstein propose MAJOR moves to improve digital security in the U.S. A Department of Digital Services could provide coordination and support we need. Corporations have to be willing to share information and protective technology, and there must be a concerted effort to remove embedded malware from systems in companies, government agencies, and the military.…
R
RealTime Cyber

1 Before the Breach: You're Liable if You Aren't Doing This 34:34
34:34
Play Later
Play Later
Lists
Like
Liked34:34
AnnMarie Giblin is a Cybersecurity Lawyer specializing in Proactive Cybersecurity. She talks about how cybersecurity laws are changing and what you can do to stay ahead. Chapters: 0:00 This Changed Cyber Negligence Law 2:30 The Changing Nature of Cybersecurity Lawsuits 9:47 Supply Chain Breaches are Changing Cybersecurity Law 12:40 You're Liable if You Aren't Doing This 17:59 This is The Cyber Liability Threshold 20:33 These New Data Privacy and Security Laws are Coming 26:42 This is How AI will Change Law and Regulation…
R
RealTime Cyber

1 Former FBI Cyber Agent Brent Watkins Talks Cyber 39:28
39:28
Play Later
Play Later
Lists
Like
Liked39:28
Brent Watkins served in the U.S Air Force during the cold war reverse engineering Soviet Technologies before joining the FBI and investigating cyber crimes. Chapters: 0:00 Air Force During the Cold War 1:36 Cyber Crime Investigations with the FBI 17:37 Tracking Terrorists Online 18:25 Investigating Hop Points 20:31 Investigating Cyber Criminal Groups 25:24 Corporate Espionage & Insider Threats 27:57 From FBI to Working in Threat Intelligence 3 1:57 Wire Fraud & Ransom Claw Backs 34: 36 What Are Cyber Criminals Like?…
R
RealTime Cyber

1 He Will Change the Way You See Artificial Intelligence 46:38
46:38
Play Later
Play Later
Lists
Like
Liked46:38
Dallas Clounch, the "AI Surfer, is a former software developer and now AI Guru. He covers all things AI. You can Find More AI insights at: https://www.theaisurfer.com/ Facebook: https://www.facebook.com/theaisurfer?mibextid=LQQJ4d Instagram: https://instagram.com/theaisurfer?igshid=YmMyMTA2M2Y= TikTok (chinese spy app): https://www.tiktok.com/@theaisurfer?_t=8bRgi3AlW3i&_r=1 YouTube: https://www.youtube.com/ @theAIsurfer…
R
RealTime Cyber

1 CyberWarfare & Signals: Deciphered by U.S. Navy Cryptologic Officer 1:07:07
1:07:07
Play Later
Play Later
Lists
Like
Liked1:07:07
Ben Bissantz is a Cryptologic Warfare Officer for the U.S Navy. He's served in Electronic Warfare and Signals Intelligence for U.S Special Operations Command (USSOCOM) and Sealiftcommand. He's also served in the Navy Information Warfare Comminity’s Artificial Intelligence and Machine Learning Task Force. Chapters: 0:00 Announcement and Disclosure 1:00 Background from USSOCOM to Sealift 3:00 Cryptologic, Cyber, & Electronic warfare explained 13:42 Cyber in Ukraine 15:37 NotPetya implications on U.S Military 19:17 What would a cyber war look like? 22:53 Border Gateway Controls; Undersea Cables & Satcom 29:30 The Irreversible Vulnerability in SatCom 31:30 OSINT, the Deep Wed, & the Dark Web 40:59 Technical Take on the Chinse Spy Balloon 53:02 Hot Take on AI 57:15 Government & Military's use of AI 1:02:05 Self Driving Cars & Self Flying Planes…
R
RealTime Cyber

1 CISO of Maricopa County Talks Superbowl and Election Security 42:14
42:14
Play Later
Play Later
Lists
Like
Liked42:14
Lester Godsey is the Chief Information Officer of Maricopa County Arizona. He has served as the Chief Information Security officer of both Maricopa County and the City of Mesa. We talk about security and cyber threats surrounding the Superbowl, Waste Management Open, Elections, and talk a little Blockchain. Chapters: 0:00 Note and Announcement 1:11 Cyber Threats facing Superbowl and WMO 4:57 The Drone Threat 6:46 CISO of a City vs County 9:31 Massive Influx of People 12:15 Cellular and Internet Overwhelmed? 15:11 Cyber Attacks on the Election 2020 vs 2022 26:54 Blockchain for Elections? 34:09 Blockchain for Threat Intelligence 37:36 Opinions on TikTok…
R
RealTime Cyber

1 Private Insights from a Data Privacy Attorney 51:58
51:58
Play Later
Play Later
Lists
Like
Liked51:58
Ryan Johnson is a data privacy and cyber security Lawyer. He sits on the boards of a few companies providing legal counsel and advising on navigating the increasingly complex world of data privacy and information security. Chapters: 0:00 From IT Admin to Data Privacy Attorney 6:49 The Dirty Secret about Data Breach Lawsuits 11:02 Is Cybersecurity Driving Inflation? 13:26 Cybersecurity Affirmative Defense Laws 18:28 Navigating the Complex Mesh of State Privacy and Breach Disclosure Laws 21:01 Cyber Insurance Premiums Going Through the Roof 25:52 Navigating the Complex Technicalities of Privacy 25:49 The Wild West Data Brokers 34:30 "Opt In" vs "Opt Out" Privacy Laws 38:17 Artificial Intelligence + Massive Data Collection 41:13 Dossier, Slander, & Governments Buying their Way Around the 4th Amendment 46:12 TikTok Spying…
R
RealTime Cyber

IoT Penetration Tester and IoT Security Expert, Ryan Jones joins the podcast to talk all things IoT Security. IoT's hyper growth is outpacing security and creating a new set of security challenges. We dive into the security of ATMs, Healthcare Devices, Drones, Cars, the Power Grid, and other Operational Technology.…
R
RealTime Cyber

1 Uncommon Insights from a Crypto Insider 1:23:19
1:23:19
Play Later
Play Later
Lists
Like
Liked1:23:19
We interviewed crypto developer, product manager, and startup founder Dima Azarenko. He's developed and engineered software, protocols, and NFTs, We talk all things crypto. LEDGER HARDWARE WALLETS: https://shop.ledger.com/?r=e411905c4b6d Dima Azarenko Twitter: https://twitter.com/azar3nko RMeta Labs: https://rmetalabs.ai/ Chapters: 0:00 Intro, Bankruptcies & Where to Store Your Crypto? 2:26 Differences Between Engineering Software vs Crypto 6:11 Crypto Security & Breaches 14:58 Crypto Laundering & Tornado Cash 17:35 Is Russia Using Crypto to Circumvent Sanctions? 20:11 Whats Actually Driving Crypto Adoption 25:01 Federal Reserve CBC Coin, China's Digital Yuan, Inflation, and Dictators 28:33 Transacting in Crypto 31:10 The Upside to the Crypto Bubble Bursting 31:57 NFTs for Real Estate? 33:27 Realistic NFT Use Cases 34:41 Louis Vuitton and Pro Sports Using NFTs to Combat Black Markets and Counterfeits 38:06 Shortcomings of NFTs 40:26 Web Domain NFTs Boomed During the Market Crash? 41:23 NFTs for Education 43:09 Artificial Intelligence Will Change Crypto, Smart Contracts, and Crypto Security 46:52 Hot Take on the Collapse of FTX and SBF 57:36 Hot Take on The Attack & Collapse of Terra Luna 1:07:48 Crypto Billionaires Mysteriously Dying? 1:12:48 Is Binance the JP Morgan Chase of Crypto? 1:16:00 Collapse of Exchanges & the Case for Decentralized Exchanges (DEX) 1:18:37 Coinbase Investing in Decentralized Protocols?…
R
RealTime Cyber

1 Former CIA Officer and Current AZ Dept of Homeland Security Director/CISO Tim Roemer 1:12:18
1:12:18
Play Later
Play Later
Lists
Like
Liked1:12:18
Tim Roemer opens up about cyber threats facing the state and country, managing the border crisis in Arizona, cyber war, Anonymous, how he's created a cyber security culture, his time at the White House and CIA, among a bunch of other topics.
R
RealTime Cyber

1 Securing the Military & Defense Industrial Base 32:37
32:37
Play Later
Play Later
Lists
Like
Liked32:37
Cybersecurity Model Maturity Certification (CMMC) consultant Grant Burns talks about new Department of Defense cybersecurity requirements for the Military and Defense Industrial Base supply chain. Grant Burns https://www.boundplanet.com/
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.