Overcoming Imposter Syndrome in Leadership
Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity.
We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, and best practices for leveraging LinkedIn for your personal brand.
More at https://cybercrimejunkies.com
Don't miss our Newsletter (no email needed!) VIGILANCE. Translating cyber into business https://www.linkedin.com/newsletters/...
Thanks to our Small Business Sponsor, Blushing Introvert. https://blushingintrovert.com
Want to try podcasting yourself? Use RIVERSIDE today! We use it (and have tried everything! We LOVE it. Sign up here today! https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
90
views
A.I. Modern Warfare & Fiction
We are joined by JL Hancock former lead innovator and Military cryptologist with the U.S. NAVY SEALs & Special Operations, spent over twenty years in the military and fought in over 100 combat operations.
He was with the first combat group to ever put an AI Drone into Combat.
He also has an outstanding book called The HAWK Enigma.
JL shares his story and a side of emerging technology that is rare and one most never get a chance to see.
You can grab JL's book too at https://jlhancock.com/
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
56
views
Hackers & Heroes. Secrets to Measuring Your Business Risk.
Rob Black, a Fractional CISO, joins us to discuss the best ways for quantifying cybersecurity and why it is crucial for small and medium-sized business owners.
Rob shares invaluable insights on how businesses can measure the effectiveness of their cybersecurity strategies.
Don’t miss the Audio Podcast: https://www.buzzsprout.com/2014652/14158261
· Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
· Contact us direct! Find the Podcast, extra content and more at https://cybercrimejunkies.com
· Don't Miss VIGILANCE. The Newsletter. Translating cyber into understandable business language. https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=6941459114879311872
Tune in wherever you get your podcasts and watch on YouTube to learn more. Gain insights from an industry expert on effectively measuring and mitigating cybersecurity risks in your organization.
Find more on Rob Black’s fractional CISO here: https://fractionalciso.com/about-us/
Don’t miss the Audio Podcast: https://www.buzzsprout.com/2014652/14158261
Rob Black, a Fractional CISO, joins us to discuss the best ways for quantifying cybersecurity and why it is crucial for small and medium-sized business owners.
Rob shares invaluable insights on how businesses can measure the effectiveness of their cybersecurity strategies.
Don’t miss the Audio Podcast: https://www.buzzsprout.com/2014652/14158261
· Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
· Contact us direct! Find the Podcast, extra content and more at https://cybercrimejunkies.com
· Don't Miss VIGILANCE. The Newsletter. Translating cyber into understandable business language. https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=6941459114879311872
Tune in wherever you get your podcasts and watch on YouTube to learn more. Gain insights from an industry expert on effectively measuring and mitigating cybersecurity risks in your organization.
Find more on Rob Black’s fractional CISO here: https://fractionalciso.com/about-us/
Don’t miss the Audio Podcast: https://www.buzzsprout.com/2014652/14158261
80
views
Negotiating with Cyber Criminals
New Undercover Dark Web Investigations
Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this Part 2 of 2 LIVE.
Topics:
• Undercover Dark Web Investigations,
• Is Ransomware Dead?
• Dark Web Secrets,
• face to face with cyber criminals,
• effects from real-life cyber crime attacks ,
• emotional toll from cyber crime,
• face to face with ransomware,
• emotional effects real life cyber crime ,
• emotional effects from cyber attacks,
• shocking human toll of cyber attacks,
Don't miss our partner www.blushingintrovert.com. You will look and feel good and be treated like family and know that any purchase will help a great cause as portions of all proceeds go to support mental health awareness initiatives. Everything handmade in US. Women's sweatshirts, tumblers, stickers, journals, bracelets and more. All in stock. All Handmade. Ready to ship straight to your door.
Please subscribe @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
86
views
How To Save Yourself During a Cyber Attack
Gabe Gambill, VP of product and technical operations with Quorum joins us for a storytelling session with great insight.
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
101
views
Vigilance. Breaking Cyber Crime News To Know
Introducing Vigilance, our new cybersecurity newsletter covering Legal, Healthcare, SLED and Finance Industries, along with AI and Governance.
Topics: best ways to keep up to date on security news, breaking cyber crime news to know, cyber security news this week, cybercrimepodcast, new cyber crime news, top security news this week, top true cyber crime stories in the news, when ransomware kills in real life, how to have vigilance in cyber security,Have vigilance in cyber security
Check out Vol 1 here: https://www.linkedin.com/pulse/vigilance-david-mauro-sa0bc and on www.CyberCrimeJunkies.com
Please subscribe to our YouTube Channel for behind-the-scenes look and be part of the conversation for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more captivating and real cybercrime stories, visit our website at https://cybercrimejunkies.com.
73
views
How Story Telling Helps Leaders
How Story Telling Helps Leaders
Dan Elliott, Principal Cyber Security Risk Advisor at Zurich, and notoriously talented storyteller for complex subjects, joins us.
Topics: how story telling helps leaders, Benefits Of Story Telling In Business, cyber security story telling, benefits of story telling for complex topics, benefits of story telling for cyber security, how to use story telling for cyber security, using story telling for cyber security, using story telling in cyber security, analogies used to explain cyber security, analogies used in cyber security, benefits for having security assessments done, benefits of security roadmap, best cybersecurity practices for business, best policies to limit cyber liability, best practices for businesses to limit cyber liability
Be part of the conversation for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more captivating and real cybercrime stories, visit our website at https://cybercrimejunkies.com.
61
views
How Story Telling Helps Leaders
Dan Elliott, Principal Cyber Security Risk Advisor at Zurich, and notoriously talented storyteller for complex subjects, joins us.
Topics: how story telling helps leaders, cyber security story telling, benefits for having security assessments done, benefits of security roadmap, best practices for businesses to limit cyber liability
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
69
views
1
comment
FBI Profiling and Negotiation.
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations.
We discuss FBI Profiling and counter terrorism, and other key topics: how fbi negotiates, how fbi negotiations are used in cyber crime, how cyber crime negotiations work, fbi profiling in cyber crime, how fbi profiling helps fight cyber crime, understanding science in social engineering, science of social engineering explained, psychology of social engineering explained, how neuroscience hacks humans, the science behind hacking humans, hacking humans using science, Global Cyber Security Strategy,
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
114
views
Name, Image License NIL and Cybersecurity
Star Athletes & Influencers. Identity & Brand Protection
Come join us live! Tim Flynn, Cybersecurity and Cloud expert has delved deep into NIL and has some outstanding exclusive insight to share. He joins us in the studio.
Topics: secret security risks in name image licensing, pros and cons in name image licensing, identity and brand protection, best practices for protecting personal data online, psychology of social engineering explained, how neuroscience hacks humans,
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
87
views
1
comment
What Cybersecurity Steps to Take Today. Story: Bear In The Woods.
Ever hear the story about the bear in the Woods? It's told in boardrooms across the globe to explain, in plain terms, various complicated risk management, and cyber security challenges.
Here we illustrate the KONICA MINOLTA Managed IT North America (All Covered) offerings for five top cyber security services:
1. MDR/MSIEM/SOC Services;
2. MEDR;
3. Vulnerability Management;
4. MSAT;
5. Incident Response Planning and Tabletops.
Topics: affordable methods to limit cyber liability, affordable ways to limit cyber liability, benefits of subscribing to top cyber security podcast, best cybersecurity practices for business, educating on security by podcasting, effective ways to protect business from cybercrime, fun security awareness no cost, how ai will effect cyber security, how to limit liability from cyber attacks, how to limit liability from data breach, how to protect employees online, how to stop social engineering
#Konicaminolta #Allcovered #cybersecurity #MSSP
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
64
views
Land mines in Job Searching
Joe Hudson with TCM Security joins us to discuss Landmines in Job Searching.
Topics: land mines in job searching, most notorious data breaches this year, most notorious breaches, top cyber crime stories in news,
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
118
views
What Employers Want in Cybersecurity
Dragos top Cybersecurity recruiter JOSH FULLMER joins Cyber Crime Junkies in the studio to discuss what employers want in cybersecurity.
Topics: what employers want in cybersecurity, How start a career in cybersecurity today, effective communication for security internally in business, security best practices for business, how to choose the right bootcamps, How To Select The Right BootCamps, new approaches to enter the cybersecurity field, how can we spot fraud in business, where to start cyber security career, how to have effective communication internally in business, best ways to keep up to date on security news
We discuss how to build a strong security culture and importance of building your personal brand.
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
108
views
Importance of Communicating in Business Terms for cyber security
Josh Copeland, The "Unpopular Opinion" guy, and AT&T Security leader, joins us. Former military professional, Josh discusses the importance of communicating in business terms for cyber security, career transition and effective internal communications.
Topics: importance of communicating in business terms for cyber security, best ways to transition from military to cyber security,
24
views
Understanding Governance Risk Compliance
Dr Gerry Auger join us. Topics: understanding governance risk compliance, understanding table top exercises in cyber security , how to start in governance risk compliance, learn governance risk compliance, governance risk compliance master class, understanding governance risk and compliance, approaches to enter cybersecurity, best ways to keep up to date on security news, careers in insider threats, from military into cyber security, cybersecurity careers for military, how important are certs in security career, how transition from military into cybersecurity today, importance of mentorship in career
Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Want more true cyber crime stories? Check out Https://cybercrimejunkies.com
141
views
Understanding Science in Social Engineering
Topics: understanding science in social engineering, science of social engineering explained, psychology of social engineering explained, how neuroscience hacks humans, the science behind hacking humans, hacking humans using science,
Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
199
views
How To Build A Security Culture
Ever wonder what it takes to build a security culture? Gabriel Friedlander, founder of Wizer Security, join us. Founded in 2019 and now in over 20k organizations across 50 countries, Wizer training demonstrates how to build a security culture and believes today security awareness should be a basic life skill.
Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
16
views
New U.S. Security Strategy Effect on AI.
New U.S. Security Strategy Effect on AI. Silicon Valley Think Tank, Task Force and ISAO leaders Carlo Brayda and Michael Thiessmeier join us.
Topics: New U.S. Security Strategy Effect on AI, Artificial Intelligence And Cybersecurity Information Sharing And Analysis, Ai And Cybersecurity Information Sharing And Analysis, New Policies For Security In Light Of Artificial Intelligence, How To Protect Security Of Organizations With Artificial Intelligence, Ways To Protect Security Of Organizations With Artificial Intelligence, New Artificial Intelligence Us Regulations, How Will The Us Regulate Artificial Intelligence, New Isao Info Gathering On Artificial Intelligence, Artificial Intelligence ISAO Info Gathering, and Top security Tips we all want to know.
Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
18
views
Zero Trust and National Security. Intel CTO.
Steve Orrin, Intel CTO, discusses zero trust and national security. Steve is a recognized security leader and public speaker and key advisor in emerging technologies and Intelligence communities.
Topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, real life zero trust, zero trust real life example, zero trust real life examples, understanding zero trust today, how to use zero trust for small business, ways to leverage zero trust for small business.
31
views
1
comment
Tik Tok Security Risks Explained
FBI Cyber leader Darren Mott jis us to discuss tik tok national security explained. Topics include: tik tok security risks explained, tik tok national security explained, national security risks from social media, identity protection in light of tiktok, tiktok connection to china government, tiktok connection to china govt, identity protection concerns in light of tik tok, how social media platforms can be national security risks, why social media platforms are security risks, why social media platforms are national security risks, why social media platform is a national security threat, how social media platforms are security risks, social media risks to national security, social media national security, cyber crime of tiktok, laws on social media national security, national security versus social media.
30
views
Identity And Brand Protection
Public speaker, educator, Dev Ops specialist and privacy advocate Hannah Sutor joins us.
Topics: new insights for identity and brand protection, identity and brand protection , identity and brand protection online, best practices for protecting personal data online, Brand protection with identification authentication, best policies to limit cyber liability, risk and brand protection, Impact of new US security strategy on AI, move it breach 2023, importance of privacy online, innovative ways to build a security culture, New ways to limit cyber liability, New Ways To Protect Business From Cyber Crime, new ways to protect business from cyber crime, new ways to protect people from cyber crime
More from Cyber Crime Junkies: https://cybercrimejunkies.buzzsprout.com
https://cybercrimejunkies.com.
28
views
The Brett Johnson Interview
Brett Johnson Interview. Cyber Crime Junkies.
U.S. Secret Service called him the Original Cyber Crime Godfather. Now the infamous Good Guy will address top security tips we all want to know in our new Exclusive Brett Johnson interview.
Topics: effective ways to protect people from cyber crime,
latest tik tok ban,effective ways to protect business from cyber crime, how can we spot fraud in business, fraud found in fintechs, financial cybercrime.
23
views
When People Fake their Death
Shocking mystery of CEO of Quadriga CX who disappeared, or died, leaving while millions vanished. Was a Netflix documentary and we did our own inside investigation.
Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exit scams and fake ids, cyber crime exist scam, did gerald cotten really die, when people fake their death, exxit scams and ponzi schemes.
16
views
Espionage Hackers and Spies
There is a bigger story behind some breaches: the Anthem Breach, The Equifax breach, the breach of the OPM (Office of Personnel Management) for the US govt, and Marriott International.
Topics: inside espionage what every american should know, inside truth behind data breaches, inside the world of chinese espionage what every american should know, espionage hackers and spies, difference between breach and espionage, secret espionage behind beaches, what chinese espionage means to America, what china espionage means to America, espionage hackers and spy stories, secret espionage inside beaches, espionage stories behind american data breaches, espionage behind breaches, espionage behind american data breaches, espionage behind data breaches, real life espionage behind data breaches, chinese espionage from breaches, chinese espionage behind scenes, china espionage and what it means to America, how espionage works behind data breaches,
36
views
Espionage, Hackers & Spies.
There is a bigger story behind some breaches:
1. the Anthem Breach,
2. The Equifax breach,
3. the breach of the OPM (Office of Personnel Management) for the US govt, and
4. Marriott International.
Topics: inside espionage what every american should know, inside truth behind data breaches, inside the world of chinese espionage what every american should know, espionage hackers and spies,
Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month
Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
For more real cybercrime stories, visit our website at https://cybercrimejunkies.com.
68
views