Planes Trains & Automobiles | Security as a Deterrent | REAL Talk with Lance | JOZ Bytes : Ep. 22
Land, Sea and Air Ports are vulnerable points of concern. Security is paramount for all modes of transportation, but for these three specifically. Join us for a discussion with a Security Expert in the Transportation Sector. From his time working on the border, to his focus on counter-terrorism, Lance has been an advocate for protecting our Transportation Infrastructure from many bad actors - foreign and domestic. Listen in on this important topic that effects all of us. We thank him for his service.
JOZ Bytes: Simplifying the world of Transportation & Supply Chain one Byte at a time.
Please visit our website at www.iLevelLogistics.com 🚛
Instagram: https://www.instagram.com/ilevellogistics
Facebook: https://www.facebook.com/ilevellogistics
Twitter: https://twitter.com/IlevelLogistics
Listen & Stream the show on your favorite podcasting platform!
Anchor: https://anchor.fm/joz-bytes
Spotify: JOZ Bytes
Apple Podcasts: JOZ Bytes
Email us! 📧 admin@ilevellogistics.com
Sponsored & Hosted by iLevel Logistics Inc.
-
31:05
Biz Jet TV
2 years agoPersonal Security & Private Jets
-
58:59
TheLogbook
1 year agoTRUCK I.T. - Plane, Trains, and Automobiles (and Ports)
7 -
1:23:06
JDATA
1 year agoHearing: "Securing Americas Maritime Border: Challenges and Solutions for U.S. National Security"
6 -
58:59
CommonDenominatorNetwork
1 year agoTRUCK I.T. - Plane, Trains, and Automobiles (and Ports)
8 -
2:01:05
The Ball Is Wild
1 year agoNo trains, no planes, no automobiles and NO GAS
71 -
7:25
flightsinasia
3 years agoData Security and the Aviation Industry
1 -
12:37
CyberHub_Podcast
1 year ago🚨 Cyber News: Military Free Gifts, Breach at American Airlines, Capital One & Patching News
167 -
10:28
kevnowledgy
2 months agoWhen Transportation Halts | Cyber Apocalypse
8 -
1:06:41
R.C. Davis
1 year agoEvaluating High-Risk Security Vulnerabilities at our Nation’s Ports - May 10, 2023
50 -
2:19:17
The RSnake Show
7 months agoS07E04 - Mastering Information Security: A Conversation with Robert E Lee
28