Cover image of InSecurity
(17)
Business
Society & Culture
Technology

InSecurity

Updated 9 days ago

Business
Society & Culture
Technology
Read more

Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Read more

Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

iTunes Ratings

17 Ratings
Average Ratings
14
0
1
2
0

Yes, there are BlackBerry Cylance episodes, but there is so much more

By packmatt73 - Feb 20 2020
Read more
This might be lame, but I want to address the notion that InSecurity is strictly a promotional vehicle for BlackBerry Cylance. Yes, we have done several episodes featuring Cylance

Infomercial

By adulgo - Feb 19 2020
Read more
It is an infomercial, promoting their own products. I agree with angry koala1. NOTE: I edited this review for spelling and grammar.

iTunes Ratings

17 Ratings
Average Ratings
14
0
1
2
0

Yes, there are BlackBerry Cylance episodes, but there is so much more

By packmatt73 - Feb 20 2020
Read more
This might be lame, but I want to address the notion that InSecurity is strictly a promotional vehicle for BlackBerry Cylance. Yes, we have done several episodes featuring Cylance

Infomercial

By adulgo - Feb 19 2020
Read more
It is an infomercial, promoting their own products. I agree with angry koala1. NOTE: I edited this review for spelling and grammar.
Cover image of InSecurity

InSecurity

Latest release on May 23, 2020

The Best Episodes Ranked Using User Listens

Updated by OwlTail 9 days ago

Rank #1: InSecurity Podcast: Mike Daugherty and Malcolm Harkins... Who Can You Trust?

Podcast cover
Read more

What if I told you that there are companies out there who deliberately spoof data breaches in order to blackmail their “customers” into paying for their “breach remediation services”?

What if I told you that, after failing to be a good little victim to such a scam, LabMD began hearing from the Federal Trade Commission about its security and technology practices?

Would you believe me if I said that, in a battle that is now in its 17thyear, our guest has attempted the impossible and stood up to the crooks and the FTC? Rather than settle a case that he knew was wrong, our guest refused to live in the world he was given. He has battled to change that world and keep his company’s name and his own name from being steamrolled by the bureaucracy of a government agency that may not really know what they are doing when it comes to data privacy and security.

Joining Matt Stephenson on the InSecurity podcast are Mike Daugherty and Malcolm Harkins.

Mike is the CEO of LabMD who refused to be the victim of a shady “Breach Mediation” company, which led to a decade long battle with the Federal Trade Commission.

Malcolm is the Chief Security & Trust Officer at Cylance. He is not one to sit idly by and let the cybersecurity industry focus on profits over people.

Imagine what might happen when you get these two in a room together…

About Mike Daugherty

Mike Daugherty is embroiled in the biggest regulatory cybersecurity legal battle in the country today. The CEO of LabMD, a cancer testing laboratory, author, speaker, consultant and policy advocate, he has spent most of the last decade defending his company against charges that it had deficient cybersecurity practices. The early years of his entering and fighting Washington, DC, are recorded in his book, The Devil Inside the Beltway. In so doing, he has become the only litigant to challenge the basic authority that underlies more than 200 enforcement actions relating to cybersecurity and online privacy that the FTC has brought over the past 15 years. Every one of the 200+ litigants before him – including some of the largest companies in the world – have settled with the FTC, creating an unquestioned and untested belief that the FTC has broad authority to regulate in these areas. Following oral arguments in June, 2017, before a panel of the 11th Circuit Court of Appeals, on June 6, 2018, he actually prevailed. In so doing, he toppled key pillars of the FTC’s cybersecurity and online privacy edifice, successfully exposing and challenging The Administrative State. The cybersecurity regulatory framework for all of industry has been flipped on its head.

About Malcolm Harkins

As the Chief Security and Trust Officer at CylanceMalcolm Harkins (@ProtectToEnable) is responsible for all aspects of information risk and security, security and privacy policy, and for peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks. Previously, he was Vice President and Chief Security and Privacy Officer at Intel Corp. In that role, Malcolm was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Jul 25 2018

50mins

Play

Rank #2: Sara Löfgren and Tom Löfgren: Keeping it in the Family, Cybersecurity from Home

Podcast cover
Read more

This is the true story, of 2 security professionals and their kids, living in house in the northern Midwest, now sequestered becaue of a global health crisis. Find out what happens, when Cybersecurity professionals stop being polite, and start getting real… The Real World… Stay Home Order Edition!

Any comic book readers out there? Who’s familiar with the Marvel family? Shazam family? Shazamily?

How about Reed & Sue Richards? The Fantastic Four? Mister Fantastc and the Invisible woman? Not sure if that one is appropriate because Sara is definitely not invisible… but Tom is definitely Fantastic

The point is… what happens in house run by pair of superho level cybersecurity professionals in the age of COVID19?

Oh… and did we mention they also own a livestock farm? Cows and horses and lots of other things?

How does a family already swimming in the world of Cybersecurity deal with working from home during the era of COVID19

This week on Insecurity, Matt Stephenson speaks with Sara and Tom Löfgren, a married couple, both elite cybersecurity professionals… who find themselves (along with the rest of us) in a quarantine situation. Is it different for security pros to bring it all in house? How do you balance co-workers, clients, kids and livestock… oh yeah… and still be a person?

About The Löfgren (that’s grammatically accurate if you are Swedish)

They have been raising baby chickens in their bathtub (Sara’s idea). They have somewhere around 4 kids and an estimated 50 horses but can't really keep count because they don't hold still.  Sara’s cow's name is either Coco or Norman depending on who you ask.

About Sara Löfgren

Sara Löfgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for nearly 20 years with a focus on solving enterprise security problems through the union of technology, people, and processes.

Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. Sara lives in Minnesota with 4 kids, 2 dogs, a cat, and many rescue horses.

Oh… her husband Tom… we’re pretty sure he’s around too.

About Tom Löfgren

Tom Löfgren is a Sales Engineer at Ionic Security. He’s really good at securing Linux and encryption.

Because he is really good at security, privacy and encryption… we don’t know much about him other than the kids, the dogs, cat and rescure horses… and Sara.

According to Sara, Tom plays hockey and has eaten surstromming voluntarily.  He has a map of Ikea in  his head and thinks it's normal when people eat pasta with ketchup on it (again… according to Sara… because Tom is really good at security and privacy, so we are going to have to take her word for it).

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Apr 17 2020

1hr 15mins

Play

Rank #3: BlackBerry Cylance: 2020 Threat Report Highlights

Podcast cover
Read more

The BlackBerry Cylance 2020 Threat Report contains a broad range of topics vital to the interests of anyone with a computer. The report is drivey by veterans of the security industry from BlackBerry and Cylance.

The goal of the report is to make security information, predictions, and lessons learned accessible to everyone, regardless of role or title.

The 2020 Threat Report examines 2019’s major security breaches and considers recent advancements that may prevent past mistakes from repeating. We have gathered some of the researchers for a discussion about what went into the report… and what you can get out of it.

This special episode of InSecurity takes a look at the cybersecurity threats of 2019 through a conversation with Threat Researchers Ebudo Osime, Anuj Soni & Tom Bonner. We examine BlackBerry Cylance’s research on all things cybersecurity for the prior year in order to get a handle on the coming years. We’re not selling products… we’re putting our experts to work to analyze the prior year in order to see what might be coming…

About Ebudo Osime

Ebudo Osime is a Threat Intelligence Analyst at BlackBerry. She is a threat intelligence advocate, threat hunter, researcher and an engineer with over 4 years in security.

She has previously worked in IT Project Management, IT Consulting with Ernst and Young, Network and Security Operations.

Ebudo Received her GIAC certification in Threat Intelligence and holds a Masters in Electronic Systems Engineering with a specialization in creating secure protocols for detecting denial of service attacks in IoT networks.

About Anuj Soni

Anuj Soni (@asoni) is a Senior Threat Researcher at BlackBerry Cylance. In addition to his corporate work, he is a SANS Certified instructor. Anuj has over 15 years of experience in the world of cybersecurity including previous stops at Booz Allen Hamilton where he worked as an Incident Response & Malware/Forensic Analyst

About Tom Bonner

Tom Bonner (@thomas_bonner) is a Director of Threat Research: BlackBerry Cylance. With over 18 years of experience in the security industry, including stops at HP Enterprise, Promon AS and Norman Shark… Tom helped design the block, build the block and has definitely been around the Cybersecurity block 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Mar 31 2020

56mins

Play

Rank #4: Bradley Hope: How Jho Low Hacked Fame and Fortune

Podcast cover
Read more

If you like global intrigue, financial crime, wealth porn, and absurdity, “Billion Dollar Whale,” by Tom Wright and Bradley Hope, is for you. It’s the story of Jho Low, an enterprising businessman from Malaysia who used his social connections to the country’s former Prime Minister Najib Razak to transform himself into an international financier. According to Wright and Hope’s account, Low persuaded Razak to create an investment fund, 1MDB, financed with government money, which Low managed behind the scenes. Goldman Sachs and other banks helped raise ten billion dollars for the fund. Then approximately five billion dollars of the money disappeared, prompting an international scandal.

"I met these guys, and said to my girlfriend Anne, ‘these guys are #@&%ing criminals… this is a #@&%ing scam, anybody who does this has stolen money.‘ You wouldn't spend money you worked for like that."

"I am very pleased to confirm that a landmark comprehensive, global settlement has been reached with the United States government."

This week on InSecurity, Matt Stephenson welcomes Pulitzer Prize nominated journalist Bradley Hope for a conversation detailing the mindboggling saga of Jho Low and his jaw dropping tale of theft and debauchery. How do you break into Hollywood, New York society and Global Financial Markets? Having $5 BILLION in purloined money in your pocket certainly helps. Stick around…

About Bradley Hope

Bradley Hope (@bradleyhope) has worked for the Wall Street Journal for the last four years, covering finance and malfeasance from New York City and London.

Before that, he spent six years as a correspondent in the Middle East, where he covered the Arab Spring uprisings from Cairo, Tripoli, Tunis, and Beirut. He was detained by authorities in Bahrain, reported from the front lines of the Libyan civil war, and has been teargassed in raucous Egyptian protests.

Bradley is a Pulitzer finalist and a Loeb winner, and also author of Last Days of the Pharaoh, a chronicle of the final days and hours of the presidency of Hosni Mubarak.

“Billion Dollar Whale,” an Absurd Tale of Financial Fraud

The definitive inside account of the 1MDB scandal, a true life thriller about a modern Gatsby who managed to swindle over $5 billion with the aid of Goldman Sachs and others.

Billion Dollar Whalre is an epic tale that exposes the secret nexus of elite wealth, banking, Hollywood, and politics from two award-winning Wall Street Journal reporters.

In 2009, with the dust yet to settle on the financial crisis, a baby-faced, seemingly mild-mannered Wharton grad began setting in motion a fraud of unprecedented gall and magnitude--one that would come to symbolize the next great threat to the global financial system. His name is Jho Low, a man whose behavior was so preposterous he might seem made up. 

An epic true-tale of hubris and greed, Billion Dollar Whale reveals how this young social climber pulled off one of the biggest heists in history--right under the nose of the global financial industry. Federal agents who helped unravel Bernie Madoff's Ponzi scheme say the 1MDB affair will become the textbook case of financial fraud in the modern age--and its fallout is already being credited for taking down the prime minister of Malaysia. 

For readers of Liar's Poker, Den of Thieves, and Bad Blood, Billion Dollar Whale will become a classic, harrowing parable about finance run amok. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Dec 16 2019

1hr 1min

Play

Rank #5: Clint Watts on Social Media Manipulation

Podcast cover
Read more

Clint Watts: Social Media Manipulation

What if I told you that the most effective way to hack an election isn’t injecting code into a voting machine or surreptitiously changing the vote count, but rather by means of clever and extensive use of popular social media platforms like Facebook and Twitter?

The major platforms are designed to be able to target specifics groups of people who fit specific profiles demographically. Nefarious organizations can use those platform features to influence public opinion and dialogue.

Bots can create what appear to be armies of people who publish what seems on the surface to be “news” that finds a home with like-minded people. And that, friends, is how someone half a world away can sway an election from an iPhone.

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Clint Watts, national security contributor at MSNBC and author of the recently released best-selling book Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News.

About Clint Watts

Clint Watts (@selectedwisdom) is a Robert A. Fox Fellow in the Foreign Policy Research Institute’s Program on the Middle Eastas well as a Senior Fellow at the Center For Cyber and Homeland Security at The George Washington University. Watts is a consultant and researcher modeling and forecasting threat actor behavior and developing countermeasures for disrupting and defeating state and non-state actors.

His research predominately focuses on terrorism forecasting and trends seeking to anticipate emerging extremist hotspots and anticipate appropriate counterterrorism responses. More recently, Watts used modeling to outline Russian influence operations via social media and the Kremlin’s return to Active Measures.

Before becoming a consultant, Clint served as a U.S. Army Infantry Officer after graduating from West Point, an FBI Special Agent on a Joint Terrorism Task Force (JTTF), as the Executive Officer of the Combating Terrorism Center at West Point (CTC) and as a consultant to the FBI’s Counter Terrorism Division (CTD) and National Security Branch (NSB). 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

 Make sure you Subscribe, Rate and Review!

Jun 18 2018

45mins

Play

Rank #6: Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

Podcast cover
Read more

Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

Is a Terminator T-800 an endpoint? Is Voltron an endpoint? Could we have prevented a lot of damage to the Earth if Tony Stark had just installed a BlackBerry Cylance endpoint protection solution on the Iron Legion?

In this week’s episode of InSecurity, Matt Stephenson chats with BlackBerry CTO Charles Eagan and BlackBerry Cylance CPO Eric Cornelius... two people charged with leading the charge to combine BlackBerry and Cylance into a security solution that will protect every Thing under the sun.

Take a walk with them as Matt finds out what the future holds now that BlackBerry and Cylance have come together.

If you are in San Francisco for RSA, make sure to come say hello to Charles, Eric, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm. 

Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities.

Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by. 

About Charles Eagan

Charles Eagan is the Chief Technology Officer for BlackBerry. In this role, Charles oversees the standardization and integration of all company products and is responsible for the advancement of new technologies and partnerships, with an emphasis on defining BlackBerry’s Enterprise of Things platform as well as driving innovation within emerging markets.

Charles was previously the Global Head of Electronics at Dyson Ltd (U.K.), focused on IoT device deployment. Prior to that he served as BlackBerry’s Global Head of Device Software, and spearheaded development of the BlackBerry 10 operating system and the transition to secure Android.

Charles was formerly Vice President of Engineering for QNX Software, where he concentrated on the automotive and embedded markets. He also worked at Cisco and directed development of the seminal CRS-1 carrier routing system.

Charles is a noted speaker, thought leader and IoT expert who has been at the forefront of new frontiers in digital connectivity for over three decades. He graduated with honors from the University of Waterloo (Canada) with a bachelor’s degree in applied mathematics and electrical engineering minor.

About Eric Cornelius

Eric Cornelius is the Chief Product Officer at Blackberry Cylance. In this role, Eric drives product and innovation. Previously Eric served as VP of Innovation, Director of Critical Infrastructure/ICS and Technical Director of Incident Response/Critical Infrastructure at Cylance. Eric brings this wealth of knowledge and long history as a security practitioner, consultant, trusted advisor and product builder to his work in elevating our product development initiatives, and to leading our product management and corporate development teams.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review! 

Mar 04 2019

43mins

Play

Rank #7: The Cybersecurity Skill Shortage is a Matter of National Security

Podcast cover
Read more

Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe.

Over two thirds of all network compromises are not discovered for months

The average cost to a business for each record lost to a data breach is $148

Now consider that, according to the Herjavec group, there will be over 3.5 million cybersecurity job vacancies by 2021. These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present?

In today’s special LIVE episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day.

About Huntsource

Huntsource seeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything.

Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe.

About Matt Donato

Matt Donato is the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business.

About Jack Hall

Jack Hall is the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Oct 29 2018

16mins

Play

Rank #8: Clint Watts: The World of Advanced Persistent Manipulators

Podcast cover
Read more

Clint Watts: The World of Advanced Persistent Manipulators

This $#!%’s chess! It ain’t checkers

 -- Detective Alonzo Harris; 2001, Training Day

Want to have some fun with some numbers? As of May 2019, the total worldwide population identifying as human is 7.7 billion. Among those people, 4.4 billion of them use the internet. Not quite everyone is sharing their lives, but there are 3.499 billion active social media users.

Are they all real people? That’s a valid question… There are an estimated 270 million fake Facebook profiles. Oh… and… in 2018 Twitter deleted 70 Million accounts they determined were fake. So there’s that.

Clint Watts studies terrorists, terrorism, social media, external forces meddling with elections and a lot of other Orwellian things. Since publishing Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News last summer, he has looked deeper into other types of election hacking including Deepfakes. You may have seen his June testimony in front of the U.S. House of Representatives Permanent Select Committee on Intelligence on C-Span… if you’re a C-Span type of person.

In this week’s episode of InSecurity, Matt Stephenson welcomes Clint Watts back to InSecurity. This week, we dig into Advanced Persistent Manipulators. Like their technology cousin Advanced Persistent Threats, APMs are hard to quantify, harder to understand and ever more difficult to stop. With governments all over the world in a state of perpetual campaign mode and candidates running their own Troll farms, do we even know what to prepare for? Tune in and find out!

About Clint Watts

Clint Watts (@selectedwisdom) is a Distinguished Research Fellow at the Foreign Policy Research Institute, Non-Resident Fellow at the Alliance for Securing Democracy. His book best-selling Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News shined a light on what has, is and could happen with regard to social media manipulation and the ways foreign interests can hack the electoral process. It was recently released in paperback.

Clint is also a national security contributor for NBC News and MSNBC. His research and writing focuses on terrorism, counterterrorism, social media influence and Russian disinformation. Clint’s tracking of terrorist foreign fighters allowed him to predict the rise of the Islamic State over al Qaeda in 2014. From 2014 – 2016, he worked with Andrew Weisburd and J.M. Berger to track and model the rise of Russian influence operations via social media leading up to the U.S. Presidential election of 2016. This research led Clint to testify before four different Senate committees in 2017and 2018regarding Russia’s information warfare campaign against the U.S. and the West.

Before becoming a consultant, Clint served as a U.S. Army infantry officer, a FBI Special Agent, as the Executive Officer of the Combating Terrorism Center at West Point, as a consultant to the FBI’s Counter Terrorism Division and National Security Branch, and as an analyst supporting the U.S. Intelligence Community and U.S. Special Operations Command.

His supporters think he’s had an interesting career, his enemies think he can’t hold down a job… both would be correct.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

A former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.

Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.

Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.

Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Jul 22 2019

58mins

Play

Rank #9: Women in Cybersecurity: Perspectives on The New Normal

Podcast cover
Read more

Women in Cybersecurity: Perspectives on The New Normal

Science is not a boy's game, it's not a girl's game. It's everyone's game. It's about where we are and where we're going. Space travel benefits us here on Earth. And we ain't stopped yet. There's more exploration to come

 -- Nichelle Nichols

Tennis legend Serena Williams was once asked by a reporter about being considered “one of the greatest female athletes of all time,”

She replied: “I prefer the words ‘one of the greatest athletes of all time."

That made news for a week, which is embarrassing given the fact that Venus has more titles than Michael Jordan, Michael Schumacher and Cristiano Ronaldo… combined.

How bout we just round up the some of the top people in the field for a discussion on what is happening in this crazy world right now? Sound good? Good.

This week on Insecurity, Matt Stephenson speaks with an All-Star Cybersecurity panel of experts including Dr Jessica Barker, Cheryl Biswas, Sherri Davidoff & Theresa Payton. With COVID19 changing everything from industry conferences to the US Presidential Election process, what role does cybersecurity play in The New Normal and The Next Normal? Check it out…

About Dr Jessica Barker

Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cybersecurity. She has been named one of the top 20 most influential women in cybersecurity in the UK and awarded as one of the UK’s Tech Women 50. She is Co-Founder and Co-Chief Executive Officer of Cygenta, where she positively influences cybersecurity awareness, behaviors and culture in organizations around the world.

Dr Barker is a popular keynote speaker and shares her expertise in the media, for example on BBC News, Sky News, Channel 4 News and in Grazia magazine and the Sunday Times. She is Chair of ClubCISO, a peer-based members forum of over 300 information security leaders. In the last year, Dr Barker has given cybersecurity outreach sessions to over 5,000 school students.

Jessica’s new book Confident Cyber Security will be released on June 3rd, 2020, published by Kogan Page.

About Cheryl Biswas

Cheryl Biswas (@3ncr1pt3d) is a Strategic Threat Intel Analyst with a major bank in Toronto, Canada. Previously, she worked as a Cybersecurity Consultant with KPMG. Her experience includes strategic analysis of threat actors and campaigns, security audits and assessments, privacy, DRP, project management, vendor management and change management.

Cheryl holds an ITIL certification and has a degree in political science. She is actively involved in the security community as a conference speaker and a volunteer, and encourages women and diversity in infosec as a founding member of the The Diana Initiative.

About Sherri Davidoff

Sherri Davidoff (@sherridavidoff) is the CEO of LMG Security and the author of Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, Davidoff has been called a “security badass” by the New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC and many more.

Sherri is an instructor for Black Hat, and the co-author of Network Forensics: Tracking Hackers through Cyberspace. Davidoff is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in computer science and electrical engineering from MIT. She has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called Alien.

About Theresa Payton

Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data.

Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation.

As White House Chief Information Officer at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members.

Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security."

Theresa’s new book, Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Mar 30 2020

1hr 6mins

Play

Rank #10: HuntSource is working hard to fill the Cybersecurity skills gap

Podcast cover
Read more

HuntSource is working hard to fill the Cybersecurity skills gap

Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe.

These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present?

Have you heard some of this before? We hope you enjoyed last week’s tribute to Orson Welles and our CyberWar of the Worldpodcast.

Now let’s get serious and have an in depth discussion about the Cybersecurity Skills gap….

In today’s episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day. 

About Huntsource

Huntsourceseeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything.

Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe.

About Matt Donato

Matt Donatois the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business.

About Jack Hall

Jack Hallis the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Nov 05 2018

47mins

Play

Rank #11: Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record

Podcast cover
Read more

Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record

“Were it left to me to decide whether we should have a government without newspapers, or newspapers without a government, I should not hesitate a moment to prefer the latter.”

“Nothing can now be believed which is seen in a newspaper. Truth itself becomes suspicious by being put into that polluted vehicle.”

Odds are, if you are affiliated with cybersecurity in any way, you have been touched by The Cyberwire. They are a cyber security-focused news service which is viewed as a trusted, independent voice in the world of news swirling around cybersecurity. Cyberwire delivers accessible and relevant information by working hard to separate the signal from the noise in an industry overloaded with information and competing messages 

As our world gets more connected with each new wired device, each new piece of IoT, we need to understand how to protect these things, and by extension, ourselves.

In this week’s episode of InSecurity, Matt Stephenson chats with Dave Bittner about Cybersecurity in the year that was and the year to come. They also quote Albert Brooks, discuss octopus eyeballs and debate the merits of Vinyl LPsand cassettescompared to digital music and streaming. You’re not going to want to miss this one…

About Dave Bittner

Dave Bittner(@bittner) is  the Producer and host of the CyberWire DailyPodcast, the top-ranking daily cybersecurity podcast in the world according to iTunes. In addition his duties as host of the CyberWire podcast, he also hosts the Hacking Humans&Recorded Futurepodcasts.

Bittner has over twenty years experience in digital media, video and television production and interactive technology. He has developed award winning interactive training programs for a variety of industries, and produced countless corporate, industrial and broadcast programs as co-owner of Pixel Workshop.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Jan 14 2019

45mins

Play

Rank #12: Dr Saif Abed: From the ICU to the Data Center; Why an MD in Cybersecurity Makes Sense

Podcast cover
Read more

Dr Saif Abed: From the ICU to the Data Center; Why an MD in Cybersecurity Makes Sense

I was feelin' so bad, I asked my family doctor just what I had, I said, Doctor… Mr. M.D. … Now can you tell me, tell me, tell me, What's ailin' me?"

 --Good Lovin’; The Rascals, 1966

What if I told you that, according to the 2018 Horizon Report from Fortified Health Security, 100 percent of web applications connected to critical health information is vulnerable to cyber attacks.

Varonis tells us that the loss of data and related failures will cost healthcare companies nearly $6 trillion in damages in the next three years.

Meanwhile, ISACA reports that 27% of healthcare firms say they are unable to find candidates to fulfill cybersecurity roles

This week on Insecurity, Matt Stephenson speaks with cybersecurity expert Dr Saif Abed, founder of AbedGraham, Clinical Cyberdefense Systems and a MEDICAL DOCTOR! Why would someone leave the calm world of the ICU for the chaos of securing a data center? Take a walk with Dr Abed to learn about his journey from healing patients in the surgery to keeping patient data safe and protected worldwide.

About Dr Saif Abed

Dr Saif Abed (@Saif_Abed) is a medical doctor and healthcare cybersecurity/national security expert. He is a recognised subject matter expert within all sub-sectors of healthcare IT with a primary field of specialisation in cyber-warfare and crime targeting public sector healthcare systems. He is currently a Founding Partner and Director of Cybersecurity Services at AbedGraham, Europe's leading exclusively clinically based healthcare cybersecurity consultancy. He is also the CEO of Clinical Cyber Defense Systems, a Boston based cybersecurity analytics company supporting US healthcare providers to derive clinical and business insights from technical security data. He holds additional roles as an independent expert for the European Commission's Horizon 2020 programme with a focus on healthcare and cybersecurity and as an expert for the World Health Organisation's Digital Health Technical Advisory Group. Dr Abed is regularly invited to contribute content and thought leadership for national media outlets, healthcare technology articles and global security events. Additionally, he has previously been recognised as a multiple international award winning and published researcher in the field of oculo-plastic surgery whilst a trainee at St. George's Hospital Medical School, London.

About AbedGraham

AbedGraham (@AbedGraham) is a leading, clinically based, European health IT and cybersecurity consultancy that provides advisory services for large technology infrastructure suppliers and government agencies that are involved in, or are responsible for, the digital transformation of healthcare systems. Our consultants are clinically trained as well as being qualified experts in specialist areas such as cybercrime and threat modelling. Selected services including strategic research, policy analysis, bid support, regulatory compliance guidance and project management.

About Clinical Cyber Defense Systems

Clinical Cyber Defense Systems (@CyberClinical) is a US developer of cybersecurity analytics and visualization platforms for healthcare providers. CCDS is headquartered in Boston, Massachusetts and is composed of a team of pioneering physicians, security architects and data scientists.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Oct 28 2019

1hr 10mins

Play

Rank #13: Brian Robison: Mobile Malware and APT Espionage

Podcast cover
Read more

Brian Robison: Mobile Malware and APT Espionage

Until now, the public’s exposure to mobile phone malware has been dominated by news about the privately run “greyware” vendors, including Gamma Group, Hacking Team and NSO. Their commercial smartphone spyware seems to inevitably end up in the hands of autocrats who use it to hamper free speech, quash dissent, or worse. Consumers of these news stories are often left with the impression that mobile malware is just something paranoid dictators purchase for use within their own borders in luddite countries few people can find on a map. It is not.

In a coming report, BlackBerry Cylance researchers will reveal what the focus on those groups has overshadowed: several governments with well-established cyber capabilities have long ago adapted to, and exploited, the mobile threat landscape for a decade or more. In this context, mobile malware is not a new or niche effort, but a longstanding part of a cross-platform strategy integrated with traditional desktop malware in diverse ways across the geopolitical sphere.

This week on Insecurity, Matt Stephenson has a chat with BlackBerry Cylance Chief Evangelist Brian Robison about the scourge of Mobile Malware and how the threats that come from attacking mobile devices are different… and thus require a different mindset when it comes to securing those devices and your network.

About Brian Robison

Brian Robison has over 20 years of cybersecurity experience. As Chief Evangelist at BlackBerry Cylance he is focused on educating and inspiring the world. Robison hosts live Hacking Exposed events, where he demonstrates the tools and techniques of real-world threat actors.

Brian is a regular speaker at industry events such as RSA, Black Hat, thought leadership forums like ISC2 Think Tank and is highly sought after to speak at partner events.

Prior to joining BlackBerry Cylance, Robison worked to defend organizations from mobile security threats —three years as a Director at Citrix XenMobile and two driving enterprise strategy at Good Technology.

Brian also spent over six years at McAfee with a special focus on end-point security -leading efforts to modernize ePolicy Orchestrator. During this time, he also managed vulnerability and policy compliance solutions. His early career ranges from a six-year period with Tripwire, Inc. to cutting his professional teeth in consumer electronics at Diamond Multimedia. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Oct 07 2019

57mins

Play

Rank #14: Susan Ramonat: Wait… Blockchain in Healthcare?

Podcast cover
Read more

Blockchain and AI and IoT, OH MY!

“Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly.”

 -- Vitalik Buterin, co-founder Ethereum and Bitcoin Magazine

According to our friends at Proto, IDC Health predicts that blockchain adoption in health care will increase eightfold by 2022. Yet for now, it remains a technology in its infancy, and one recent survey of health care organizations found that only 6%

were building blockchain programs and just 3% had pilot programs underway. Nearly two in five weren’t doing anything at all.

“it’s pretty confusing, right?" slick-to-the-touch banker Jared Vennett (Ryan Gosling) asks in voiceover not far into The Big Short. "Does it make you feel bored? Or stupid? Well, it’s supposed to. Wall Street loves to use confusing terms to make you think only they can do what they do. Or even better, for you to just leave them the #@&% alone:

 -- Jared Vennett (Ryan Gosling); The Big Short, 2015

Does the cybersecurity industry do that to you?

Do we set up in these vocabulary word protected forts in order to unnerve you to the point that you doing really understand anything other than the fact that ALL YOUR DATA IS AT RISK AND ONLY WE CAN SAVE YOU

What if I told you that there are plainspoken people involved in some of the most esoteric aspects of security who really WANT you to understand what is happening and why some magical technology might provide a better solution

What if she used plain language to explain some very bleeding edge technology?

Spiritus CEO Susan Ramonat joins Matt Stephenson this week to talk about the role of Distributed Ledger Technology and Blockchain in securing healthcare data

About Susan Ramonat

Susan Ramonat is the CEO of Spiritus, where she draws upon 25 years of executive experience in enterprise sales, product management, technology strategy, corporate development, operational risk management, and cybersecurity.

She is a strategic ground-breaker with a historical sensibility. In her work, Susan brings an understanding of context, contingency and uncertainty to bear with humility and pragmatism to inform decisions and promote a recognizably human, desirable future.

She speaks frequently at industry conferences and universities about DLT/blockchain, artificial intelligence, IoT and cybersecurity for critical infrastructure.

Susan serves on the Dean’s Advisory Council at Loyola University Chicago and is an Industry Associate at UCL Blockchain Centre of Excellence. She is a magna cum laude graduate of Princeton University.

About Spiritus

Spiritus (@SpiritusPtrs) is delivering ground-breaking transparency and analytics about the safety and condition of medical devices at the point of care.

With Spiritus, health systems, manufacturers and 3rd party service providers connect the dots across a medical device's operating life cycle. In a shared middle ground, they agree on a single service history… for life, using multi-party consensus. 

Based in Exton, PA with a development center in Edinburgh, Scotland, Spiritus is raising the bar for governance, risk and compliance at leading health systems in the process of digitally-enabling their clinical operations.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Dec 10 2019

1hr 5mins

Play

Rank #15: Joseph Menn: Cult of the Dead Cow

Podcast cover
Read more

Joseph Menn: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

Cult of the Dead Cow

Mudge

DilDog Sir Dystic Oxblood Ruffin Lord Digital Mixter Psychedelic Warlord

You might not know who they are but they changed your life more than Lewis Rainieri, the I-pod and YouTube put together.

Have you ever seen Hackers? The Net? Antitrust? Sneakers? If you’re a subscriber to the InSecurity podcast… odds are you’ve seen and love those movies as well as a list of others we could mention. If you like any of these flicks, then you know… or should know… that they all owe a debt to a group of men and women who changed the world over 30 years ago

Long before there was a multi-billion dollar cyber industry, there were some ethical hackers who showed us that the Silicon Valley emperors had no clothes. They looked like misfits, but they showed us how insecure the Internet was and how to make it better”

-- Richard A. Clarke, first White House "Cyber Czar" on Cult of the Dead Cow

“We were pirates, not mercenaries… Pirates have a code.”

-- Rob Beck; Former member @stake and Cult of the Dead Cow Ninja Strike Force; Much @Stake: The Band of Hackers That Defined an Era

In this episode of InSecurity, Matt Stephenson has the rare privilege of a chat with best selling author Joseph Menn on his latest blockbuster book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. It’s been over 30 years, but Joe spoke with the original punk rock hacking collective about what they did and how they changed the world.

Oh… and one of them is running for President of the United States.

About Joseph Menn

Joe Menn (@josephmenn) has been a professional journalist for three decades, specializing in technology stories since 1999. His  most recent book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, was published in June 2019. The New York Times Book Review said: “The tale of this small but influential group is a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age." An adaptation of the book for Reuters revealed that Beto O'Rourke had been a member of the enormously influential group and drew the most engagement on Reuters.com in its history.

Previously, Joe wrote Fatal System Error: the Hunt for the New Crime Lords who are Bringing Down the Internet. That book was the first serious journalism accusing the Russian intelligence agencies of working with organized cyber criminals. It also exposed Gambino crime family investments in Internet gambling operations, and was cited in that context by the Miami Herald and McClatchy Newspapers in their Pulitzer Prize-winning coverage of the Panama Papers money-laundering leaks. 

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom — even democracy itself

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters — activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O’Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.

Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Jun 17 2019

1hr

Play

Rank #16: Paula Januszkiewicz: Teach them Security and They’ll Be Safe for a Lifetime

Podcast cover
Read more

“Your most unhappy customers are your greatest source of learning

 -- Business @ the Speed of Thought; Bill Gates, 1999

“I think most people either forget or don’t know that Microsoft only hires people with IQs well over 130”

 -- NY Times; Douglas Coupland, 1998

Last week, Microsoft Windows turned 34 years old. Next year, it can be President of the United States.

You think that means Microsoft is getting old and losing touch? Maybe… but consider the facts that, as of May 07, 2019, 1.5 BILLION machines run Windows AND… according to Microsoft, over 900 MILLION machines run Windows 10.

Every day, Microsoft analyzes over 6.5 TRILLION signals in order to identify emerging threats and protect customers.

While Microsoft may not be rolling out streaming services or dropping new devices in splashy events every fall, this summer, they quietly became only the third company in world history  to be valued at over ONE TRILLION DOLLARS.

Say what you will about them, but it’s a lot harder to go through a day without Office, Windows and Azure than it is without an iPad, Linux or Amazon

And… don’t even get us started on gaming…

Halo? End of discussion. Steam? As of November 2018, 90% of Steam gaming machines were running Windows 10

There’s a reason Bill Gates overtook Warren Buffet as the world’s wealthiest person.

This week on InSecurity, Matt Stephenson chats with CQURE founder & CEO Paula Januszkiewicz about the security orbit around Microsoft… what are the misconceptions? What is Microsoft doing right? How does security training impact an organization? What is hype and what is legit in security? And a bit more…

About Paula Januszkiewicz

Paula Januszkiewicz (@PaulaCqure) is the founder and CEO of CQURE Inc., a a provider of specialized services in IT infrastructure security, business applications, consulting and advisory services.

She is an IT Security Auditor and Penetration Tester, Cloud and Datacenter Management MVP and trainer (MCT), and Microsoft Security Trusted Advisor.

Paula is also a top speaker at many well-known conferences including TechEd conferences around the world, Microsoft Ignite, RSA, Black Hat USA, and CyberCrime.

She is engaged as a keynote speaker for security related events and writes articles on Windows Security. She drives her own company, CQURE, working on security related issues and projects. Paula has conducted hundreds of IT security audits and penetration tests, some for governmental organizations.

Her distinct specialization is on Microsoft security solutions-she holds multiple Microsoft certifications, and is familiar with and possesses certifications in other related technologies. Paula is passionate about sharing her knowledge with others. In private, she enjoys researching new technologies, which she converts to authored trainings.

Oh… and… Paula has access to the Windows source code!

About CQURE Inc. and CQURE Academy

CQURE  is a provider of specialized services in IT infrastructure security, business applications, consulting and advisory services. Our projects Every project is discussed in detail with Clients. We believe that this is the only way to achieve full satisfaction in IT projects. Our key to success are: highly qualified team and good planning. We build the detailed project schedules, thus avoiding a delay.

CQURE was formed in November 2008 and since that time we finalized many projects: starting from IT, Security Audits, ending up with trainings and implementations. Clients range from the global corporations to small companies. For large and medium companies they offer authorship training packs, intensive IT Security audits for the whole IT environment and solutions adjusted to their needs.

CQURE Academy (@CQUREAcademy) is a part of CQURE company that was formed in 2008 in Poland and since then has expanded to the rest of Europe, the Americas, Middle East and Asia – as well as opening offices in New York and in Dubai.

On a daily basis, they deliver IT services — ranging from IT security audits, to penetration tests or solution implementations in big and small organisations around the world. In CQURE Academy they share our expertise offline at seminars and conferences and online through videos and blog posts.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the host of the InSecurity podcast and video series at events all over the world.

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Dec 02 2019

1hr 9mins

Play

Rank #17: As a Healthcare CISO, Taylor Lehmann protects more than just Endpoints

Podcast cover
Read more

InSecurity Podcast: As a Healthcare CISO, Taylor Lehmann protects more than just Endpoints

Is a Patient a User? A Customer? A Client? Wellforce CISO Taylor Lehmann Needs to Protect Them All.

Taylor Lehmann is the CISO of a healthcare system spread over 8 locations that treats hundreds of thousands of patients and employs thousands of staff.

He has to be on top of all it from a cybersecurity perspective. Wellforce users and “customers” are a very different responsibility for Taylor compared to that of the average CISO. Lives are literally on the line.

In this episode of InSecurity, Matt Stephenson chats with Wellforce’s Taylor Lehmann on the role of the CISO at a large, multi-location healthcare system. Taylor isn’t just a suit-and-tie executive, though. He puts on the scrubs and does rounds with the medical staff in order to immerse himself in the daily operations of the facilities. For Taylor, that is the only way to grok what is happening at Wellforce and to know what he and his teams must be doing to protect it

About Taylor Lehmann

Taylor Lehman (@sidechannelsec) is the CISO of Wellforce and Tufts Medical Center. He was formerly the CPO/CISO/CIO/ Director for Independent Health, HealthEdge, and PwC, as well as the former VP of Cyber Risk Management at State Street Bank.

Taylor is also an expert in securing software development and delivery, and is on the boards of Gartner Evanta, the HITRUST Community Extension Program, the TPA Summit, and the Business Associate Council. He has CBCP, CISM, CISA, CRISC, CIPP/US, CCSFP (HITRUST), ITIL, HCISPP, and PMP certifications. 

About Matt Stephenson

Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Sep 24 2018

47mins

Play

Rank #18: Brian Haugli: Livin’ La Vida CISO

Podcast cover
Read more

Brian Haugli: Livin’ La Vida CISO

According to our friends at Ponemon… in a 24 month period, a business has a 1 in 4 chance of being hit with a significant threat.

A separate study shows that nearly 75% of businesses do NOT have an established incident response strategy that is applied consistently across their organization.

In a Crisis Situation, the most scarce and precious resource a CISO has is time.

How a CISO implements his or her OODA Loop can make or break a company and a career.

What if you are a Small or Medium business who does not have a traditional C-Suite structure or security team?

What if you are a CISO and all eyes are on you?

Will you be ready?

Are you ready now?

What if we told you that there are companies out there who can help your organization deal with these crisis situations without the process and expense of hiring a full time CISO?

In this episode of the InSecurity Podcast, Matt Stephenson with Side-Channel Security co-founder and former CISO Brian Haugli. Brian has been around the CISO block more times than most and is the host of the #CISOLife series on YouTube. He is leading the charge to bring Enterprise Level CISO talent to mid-market companies in order to protect their business and keep the bad guys out.

About Brian Haugli

Brian Haugli (@BrianHaugli) is a Co-Founder and Partner at SideChannel Security. He is also the creator and host of #CISOLife on YouTube.

Viewed as a "full stack CISO", he is an executive security leader and mentor focused on building high performance security teams, deploying effective operating models, and delivering risk management capabilities for global, domestic, and local enterprises. Brian has held senior advisory & practitioner roles within DoD, the Intelligence Community and Fortune 1000 companies. He has been recognized as a NIST expert, specifically with the Cyber Security Framework (CSF) and 800-53, and for industrial control systems & operational technologies. Brian is a firm believer that the small & mid-market companies deserve security guidance and realistic capabilities just the same as large organizations. 

About SideChannel Security

Side Channel Security specializes in consulting organizations who need CISO advice to protect their digital assets. They offer CISO & advisory services to the C suite, their boards, and those accountable for security across their operations or their products.

SideChannel Security has engaged in military operations under the DoD and consulted the largest companies in the world in Big 4 consulting.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Nov 20 2019

1hr 14mins

Play

Rank #19: Susan Etlinger on The Ever Expanding Role of Artificial Intelligence

Podcast cover
Read more

From Amazon Echo to self-driving cars to Norman, the Psychopathic AI… the Artificial Intelligence diaspora appears to be growing as diverse as humanity itself. Are we good with that?

Susan Etlinger joins Matt Stephenson on the InSecurity podcast to dig into the business ramifications of the ever-increasing presence Artificial Intelligence in the data center. Susan is an industry analyst focusing on industry trends related to the impact of emerging technologies on organizations and individuals. Susan specializes in business strategies related to artificial intelligence, data science, analytics and digital ethics.

In this episode of Insecurity, Susan calms Matt's irrational fears of the potential of AI while illuminating the exciting present and future of Artificial Intelligence and Machine Learning.

We'll take a look at what is happening in "The Enterprise" and why AI experiments like Microsoft's Tay and MIT's Norman can provide value. Given that Susan was recently named among 100 #AI Influencersby US AI, she is among the most qualified among us to lead this conversation. 

About Susan Etlinger

Susan Etlinger(@setlinger), an industry analyst at Altimeter Group, is a globally recognized expert in digital strategy, with a focus on artificial intelligence, big data, AI ethics and big data. Susan conducts independent research and has authored many reports that are available to the public. Susan works with Global 2000 clients to assess the impact of AI and related technologies on business, and identify use cases, opportunities, risks and organizational structure and culture. She also works with technology vendors to refine product road maps and strategies based on her independent research. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Aug 19 2018

37mins

Play

Rank #20: Marcus Carey: Tribe of Hackers

Podcast cover
Read more

Marcus Carey: Tribe of Hackers

There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. With his new book Tribe of Hackers, Marcus Carey wants to change that.

Tribe of Hackers is a collection of industry, career, and personal insights from 70 cybersecurity luminaries.

In this week’s episode of InSecurity, Matt Stephenson sits down with world renowned hacker Marcus Carey, CEO of Threatcare, to talk about talk about his new book, Tribe of Hackers as well as mentors from his past who have influenced him and, by extension, influenced the world of cybersecurity.

About Tribe of Hackers

These are the wisdom and perspectives of real-life hackers and cybersecurity practitioners, including David KennedyWendy NatherLesley Carhart, and Bruce Potter.

Threatcare will be giving away three copies per day (fifteen total) at the RSA Conference. Follow Threatcare on Twitter and Sign Up for the Risk Report to learn more about the details.

All proceeds from the book will go towards Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid’s Club.

About Marcus Carey

Marcus Carey is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy and holds a Master’s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. Currently, working as founder and CEO of cybersecurity company Threatcare, Marcus is passionate about giving back to the community through things like mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time. Tribe of Hackers is his first published book, but will definitely not be his last.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Jan 28 2019

51mins

Play