
Security Confidential
By Dark Rhino Security

Security ConfidentialAug 30, 2021

S12 E10 Bourbon Breakdown
#SecurityConfidential #DarkRhinoSecurity 00:00 Introduction 01:10 Apple Zero-Day Exploited 06:14 TEMU App 09:42 Cisco to buy Splunk 13:35 Bookers Bourbon 14:50 F35 Hacked 21:47 MGM Breached 23:43 5 Lawsuits against MGM resorts 28:14 Sony Systems Hacked by new Group 32:53 Cyber Horror Stories ---------------------------------------------------------------------- Articles Mentioned: https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html https://grizzlyreports.com/we-believe-pdd-is-a-dying-fraudulent-company-and-its-shopping-app-temu-is-cleverly-hidden-spyware-that-poses-an-urgent-security-threat-to-u-s-national-interests/ https://www.nytimes.com/2023/09/21/business/cisco-splunk-deal.html https://nybreaking.com/im-a-former-defense-official-who-warned-about-the-f-35s-catalogue-of-safety-and-security-problems-years-ago-this-is-why-it-may-have-been-hacked-or-malfunctioned/ https://www.reuters.com/technology/hackers-who-breached-casino-giants-mgm-caesars-also-hit-3-other-firms-okta-says-2023-09-19/ https://www.8newsnow.com/news/local-news/5-lawsuits-go-after-mgm-caesars-following-data-breaches-seek-ok-for-class-action-status/ https://kotaku.com/sony-playstation-hack-breach-ransomware-ransomed-vc-1850870993 ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S12 E9 What is Vishing?
Dmytro Bielievtsov is the CTO and Co-founder of Respeecher. Respeecher focuses on high-fidelity voice cloning and their synthetic speech technology was the first one to be adopted by big Hollywood production studios in 2019. Respeecher's has already shown up in major Feature films, TV projects, and Video Games. Animation studios, Localization and media agencies, in Healthcare, and other areas are using it. Some of their projects include artificially voicing God of War Ragnarok, de-aging Mark Hamill’s voice in The Mandalorian and The Book of Boba Fett, and James Earl Jones’s voice for the Obi-Wan Kenobi series. They have also been featured in Forbes, The Guardian, TechCrunch, VentureBeat, to name a few.00:00 Introduction00:19 Our Guest01:33 Running a company in the Ukraine04:55 Respeecher07:24 How does Respeecher work?10:37 How did Hollywood find you?12:10 Voice work for Star Wars14:55 Do you keep the voice?16:23 Deep Fake in the Election22:02 Vishing23:25 Luke Skywalkers Voice25:26 De-Aging Mark Hamill’s voice26:15 Animal Voices28:02 The Future for Respeecher30:11 Electrolarynx devices ---------------------------------------------------------------------- To learn more about Respeecher visit https://www.respeecher.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S12 E8 The Human Factor is the Weakest Link
Frank is a cybersecurity and privacy expert and former C-level executive with 25 years of experience developing compliance and privacy programs for large healthcare systems. Riccardi has held positions as Chief Compliance and Privacy Officer overseeing high-profile data breaches and cybersecurity investigations. His book, “Mobilizing the C-suite: Waging War Against Cyberattacks,” urges C-suite leaders to take action against cyberattacks by deploying basic cybersecurity controls and supporting frontline cybersecurity professionals with companywide cyber hygiene training. It also introduces real-world cybersecurity principles to college students, our future generation of cyber-savvy leaders.
00:00 Introduction
00:19 Our Guest
01:20 Frank’s Background
02:05 2021 Events, Motivation, and the Colonial Pipeline
07:28 Regulations in Healthcare
10:14 Does the C-suite understand that Cyber is a business problem or an I.T. problem?
17:53 The trickery behind the technology
21:17 The Human Factor is the weakest link in Cybersecurity
23:27 Why do Healthcare organizations ask for Social Security?
28:15 Why can’t the healthcare industry solve the problem?
31:55 Bills from Hospitals. What percentage do they get?
35:38 Mobilizing the C-suite: Waging War Against Cyberattacks
36:55 Connect with Frank!
Frank https://www.linkedin.com/in/frank-riccardi-jd-chc-261831b1/

Streaming Services vs. Cable | Confidential Happy Hour
Taking a break from our regularly scheduled Security Confidential episodes to talk about Streaming services, important skills that need to be taught in schools, an Okta Breach, and "Owning" DVDs. To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #disneyplus #hulu #hbomax #netflix #streamingservices #entertainmentnews #movies #actionmovies #jamesbond #schooleducation #oktabreach

S12 E7 More Than The Original Voice Of SIRI
Her career started with music. From then on, she did hundreds of commercial jingles (famously, Tillie the All-Time Teller for the first successful ATM in the US) and sang backup vocals on tour with Burt Bacharach and Roy Orbison. She got into voiceover and acting work at Doppler Studios in Atlanta, when the voice actor hired for a particular commercial didn't show up, and studio owner Pete Caldwell suggested she do the spot instead. She ended up doing spots for Coca-Cola, IBM, Papa John's Pizza, McDonald's, AT&T, Wendy's, Goodyear, Ford, Chiquita, etc., for both radio and TV. She also ended up working on camera for such clients as Morrison's, Ford, GA Pacific, IBM, Kimberly Clark, etc. But she’s Best known as the original VOICE OF SIRI. 00:00 Introduction 00:18 Our Guest 01:18 Her background 03:01 How Apple Took Her Voice 04:55 Remaining positive 05:16 Working with Roy Orbison 06:55 Perfect Pitch 07:40 Learning to play the Piano 08:40 How Siri affected her career 09:31 A Siri-like voice 10:07 Future acting jobs 11:45 Are you tech-savvy? 12:33 Remaining Positive 14:44 AI taking over voice work 16:53 Have you ever not been selected as the voice of Siri? 18:18 Hire Susan for your speaker events 19:00 A message to anyone in Tech ---------------------------------------------------------------------- To learn more about Susan or to hire her for your next event, visit https://susancbennett.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #Voicework #SAGAFTRAstrike #SAGstrike #Actorstrike #Siri #voiceacting #appleceo #susancbennett #susanbennett #mcdonalds #voicecloning ---------------------------------------------------------------------- Photos used: McDonald's logo: https://www.flickr.com/photos/neeky_b/24814690583 Coca-Cola logo: Viktaur, Public domain, via Wikimedia Commons

S12 E6 A Senior Survival Guide
Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection. He was on previously to talk about his book “Confessions of a CIA Spy” and now he’s here to promote his new book “Why Are You Messing With Me? - Senior Survival Guide on Fraud, Privacy, and Security". 00:00 Introduction 00:19 Our Guest 02:06 ChatGPT and Generative Ai: How they’re used 06:14 Evil ChatGPT 07:16 How do we remain secure with Ai? 12:18 Why you shouldn’t be giving out your SSN 13:35 Sim Swapping Case 16:26 U.A.E Voice Cloning Case 23:07 What measurements does the CIA take? 25:55 Facial recognition 27:03 Educating the Public 29:38 Why are you messing with me? - Senior survival guide 43:28 More about Peter --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- Links Mentioned: $24M AT&T Sim Swapping Case: https://blockworks.co/news/att-crypto-sim-swap-lawsuit Voice Cloning U.A.E Case: https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=4e5cb5507559 Peters Books: https://www.amazon.com/stores/Peter-Warmka/author/B08QZ8C7S6?ref=ap_rdr&store_ref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S12 E5 Building Awareness About Your Startup
#SecurityConfidential #DarkRhinoSecurity Dan Wachtler is the CEO of DarkLight Inc and an accomplished entrepreneur with over 20 years of experience serving in both executive and sales leadership roles. Previously, he was the President of root9B Holdings, Inc., a NASDAQ-listed advanced cybersecurity firm and creator of the first-ever commercial HUNT platform. Dan has led numerous capital raises and managed large corporate realignment efforts including international expansion efforts. 00:00 Disclaimer 00:09 Introduction 00:25 Our Guest 01:18 Journey into Becoming an Entrepreneur 03:44 What is success to you? 08:21 What’s the secret to bringing awareness to your startup? 12:22 How do you differentiate? 16:43 What does DarkLight do? 22:53 How does your system differentiate between industries? 28:30 Understanding Risk 31:09 Does A.I. have a role in this? 36:07 Getting a Demo with DarkLight 37:44 More about Dan and DarkLight ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S12 E4 Understand, Manage, and Measure Cyber Risk
Ryan is the CEO of Neuvik and the author of the book “Understand, Manage, and Measure Cyber Risk”. His past adventures include growing a cyber research and development company, formerly serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, a cybersecurity strategist for McKinsey, and a technologist at IBM. 00:00 Introduction 00:17 Our Guest 01:08 Behind the name Neuvik 02:20 What does Neuvik do? 03:29 Imperfect Technology layered on Imperfect Technology 05:35 Is the next gadget worth it? 07:54 Guiding a newbie CXO 10:50 What is it that you're protecting? 22:54 Which framework has worked the best? 25:56 Understand, Manage, and Measure Cyber Risk 35:39 Leveraging vulnerabilities for offensive purposes 40:35 Connecting with Ryan --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com --------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security --------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #riskmanagement #cyberrisk #cybernews #cyberbook #Neuvik

S12 E3 Your guide to SBOMs
Eric is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On top of that, Eric has formal training as a software and mechanical engineer 00:00 Introduction 00:16 Our Guest 02:11 Open Source is Everywhere. Even Healthcare 04:45 Legal Risk using Open Source 06:05 Reading the Terms and Conditions 07:55 Would development time increase if you don’t use Open Source? 09:16 26,448 New CVEs Reported in 2022 11:03 Equifax Attack affected 143 Million 13:01 Therac-25 Medical Device Tragedy 14:53 What is a SBOM? 18:53 You need an FBOM 20:21 Knowing your “ingredients” 21:53 Is this a blockchain problem? 23:42 How does an SBOM help me? 31:48 Embedded Systems 40:28 Forking a project 43:10 How is SOOS staying up to date 47:40 Holding companies responsible 53:15 News from Eric

S12 E2 Who is Responsible for Cybersecurity?
Robert Black is a Lecturer in Information Activities at Cranfield University on behalf of the UK Defence Academy. He is also the former Deputy Director of the UK’s National Cyber Deception Laboratory. At the Defence Academy, he helps educate senior military leaders about Warfare in the Information Age. His interests are several interests one of them being the role of influence and deception in cyber. 00:00 Introduction 00:19 Our Guest: Robert Black 01:28 Rob's Journey into Cyber 06:20 The weakest link is designing systems that don’t appreciate humans are integrated as a part of the system 09:17 Taking an insurance mindset 10:36 Does the Lock and Key model for Cyber work on bad actors? 16:12 Legality and Kinetic Response (Hack back, WannaCry attack, Liam Neeson, Crowdstrike report, U.S. Military) 22:30 Striking Fear into the Hackers 28:00 Does that help the SOC team? 29:45 Arguing with Attorneys and Hackers 33:19 Use of Deception in Tech 35:32 The psychology of the adversary 41:41 Who is responsible for Cybersecurity? 52:43 Connecting with Rob ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S12 E1 Tech Talk Overwhelms the NonTechnical
Marius is also a public speaker, mentor, and non-executive director for many cybersecurity businesses. He was the former Cloud Security Architect and Analyst at Domino’s Pizza UK & Ireland, Analyst at Burberry, and many more. 00:00 Introduction 00:18 Our Guest: Marius Poskus 01:03 Physical Security to Cybersecurity 04:14 Tech talk overwhelms the nontechnical 11:00 How do you go about assessing risk? 17:20 A message to the executives 21:56 Cyber basics: How do you connect the dots? 26:39 Understanding the techniques from the 3 letter agencies 42:47 The Role of Offense 48:58 What can we do to implement processes to look out for configurations? 53:55 More about Marius ---------------------------------------------------------------------- To learn more about Marius visit https://www.linkedin.com/in/marius-poskus-92611b22/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #informationsecurity #defense #depth #ciso #risk #malware #ransomware #technews #informationtechnology #oilandgas #mssp #entrepreneur #invest #businesstips #dublinohio #digitalmarketing #socialmediamarketing#follow #foryoupage #Computerscience #Security #Cyberattack #Cloudcomputing

S11 E10 Can Cyber Mercenaries Overthrow the Government?
#SecurityConfidential #DarkRhinoSecurity Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:19 Can Cyber Mercenaries overthrow the government? 04:32 What can we do about it? 09:50 SIEM logic for engineers 12:43 Could the government apply policies to help? 14:32 Refusing to loose Power 17:55 Chris’ Research

S11 E9 Terminated From Speaking at TED Global
Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:00 Introduction 00:24 Our Guest 01:18 How many Chris Rocks are there? 02:58 3 Cyber Threats to Society 05:56 Can you use Genralative Ai for malicious reasons? 09:00 The Third Cyber Threat to Society 12:26 Looking for flaws in the process 16:15 The Gartner Model 18:16 Is it Laziness, Apathy, or Indifference? 23:59 Terminated from speaking at TED Global ---------------------------------------------------------------------- Order his book here: https://www.amazon.com/Baby-Harvest-terrorist-criminal-laundering/dp/1515014576 To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S11 E8 The Recovery of Missing and Exploited Children
#SecurityConfidential #DarkRhinoSecurity --------------------------------------------------------------------------- Your life is important to everyone around you. If you have had Suicidal thoughts, please call or chat the: 988 Suicide and Crisis Lifeline Hours: Available 24 hours. Languages: English, Spanish You can also chat with them online: https://988lifeline.org/ --------------------------------------------------------------------------- Kevin Metcalf is a former federal agent turned prosecutor, author, and founder of the National Child Protection Task Force, which brings together recognized experts in fields such as strategic legal applications, OSINT, cellular mapping and analysis, dark web investigations, and cryptocurrency to aid law enforcement agencies everywhere. Kevin has assisted with the recovery of numerous missing and exploited children and the identification and apprehension of sexual predators in multiple states. 00:00 Disclaimer 00:10 Introduction 00:23 Our guest 01:30 What is OSINT? How does it work? 05:10 Privacy laws 11:30 Sextortion 17:51 Financial Sextortion: How it works 20:00 When does it become statistically significant 21:33 What lead Kevin to help children 22:37 What role does law enforcement play? 25:52 A special case 28:45 OSINT, Mobile devices, and Kevins Books 34:53 Kevin's thoughts on the ADPPA 41:19 News from Kevin ---------------------------------------------------------------------- To learn more about The National Child Protection Task Force (NCPTF) visit: https://www.ncptf.org/ Read more of Kevins Work: https://www.amazon.com/Books-Kevin-Metcalf/s?rh=n%3A283155%2Cp_27%3AKevin+Metcalf To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #missingchildren #NationalChildProtectionTaskForce

S11 E7 What makes a great DevOps team?
Benjamin Johnson is a serial entrepreneur with a track record of success and hands-on open-source programming experience. With 20+ years as a software developer and leader, Benjamin is the CEO & Founder of Particle41, a dev firm founded by industry veterans that aims to help companies accelerate their initiatives through Software Development, DevOps, and Data Science. 00:00 Introduction 00:20 Our Guest 01:25 Behind the name: Particle41 03:07 Ben’s Origin story 05:14 Where did the ideas come from? 08:20 Outsourcing DevOps 10:45 What makes a great DevOps team? 16:50 Extreme Ownership 19:50 “Bridge” Personality 21:30 Is there a benefit to being first to market? 22:55 Monetizing Open Source 28:22 Characteristics that make successful people 34:02 More about Ben ---------------------------------------------------------------------- To learn more about Ben visit https://www.linkedin.com/in/benjaminrjohnson/https://particle41.com/ https://www.linkedin.com/company/particle41/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

S11 E6 You CAN Train Your Mind
#SecurityConfidential #DarkRhinoSecurity This is part 2 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years experience of in researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain, and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level. 00:00 Introduction 00:10 Does a person have the ability to pause their thoughts before taking action? 05:18 What is Resilience? 10:32 You can Train your mind 12:34 Why do teams still fall apart under pressure? 14:42 What would you say to the executive? 17:26 What to do if you get the same results again? 19:00 The Wicked Problem 21:04 The Chain of Command 28:01 Mandatory Security Awareness training: What does that have to do with me? 33:30 More about Bec Thinking, Fast and Slow by Daniel Kahneman https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 ---------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices #trainingyourthinking

S11 E5 The Psychology behind our Cybersecurity Choices and Teams - Part 1
This is part 1 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level.
00:00 Introduction
00:20 Our Guest
01:27 What is a chartered Psychologist?
03:40 How do you control chaos?
07:08 How we compare to mIlitary Training?
09:20 The baseline of response: How does the brain work?
13:31 So how do we structure a team?
17:10 Cognitive Agility: Passing along that knowledge
20:29 Getting Comfortable with being uncomfortable
Thinking, Fast and Slow by Daniel Kahneman
https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555
--------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices

S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester
#SecurityConfidential #DarkRhinoSecurity
Phillip is an offensive security professional, educator, mentor, author, and frequent public speaker. His passions outside of the technical side of cybersecurity are sharing resources, professional networking, and bringing people together. He is also the host of The Hacker Factory Podcast and his new podcast, the Phillip Wylie Show. Phillip is the concept creator and coauthor of The Pentester Blueprint: Starting a Career as an Ethical Hacker.
00:00 Introduction
00:18 Our Guest
01:45 Phillips Origin Story
04:06 Wrestling a 750 pound bear
07:41 From Wresting to Cyber
10:12 What motivated Phillip to pursue Ethical Hacking?
11:43 Vulnerability management: What are we getting wrong?
14:52 Changing the Mindset
26:51 What is the role of Threat Intel?
28:08 Asset Intel approaches31:05 Ransomware: It’s still growing34:35 The Hacker Factory Podcast34:59 The Phillip Wylie Show36:17 News from Phillip37:44 Connecting with Phillip ---------------------------------------------------------------------- To learn more about Phillip visit :https://www.linkedin.com/in/phillipwylie/https://www.thehackermaker.com/Podcasts:https://www.thehackermaker.com/the-hacker-factory-podcast/https://www.thehackermaker.com/phillip-wylie-show/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security

S11 E3 From Disinformation to AI - Pt 2
George Kamide was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus.
00:10 Changing the vulnerability landscape
01:48 Voice Cloning and email chat hacking
05:55 How does a machine generate context?
07:58 Social Media bots
10:06 What jobs will go away with AI?15:40 Whose fault is it?
20:40 Can you 100% trust something?
23:03 Work from Home
26:11 Connecting with George
----------------------------------------------------------------------
To learn more about George visit https://www.linkedin.com/in/george-ka...
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA:
Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
https://www.zdnet.com/article/watch-o...
https://www.wsj.com/articles/i-cloned...
https://www.washingtonpost.com/techno...
https://abcnews.go.com/GMA/Family/mom...
----------------------------------------------------------------------

S11 E2 From Disinformation to AI - Pt 1
George Kamide is a Senior Director at SafeGuard Cyber. He was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 00:00 Introduction 00:18 Our Guest 01:30 George’s Origin story 05:04 Twitter bots controlled by Russia 07:37 Does Congress understand the cyber risks? 09:57 First Watch 13:03 Bare knuckles and Brass Tacks 14:15 Bad practices vendors make 18:40 Developing trust with People virtually 20:43 Using AI for Marketing ---------------------------------------------------------------------- To learn more about George visit https://www.linkedin.com/in/george-kamide/https://www.zdnet.com/article/twitter-bot-activity-spiked-after-the-release-of-the-mueller-report/https://www.cyberdefensemagazine.com/russian-twitter-bot-activity-increased-in-the-wake-mueller-report-release/https://www.safeguardcyber.com/podcasts To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #twitterbot #cybersecurity #cyberpodcast #ai #artificialintelligence #marketingusingai #securitypodcast #firstwatchpodcast #bareknucklesandbasstackspodcast #cybernews

S11 E1 Having ACCURATE Asset Inventory
Huxley Barbee is a Security Evangelist at runZero (formerly Rumble Network Discovery), a company founded by Metasploit creator HD Moore that helps companies discover unmanaged devices for asset inventory. Huxley previously worked for Cisco, Sparkpost, and most recently, Datadog – where he formulated the Datadog Cloud Security Platform. He has spent over 20 years as a software engineer and security consultant. He attended his first DEF CON in 1999 and holds both CISSP and CISM certifications. On top of that, he’s also an organizer of BSidesNYC.
00:00 Introduction
00:15 Our Guest
01:00 Huxleys Origin Story
02:27 Proactive Security, Risk, and Asset Inventory: What’s the connection?
04:56 Using the right tools
07:17 IPv4 and IPv6
11:15 What do you need in terms of an ACCURATE Asset inventory?
21:56 Asset Inventory Playing a role in ransomware
26:17 Connecting with Huxley
https://www.runzero.com/
https://www.linkedin.com/in/jhbarbee/
https://www.helpnetsecurity.com/2023/02/24/bsidesnyc-2023/

S10 E10 How Do You Build A Successful Video Games
Tom Dusenberry has spent 30 years of his career as an interactive entertainment executive and was the CEO of Hasbro Interactive, Games.com, and Atari. He is currently the CEO of Dusenberry Entertainment. Tom is closely associated with great game brands like Monopoly, Trivial Pursuit, Frogger, Star Wars, and Roller Coaster Tycoon.
00:00 Introduction
00:22 Our Guest
01:26 Are you a gamer?
01:55 Tom's Favorite Games in different eras
04:54 Elements for a good game
07:02 Streaming Games
09:55 The Blue Ocean Strategy
12:03 Controlling the Gaming Market
14:20 Dusenberry Entertainment
16:35 The Process needed to create a game
19:54 Is creating a gaming community part of the process?
22:20 Gaming Franchises
23:27 Ai and it’s Role in the gaming world
25:03 Does violence in games cause violence in real life?
27:30 Advice for being successful in gaming
29:33 Got a game idea? Contact Tom! (Tom@tomdusenberry.com) ---------------------------------------------------------------------- To learn more about Tom visit Dusenberryentertainment.com To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Frogger:https://www.amazon.com/Frogger-Classic-Arcade-Poster-Vintage/dp/B098TPZRNL
Sonic the Hedgehog:
https://www.bbc.com/news/newsbeat-57566746
https://play.google.com/store/apps/details?id=com.sega.sonic1px&hl=en_US&pli=1
First Nintendo System:
https://www.amazon.com/Nintendo-Entertainment-System-NES-Classic/dp/B01IFJBQ1E
Nintendo 64 Console: GoldenEye 007
https://retrovgames.com/n64-console-goldeneye-007/
RollerCoaster Tycoon:
https://store.steampowered.com/app/683900/RollerCoaster_Tycoon_Classic/
Forza: https://store.steampowered.com/app/1551360/Forza_Horizon_5/

S10 E9 April 14th News of the Week: Discord, Putin, and Chinese Data
Chris and Rory are BACK! This time with Tech news that you should know about. 00:00 Introduction 02:53 War Thunder Discord Documents 11:54 U.S. taking your Data vs. Chinese taking your Data 13:49 Apple Has Weird Terms and Conditions 15:23 A Guide to Understanding the Hoax of the Century 22:00 Russia’s Electronic Draft Bill ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- https://www.cnn.com/2023/04/14/politics/discord-chatrooms-leaked-pentagon-documents/index.html Understanding the Hoax of the Century: https://www.tabletmag.com/sections/news/articles/guide-understanding-hoax-century-thirteen-ways-looking-disinformationhttps://apnews.com/article/russia-ukraine-war-draft-mobilization-conscription-notices-bf18ad64dd08c9d11aab2e222cabfee9https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/on-the-internet ---------------------------------------------------------------------- #warthunder #apple #termsandconditions #cybernews #technews #russiannews #electronicdraft#militarydraft #chinesedata #chineseapps #discord #itunes #media #politicsnews

S10 E8 How Do You Build A Leader
Melissa Thornley is a leadership consultant who focuses on using emotional intelligence to drive better results. She has years of experience as an advertising/film industry executive and has worked with McDonald’s, Walgreens, Anheuser Busch, Nike, Capital One, Coca-Cola, and PBS. She's known for her contagious energy and passion for turning intangible concepts into tangible outcomes.
00:00 Introduction
00:18 Our Guest
01:15 Starting off in Tech
06:58 Working with Celebrities
09:05 Celebrity leadership
10:20 How do you create a leader?
14:07 Emotional intelligence: What is it?
19:37 Managing your triggers
22:20 Have a system or process
30:25 Personal and Team Accountability
32:38 “Your baby’s Ugly”
40:12 More about Melissa
----------------------------------------------------------------------
To learn more about Melissa visit https://www.melissathornley.com/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA:
Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Read More About Melissa:
https://reelchicago.com/article/reel-women-author-leadership-expert-melissa-thornley/https://medium.com/authority-magazine/melissa-thornley-emotional-intelligence-what-it-is-why-it-is-so-essential-and-how-we-can-2f75525bec62https://cceglobal.org/event/global-industry-spotlight-melissa-thornley/

S10 E7 Stop Playing the Victim Role
Joel Beasley is a well-known figure in the tech industry. In 2017, he founded the Modern CTO Podcast while writing the Modern CTO book, with the goal of interviewing CTOs and sharing their experiences with others in the tech community. From there, Joel founded ProSeries Media to help companies worldwide create their own podcasts. Through his work on the Modern CTO Podcast and ProSeries Media, Joel has inspired others to share their knowledge and insights with the wider community. His passion for creating engaging content that informs, inspires, and entertains has made him a sought-after speaker and advisor on all things tech. 00:00 Introduction 00:22 Our Guest 01:04 Joel’s Origin Story 05:45 Motivation to keep you going 07:18 Maintaining a positive attitude 08:49 What does a CTO do? 12:09 The Role of Failure in Success 15:51 What if Success happens easily? 17:02 Is there a secret sauce to say motivated through the failures. 21:11 Self-awareness 22:25 Playing the Victim 22:52 Nashville shooting 30:18 Modern CTO 30:22 Joel Beasley Tech Titans 30:34 Joel Beasley Tech and Science ---------------------------------------------------------------------- To learn more about Joel visit https://www.linkedin.com/in/joelbeasleyleader/https://proseriesmedia.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security

S10 E6 U.S. Air Force Academy to Teaching Cyber
Josh has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and business consulting for clients 00:00 Introduction 00:22 Our Guest 01:06 U.S Air Force Academy to Cyber 07:28 Is there a bias against Veterans entering Cybersecurity? 08:49 What are clients getting wrong with Infosec? 13:14 Learning Lessons 16:58 People like “Free” 17:35 Constantly Changing 20:43 More about Josh ---------------------------------------------------------------------- To learn more about Josh visit https://www.linkedin.com/in/joshuacmason/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- Images: https://www.military.com/equipment/marine-corps-aircrafthttps://www.zuora.com/billing-topics/annual-recurring-revenue/#:~:text=Annual%20Recurring%20Revenue%2C%20or%20ARR,for%20a%20single%20calendar%20year.

S10 E5 What is Hack-back?
Shea has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. 00:00 Introduction 01:07 Our Guest 02:39 The policy question that made me pause my vacation 05:16 Diversity in Cyber 06:22 Echelon Risk 07:05 Has the Executive Mindset changed? 12:52 Hack-Back and the Biden administration 18:50 News from Shea ---------------------------------------------------------------------- 2023 Central Ohio InfoSec Summit (https://www.infosecsummit.com/website/44575/home/) – it’s titled “Beyond Checking the Box: Putting Compliance at the Forefront of Decision-Making” being presented by Amelia Fisher https://echeloncyber.com/ Hack-Back https://www.techdirt.com/2023/01/27/biden-administration-declares-war-on-the-internet-clears-path-for-offensive-hacking-efforts-by-federal-agencies/https://www.securityweek.com/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations/https://www.darkreading.com/ics-ot/bidens-cybersecurity-strategy-calls-for-software-liability-tighter-critical-infastructure-securityhttps://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.htmlhttps://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-backhttps://techbeacon.com/security/why-hack-back-still-worst-idea-cybersecurity --------------------------------------------------------------------- To learn more about Shea visit https://www.linkedin.com/in/sheanangle/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security

S10 E4 Why is the U.S Banning Tiktok?
Continuing our Conversation with Navy SEAL, Mike Rice
00:00 Introduction
00:18 Our Guest
00:30 The Future of War
05:06 Is China our biggest threat?
09:13 TikTok and other Chinese Apps
11:40 Spy Balloons? Weather balloons? What was it?
16:13 Where do you see the war in Ukraine headed?
17:58 Who is the Wagner group?
18:41 Russia

S10 E3 How Smartwatches lead Iran to US Troops
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation.
00:00 Introduction
00:18 Our Guest
00:33 The Navy SEAL Team
04:05 What made you shift to SEAL Team?
08:16 What was the atmosphere like in BUD/S?
11:09 How was the SEAL Team Technology after 9/11?
13:21 Leveraging Technology
17:39 Where do you see technology affect you the most?
21:40 Stories with Mike

S10 E2 The Secrets of Linkedin's Algorithm
David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.
00:00 Introduction
00:17 Our Guest
01:12 Using LinkedIn to break into Cybersecurity
07:30 Fake Profiles on Linkedin
08:30 Having a complete profile
10:19 the LinkedIn Algorithm
14:20 Useful Certifications and Resources
26:39 Davids Book about Women in Cyber
32:28 SOC fatigue
36:27 What role does Automation has?
37:46 Will Automation replace a SOC Analyst?
39:30 How can Clients improve their Cybersecurity?
42:35 Risk Assessments: Who should be leading?
45:20 Connecting with David
----------------------------------------------------------------------
To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/
To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
https://securityplus.training/

S10 E1 Helping Pave the way for Women in Cyber
#SecurityConfidential #DarkRhinoSecurity
Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.
00:00 Introduction
00:16 Our Guest
01:52 Being in the Special Forces as a Woman
04:30 Cultural Support Team Program
07:47 Jaxs’ Current Mission
09:29 What is an Entry-Level Job?
11:49 How Jax began her journey into Cybersecurity
16:07 Data Breaches: What’s broken?
18:07 Company Policies and Bringing Awareness
19:38 Compliance isn’t security
23:17 NIST vs CMMC vs ISO
27:03 Who uses CMMC?
30:56 Resources for CMMC
32:12 What should the Federal Government be adopting?
36:45 HackBack
41:58 Connect with Jax
----------------------------------------------------------------------
To learn more about Jax visit https://www.linkedin.com/in/iamjax/
https://twitter.com/outpostgray
https://iamjax.me/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Articles and Resources Mentioned in this Video:
Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1
Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html
NICE and NIST Frameworks:
https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/
https://www.cisa.gov/nice-cybersecurity-workforce-framework
https://www.securityprogram.io/a-guide-to-common-security-standards/
Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms
JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/
HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/
Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.
Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039

S9 E10 Biological Viruses vs Computer Viruses
Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization's global DevSecOps transformation initiative. Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.
00:00 Introduction
00:21 Our Guest
01:40 Transitioning from Medical Genetics to Cyber
04:50 The importance of having people from different fields
07:41 Comparisons between Biological Virus and Breach
12:09 Low Earth Orbit Constellation
18:18 Hackers are Collaborative
22:01 100% Security
26:30 Understanding the Risk
30:40 Building a Culture of Awareness
35:35 DevSecOps
38:50 Controlling that 3rd party risk
43:15 Connecting with Wendy
VkzkH79NmeR5yCZidDzz

S9 E9 How Paris Hilton Helped My Career
Bob Carver CISM, CISSP, M.S. began his security career working in the financial industry. Later, Bob became the first full-time security employee hired to start the dedicated security monitoring and incident response team for Verizon Wireless. He has been involved in cyber risk management, policy, threat intelligence, and analytics. He was recognized by LinkedIn as one of the Top 5 Influencers in the World to follow in Cybersecurity. Most recently, he was on the expert panel for CES (Consumer Electronics Show) in Las Vegas discussing "Focusing on Security in Product Innovation."
00:00 Introduction
00:18 Our Guest
01:47 Bobs Beginning
05:02 How did Bob land his position at Verizon?
08:00 Budget issues
11:02 Why are companies so ineffective with Cybersecurity?
13:38 Cyber professionals not addressing business security implications
18:40 Malvertising
21:31 Not downloading everything off the internet
26:15 Curing your problems with a tool
28:26 Budgeting: Where should you prioritize?
32:22 ChatGPT
33:47 Cyber Insurance
37:29 Multifactor Authentication
43:06 File Storing System
45:48 Modern-day Bonnie and Clyde
47:43 Connecting with Bob
----------------------------------------------------------------------
Bobs video on Malvertising: https://www.linkedin.com/feed/update/urn:li:activity:7029053209889411072/
Bob's Twitter: @cybersecboardrm
Bob's LinkedIn https://www.linkedin.com/in/bobcarver/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
---------------------------------------------------------------------
Articles Mentioned:
https://cybermagazine.com/cyber-security/executive-profile-bob-carver-verizon-wireless
https://www.wired.com/2005/02/paris-hilton-hacked-or-not/
VkzkH79NmeR5yCZidDzz

S9 E8 Confessions of a CIA Spy
Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection.
00:00 Introduction
00:19 Our Guest
01:39 How do you become a CIA Intelligence Officer?
05:59 Human Intelligence Gathering
08:27 Knowing the risks within the job
13:24 The Counterintelligence Institute
13:53 Statistics and TED talks
19:42 Change the name of Cybersecurity
22:03 Getting into the mind of a Hacker
27:19 Why would anyone target me?
30:11 Panama Papers
32:28 Success with Employee Awareness
34:57 Being cautious on the Social Media
40:45 Fake Profiles on Social Media
42:32 Advanced AI technology/ ChatGPT
43:20 The Dangers of Linkedin
49:43 Peters Book: Confessions of a CIA Spy
53:10 Contact Peter
----------------------------------------------------------------------
More About Peter:
https://www.counterintelligence-institute.com/upcoming-events
https://www.amazon.com/Confessions-CIA-Spy-Human-Hacking-ebook/dp/B08QYZJ13K?ref_=ast_author_mpb
https://www.linkedin.com/in/peterwarmka/
----------------------------------------------------------------------
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E7 Everybody has a Boss
Eric is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On top of that, Eric has formal training as a software and mechanical engineer.
00:00 Introduction
00:19 Our Guest
01:20 Software Engineering out of College
04:23 Being a Stay-at-Home-Dad
05:57 Entrepreneurship to Corporate
07:33 Everybody has a boss
08:53 Giving Interview Feedback
11:25 Opinionated Questions in an Interview
13:30 What is SOOS?
16:33 Minimum Viable Product (MVP)
24:27 Software tools: What works and what doesn’t?
29:18 People should become more aware
36:12 Compliance
41:03 SOOS tools
46:10 More news from Eric
----------------------------------------------------------------------
Articles Mentioned:
https://soos.io/news/soos-launches-free-community-edition-sca-tool
https://soos.io/news/soos-partners-with-secureframe
https://soos.io/news/new-soos-partnership-with-rkvst-makes-it-easier-to-create-and-share-sboms
https://www.linkedin.com/pulse/importance-giving-feedback-after-interviews-sacha-dixon/
https://www.federalreserve.gov/paymentsystems/regcc-faq-check21.htm
----------------------------------------------------------------------
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E6 Analyst Fatigue
Dallas is a US Army Veteran and Cyber Professional. He has worked for many companies including PerimeterX, Blue Shield, PayPal, and HUMAN where he is currently the Threat Intelligence Analyst. He is skilled in Python, SQL, Information Security, JavaScript, Networking, and recently obtained a new certification in Cyber Threat Management
00:00 Introduction
00:16 Our Guest
00:45 What’s new from Dallas
02:34 HUMAN + Perimeter X
03:51 Cyber is not secure!
05:34 Phishing Emails
09:25 2 Human behaviors that cause breaches
13:24 Analyst Fatigue
15:56 Having Humans perform Automation is not proper automation
20:07 Realtor, Angel Investor, and more projects from Dallas
24:23 HBO Documentary with Dallas
35:32 More news from Dallas
38:14 Connecting with Dallas
Article Mentioned: https://www.businesswire.com/news/home/20210330005240/en/White-Ops-Reintroduces-Itself-as-HUMAN-Signaling-Cybersecurity-Company%E2%80%99s-Dedication-to-Protecting-Enterprises-from-Bot-Attacks
About HUMAN: https://www.humansecurity.com/newsroom/tag/in-the-news
----------------------------------------------------------------------
To learn more about Dallas visit https://www.linkedin.com/in/dallascbaker/
https://www.instagram.com/realdallasbaker/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E5 The Captain America Approach
#SecurityConfidential #DarkRhinoSecurity
00:00 Introduction
00:20 Our Guest
02:15 Philippe’s Origin Story
07:42 Becoming a Leader
14:51 The Captain America Approach
18:20 Approaching Unknown Unknowns
22:34 How to monetize an open-source platform
26:19 Free Users
27:15 Where is Open source going?
28:34 CrowdSecs big announcement
32:01 Malevolent IP addresses Growing
33:25 Ensuring Accuracy
37:32 More about Philippe
Article Mentioned: https://health.clevelandclinic.org/barometric-pressure-headache/
To learn more about Philippe visit https://www.linkedin.com/in/philippehumeau/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E4 Recycling of Electronic Devices and Data
#SecurityConfidential #DarkRhinoSecurity
John Shegerian (pronounced "SHUH-GARE-EE-UHN") is the co-founder and Chairman/CEO of ERI, the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. He is also the co-author of the #1 best-selling book "The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and the host of the IMPACT podcast.
00:00 Introduction
00:10 Our Guest
01:34 Johns Origin Story
05:34 The secret to success: Doing good for others
07:56 Advice for Future Entrepreneurs
11:00 ERI: SOC2 Compliance
12:05 What are the steps for recycling electronics?
15:33 Gold, Copper, Precious Metals
18:30 Is there a recycling issue forming with EV cars? How JB Straubel is involved
25:21 Hardware Hacking
30:55 What to do before throwing electronics away
38:07 Anything you can’t recycle?
42:03 A FREE COPY OF JOHNS BOOK
44:33 Johns Book
47:11 Rental Car Agencies
48:20 Anything new for John
----------------------------------------------------------------------
To learn more about John visit https://johnshegerian.com
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Articles Mentioned
United Nations Article: https://ewastemonitor.info/gem-2020/
https://www.businesswire.com/news/home/20170914006135/en/Fortune-Magazine-Calls-Electronic-Waste-%E2%80%98Dead-but-Not-Forgotten%E2%80%99----ERI-Featured-in-Report-About-Cybersecurity
https://fortune.com/2017/09/06/electronic-waste-recycling-cybersecurity/
Information and photos about John:
https://impactpodcast.com/
https://eridirect.com/category/news/
https://johnshegerian.com/gallery/
https://eridirect.com/
1992 LA Rodney King Riots:
https://www.britannica.com/event/Los-Angeles-Riots-of-1992
https://www.npr.org/2017/04/26/524744989/when-la-erupted-in-anger-a-look-back-at-the-rodney-king-riots
https://www.nbclosangeles.com/news/local/timeline-rodney-king-beating-lapd-verdict-1992-la-riots/2880027/

S9 E3 Credentials: Which ones are the most important?
Brian started his career as a systems analyst for the United States Army then became a Senior Systems Analyst for the United States Airforce. From then on, Brian grew extensive experience with a background in managing risk, security, compliance, business continuity, and governance for SaaS providers. He is currently a Security Test Manager for Adobe.
00:00 Introduction
01:05 The Army or the Airforce? Is one better than the other?
01:40 Brians Background
03:07 Pivoting into a new role
07:14 Credentials: What is important to get?
12:17 Is cybersecurity about a mindset or skill?
13:12 Communicating the Mindset
19:00 Risk Assessment process
24:30 100% Compliance
31:00 Getting pushback
33:47 Risk Quantification
36:36 Third-party risk
47:39 News for Brian
----------------------------------------------------------------------
To learn more about Brian visit https://www.linkedin.com/in/briandavisit/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E2 From Bagging Groceries to Teaching Cyber
Kenneth is a Senior Cyber Security Consultant at EY where he specializes in SIEM and SOAR technologies. He is also the Founder and owner of Ellington Cyber Academy, an E-Learning platform that teaches and trains people on how to use various SIEM and SOAR technologies so that they can transition or upskill themselves in their careers. On top of all that, Kenneth is also a part-time Associate cybersecurity instructor at the University of Houston and a Cybersecurity trainer at Blacks In Cybersecurity.
00:00 Introduction
03:08 The Chicken Tender Sub
04:13 How important are ingredients?
05:24 Passion for educating others
06:30 Leaving an impression with teaching
07:40 Being a good student
09:34 Tips you won’t get in College
11:06 Explaining in business terms
12:38 Why Cybersecurity?
14:35 An opportunity at Publix
15:30 Cyber Bootcamp
18:55 Why choose an analyst role?
20:45 SIEM vs Log Management System
23:10 What do you need for a good SIEM platform?
27:07 What is the role of SOAR
29:19 Ai and Analyst fatigue
32:25 No human elements
36:17 Common mistakes when implementing a SIEM
37:38 Can you ever be done tuning a SIEM
39:25 The Ellington Cyber Academy
41:00 How does ECA compare?
45:00 ECA’s goals in the future
48:02 News for Kenneth
----------------------------------------------------------------------
To learn more about Kenneth visit https://www.linkedin.com/in/kenneth-ellington/
The Ellington Cyber Academy: https://kenneth-ellington-s-school.teachable.com/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S9 E1 Where Does Our Data Go?
#SecurityConfidential #darkrhinosecurity
Justin is a corporate M&A attorney, Author, Tedx and keynote speaker, and business advisor, with a deep background in cybersecurity. He uses a unique skill set to collaborate with executives to create and implement multi-layered strategies to better manage cybersecurity and data protection. He co-hosts the “She Said Privacy/ He said Security” Podcast with his wife Jodi.
00:00 Introduction
01:52 Origin Story
03:19 Remote work: How attackers are successful
07:57 Cyber Proctology Exam
10:00 The Digital Seatbelt of the 21st Century
13:17 Cyber being an afterthought: How to change the mindset
14:20 Where does our Data go?
17:57 Can you have privacy?
19:10 Credibility Gap
27:00 Privacy Laws in Tech (Samsung, Tesla, Healthcare)
35:10 Data Reimagined: Building Trust
39:52 Bad Actors
42:48 Defense in Depth
48:38 A Message from Justin
---------------------------------------------------------
Justin and Jodi's Book: https://www.amazon.com/Data-Reimagined-Building-Trust-Byte-ebook/dp/B0BDVQ97YQ
Justin and Jodi's Podcast: https://open.spotify.com/show/5q8B2oYUPajIvmvZiLa4K4
To learn more about Justin visit https://www.linkedin.com/in/justinsdaniels/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
---------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S8 E10 Trusting Your Remote Employees With Your Business
#SecurityConfidential #DarkRhinoSecurity
Brian is the Vice President of Worldwide Channels and Alliances at DTEX Systems. Brian has extensive experience in MSSP, Channel, Strategic Alliances, and OEM for high-growth security solution providers. Brian has a long history with cybersecurity OEMs starting with CA where I first met him. Brian has been with McAfee, Fireeye, Cylance, Stellar Cyber, and is now with DTEX Systems.
00:00 Introduction
01:18 Technology trends
02:30 Is the industry overcrowded?
05:49 DTEX: who are they and what do they do?
08:45 Compromised Machines
9:26 Endpoint detection
13:48 Where is DTEX Classified?
15:32 Managing Vulnerabilities on the endpoint
18:19 Working with Sectors
20:39 Customer Profile: How small is too small?
24:05 DTEX Cloud
25:23 Trends with Investors
28:00 Remote work: Can you trust your employees?
30:00 Remote work: Fake Linkedin Profiles
33:53 More about Brian
----------------------------------------------------------
Boise States Cyber Dome Program: https://www.boisestate.edu/news/2022/10/12/welcome-to-the-cyberdome/
https://www.boisestate.edu/cybersecurity/
To learn more about Brian visit https://www.linkedin.com/in/brian-stoner-146a56/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
-------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S8 E9 Pro Athlete turned Cybersecurity CEO
#SecurityConfidential #DarkRhinoSecurity
Greg Tomchick is a former professional athlete. He played in the minor league for three seasons for the St. Louis Cardinals. He is the author of the book Growing into you. He is driven by a passion for cybersecurity from an experience he had with a former company. He is currently the Partner and CEO of Valorr. They focused on identifying and mitigating cyber threats upfront and when necessary, countering cyber attacks with targeted and strategic responses.
00:00 Introduction
01:36 Gregs Origin Story
04:15 Incubation Technologies
05:42 The right mindset
10:26 Cyberattack
15:12 Cybersecurity is a business problem
15:56 100% Cyber security?
16:56 Stimulation Output
17:50 How much cybersecurity is enough?
19:17 The process at Valor
22:38 Communicating with the Department of No
24:50 Advise for CEOs when talking about digital risk
27:16 Talking to the executive team
30:02 The Proactive side
31:58 Threat Actors
34:00 Third-Party Risk and Communicating with Vendors
37:50 Laws
43:12 Gregs Book
46:00 More about Greg
To learn more about Greg visit https://www.linkedin.com/in/greg-tomchick/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @DarkRhinoSecurity

S8 E8 Cybersecurity Awareness for Healthcare: Is it discussed?
#SecurityConfidential #DarkRhinoSecurity
Kevin is the director of cybersecurity data and application protection for Cleveland Clinic. He has over two decades of experience in software development and cybersecurity. He has done work in embedded systems and attack surface reduction and has a couple of patents related to this. He is the president-elect for the Northern Ohio HIMSS Chapter. In his spare time, he supports Velosano in fundraising for cancer research.
00:00 Introduction
02:12 From Rockwell to Cybersecurity
04:53 Nation-state actors
07:32 FedEx and Merck Cyber insurance lawsuit
09:04 Cybersecurity awareness for healthcare. Is it discussed?
13:08 Getting the Executive's attention
18:19 Healthcare Data
21:55 Purple Team/Red Team: What is their role?
27:40 Getting the word out about Cyber
33:03 Embedded Systems: How big of a threat are they and how do we manage it?
37:22 Compromised Chips
38:16 Open source components: What are the risks?
41:06 Updating the law? Can we secure everything?
45:24 Velosano: fundraising for cancer research.
47:42 More about Kevin
To learn more about Kevin visit https://www.linkedin.com/in/kevintambascio/
Cleveland Clinic: https://my.clevelandclinic.org/giving
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security

S8 E7 Why should Grandma care?
Ted Harrington is the #1 best-selling author of Hackable: How to Do Application Security Right. He’s also the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He’s helped companies like Google, Amazon, Microsoft, Netflix, and more fix thousands of security vulnerabilities. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes
00:00 Introduction
01:04 More than a checklist
06:19 Investing in the wrong thing
12:51 Story #1 Why would Grandma care?
13:58 Story #2 Grain of Sand
15:48 Psychology security
17:56 Different types of Hackers
22:59 Changing the mindset
32:49 Embedding
34:31 Defense in Depth
40:26 Automation
43:51 Pen Test vs Vulnerability Scan vs Vulnerability assessment
49:47 More about Ted
50:58 Win a SIGNED copy of Teds Book
--------------------------------------------------
To win a FREE signed copy of Ted's book "Hackable: How to Do Application Security Right" make sure you:
1. Follow @securityconfidential and @teddy.ballgame on Instagram.
2. Comment a good question that will stump Ted under the Security Confidential infographic for Teds part 1 episode.
3. Nothing else! You're done!
---------------------------------------------------
To learn more about Ted visit https://www.tedharrington.com/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
---------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: securityconfidential and OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @darkrhinosecurity
Youtube: @Dark Rhino Security

S8 E6 The Cyber Warrior
Derek is a military veteran. He has over 10 years of experience in infosec and IT. Derek is the Founder, Content Creator, and Podcast Host of Cyber Warrior Studios LLC, and a Senior Security Consultant at Seiso.
00:00 Introduction
01:25 Dereks Origin Story
04:20 Dereks Military Cyber background
09:13 Dereks Origin Story (cont.)
12:15 Why “Cyber Warrior”
14:50 Strategy
18:50 Defense in Depth
21:50 Prevention Paradox
22:49 100% Secure
26:30 What makes a good target?
30:34 How many companies are compromised and don’t know it?
33:05 What can we do?
35:07 Sony attack
38:46 Hackers & Malware
43:30 More About Derek
To learn more about Derek visit https://www.linkedin.com/in/dschellerjr/ Visit Cyberwarriorstudios.com
Follow Derek on his Social Media Channels:
https://www.instagram.com/cyberwarriorstudios/
https://www.youtube.com/cyberwarriorstudios
https://www.facebook.com/CyberWarriorStudios/
https://twitter.com/cyberwarriorst1
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: https://www.instagram.com/securityconfidential/
Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/
Twitter: https://twitter.com/darkrhinosec
LinkedIn: https://www.linkedin.com/company/dark-rhino-security
Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

S8 E5 Oh no...Hacked Again!
Zinet is a cloud security engineer at Best Buy, an award-winning children's book author, and speaker, and is working on her master's degree in Cybersecurity at Georgia Tech. She is the director of community outreach at Black Girls In Cyber.
00:00 Introduction
01:25 Why the United States?
03:55 Transitioning from Law to Cybersecurity
05:27 Why Cyber security?
07:00 What do you want to be when you grow up?
08:38 How did you learn about cybersecurity?
13:40 Culture, Diversity, and Heritage
16:10 Our Special Sauce
18:55 “Oh no…Hacked again!”
22:51 Online Gaming: What can parents/guardians do to help?
30:55 Cloud Security: What do businesses miss?
35:18 Blue Team vs Red Team
36:20 Repeating defenses
37:20 CISA Auditor: What should companies prep for?
39:20 Has the government gained more knowledge of Cybersecurity?
41:39 Advice for anyone changing careers?
46:13 Upcoming news for Zinet
47:13 Finding Zinets Book
To learn more about Zinet Kemal visit Zinetkemal.com or https://www.linkedin.com/in/zinet-kemal/
Subscribe to her on Youtube: https://www.youtube.com/channel/UC4fg6G_rpsDh2s5laPoTZkg
Buy Zinets Books:
"Oh no...Hacked again": https://www.amazon.com/Oh-No-Hacked-Again-Online-ebook/dp/B09M85Y31J/ref=tmm_kin_swatch_0?_encoding=UTF8&qid=1645231721&sr=8-1
"Proud in her Hijab" : https://www.amazon.com/Proud-Her-Hijab-Strength-Empowerment-ebook/dp/B099NX1GTV/ref=d_pd_sbs_sccl_1_1/147-1154618-3680532?pd_rd_w=LJwaX&content-id=amzn1.sym.e8ae2edd-d546-4619-bda8-82a9f33e83eb&pf_rd_p=e8ae2edd-d546-4619-bda8-82a9f33e83eb&pf_rd_r=ZN1019A5MX4TNVQMMCCG&pd_rd_wg=tTrY2&pd_rd_r=31b172cf-c512-4c18-9d39-ea6b66aff608&pd_rd_i=B099NX1GTV&psc=1
Zinet on GMA: https://www.youtube.com/watch?v=ff0Y2BP5Ei8
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: https://www.instagram.com/securityconfidential/
Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/
Twitter: https://twitter.com/darkrhinosec
LinkedIn: https://www.linkedin.com/company/dark-rhino-security
Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

Cyber Horror Story #15 Lil Nitro Challenge - Tech Team (VIDEO)
Finishing off the Cyber Horror Story train is our Tech team..some of them.
These three brave souls WANTED to try the Lil Nitro Gummy Bear Challenge.
Some information:
-The Lil Nitro Gummy bear has 9 million Scoville units!
-The instructions are to chew the gummy bear for 30 seconds and then swallow.
-We ate right before starting this challenge...
-After swallowing the gummy bear, the challenge begins; who can withstand the heat for 5 minutes?
-It is 900 times hotter than a jalapeno

S8 E4 Why CISOs don’t stay more than 2 years
#SecurityConfidential #DarkRhinoSecurity
Eddie is a Regional Sales Manager at DataLocker, a bestselling author, and entrepreneur who has been featured on ABC, CBS, & FOX news affiliates. Eddie has worked with multiple Fortune 500 companies to improve their revenue and was named one of the top business professionals by the Chamber of Commerce. Eddie hosts the popular “Leaders in Cyber security” where he talks to cyber professionals about #InfoSec.
00:00 Introduction
01:50 “People have to be people”
05:30 U.N.L.O.C.K. Yourself
11:56 Humility
15:14 Who you want to be
16:30 Negativity
24:15 Twitter CISO News
29:27 Who owns the risk in the company?
31:30 Why CISOs don’t stay more than 2 years
35:58 vCISO or CISO?
40:30 What’s new for Eddie
Books Mentioned:
"The Compound Effect" By Darren Hardy
"THE ENERGY BUS: 10 RULES TO FUEL YOUR LIFE, WORK, AND TEAM WITH POSITIVE ENERGY" By Jon Gordon
"Unlock Yourself: How to Earn the Success You were Born to Create" By Eddie Thomason
Article Mentioned: https://www.infosecurity-magazine.com/news/ex-security-chief-twitter-cyber/
To learn more about Eddie visit https://www.linkedin.com/in/eddiethomason/
https://leadersincyberpodcast.com/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: https://www.instagram.com/securityconfidential/
Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/
Twitter: https://twitter.com/darkrhinosec
LinkedIn: https://www.linkedin.com/company/dark-rhino-security
Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

Cyber Horror Story #14 A Hackers Nightmare
Hacker Valley Media's own Ron Eddings shares his personal horror story and how his past came back to haunt his future
This October we wanted to do something different. So we came up with Cyber Horror Stories. These are 2-10 minute scary stories from your favorite guests. Now hold on, You'll still have new episodes of Security Confidential every Friday at 8 am. But now, you'll also have new Cyber Horror Stories every Monday, Wednesday, and Friday.
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
SOCIAL MEDIA:
Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @SecurityConfidential
Facebook: @DarkRhinoSecurity Inc
Twitter: @Darkrhinosec
LinkedIn: @DarkRhinoSecurity
Youtube: @DarkRhinoSecurity