Skip to main content
Spotify for Podcasters
Security Confidential

Security Confidential

By Dark Rhino Security

Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

S5 E7 Speed bump Security

Security ConfidentialAug 30, 2021

00:00
46:07
S12 E10 Bourbon Breakdown

S12 E10 Bourbon Breakdown

#SecurityConfidential #DarkRhinoSecurity 00:00 Introduction 01:10 Apple Zero-Day Exploited 06:14 TEMU App 09:42 Cisco to buy Splunk 13:35 Bookers Bourbon 14:50 F35 Hacked 21:47 MGM Breached 23:43 5 Lawsuits against MGM resorts 28:14 Sony Systems Hacked by new Group 32:53 Cyber Horror Stories ---------------------------------------------------------------------- Articles Mentioned: https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html https://grizzlyreports.com/we-believe-pdd-is-a-dying-fraudulent-company-and-its-shopping-app-temu-is-cleverly-hidden-spyware-that-poses-an-urgent-security-threat-to-u-s-national-interests/ https://www.nytimes.com/2023/09/21/business/cisco-splunk-deal.html https://nybreaking.com/im-a-former-defense-official-who-warned-about-the-f-35s-catalogue-of-safety-and-security-problems-years-ago-this-is-why-it-may-have-been-hacked-or-malfunctioned/ https://www.reuters.com/technology/hackers-who-breached-casino-giants-mgm-caesars-also-hit-3-other-firms-okta-says-2023-09-19/ https://www.8newsnow.com/news/local-news/5-lawsuits-go-after-mgm-caesars-following-data-breaches-seek-ok-for-class-action-status/ https://kotaku.com/sony-playstation-hack-breach-ransomware-ransomed-vc-1850870993 ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Sep 29, 202333:42
S12 E9 What is Vishing?

S12 E9 What is Vishing?

Dmytro Bielievtsov is the CTO and Co-founder of Respeecher. Respeecher focuses on high-fidelity voice cloning and their synthetic speech technology was the first one to be adopted by big Hollywood production studios in 2019. Respeecher's has already shown up in major Feature films, TV projects, and Video Games. Animation studios, Localization and media agencies, in Healthcare, and other areas are using it. Some of their projects include artificially voicing God of War Ragnarok, de-aging Mark Hamill’s voice in The Mandalorian and The Book of Boba Fett, and James Earl Jones’s voice for the Obi-Wan Kenobi series. They have also been featured in Forbes, The Guardian, TechCrunch, VentureBeat, to name a few.00:00 Introduction00:19 Our Guest01:33 Running a company in the Ukraine04:55 Respeecher07:24 How does Respeecher work?10:37 How did Hollywood find you?12:10 Voice work for Star Wars14:55 Do you keep the voice?16:23 Deep Fake in the Election22:02 Vishing23:25 Luke Skywalkers Voice25:26 De-Aging Mark Hamill’s voice26:15 Animal Voices28:02 The Future for Respeecher30:11 Electrolarynx devices ---------------------------------------------------------------------- To learn more about Respeecher visit https://www.respeecher.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Sep 22, 202331:54
S12 E8 The Human Factor is the Weakest Link

S12 E8 The Human Factor is the Weakest Link

Frank is a cybersecurity and privacy expert and former C-level executive with 25 years of experience developing compliance and privacy programs for large healthcare systems. Riccardi has held positions as Chief Compliance and Privacy Officer overseeing high-profile data breaches and cybersecurity investigations. His book, “Mobilizing the C-suite: Waging War Against Cyberattacks,” urges C-suite leaders to take action against cyberattacks by deploying basic cybersecurity controls and supporting frontline cybersecurity professionals with companywide cyber hygiene training. It also introduces real-world cybersecurity principles to college students, our future generation of cyber-savvy leaders.


00:00 Introduction

00:19 Our Guest

01:20 Frank’s Background

02:05 2021 Events, Motivation, and the Colonial Pipeline

07:28 Regulations in Healthcare 

10:14 Does the C-suite understand that Cyber is a business problem or an I.T. problem?

17:53 The trickery behind the technology

21:17 The Human Factor is the weakest link in Cybersecurity

23:27 Why do Healthcare organizations ask for Social Security?

28:15 Why can’t the healthcare industry solve the problem?

31:55 Bills from Hospitals. What percentage do they get?

35:38 Mobilizing the C-suite: Waging War Against Cyberattacks

36:55 Connect with Frank!



Frank https://www.linkedin.com/in/frank-riccardi-jd-chc-261831b1/

Sep 15, 202338:18
Streaming Services vs. Cable | Confidential Happy Hour

Streaming Services vs. Cable | Confidential Happy Hour

Taking a break from our regularly scheduled Security Confidential episodes to talk about Streaming services, important skills that need to be taught in schools, an Okta Breach, and "Owning" DVDs. To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #disneyplus #hulu #hbomax #netflix #streamingservices #entertainmentnews #movies #actionmovies #jamesbond #schooleducation #oktabreach

Sep 08, 202331:05
S12 E7 More Than The Original Voice Of SIRI

S12 E7 More Than The Original Voice Of SIRI

Her career started with music. From then on, she did hundreds of commercial jingles (famously, Tillie the All-Time Teller for the first successful ATM in the US) and sang backup vocals on tour with Burt Bacharach and Roy Orbison. She got into voiceover and acting work at Doppler Studios in Atlanta, when the voice actor hired for a particular commercial didn't show up, and studio owner Pete Caldwell suggested she do the spot instead. She ended up doing spots for Coca-Cola, IBM, Papa John's Pizza, McDonald's, AT&T, Wendy's, Goodyear, Ford, Chiquita, etc., for both radio and TV. She also ended up working on camera for such clients as Morrison's, Ford, GA Pacific, IBM, Kimberly Clark, etc. But she’s Best known as the original VOICE OF SIRI. 00:00 Introduction 00:18 Our Guest 01:18 Her background 03:01 How Apple Took Her Voice 04:55 Remaining positive 05:16 Working with Roy Orbison 06:55 Perfect Pitch 07:40 Learning to play the Piano 08:40 How Siri affected her career 09:31 A Siri-like voice 10:07 Future acting jobs 11:45 Are you tech-savvy? 12:33 Remaining Positive 14:44 AI taking over voice work 16:53 Have you ever not been selected as the voice of Siri? 18:18 Hire Susan for your speaker events 19:00 A message to anyone in Tech ---------------------------------------------------------------------- To learn more about Susan or to hire her for your next event, visit https://susancbennett.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #Voicework #SAGAFTRAstrike #SAGstrike #Actorstrike #Siri #voiceacting #appleceo #susancbennett #susanbennett #mcdonalds #voicecloning ---------------------------------------------------------------------- Photos used: McDonald's logo: https://www.flickr.com/photos/neeky_b/24814690583 Coca-Cola logo: Viktaur, Public domain, via Wikimedia Commons

Sep 01, 202320:39
S12 E6 A Senior Survival Guide

S12 E6 A Senior Survival Guide

Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection. He was on previously to talk about his book “Confessions of a CIA Spy” and now he’s here to promote his new book “Why Are You Messing With Me? - Senior Survival Guide on Fraud, Privacy, and Security". 00:00 Introduction 00:19 Our Guest 02:06 ChatGPT and Generative Ai: How they’re used 06:14 Evil ChatGPT 07:16 How do we remain secure with Ai? 12:18 Why you shouldn’t be giving out your SSN 13:35 Sim Swapping Case 16:26 U.A.E Voice Cloning Case 23:07 What measurements does the CIA take? 25:55 Facial recognition 27:03 Educating the Public 29:38 Why are you messing with me? - Senior survival guide 43:28 More about Peter --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- Links Mentioned: $24M AT&T Sim Swapping Case: https://blockworks.co/news/att-crypto-sim-swap-lawsuit Voice Cloning U.A.E Case: https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=4e5cb5507559 Peters Books: https://www.amazon.com/stores/Peter-Warmka/author/B08QZ8C7S6?ref=ap_rdr&store_ref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Aug 25, 202344:40
S12 E5 Building Awareness About Your Startup

S12 E5 Building Awareness About Your Startup

#SecurityConfidential #DarkRhinoSecurity Dan Wachtler is the CEO of DarkLight Inc and an accomplished entrepreneur with over 20 years of experience serving in both executive and sales leadership roles. Previously, he was the President of root9B Holdings, Inc., a NASDAQ-listed advanced cybersecurity firm and creator of the first-ever commercial HUNT platform. Dan has led numerous capital raises and managed large corporate realignment efforts including international expansion efforts. 00:00 Disclaimer 00:09 Introduction 00:25 Our Guest 01:18 Journey into Becoming an Entrepreneur 03:44 What is success to you? 08:21 What’s the secret to bringing awareness to your startup? 12:22 How do you differentiate? 16:43 What does DarkLight do? 22:53 How does your system differentiate between industries? 28:30 Understanding Risk 31:09 Does A.I. have a role in this? 36:07 Getting a Demo with DarkLight 37:44 More about Dan and DarkLight ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Aug 18, 202343:16
S12 E4 Understand, Manage, and Measure Cyber Risk

S12 E4 Understand, Manage, and Measure Cyber Risk

Ryan is the CEO of Neuvik and the author of the book “Understand, Manage, and Measure Cyber Risk”. His past adventures include growing a cyber research and development company, formerly serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, a cybersecurity strategist for McKinsey, and a technologist at IBM. 00:00 Introduction 00:17 Our Guest 01:08 Behind the name Neuvik 02:20 What does Neuvik do? 03:29 Imperfect Technology layered on Imperfect Technology 05:35 Is the next gadget worth it? 07:54 Guiding a newbie CXO 10:50 What is it that you're protecting? 22:54 Which framework has worked the best? 25:56 Understand, Manage, and Measure Cyber Risk 35:39 Leveraging vulnerabilities for offensive purposes 40:35 Connecting with Ryan --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com --------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ --------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #riskmanagement #cyberrisk #cybernews #cyberbook #Neuvik

Aug 11, 202342:50
S12 E3 Your guide to SBOMs

S12 E3 Your guide to SBOMs

Eric is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On top of that, Eric has formal training as a software and mechanical engineer 00:00 Introduction 00:16 Our Guest 02:11 Open Source is Everywhere. Even Healthcare 04:45 Legal Risk using Open Source 06:05 Reading the Terms and Conditions 07:55 Would development time increase if you don’t use Open Source? 09:16 26,448 New CVEs Reported in 2022 11:03 Equifax Attack affected 143 Million 13:01 Therac-25 Medical Device Tragedy 14:53 What is a SBOM? 18:53 You need an FBOM 20:21 Knowing your “ingredients” 21:53 Is this a blockchain problem? 23:42 How does an SBOM help me? 31:48 Embedded Systems 40:28 Forking a project 43:10 How is SOOS staying up to date 47:40 Holding companies responsible 53:15 News from Eric

Aug 04, 202354:52
S12 E2 Who is Responsible for Cybersecurity?

S12 E2 Who is Responsible for Cybersecurity?

Robert Black is a Lecturer in Information Activities at Cranfield University on behalf of the UK Defence Academy. He is also the former Deputy Director of the UK’s National Cyber Deception Laboratory. At the Defence Academy, he helps educate senior military leaders about Warfare in the Information Age. His interests are several interests one of them being the role of influence and deception in cyber. 00:00 Introduction 00:19 Our Guest: Robert Black 01:28 Rob's Journey into Cyber 06:20 The weakest link is designing systems that don’t appreciate humans are integrated as a part of the system 09:17 Taking an insurance mindset 10:36 Does the Lock and Key model for Cyber work on bad actors? 16:12 Legality and Kinetic Response (Hack back, WannaCry attack, Liam Neeson, Crowdstrike report, U.S. Military) 22:30 Striking Fear into the Hackers 28:00 Does that help the SOC team? 29:45 Arguing with Attorneys and Hackers 33:19 Use of Deception in Tech 35:32 The psychology of the adversary 41:41 Who is responsible for Cybersecurity? 52:43 Connecting with Rob ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jul 28, 202355:26
S12 E1 Tech Talk Overwhelms the NonTechnical

S12 E1 Tech Talk Overwhelms the NonTechnical

Marius is also a public speaker, mentor, and non-executive director for many cybersecurity businesses. He was the former Cloud Security Architect and Analyst at Domino’s Pizza UK & Ireland, Analyst at Burberry, and many more. 00:00 Introduction 00:18 Our Guest: Marius Poskus 01:03 Physical Security to Cybersecurity 04:14 Tech talk overwhelms the nontechnical 11:00 How do you go about assessing risk? 17:20 A message to the executives 21:56 Cyber basics: How do you connect the dots? 26:39 Understanding the techniques from the 3 letter agencies 42:47 The Role of Offense 48:58 What can we do to implement processes to look out for configurations? 53:55 More about Marius ---------------------------------------------------------------------- To learn more about Marius visit https://www.linkedin.com/in/marius-poskus-92611b22/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #informationsecurity #defense #depth #ciso #risk #malware #ransomware #technews #informationtechnology #oilandgas #mssp #entrepreneur #invest #businesstips #dublinohio #digitalmarketing #socialmediamarketing#follow #foryoupage #Computerscience #Security #Cyberattack #Cloudcomputing

Jul 21, 202357:33
S11 E10 Can Cyber Mercenaries Overthrow the Government?

S11 E10 Can Cyber Mercenaries Overthrow the Government?

#SecurityConfidential #DarkRhinoSecurity Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:19 Can Cyber Mercenaries overthrow the government? 04:32 What can we do about it? 09:50 SIEM logic for engineers 12:43 Could the government apply policies to help? 14:32 Refusing to loose Power 17:55 Chris’ Research

Jul 14, 202322:12
S11 E9 Terminated From Speaking at TED Global

S11 E9 Terminated From Speaking at TED Global

Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:00 Introduction 00:24 Our Guest 01:18 How many Chris Rocks are there? 02:58 3 Cyber Threats to Society 05:56 Can you use Genralative Ai for malicious reasons? 09:00 The Third Cyber Threat to Society 12:26 Looking for flaws in the process 16:15 The Gartner Model 18:16 Is it Laziness, Apathy, or Indifference? 23:59 Terminated from speaking at TED Global ---------------------------------------------------------------------- Order his book here: https://www.amazon.com/Baby-Harvest-terrorist-criminal-laundering/dp/1515014576 To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jul 07, 202330:01
S11 E8 The Recovery of Missing and Exploited Children

S11 E8 The Recovery of Missing and Exploited Children


#SecurityConfidential #DarkRhinoSecurity --------------------------------------------------------------------------- Your life is important to everyone around you. If you have had Suicidal thoughts, please call or chat the: 988 Suicide and Crisis Lifeline Hours: Available 24 hours. Languages: English, Spanish You can also chat with them online: https://988lifeline.org/ --------------------------------------------------------------------------- Kevin Metcalf is a former federal agent turned prosecutor, author, and founder of the National Child Protection Task Force, which brings together recognized experts in fields such as strategic legal applications, OSINT, cellular mapping and analysis, dark web investigations, and cryptocurrency to aid law enforcement agencies everywhere. Kevin has assisted with the recovery of numerous missing and exploited children and the identification and apprehension of sexual predators in multiple states. 00:00 Disclaimer 00:10 Introduction 00:23 Our guest 01:30 What is OSINT? How does it work? 05:10 Privacy laws 11:30 Sextortion 17:51 Financial Sextortion: How it works 20:00 When does it become statistically significant 21:33 What lead Kevin to help children 22:37 What role does law enforcement play? 25:52 A special case 28:45 OSINT, Mobile devices, and Kevins Books 34:53 Kevin's thoughts on the ADPPA 41:19 News from Kevin ---------------------------------------------------------------------- To learn more about The National Child Protection Task Force (NCPTF) visit: https://www.ncptf.org/ Read more of Kevins Work: https://www.amazon.com/Books-Kevin-Metcalf/s?rh=n%3A283155%2Cp_27%3AKevin+Metcalf To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #missingchildren #NationalChildProtectionTaskForce



Jun 30, 202343:32
S11 E7 What makes a great DevOps team?

S11 E7 What makes a great DevOps team?

Benjamin Johnson is a serial entrepreneur with a track record of success and hands-on open-source programming experience. With 20+ years as a software developer and leader, Benjamin is the CEO & Founder of Particle41, a dev firm founded by industry veterans that aims to help companies accelerate their initiatives through Software Development, DevOps, and Data Science. 00:00 Introduction 00:20 Our Guest 01:25 Behind the name: Particle41 03:07 Ben’s Origin story 05:14 Where did the ideas come from? 08:20 Outsourcing DevOps 10:45 What makes a great DevOps team? 16:50 Extreme Ownership 19:50 “Bridge” Personality 21:30 Is there a benefit to being first to market? 22:55 Monetizing Open Source 28:22 Characteristics that make successful people 34:02 More about Ben ---------------------------------------------------------------------- To learn more about Ben visit https://www.linkedin.com/in/benjaminrjohnson/https://particle41.com/ https://www.linkedin.com/company/particle41/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jun 23, 202336:11
S11 E6 You CAN Train Your Mind

S11 E6 You CAN Train Your Mind

#SecurityConfidential #DarkRhinoSecurity This is part 2 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years experience of in researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain, and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level. 00:00 Introduction 00:10 Does a person have the ability to pause their thoughts before taking action? 05:18 What is Resilience? 10:32 You can Train your mind 12:34 Why do teams still fall apart under pressure? 14:42 What would you say to the executive? 17:26 What to do if you get the same results again? 19:00 The Wicked Problem 21:04 The Chain of Command 28:01 Mandatory Security Awareness training: What does that have to do with me? 33:30 More about Bec Thinking, Fast and Slow by Daniel Kahneman https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 ---------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices #trainingyourthinking

Jun 16, 202335:13
S11 E5 The Psychology behind our Cybersecurity Choices and Teams - Part 1

S11 E5 The Psychology behind our Cybersecurity Choices and Teams - Part 1

This is part 1 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence.  She is an expert on the ways humans behave when working in complex, uncertain and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level.


00:00 Introduction 

00:20 Our Guest

01:27 What is a chartered Psychologist?

03:40 How do you control chaos?

07:08 How we compare to mIlitary Training?

09:20 The baseline of response: How does the brain work?

13:31 So how do we structure a team?

17:10 Cognitive Agility: Passing along that knowledge

20:29 Getting Comfortable with being uncomfortable 


Thinking, Fast and Slow by Daniel Kahneman

https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555


--------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices

Jun 09, 202325:24
S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester

S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester

#SecurityConfidential #DarkRhinoSecurity

Phillip is an offensive security professional, educator, mentor, author, and frequent public speaker. His passions outside of the technical side of cybersecurity are sharing resources, professional networking, and bringing people together. He is also the host of The Hacker Factory Podcast and his new podcast, the Phillip Wylie Show. Phillip is the concept creator and coauthor of The Pentester Blueprint: Starting a Career as an Ethical Hacker.

00:00 Introduction

00:18 Our Guest

01:45 Phillips Origin Story

04:06 Wrestling a 750 pound bear

07:41 From Wresting to Cyber

10:12 What motivated Phillip to pursue Ethical Hacking?

11:43 Vulnerability management: What are we getting wrong?

14:52 Changing the Mindset

26:51 What is the role of Threat Intel?

28:08 Asset Intel approaches31:05 Ransomware: It’s still growing34:35 The Hacker Factory Podcast34:59 The Phillip Wylie Show36:17 News from Phillip37:44 Connecting with Phillip ---------------------------------------------------------------------- To learn more about Phillip visit :https://www.linkedin.com/in/phillipwylie/https://www.thehackermaker.com/Podcasts:https://www.thehackermaker.com/the-hacker-factory-podcast/https://www.thehackermaker.com/phillip-wylie-show/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Jun 02, 202338:47
S11 E3 From Disinformation to AI - Pt 2

S11 E3 From Disinformation to AI - Pt 2

George Kamide was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 


00:10 Changing the vulnerability landscape

01:48 Voice Cloning and email chat hacking

05:55 How does a machine generate context?

07:58 Social Media bots

10:06 What jobs will go away with AI?15:40 Whose fault is it?

20:40 Can you 100% trust something?

23:03 Work from Home

26:11 Connecting with George

 

----------------------------------------------------------------------


To learn more about George visit https://www.linkedin.com/in/george-ka...


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------


SOCIAL MEDIA:

Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!


Instagram: @securityconfidential and @OfficialDarkRhinoSecurity

Facebook: @Dark-Rhino-Security-Inc

Twitter: @darkrhinosec

LinkedIn: @dark-rhino-security

Youtube:  @Dark Rhino Security ​


----------------------------------------------------------------------

https://www.zdnet.com/article/watch-o...


https://www.wsj.com/articles/i-cloned...


https://www.washingtonpost.com/techno...


https://abcnews.go.com/GMA/Family/mom...


----------------------------------------------------------------------

May 26, 202328:51
S11 E2 From Disinformation to AI - Pt 1

S11 E2 From Disinformation to AI - Pt 1

George Kamide is a Senior Director at SafeGuard Cyber. He was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 00:00 Introduction 00:18 Our Guest 01:30 George’s Origin story 05:04 Twitter bots controlled by Russia 07:37 Does Congress understand the cyber risks? 09:57 First Watch 13:03 Bare knuckles and Brass Tacks 14:15 Bad practices vendors make 18:40 Developing trust with People virtually 20:43 Using AI for Marketing ---------------------------------------------------------------------- To learn more about George visit https://www.linkedin.com/in/george-kamide/https://www.zdnet.com/article/twitter-bot-activity-spiked-after-the-release-of-the-mueller-report/https://www.cyberdefensemagazine.com/russian-twitter-bot-activity-increased-in-the-wake-mueller-report-release/https://www.safeguardcyber.com/podcasts To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #twitterbot #cybersecurity #cyberpodcast #ai #artificialintelligence #marketingusingai #securitypodcast #firstwatchpodcast #bareknucklesandbasstackspodcast #cybernews

May 19, 202327:30
S11 E1 Having ACCURATE Asset Inventory

S11 E1 Having ACCURATE Asset Inventory

Huxley Barbee is a Security Evangelist at runZero (formerly Rumble Network Discovery), a company founded by Metasploit creator HD Moore that helps companies discover unmanaged devices for asset inventory. Huxley previously worked for Cisco, Sparkpost, and most recently, Datadog – where he formulated the Datadog Cloud Security Platform. He has spent over 20 years as a software engineer and security consultant. He attended his first DEF CON in 1999 and holds both CISSP and CISM certifications. On top of that, he’s also an organizer of BSidesNYC.  


00:00 Introduction

00:15 Our Guest

01:00 Huxleys Origin Story

02:27 Proactive Security, Risk, and Asset Inventory: What’s the connection?

04:56 Using the right tools

07:17 IPv4 and IPv6

11:15 What do you need in terms of an ACCURATE Asset inventory?

21:56 Asset Inventory Playing a role in ransomware

26:17 Connecting with Huxley 


https://www.runzero.com/

https://www.linkedin.com/in/jhbarbee/

https://www.helpnetsecurity.com/2023/02/24/bsidesnyc-2023/



May 12, 202327:30
S10 E10 How Do You Build A Successful Video Games

S10 E10 How Do You Build A Successful Video Games

Tom Dusenberry has spent 30 years of his career as an interactive entertainment executive and was the CEO of Hasbro Interactive, Games.com, and Atari. He is currently the CEO of Dusenberry Entertainment. Tom is closely associated with great game brands like Monopoly, Trivial Pursuit, Frogger, Star Wars, and Roller Coaster Tycoon.


00:00 Introduction

00:22 Our Guest

01:26 Are you a gamer?

01:55 Tom's Favorite Games in different eras

04:54 Elements for a good game

07:02 Streaming Games

09:55 The Blue Ocean Strategy

12:03 Controlling the Gaming Market

14:20 Dusenberry Entertainment

16:35 The Process needed to create a game

19:54 Is creating a gaming community part of the process?

22:20 Gaming Franchises

23:27 Ai and it’s Role in the gaming world

25:03 Does violence in games cause violence in real life?

27:30 Advice for being successful in gaming

29:33 Got a game idea? Contact Tom! (Tom@tomdusenberry.com) ---------------------------------------------------------------------- To learn more about Tom visit Dusenberryentertainment.com To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security

​----------------------------------------------------------------------

Frogger:https://www.amazon.com/Frogger-Classic-Arcade-Poster-Vintage/dp/B098TPZRNL


Sonic the Hedgehog:

https://www.bbc.com/news/newsbeat-57566746

https://play.google.com/store/apps/details?id=com.sega.sonic1px&hl=en_US&pli=1


First Nintendo System:

https://www.amazon.com/Nintendo-Entertainment-System-NES-Classic/dp/B01IFJBQ1E


Nintendo 64 Console: GoldenEye 007

https://retrovgames.com/n64-console-goldeneye-007/


RollerCoaster Tycoon:

https://store.steampowered.com/app/683900/RollerCoaster_Tycoon_Classic/


Forza: https://store.steampowered.com/app/1551360/Forza_Horizon_5/

Apr 28, 202331:12
S10 E9 April 14th News of the Week: Discord, Putin, and Chinese Data

S10 E9 April 14th News of the Week: Discord, Putin, and Chinese Data

Chris and Rory are BACK! This time with Tech news that you should know about. 00:00 Introduction 02:53 War Thunder Discord Documents 11:54 U.S. taking your Data vs. Chinese taking your Data 13:49 Apple Has Weird Terms and Conditions 15:23 A Guide to Understanding the Hoax of the Century 22:00 Russia’s Electronic Draft Bill ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- https://www.cnn.com/2023/04/14/politics/discord-chatrooms-leaked-pentagon-documents/index.html Understanding the Hoax of the Century: https://www.tabletmag.com/sections/news/articles/guide-understanding-hoax-century-thirteen-ways-looking-disinformationhttps://apnews.com/article/russia-ukraine-war-draft-mobilization-conscription-notices-bf18ad64dd08c9d11aab2e222cabfee9https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/on-the-internet ---------------------------------------------------------------------- #warthunder #apple #termsandconditions #cybernews #technews #russiannews #electronicdraft#militarydraft #chinesedata #chineseapps #discord #itunes #media #politicsnews

Apr 21, 202326:14
S10 E8 How Do You Build A Leader

S10 E8 How Do You Build A Leader


Melissa Thornley is a leadership consultant who focuses on using emotional intelligence to drive better results. She has years of experience as an advertising/film industry executive and has worked with McDonald’s, Walgreens, Anheuser Busch, Nike, Capital One, Coca-Cola, and PBS. She's known for her contagious energy and passion for turning intangible concepts into tangible outcomes. 00:00 Introduction 00:18 Our Guest 01:15 Starting off in Tech 06:58 Working with Celebrities 09:05 Celebrity leadership 10:20 How do you create a leader? 14:07 Emotional intelligence: What is it? 19:37 Managing your triggers 22:20 Have a system or process 30:25 Personal and Team Accountability 32:38 “Your baby’s Ugly” 40:12 More about Melissa ---------------------------------------------------------------------- To learn more about Melissa visit https://www.melissathornley.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- Read More About Melissa: https://reelchicago.com/article/reel-women-author-leadership-expert-melissa-thornley/https://medium.com/authority-magazine/melissa-thornley-emotional-intelligence-what-it-is-why-it-is-so-essential-and-how-we-can-2f75525bec62https://cceglobal.org/event/global-industry-spotlight-melissa-thornley/

Apr 14, 202342:43
S10 E7 Stop Playing the Victim Role

S10 E7 Stop Playing the Victim Role

Joel Beasley is a well-known figure in the tech industry. In 2017, he founded the Modern CTO Podcast while writing the Modern CTO book, with the goal of interviewing CTOs and sharing their experiences with others in the tech community. From there, Joel founded ProSeries Media to help companies worldwide create their own podcasts. Through his work on the Modern CTO Podcast and ProSeries Media, Joel has inspired others to share their knowledge and insights with the wider community. His passion for creating engaging content that informs, inspires, and entertains has made him a sought-after speaker and advisor on all things tech. 00:00 Introduction 00:22 Our Guest 01:04 Joel’s Origin Story 05:45 Motivation to keep you going 07:18 Maintaining a positive attitude 08:49 What does a CTO do? 12:09 The Role of Failure in Success 15:51 What if Success happens easily? 17:02 Is there a secret sauce to say motivated through the failures. 21:11 Self-awareness 22:25 Playing the Victim 22:52 Nashville shooting 30:18 Modern CTO 30:22 Joel Beasley Tech Titans 30:34 Joel Beasley Tech and Science ---------------------------------------------------------------------- To learn more about Joel visit https://www.linkedin.com/in/joelbeasleyleader/https://proseriesmedia.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Apr 07, 202332:46
S10 E6 U.S. Air Force Academy to Teaching Cyber

S10 E6 U.S. Air Force Academy to Teaching Cyber

Josh has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and business consulting for clients 00:00 Introduction 00:22 Our Guest 01:06 U.S Air Force Academy to Cyber 07:28 Is there a bias against Veterans entering Cybersecurity? 08:49 What are clients getting wrong with Infosec? 13:14 Learning Lessons 16:58 People like “Free” 17:35 Constantly Changing 20:43 More about Josh ---------------------------------------------------------------------- To learn more about Josh visit https://www.linkedin.com/in/joshuacmason/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- Images: https://www.military.com/equipment/marine-corps-aircrafthttps://www.zuora.com/billing-topics/annual-recurring-revenue/#:~:text=Annual%20Recurring%20Revenue%2C%20or%20ARR,for%20a%20single%20calendar%20year.

Mar 31, 202324:25
S10 E5 What is Hack-back?

S10 E5 What is Hack-back?

Shea has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. 00:00 Introduction 01:07 Our Guest 02:39 The policy question that made me pause my vacation 05:16 Diversity in Cyber 06:22 Echelon Risk 07:05 Has the Executive Mindset changed? 12:52 Hack-Back and the Biden administration 18:50 News from Shea ---------------------------------------------------------------------- 2023 Central Ohio InfoSec Summit (https://www.infosecsummit.com/website/44575/home/) – it’s titled “Beyond Checking the Box: Putting Compliance at the Forefront of Decision-Making” being presented by Amelia Fisher https://echeloncyber.com/ Hack-Back https://www.techdirt.com/2023/01/27/biden-administration-declares-war-on-the-internet-clears-path-for-offensive-hacking-efforts-by-federal-agencies/https://www.securityweek.com/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations/https://www.darkreading.com/ics-ot/bidens-cybersecurity-strategy-calls-for-software-liability-tighter-critical-infastructure-securityhttps://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.htmlhttps://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-backhttps://techbeacon.com/security/why-hack-back-still-worst-idea-cybersecurity --------------------------------------------------------------------- To learn more about Shea visit https://www.linkedin.com/in/sheanangle/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Mar 24, 202320:48
S10 E4 Why is the U.S Banning Tiktok?

S10 E4 Why is the U.S Banning Tiktok?

Continuing our Conversation with Navy SEAL, Mike Rice  


00:00 Introduction 

00:18 Our Guest 

00:30 The Future of War 

05:06 Is China our biggest threat?

 09:13 TikTok and other Chinese Apps 

11:40 Spy Balloons? Weather balloons? What was it? 

16:13 Where do you see the war in Ukraine headed?

 17:58 Who is the Wagner group? 

18:41 Russia

Mar 17, 202323:30
S10 E3 How Smartwatches lead Iran to US Troops

S10 E3 How Smartwatches lead Iran to US Troops

Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation.


00:00 Introduction

00:18 Our Guest

00:33 The Navy SEAL Team

04:05 What made you shift to SEAL Team?

08:16 What was the atmosphere like in BUD/S?

11:09 How was the SEAL Team Technology after 9/11?

13:21 Leveraging Technology

17:39 Where do you see technology affect you the most?

21:40 Stories with Mike

Mar 10, 202325:00
S10 E2 The Secrets of Linkedin's Algorithm

S10 E2 The Secrets of Linkedin's Algorithm

David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.  


00:00 Introduction 

00:17 Our Guest  

01:12 Using LinkedIn to break into Cybersecurity 

07:30 Fake Profiles on Linkedin 

08:30 Having a complete profile 

10:19 the LinkedIn Algorithm  

14:20 Useful Certifications and Resources 

26:39 Davids Book about Women in Cyber 

32:28 SOC fatigue

 36:27 What role does Automation has? 

37:46 Will Automation replace a SOC Analyst? 

39:30 How can Clients improve their Cybersecurity? 

42:35 Risk Assessments: Who should be leading? 

45:20 Connecting with David


---------------------------------------------------------------------- 

To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/ 

To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc

 Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​ 

----------------------------------------------------------------------

  https://securityplus.training/

Mar 03, 202349:36
S10 E1 Helping Pave the way for Women in Cyber

S10 E1 Helping Pave the way for Women in Cyber

#SecurityConfidential #DarkRhinoSecurity 

Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.   


00:00 Introduction 

00:16 Our Guest 

01:52 Being in the Special Forces as a Woman 

04:30 Cultural Support Team Program 

07:47 Jaxs’ Current Mission 

09:29 What is an Entry-Level Job? 

11:49 How Jax began her journey into Cybersecurity 

16:07 Data Breaches: What’s broken? 

18:07 Company Policies and Bringing Awareness 

19:38 Compliance isn’t security 

23:17 NIST vs CMMC vs ISO 

27:03 Who uses CMMC? 

30:56 Resources for CMMC  

32:12 What should the Federal Government be adopting? 

36:45 HackBack 

41:58 Connect with Jax

 ---------------------------------------------------------------------- 

 To learn more about Jax visit https://www.linkedin.com/in/iamjax/ 

https://twitter.com/outpostgray 

https://iamjax.me/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​ 

---------------------------------------------------------------------- 

Articles and Resources Mentioned in this Video:  

Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1 


Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html 


NICE and NIST Frameworks: 

https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/ 

https://www.cisa.gov/nice-cybersecurity-workforce-framework 

https://www.securityprogram.io/a-guide-to-common-security-standards/ 


Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms 

JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/ 


HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/ 

Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.  


Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039

Feb 24, 202343:39
S9 E10 Biological Viruses vs Computer Viruses

S9 E10 Biological Viruses vs Computer Viruses

Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization's global DevSecOps transformation initiative.  Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.  

00:00 Introduction 

00:21 Our Guest 

01:40 Transitioning from Medical Genetics to Cyber 

04:50 The importance of having people from different fields 

07:41 Comparisons between Biological Virus and Breach 

12:09 Low Earth Orbit Constellation 

18:18 Hackers are Collaborative  

22:01 100% Security 

26:30 Understanding the Risk

 30:40 Building a Culture of Awareness  

35:35 DevSecOps 

38:50 Controlling that 3rd party risk 

43:15 Connecting with Wendy


VkzkH79NmeR5yCZidDzz

Feb 17, 202346:23
S9 E9 How Paris Hilton Helped My Career

S9 E9 How Paris Hilton Helped My Career

Bob Carver CISM, CISSP, M.S. began his security career working in the financial industry. Later, Bob became the first full-time security employee hired to start the dedicated security monitoring and incident response team for Verizon Wireless. He has been involved in cyber risk management, policy, threat intelligence, and analytics. He was recognized by LinkedIn as one of the Top 5 Influencers in the World to follow in Cybersecurity. Most recently, he was on the expert panel for CES (Consumer Electronics Show) in Las Vegas discussing "Focusing on Security in Product Innovation."   


00:00 Introduction 

00:18 Our Guest 

01:47 Bobs Beginning  

05:02 How did Bob land his position at Verizon?

 08:00 Budget issues 

11:02 Why are companies so ineffective with Cybersecurity? 

13:38 Cyber professionals not addressing business security implications 

18:40 Malvertising

 21:31 Not downloading everything off the internet  

26:15 Curing your problems with a tool 

28:26 Budgeting: Where should you prioritize? 

32:22 ChatGPT 

33:47 Cyber Insurance 

37:29 Multifactor Authentication  

43:06 File Storing System 

45:48 Modern-day Bonnie and Clyde 

47:43 Connecting with Bob 

 ---------------------------------------------------------------------- 

Bobs video on Malvertising: https://www.linkedin.com/feed/update/urn:li:activity:7029053209889411072/ 

Bob's Twitter: @cybersecboardrm  

 Bob's LinkedIn https://www.linkedin.com/in/bobcarver/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

 Instagram: @securityconfidential and @OfficialDarkRhinoSecurity

 Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security

 --------------------------------------------------------------------- 

Articles Mentioned: 

 https://cybermagazine.com/cyber-security/executive-profile-bob-carver-verizon-wireless 

https://www.wired.com/2005/02/paris-hilton-hacked-or-not/



VkzkH79NmeR5yCZidDzz

Feb 10, 202350:05
S9 E8 Confessions of a CIA Spy

S9 E8 Confessions of a CIA Spy

Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection.


00:00 Introduction

00:19 Our Guest

01:39 How do you become a CIA Intelligence Officer?

05:59 Human Intelligence Gathering

08:27 Knowing the risks within the job

13:24 The Counterintelligence Institute

13:53 Statistics and TED talks

19:42 Change the name of Cybersecurity

22:03 Getting into the mind of a Hacker

27:19 Why would anyone target me?

30:11 Panama Papers

32:28 Success with Employee Awareness

34:57 Being cautious on the Social Media

40:45 Fake Profiles on Social Media

42:32 Advanced AI technology/ ChatGPT

43:20 The Dangers of Linkedin

49:43 Peters Book: Confessions of a CIA Spy

53:10 Contact Peter

 ----------------------------------------------------------------------  

More About Peter:

https://www.counterintelligence-institute.com/upcoming-events

https://www.amazon.com/Confessions-CIA-Spy-Human-Hacking-ebook/dp/B08QYZJ13K?ref_=ast_author_mpb

https://www.linkedin.com/in/peterwarmka/ 

 ----------------------------------------------------------------------  

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

 ----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security

Feb 03, 202355:03
S9 E7 Everybody has a Boss

S9 E7 Everybody has a Boss

Eric is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On top of that, Eric has formal training as a software and mechanical engineer.    


00:00 Introduction

 00:19 Our Guest 

01:20 Software Engineering out of College 

04:23 Being a Stay-at-Home-Dad 

05:57 Entrepreneurship to Corporate  

07:33 Everybody has a boss 

08:53 Giving Interview Feedback  

11:25 Opinionated Questions in an Interview 

13:30 What is SOOS? 

16:33 Minimum Viable Product (MVP) 

24:27 Software tools: What works and what doesn’t? 

29:18 People should become more aware 

36:12 Compliance 

41:03 SOOS tools 

46:10 More news from Eric

 ---------------------------------------------------------------------- 

Articles Mentioned:  

https://soos.io/news/soos-launches-free-community-edition-sca-tool 

https://soos.io/news/soos-partners-with-secureframe 

https://soos.io/news/new-soos-partnership-with-rkvst-makes-it-easier-to-create-and-share-sboms 

https://www.linkedin.com/pulse/importance-giving-feedback-after-interviews-sacha-dixon/ 

https://www.federalreserve.gov/paymentsystems/regcc-faq-check21.htm

 ---------------------------------------------------------------------- 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Jan 27, 202347:41
S9 E6 Analyst Fatigue

S9 E6 Analyst Fatigue

Dallas is a US Army Veteran and Cyber Professional. He has worked for many companies including PerimeterX, Blue Shield, PayPal, and HUMAN where he is currently the Threat Intelligence Analyst. He is skilled in Python, SQL, Information Security, JavaScript, Networking, and recently obtained a new certification in Cyber Threat Management   


00:00 Introduction 

00:16 Our Guest 

00:45 What’s new from Dallas 

02:34 HUMAN + Perimeter X 

03:51 Cyber is not secure! 

05:34 Phishing Emails 

09:25 2 Human behaviors that cause breaches 

13:24 Analyst Fatigue 

15:56 Having Humans perform Automation is not proper automation 

20:07 Realtor, Angel Investor, and more projects from Dallas 

24:23 HBO Documentary with Dallas 

35:32 More news from Dallas 

38:14 Connecting with Dallas  


Article Mentioned:  https://www.businesswire.com/news/home/20210330005240/en/White-Ops-Reintroduces-Itself-as-HUMAN-Signaling-Cybersecurity-Company%E2%80%99s-Dedication-to-Protecting-Enterprises-from-Bot-Attacks 


About HUMAN: https://www.humansecurity.com/newsroom/tag/in-the-news

----------------------------------------------------------------------  

To learn more about Dallas visit https://www.linkedin.com/in/dallascbaker/ 

https://www.instagram.com/realdallasbaker/

 To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

 Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube: @Dark Rhino Security ​

Jan 20, 202340:25
S9 E5 The Captain America Approach

S9 E5 The Captain America Approach

#SecurityConfidential #DarkRhinoSecurity 

00:00 Introduction 

00:20 Our Guest 

02:15 Philippe’s Origin Story 

07:42 Becoming a Leader 

14:51 The Captain America Approach 

18:20 Approaching Unknown Unknowns 

22:34 How to monetize an open-source platform 

26:19 Free Users

 27:15 Where is Open source going? 

28:34 CrowdSecs big announcement 

32:01 Malevolent IP addresses Growing 

33:25 Ensuring Accuracy 

37:32 More about Philippe  


Article Mentioned:  https://health.clevelandclinic.org/barometric-pressure-headache/ 

To learn more about Philippe visit https://www.linkedin.com/in/philippehumeau/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Jan 13, 202339:35
S9 E4 Recycling of Electronic Devices and Data

S9 E4 Recycling of Electronic Devices and Data

#SecurityConfidential #DarkRhinoSecurity 

John Shegerian (pronounced "SHUH-GARE-EE-UHN") is the co-founder and Chairman/CEO of ERI, the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. He is also the co-author of the #1 best-selling book "The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and the host of the IMPACT podcast.  


00:00 Introduction 

00:10 Our Guest  

01:34 Johns Origin Story 

05:34 The secret to success: Doing good for others 

07:56 Advice for Future Entrepreneurs 

11:00 ERI: SOC2 Compliance 

12:05 What are the steps for recycling electronics? 

15:33 Gold, Copper, Precious Metals 

18:30 Is there a recycling issue forming with EV cars? How JB Straubel is involved 

25:21 Hardware Hacking 

30:55 What to do before throwing electronics away 

38:07 Anything you can’t recycle? 

42:03 A FREE COPY OF JOHNS BOOK 

44:33 Johns Book  

47:11 Rental Car Agencies 

48:20 Anything new for John

 ----------------------------------------------------------------------  

To learn more about John visit https://johnshegerian.com 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

 Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​ 

---------------------------------------------------------------------- 

Articles Mentioned  

United Nations Article:  https://ewastemonitor.info/gem-2020/ 

https://www.businesswire.com/news/home/20170914006135/en/Fortune-Magazine-Calls-Electronic-Waste-%E2%80%98Dead-but-Not-Forgotten%E2%80%99----ERI-Featured-in-Report-About-Cybersecurity 

https://fortune.com/2017/09/06/electronic-waste-recycling-cybersecurity/  


Information and photos about John:  

https://impactpodcast.com/ 

https://eridirect.com/category/news/ 

https://johnshegerian.com/gallery/ 

https://eridirect.com/  


1992 LA Rodney King Riots:  

https://www.britannica.com/event/Los-Angeles-Riots-of-1992

 https://www.npr.org/2017/04/26/524744989/when-la-erupted-in-anger-a-look-back-at-the-rodney-king-riots 

https://www.nbclosangeles.com/news/local/timeline-rodney-king-beating-lapd-verdict-1992-la-riots/2880027/

Jan 06, 202349:44
S9 E3 Credentials: Which ones are the most important?

S9 E3 Credentials: Which ones are the most important?

Brian started his career as a systems analyst for the United States Army then became a Senior Systems Analyst for the United States Airforce. From then on, Brian grew extensive experience with a background in managing risk, security, compliance, business continuity, and governance for SaaS providers. He is currently a Security Test Manager for Adobe.   

00:00 Introduction 

01:05 The Army or the Airforce? Is one better than the other? 

01:40 Brians Background 

03:07 Pivoting into a new role 

07:14 Credentials: What is important to get? 

12:17 Is cybersecurity about a mindset or skill? 

13:12 Communicating the Mindset 

19:00 Risk Assessment process 

24:30 100% Compliance  

31:00 Getting pushback 

33:47 Risk Quantification 

36:36 Third-party risk 

47:39 News for Brian

 ----------------------------------------------------------------------  

To learn more about Brian visit https://www.linkedin.com/in/briandavisit/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Dec 30, 202249:53
S9 E2 From Bagging Groceries to Teaching Cyber

S9 E2 From Bagging Groceries to Teaching Cyber

Kenneth is a Senior Cyber Security Consultant at EY where he specializes in SIEM and SOAR technologies. He is also the Founder and owner of Ellington Cyber Academy, an E-Learning platform that teaches and trains people on how to use various SIEM and SOAR technologies so that they can transition or upskill themselves in their careers. On top of all that, Kenneth is also a part-time Associate cybersecurity instructor at the University of Houston and a Cybersecurity trainer at Blacks In Cybersecurity.   


00:00 Introduction 

03:08 The Chicken Tender Sub 

04:13 How important are ingredients? 

05:24 Passion for educating others 

06:30 Leaving an impression with teaching 

07:40 Being a good student 

09:34 Tips you won’t get in College 

11:06 Explaining in business terms 

12:38 Why Cybersecurity? 

14:35 An opportunity at Publix 

15:30 Cyber Bootcamp 

18:55 Why choose an analyst role? 

20:45 SIEM vs Log Management System 

23:10 What do you need for a good SIEM platform? 

27:07 What is the role of SOAR 

29:19 Ai and Analyst fatigue  

32:25 No human elements 

36:17 Common mistakes when implementing a SIEM 

37:38 Can you ever be done tuning a SIEM 

39:25 The Ellington Cyber Academy 

41:00 How does ECA compare? 

45:00 ECA’s goals in the future 

48:02 News for Kenneth 

 ----------------------------------------------------------------------  

To learn more about Kenneth visit https://www.linkedin.com/in/kenneth-ellington/  

 The Ellington Cyber Academy:  https://kenneth-ellington-s-school.teachable.com/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Dec 23, 202249:28
S9 E1 Where Does Our Data Go?

S9 E1 Where Does Our Data Go?

#SecurityConfidential #darkrhinosecurity  


Justin is a corporate M&A attorney, Author, Tedx and keynote speaker, and business advisor, with a deep background in cybersecurity. He uses a unique skill set to collaborate with executives to create and implement multi-layered strategies to better manage cybersecurity and data protection.  He co-hosts the “She Said Privacy/ He said Security” Podcast with his wife Jodi.    


00:00 Introduction 

01:52 Origin Story 

03:19 Remote work: How attackers are successful 

07:57 Cyber Proctology Exam 

10:00 The Digital Seatbelt of the 21st Century 

13:17 Cyber being an afterthought: How to change the mindset 

14:20 Where does our Data go? 

17:57 Can you have privacy? 

19:10 Credibility Gap 

27:00 Privacy Laws in Tech (Samsung, Tesla, Healthcare) 

35:10 Data Reimagined: Building Trust 

39:52 Bad Actors 

42:48 Defense in Depth 

48:38 A Message from Justin 

 --------------------------------------------------------- 

Justin and Jodi's Book: https://www.amazon.com/Data-Reimagined-Building-Trust-Byte-ebook/dp/B0BDVQ97YQ

Justin and Jodi's Podcast: https://open.spotify.com/show/5q8B2oYUPajIvmvZiLa4K4

To learn more about Justin visit  https://www.linkedin.com/in/justinsdaniels/

 To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

--------------------------------------------------------- 

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Dec 16, 202251:39
S8 E10 Trusting Your Remote Employees With Your Business

S8 E10 Trusting Your Remote Employees With Your Business

#SecurityConfidential #DarkRhinoSecurity 

Brian is the Vice President of Worldwide Channels and Alliances at DTEX Systems. Brian has extensive experience in MSSP, Channel, Strategic Alliances, and OEM for high-growth security solution providers. Brian has a long history with cybersecurity OEMs starting with CA where I first met him. Brian has been with McAfee, Fireeye, Cylance, Stellar Cyber, and is now with DTEX Systems.   

00:00 Introduction 

01:18 Technology trends 

02:30 Is the industry overcrowded? 

05:49 DTEX: who are they and what do they do? 

08:45 Compromised Machines

 9:26 Endpoint detection 

13:48 Where is DTEX Classified? 

15:32 Managing Vulnerabilities on the endpoint

18:19 Working with Sectors

 20:39 Customer Profile: How small is too small? 

24:05 DTEX Cloud 

25:23 Trends with Investors 

28:00 Remote work: Can you trust your employees? 

30:00 Remote work: Fake Linkedin Profiles 

33:53 More about Brian

 ---------------------------------------------------------- 

Boise States Cyber Dome Program: https://www.boisestate.edu/news/2022/10/12/welcome-to-the-cyberdome/ 

https://www.boisestate.edu/cybersecurity/ 

To learn more about Brian visit https://www.linkedin.com/in/brian-stoner-146a56/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

-------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

 Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Dec 09, 202240:36
S8 E9 Pro Athlete turned Cybersecurity CEO

S8 E9 Pro Athlete turned Cybersecurity CEO

#SecurityConfidential #DarkRhinoSecurity

Greg Tomchick is a former professional athlete. He played in the minor league for three seasons for the St. Louis Cardinals. He is the author of the book Growing into you. He is driven by a passion for cybersecurity from an experience he had with a former company. He is currently the Partner and CEO of Valorr. They focused on identifying and mitigating cyber threats upfront and when necessary,  countering cyber attacks with targeted and strategic responses.  

00:00 Introduction 

01:36 Gregs Origin Story 

04:15 Incubation Technologies

05:42 The right mindset 

10:26 Cyberattack 

15:12 Cybersecurity is a business problem 

15:56 100% Cyber security? 

16:56 Stimulation Output 

17:50 How much cybersecurity is enough? 

19:17 The process at Valor 

22:38 Communicating with the Department of No 

24:50 Advise for CEOs when talking about digital risk 

27:16 Talking to the executive team 

30:02 The Proactive side 

31:58 Threat Actors 

34:00 Third-Party Risk and Communicating with Vendors 

37:50 Laws 

43:12 Gregs Book 

46:00 More about Greg   


To learn more about Greg visit https://www.linkedin.com/in/greg-tomchick/    

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com 


SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

 Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @DarkRhinoSecurity ​

Dec 02, 202249:58
S8 E8 Cybersecurity Awareness for Healthcare: Is it discussed?

S8 E8 Cybersecurity Awareness for Healthcare: Is it discussed?

#SecurityConfidential #DarkRhinoSecurity 

Kevin is the director of cybersecurity data and application protection for Cleveland Clinic. He has over two decades of experience in software development and cybersecurity.  He has done work in embedded systems and attack surface reduction and has a couple of patents related to this. He is the president-elect for the Northern Ohio HIMSS Chapter. In his spare time, he supports Velosano in fundraising for cancer research.   

00:00 Introduction 

02:12 From Rockwell to Cybersecurity 

04:53 Nation-state actors 

07:32  FedEx and Merck Cyber insurance lawsuit 

09:04 Cybersecurity awareness for healthcare. Is it discussed? 

13:08 Getting the Executive's attention 

18:19 Healthcare Data 

21:55 Purple Team/Red Team: What is their role? 

27:40 Getting the word out about Cyber 

33:03 Embedded Systems: How big of a threat are they and how do we manage it? 

37:22 Compromised Chips 

38:16 Open source components: What are the risks? 

41:06 Updating the law? Can we secure everything? 

45:24 Velosano: fundraising for cancer research.  

47:42  More about Kevin   


To learn more about Kevin visit https://www.linkedin.com/in/kevintambascio/    

Cleveland Clinic: https://my.clevelandclinic.org/giving 


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com 


SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​

Nov 25, 202248:52
S8 E7 Why should Grandma care?

S8 E7 Why should Grandma care?

Ted Harrington is the #1 best-selling author of Hackable: How to Do Application Security Right. He’s also the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He’s helped companies like Google, Amazon, Microsoft, Netflix, and more fix thousands of security vulnerabilities. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes  


00:00 Introduction 

01:04 More than a checklist 

06:19 Investing in the wrong thing 

12:51 Story #1 Why would Grandma care? 

13:58 Story #2 Grain of Sand 

15:48 Psychology security

 17:56 Different types of Hackers 

22:59 Changing the mindset 

32:49 Embedding 

34:31 Defense in Depth 

40:26 Automation 

43:51 Pen Test vs Vulnerability Scan vs Vulnerability assessment 

49:47 More about Ted 

50:58 Win a SIGNED copy of Teds Book 

 --------------------------------------------------

 To win a FREE signed copy of Ted's book "Hackable: How to Do Application Security Right" make sure you: 

1. Follow @securityconfidential and @teddy.ballgame on Instagram.  

2. Comment a good question that will stump Ted under the Security Confidential infographic for Teds part 1 episode.  

3. Nothing else! You're done!

  --------------------------------------------------- 

To learn more about Ted visit https://www.tedharrington.com/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

 --------------------------------------------------- 

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: securityconfidential and OfficialDarkRhinoSecurity  

Facebook: @Dark-Rhino-Security-Inc  

Twitter: @darkrhinosec  

LinkedIn: @darkrhinosecurity  

Youtube:  @Dark Rhino Security 

Nov 18, 202251:41
S8 E6 The Cyber Warrior

S8 E6 The Cyber Warrior

Derek is a military veteran. He has over 10 years of experience in infosec and IT. Derek is the Founder, Content Creator, and Podcast Host of Cyber Warrior Studios LLC, and a Senior Security Consultant at Seiso.  


00:00 Introduction 

01:25 Dereks Origin Story

 04:20 Dereks Military Cyber background 

09:13 Dereks Origin Story (cont.) 

12:15 Why “Cyber Warrior” 

14:50 Strategy 

18:50 Defense in Depth 

21:50 Prevention Paradox 

22:49 100% Secure 

26:30 What makes a good target? 

30:34 How many companies are compromised and don’t know it? 

33:05 What can we do?  

35:07 Sony attack 

38:46 Hackers & Malware 

43:30 More About Derek  


To learn more about Derek visit   https://www.linkedin.com/in/dschellerjr/ Visit Cyberwarriorstudios.com  

Follow Derek on his Social Media Channels: 

https://www.instagram.com/cyberwarriorstudios/ 

https://www.youtube.com/cyberwarriorstudios 

https://www.facebook.com/CyberWarriorStudios/ 

https://twitter.com/cyberwarriorst1 


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com 


SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: https://www.instagram.com/securityconfidential/ 

Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/

 Twitter: https://twitter.com/darkrhinosec 

LinkedIn: https://www.linkedin.com/company/dark-rhino-security 

Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

Nov 11, 202244:56
S8 E5 Oh no...Hacked Again!

S8 E5 Oh no...Hacked Again!

Zinet is a cloud security engineer at Best Buy, an award-winning children's book author, and speaker, and is working on her master's degree in Cybersecurity at Georgia Tech. She is the director of community outreach at Black Girls In Cyber.  


00:00 Introduction 

01:25 Why the United States? 

03:55 Transitioning from Law to Cybersecurity 

05:27 Why Cyber security? 

07:00 What do you want to be when you grow up? 

08:38 How did you learn about cybersecurity? 

13:40 Culture, Diversity, and Heritage 

16:10 Our Special Sauce 

18:55 “Oh no…Hacked again!” 

22:51 Online Gaming: What can parents/guardians do to help? 

30:55 Cloud Security: What do businesses miss? 

35:18 Blue Team vs Red Team 

36:20 Repeating defenses  

37:20 CISA Auditor: What should companies prep for? 

39:20 Has the government gained more knowledge of Cybersecurity? 

41:39 Advice for anyone changing careers? 

46:13 Upcoming news for Zinet 

47:13 Finding Zinets Book 


 To learn more about Zinet Kemal visit Zinetkemal.com or https://www.linkedin.com/in/zinet-kemal/   

Subscribe to her on Youtube: https://www.youtube.com/channel/UC4fg6G_rpsDh2s5laPoTZkg 

Buy Zinets Books: 

 "Oh no...Hacked again":  https://www.amazon.com/Oh-No-Hacked-Again-Online-ebook/dp/B09M85Y31J/ref=tmm_kin_swatch_0?_encoding=UTF8&qid=1645231721&sr=8-1 

"Proud in her Hijab" : https://www.amazon.com/Proud-Her-Hijab-Strength-Empowerment-ebook/dp/B099NX1GTV/ref=d_pd_sbs_sccl_1_1/147-1154618-3680532?pd_rd_w=LJwaX&content-id=amzn1.sym.e8ae2edd-d546-4619-bda8-82a9f33e83eb&pf_rd_p=e8ae2edd-d546-4619-bda8-82a9f33e83eb&pf_rd_r=ZN1019A5MX4TNVQMMCCG&pd_rd_wg=tTrY2&pd_rd_r=31b172cf-c512-4c18-9d39-ea6b66aff608&pd_rd_i=B099NX1GTV&psc=1 

Zinet on GMA: https://www.youtube.com/watch?v=ff0Y2BP5Ei8  


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com 


SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! 

Instagram: https://www.instagram.com/securityconfidential/ 

Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/ 

Twitter: https://twitter.com/darkrhinosec 

LinkedIn: https://www.linkedin.com/company/dark-rhino-security 

Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

Nov 04, 202248:20
Cyber Horror Story #15 Lil Nitro Challenge - Tech Team (VIDEO)

Cyber Horror Story #15 Lil Nitro Challenge - Tech Team (VIDEO)

Finishing off the Cyber Horror Story train is our Tech team..some of them.  

These three brave souls WANTED to try the Lil Nitro Gummy Bear Challenge.  


Some information: 

-The Lil Nitro Gummy bear has 9 million Scoville units! 

-The instructions are to chew the gummy bear for 30 seconds and then swallow. 

-We ate right before starting this challenge...

-After swallowing the gummy bear, the challenge begins; who can withstand the heat for 5 minutes?

 -It is 900 times hotter than a jalapeno

Oct 31, 202204:46
S8 E4 Why CISOs don’t stay more than 2 years

S8 E4 Why CISOs don’t stay more than 2 years

#SecurityConfidential #DarkRhinoSecurity 

Eddie is a Regional Sales Manager at DataLocker,  a bestselling author, and entrepreneur who has been featured on ABC, CBS, & FOX news affiliates. Eddie has worked with multiple Fortune 500 companies to improve their revenue and was named one of the top business professionals by the Chamber of Commerce. Eddie hosts the popular “Leaders in Cyber security” where he talks to cyber professionals about #InfoSec.   

00:00 Introduction 

01:50 “People have to be people” 

05:30 U.N.L.O.C.K. Yourself 

11:56 Humility  

15:14 Who you want to be 

16:30 Negativity 

24:15 Twitter CISO News 

29:27 Who owns the risk in the company? 

31:30 Why CISOs don’t stay more than 2 years 

35:58 vCISO or CISO?  

40:30 What’s new for Eddie  


Books Mentioned: 

"The Compound Effect" By Darren Hardy 

 "THE ENERGY BUS: 10 RULES TO FUEL YOUR LIFE, WORK, AND TEAM WITH POSITIVE ENERGY" By Jon Gordon  

"Unlock Yourself: How to Earn the Success You were Born to Create" By Eddie Thomason   


Article Mentioned: https://www.infosecurity-magazine.com/news/ex-security-chief-twitter-cyber/  


To learn more about Eddie visit https://www.linkedin.com/in/eddiethomason/ 

https://leadersincyberpodcast.com/ 


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com  


SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: https://www.instagram.com/securityconfidential/ 

Facebook: https://m.facebook.com/Dark-Rhino-Security-Inc-105978998396396/ 

Twitter: https://twitter.com/darkrhinosec 

LinkedIn: https://www.linkedin.com/company/dark-rhino-security 

Youtube: https://www.youtube.com/channel/UCs6R-jX06_TDlFrnv-uyy0w/videos

Oct 28, 202243:42
Cyber Horror Story #14 A Hackers Nightmare

Cyber Horror Story #14 A Hackers Nightmare

Hacker Valley Media's own Ron Eddings shares his personal horror story and how his past came back to haunt his future

This October we wanted to do something different. So we came up with Cyber Horror Stories. These are 2-10 minute scary stories from your favorite guests. Now hold on, You'll still have new episodes of Security Confidential every Friday at 8 am. But now, you'll also have new Cyber Horror Stories every Monday, Wednesday, and Friday.


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

SOCIAL MEDIA:

Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!

Instagram: @SecurityConfidential

Facebook: @DarkRhinoSecurity Inc

Twitter: @Darkrhinosec

LinkedIn: @DarkRhinoSecurity

Youtube: @DarkRhinoSecurity

Oct 28, 202208:27