<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"><channel><title><![CDATA[Into the Breach by IBM]]></title><description><![CDATA[Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6</link><image><url>https://files.casted.us/93118130-fc73-4f9a-ba42-c31d76343cc4.jpg</url><title>Into the Breach by IBM</title><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6</link></image><generator>Casted (https://casted.us)</generator><lastBuildDate>Fri, 01 Dec 2023 17:35:17 GMT</lastBuildDate><atom:link href="https://feeds.casted.us/95/Into-the-Breach-by-IBM-34edaef6/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[IBM 2023]]></copyright><language><![CDATA[en]]></language><category><![CDATA[Technology]]></category><itunes:author>IBM</itunes:author><itunes:subtitle>Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are...</itunes:subtitle><itunes:summary>Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…</itunes:summary><itunes:type>episodic</itunes:type><itunes:owner><itunes:name>IBM</itunes:name><itunes:email>ortega.zach@ibm.com</itunes:email></itunes:owner><itunes:explicit>No</itunes:explicit><itunes:category text="Technology"></itunes:category><itunes:category text="Education"></itunes:category><itunes:image href="https://files.casted.us/93118130-fc73-4f9a-ba42-c31d76343cc4.jpg"/><googleplay:email>ortega.zach@ibm.com</googleplay:email><googleplay:description>Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…</googleplay:description><googleplay:category text="Technology"></googleplay:category><googleplay:category text="Education"></googleplay:category><googleplay:explicit>No</googleplay:explicit><item><title><![CDATA[Cyber leaders: Stop being your own worst career enemy. Here’s how.]]></title><description><![CDATA[<p>Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.</p><p><br></p><p>In the cyber realm, this can become even murkier. We have hackers, who often view rules as guideposts (or even challenges, for that matter); incident responders and threat intelligence officers who tend to have great regard for rules and a well-developed (if not regimented) approach to unraveling mysteries; and product engineers who are astute at design and technical issue resolution.</p><p><br></p><p>The net is this: Cyber brainiacs are really good at solving problems. And less good at inspiring (or even allowing) others to solve them.</p><p><br></p><p>In this episode, host Mitch Mayne talks with <a href="https://www.linkedin.com/in/brianfdonovan1" rel="noopener noreferrer" target="_blank">Brian Donovan</a>, author of "<a href="https://www.amazon.com/dp/B07BNYYKLH?ref_=cm_sw_r_cp_ud_dp_FN6C68FSSVM77D0SS0RW" rel="noopener noreferrer" target="_blank">Leadership Is Changing the Game - The Transition from Technical Expert to Leader</a>." They explore some of the critical components of cyber leadership—including Donovan’s perspective that the trick isn’t to develop an entirely new skill set—or <a href="https://quiz.tryinteract.com/#/610dbd0f96add90017a757c8/q/1" rel="noopener noreferrer" target="_blank">superpower</a>, as he puts it—but to hone your existing superpower and learn how to influence and inspire.</p><p><br></p><p>If you’ve ever wondered how to get out of your own way and transition into cyber leadership, this may be the episode for you.</p><p><br></p><p>Take a listen—and venture Into the Breach.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;01:20] Introduction</li><li>[03:05&nbsp;-&nbsp;05:34] Mitchs' journey to leadership in the cyber world</li><li>[06:07&nbsp;-&nbsp;07:42] Challenges technically smart people might run into when stepping into a leadership role</li><li>[08:24&nbsp;-&nbsp;12:43] Turning your strengths into superpowers in leadership</li><li>[18:09&nbsp;-&nbsp;20:50] Imposter syndrome within cyber leadership</li><li>[29:02&nbsp;-&nbsp;31:10] What Brian learned from his best manager</li><li>[32:20&nbsp;-&nbsp;34:49] Advice to be a great leader in cyber</li></ul>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/9931fa66</link><guid isPermaLink="false">abad48e4-e633-43a3-b486-15a6cfd64cb9</guid><pubDate>Mon, 10 Jul 2023 16:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/9931fa66.mp3" length="34888020" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In the cyber realm, this can become even murkier. We have hackers, who often view rules as guideposts (or even challenges,...</itunes:subtitle><itunes:summary>&lt;p&gt;Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In the cyber realm, this can become even murkier. We have hackers, who often view rules as guideposts (or even challenges, for that matter); incident responders and threat intelligence officers who tend to have great regard for rules and a well-developed (if not regimented) approach to unraveling mysteries; and product engineers who are astute at design and technical issue resolution.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The net is this: Cyber brainiacs are really good at solving problems. And less good at inspiring (or even allowing) others to solve them.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with &lt;a href=&quot;https://www.linkedin.com/in/brianfdonovan1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Brian Donovan&lt;/a&gt;, author of &quot;&lt;a href=&quot;https://www.amazon.com/dp/B07BNYYKLH?ref_=cm_sw_r_cp_ud_dp_FN6C68FSSVM77D0SS0RW&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Leadership Is Changing the Game - The Transition from Technical Expert to Leader&lt;/a&gt;.&quot; They explore some of the critical components of cyber leadership—including Donovan’s perspective that the trick isn’t to develop an entirely new skill set—or &lt;a href=&quot;https://quiz.tryinteract.com/#/610dbd0f96add90017a757c8/q/1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;superpower&lt;/a&gt;, as he puts it—but to hone your existing superpower and learn how to influence and inspire.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you’ve ever wondered how to get out of your own way and transition into cyber leadership, this may be the episode for you.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Take a listen—and venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:20] Introduction&lt;/li&gt;&lt;li&gt;[03:05&amp;nbsp;-&amp;nbsp;05:34] Mitchs&apos; journey to leadership in the cyber world&lt;/li&gt;&lt;li&gt;[06:07&amp;nbsp;-&amp;nbsp;07:42] Challenges technically smart people might run into when stepping into a leadership role&lt;/li&gt;&lt;li&gt;[08:24&amp;nbsp;-&amp;nbsp;12:43] Turning your strengths into superpowers in leadership&lt;/li&gt;&lt;li&gt;[18:09&amp;nbsp;-&amp;nbsp;20:50] Imposter syndrome within cyber leadership&lt;/li&gt;&lt;li&gt;[29:02&amp;nbsp;-&amp;nbsp;31:10] What Brian learned from his best manager&lt;/li&gt;&lt;li&gt;[32:20&amp;nbsp;-&amp;nbsp;34:49] Advice to be a great leader in cyber&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>2179</itunes:duration><itunes:season>2</itunes:season><itunes:episode>7</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In the cyber realm, this can become even murkier. We have hackers, who often view rules as guideposts (or even challenges, for that matter); incident responders and threat intelligence officers who tend to have great regard for rules and a well-developed (if not regimented) approach to unraveling mysteries; and product engineers who are astute at design and technical issue resolution.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The net is this: Cyber brainiacs are really good at solving problems. And less good at inspiring (or even allowing) others to solve them.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with &lt;a href=&quot;https://www.linkedin.com/in/brianfdonovan1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Brian Donovan&lt;/a&gt;, author of &quot;&lt;a href=&quot;https://www.amazon.com/dp/B07BNYYKLH?ref_=cm_sw_r_cp_ud_dp_FN6C68FSSVM77D0SS0RW&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Leadership Is Changing the Game - The Transition from Technical Expert to Leader&lt;/a&gt;.&quot; They explore some of the critical components of cyber leadership—including Donovan’s perspective that the trick isn’t to develop an entirely new skill set—or &lt;a href=&quot;https://quiz.tryinteract.com/#/610dbd0f96add90017a757c8/q/1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;superpower&lt;/a&gt;, as he puts it—but to hone your existing superpower and learn how to influence and inspire.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you’ve ever wondered how to get out of your own way and transition into cyber leadership, this may be the episode for you.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Take a listen—and venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:20] Introduction&lt;/li&gt;&lt;li&gt;[03:05&amp;nbsp;-&amp;nbsp;05:34] Mitchs&apos; journey to leadership in the cyber world&lt;/li&gt;&lt;li&gt;[06:07&amp;nbsp;-&amp;nbsp;07:42] Challenges technically smart people might run into when stepping into a leadership role&lt;/li&gt;&lt;li&gt;[08:24&amp;nbsp;-&amp;nbsp;12:43] Turning your strengths into superpowers in leadership&lt;/li&gt;&lt;li&gt;[18:09&amp;nbsp;-&amp;nbsp;20:50] Imposter syndrome within cyber leadership&lt;/li&gt;&lt;li&gt;[29:02&amp;nbsp;-&amp;nbsp;31:10] What Brian learned from his best manager&lt;/li&gt;&lt;li&gt;[32:20&amp;nbsp;-&amp;nbsp;34:49] Advice to be a great leader in cyber&lt;/li&gt;&lt;/ul&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[The Quantum Quandary: How researchers are bridging the supercomputer security concerns]]></title><description><![CDATA[<p>Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide major breakthroughs across society, science and business. At the same time, it poses a risk to key cryptographic algorithms we depend upon for the safety of our digital world. Meaning, it has the potential to render existing communications as insecure as if they weren’t encoded at all.</p><p><br></p><p>In this episode, host Mitch Mayne talks with one of the scientists working on quantum-safe encryption algorithms. Dr. Walid Rjaibi has spent considerable time experimenting with these algorithms and creating prototypes for transitioning current software to quantum-safe standards. </p><p><br></p><p>They talk in-depth about the security risk quantum poses, how researchers are addressing that risk, how policy can (or should) shift to make standardization a reality, and what organizations might struggle with as they shift toward quantum—and how some of those struggles might be addressed.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;01:34] Introduction</li><li>[03:55&nbsp;-&nbsp;06:05] An overview of quantum computing</li><li>[06:45&nbsp;-&nbsp;11:30] Cyber risks associated with quantum</li><li>[15:03&nbsp;-&nbsp;18:42] Algorithms that are quantum-safe</li><li>[19:09&nbsp;-&nbsp;21:54] Encryption algorithms, RSA deep dive</li><li>[25:18&nbsp;-&nbsp;26:15] Effective policy regulations</li><li>[26:42&nbsp;-&nbsp;29:30] Where to begin when learning about quantum</li></ul>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/c2086251</link><guid isPermaLink="false">9ef93f4e-ebf1-4e5f-adbe-dce0ab7b27bc</guid><pubDate>Mon, 03 Jul 2023 20:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/c2086251.mp3" length="30059764" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide major breakthroughs across society, science and business. At the same time, it poses a risk to key crypt...</itunes:subtitle><itunes:summary>&lt;p&gt;Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide major breakthroughs across society, science and business. At the same time, it poses a risk to key cryptographic algorithms we depend upon for the safety of our digital world. Meaning, it has the potential to render existing communications as insecure as if they weren’t encoded at all.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with one of the scientists working on quantum-safe encryption algorithms. Dr. Walid Rjaibi has spent considerable time experimenting with these algorithms and creating prototypes for transitioning current software to quantum-safe standards. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;They talk in-depth about the security risk quantum poses, how researchers are addressing that risk, how policy can (or should) shift to make standardization a reality, and what organizations might struggle with as they shift toward quantum—and how some of those struggles might be addressed.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:34] Introduction&lt;/li&gt;&lt;li&gt;[03:55&amp;nbsp;-&amp;nbsp;06:05] An overview of quantum computing&lt;/li&gt;&lt;li&gt;[06:45&amp;nbsp;-&amp;nbsp;11:30] Cyber risks associated with quantum&lt;/li&gt;&lt;li&gt;[15:03&amp;nbsp;-&amp;nbsp;18:42] Algorithms that are quantum-safe&lt;/li&gt;&lt;li&gt;[19:09&amp;nbsp;-&amp;nbsp;21:54] Encryption algorithms, RSA deep dive&lt;/li&gt;&lt;li&gt;[25:18&amp;nbsp;-&amp;nbsp;26:15] Effective policy regulations&lt;/li&gt;&lt;li&gt;[26:42&amp;nbsp;-&amp;nbsp;29:30] Where to begin when learning about quantum&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1878</itunes:duration><itunes:season>2</itunes:season><itunes:episode>6</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide major breakthroughs across society, science and business. At the same time, it poses a risk to key cryptographic algorithms we depend upon for the safety of our digital world. Meaning, it has the potential to render existing communications as insecure as if they weren’t encoded at all.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with one of the scientists working on quantum-safe encryption algorithms. Dr. Walid Rjaibi has spent considerable time experimenting with these algorithms and creating prototypes for transitioning current software to quantum-safe standards. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;They talk in-depth about the security risk quantum poses, how researchers are addressing that risk, how policy can (or should) shift to make standardization a reality, and what organizations might struggle with as they shift toward quantum—and how some of those struggles might be addressed.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:34] Introduction&lt;/li&gt;&lt;li&gt;[03:55&amp;nbsp;-&amp;nbsp;06:05] An overview of quantum computing&lt;/li&gt;&lt;li&gt;[06:45&amp;nbsp;-&amp;nbsp;11:30] Cyber risks associated with quantum&lt;/li&gt;&lt;li&gt;[15:03&amp;nbsp;-&amp;nbsp;18:42] Algorithms that are quantum-safe&lt;/li&gt;&lt;li&gt;[19:09&amp;nbsp;-&amp;nbsp;21:54] Encryption algorithms, RSA deep dive&lt;/li&gt;&lt;li&gt;[25:18&amp;nbsp;-&amp;nbsp;26:15] Effective policy regulations&lt;/li&gt;&lt;li&gt;[26:42&amp;nbsp;-&amp;nbsp;29:30] Where to begin when learning about quantum&lt;/li&gt;&lt;/ul&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Threat sharing evolution: How groups offer less risk and better intelligence to members]]></title><description><![CDATA[<p>It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private threat sharing groups—like the Joint Cyber Defense Counsel (JCDC) and National Artificial Intelligence and Cybersecurity ISAO (NAIC/ISAO), offering platforms where member organizations can both share threat information and gain access to the larger collection.</p><p><br></p><p>Yet, perception challenges still exist for threat sharing groups. These include both liability and confidentiality concerns, with some organizations wondering if information shared in a group could be traced back to—and used against—the organization that shared the data in the first place.</p><p><br></p><p>In this episode, host Mitch Mayne talks with Michael Thiessmeier, Co-founder and Executive Director of the NAIC/ISAO, about the history of threat sharing and how the “public good” has benefitted. They also explore the perceived hurdles to entering threat sharing groups and explore whether or not those are legitimate concerns.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;01:41] Introduction</li><li>[03:23&nbsp;-&nbsp;05:54] Notable wins as a result of groups sharing intelligence</li><li>[06:19&nbsp;-&nbsp;07:23] What information to consider sharing in an information-sharing group</li><li>[11:00&nbsp;-&nbsp;14:03] Has trust been restored that the government does the right thing in terms of privacy and surveillance?</li><li>[20:09&nbsp;-&nbsp;21:23] Michaels information products</li><li>[22:15&nbsp;-&nbsp;23:20] Why threat sharing is important</li></ul>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/3c8c505a</link><guid isPermaLink="false">19346bda-f79f-45af-90a6-aa6f599e7c91</guid><pubDate>Wed, 28 Jun 2023 20:12:56 GMT</pubDate><enclosure url="https://media.casted.us/95/3c8c505a.mp3" length="23544308" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private threat sharing groups—like the Joint Cyber Defense Counsel (JCDC) and National Artificial Intelligence ...</itunes:subtitle><itunes:summary>&lt;p&gt;It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private threat sharing groups—like the Joint Cyber Defense Counsel (JCDC) and National Artificial Intelligence and Cybersecurity ISAO (NAIC/ISAO), offering platforms where member organizations can both share threat information and gain access to the larger collection.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Yet, perception challenges still exist for threat sharing groups. These include both liability and confidentiality concerns, with some organizations wondering if information shared in a group could be traced back to—and used against—the organization that shared the data in the first place.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with Michael Thiessmeier, Co-founder and Executive Director of the NAIC/ISAO, about the history of threat sharing and how the “public good” has benefitted. They also explore the perceived hurdles to entering threat sharing groups and explore whether or not those are legitimate concerns.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:41] Introduction&lt;/li&gt;&lt;li&gt;[03:23&amp;nbsp;-&amp;nbsp;05:54] Notable wins as a result of groups sharing intelligence&lt;/li&gt;&lt;li&gt;[06:19&amp;nbsp;-&amp;nbsp;07:23] What information to consider sharing in an information-sharing group&lt;/li&gt;&lt;li&gt;[11:00&amp;nbsp;-&amp;nbsp;14:03] Has trust been restored that the government does the right thing in terms of privacy and surveillance?&lt;/li&gt;&lt;li&gt;[20:09&amp;nbsp;-&amp;nbsp;21:23] Michaels information products&lt;/li&gt;&lt;li&gt;[22:15&amp;nbsp;-&amp;nbsp;23:20] Why threat sharing is important&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1470</itunes:duration><itunes:season>2</itunes:season><itunes:episode>5</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private threat sharing groups—like the Joint Cyber Defense Counsel (JCDC) and National Artificial Intelligence and Cybersecurity ISAO (NAIC/ISAO), offering platforms where member organizations can both share threat information and gain access to the larger collection.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Yet, perception challenges still exist for threat sharing groups. These include both liability and confidentiality concerns, with some organizations wondering if information shared in a group could be traced back to—and used against—the organization that shared the data in the first place.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, host Mitch Mayne talks with Michael Thiessmeier, Co-founder and Executive Director of the NAIC/ISAO, about the history of threat sharing and how the “public good” has benefitted. They also explore the perceived hurdles to entering threat sharing groups and explore whether or not those are legitimate concerns.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:41] Introduction&lt;/li&gt;&lt;li&gt;[03:23&amp;nbsp;-&amp;nbsp;05:54] Notable wins as a result of groups sharing intelligence&lt;/li&gt;&lt;li&gt;[06:19&amp;nbsp;-&amp;nbsp;07:23] What information to consider sharing in an information-sharing group&lt;/li&gt;&lt;li&gt;[11:00&amp;nbsp;-&amp;nbsp;14:03] Has trust been restored that the government does the right thing in terms of privacy and surveillance?&lt;/li&gt;&lt;li&gt;[20:09&amp;nbsp;-&amp;nbsp;21:23] Michaels information products&lt;/li&gt;&lt;li&gt;[22:15&amp;nbsp;-&amp;nbsp;23:20] Why threat sharing is important&lt;/li&gt;&lt;/ul&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Your private information is probably being sold on the dark web. How can criminals use it?]]></title><description><![CDATA[<p>Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks.&nbsp;<a href="https://www.linkedin.com/in/stephanie-carruthers/" rel="noopener noreferrer" target="_blank">Stephanie Caruthers</a>—known online as “Snow,’ is a professional hacker herself and has a solid&nbsp;<a href="https://securityintelligence.com/posts/an-ibm-hacker-breaks-down-high-profile-attacks/" rel="noopener noreferrer" target="_blank">working theory</a>&nbsp;on how the attacks happened. Stephanie’s take: the criminal may have purchased already stolen credentials of users off the dark web, used that data to research the target victims, and then combine those sources of information to engineer highly targeted attacks.Which raises the question: Is your information out on the dark web, and how can it be used by a criminal?Let’s find out. Join us as we venture, Into the Breach.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;01:36] Introduction</li><li>[01:55&nbsp;-&nbsp;02:30] The genesis of online name Snow</li><li>[05:42&nbsp;-&nbsp;06:41] Spearfishing vs. social engineering</li><li>[07:21&nbsp;-&nbsp;08:21] What Snow knows about Uber and Rockstar hacks</li><li>[08:45&nbsp;-&nbsp;10:37] Snow's thoughts on TeaPot purchasing credentials from the dark web for who they were targeting</li><li>[11:04&nbsp;-&nbsp;12:20] What Snow looks for to find information from a social media perspective</li><li>[19:37&nbsp;-&nbsp;22:43] Advice on how to avoid being attacked</li><li>[21:00&nbsp;-&nbsp;22:43] How the attacks happened</li><li>[23:38&nbsp;-&nbsp;24:38] For the average citizen: What to do or not to do</li></ul>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/31bbed4b</link><guid isPermaLink="false">7dfdbd09-85b9-4689-a415-51adf75bbf63</guid><pubDate>Thu, 06 Apr 2023 15:56:08 GMT</pubDate><enclosure url="https://media.casted.us/95/31bbed4b.mp3" length="26793817" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks.&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/in/stephanie-carruthers/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Stephanie Caruther...</itunes:subtitle><itunes:summary>&lt;p&gt;Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks.&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/in/stephanie-carruthers/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Stephanie Caruthers&lt;/a&gt;—known online as “Snow,’ is a professional hacker herself and has a solid&amp;nbsp;&lt;a href=&quot;https://securityintelligence.com/posts/an-ibm-hacker-breaks-down-high-profile-attacks/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;working theory&lt;/a&gt;&amp;nbsp;on how the attacks happened. Stephanie’s take: the criminal may have purchased already stolen credentials of users off the dark web, used that data to research the target victims, and then combine those sources of information to engineer highly targeted attacks.Which raises the question: Is your information out on the dark web, and how can it be used by a criminal?Let’s find out. Join us as we venture, Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:36] Introduction&lt;/li&gt;&lt;li&gt;[01:55&amp;nbsp;-&amp;nbsp;02:30] The genesis of online name Snow&lt;/li&gt;&lt;li&gt;[05:42&amp;nbsp;-&amp;nbsp;06:41] Spearfishing vs. social engineering&lt;/li&gt;&lt;li&gt;[07:21&amp;nbsp;-&amp;nbsp;08:21] What Snow knows about Uber and Rockstar hacks&lt;/li&gt;&lt;li&gt;[08:45&amp;nbsp;-&amp;nbsp;10:37] Snow&apos;s thoughts on TeaPot purchasing credentials from the dark web for who they were targeting&lt;/li&gt;&lt;li&gt;[11:04&amp;nbsp;-&amp;nbsp;12:20] What Snow looks for to find information from a social media perspective&lt;/li&gt;&lt;li&gt;[19:37&amp;nbsp;-&amp;nbsp;22:43] Advice on how to avoid being attacked&lt;/li&gt;&lt;li&gt;[21:00&amp;nbsp;-&amp;nbsp;22:43] How the attacks happened&lt;/li&gt;&lt;li&gt;[23:38&amp;nbsp;-&amp;nbsp;24:38] For the average citizen: What to do or not to do&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>Yes</itunes:explicit><itunes:duration>1674</itunes:duration><itunes:season>2</itunes:season><itunes:episode>4</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks.&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/in/stephanie-carruthers/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Stephanie Caruthers&lt;/a&gt;—known online as “Snow,’ is a professional hacker herself and has a solid&amp;nbsp;&lt;a href=&quot;https://securityintelligence.com/posts/an-ibm-hacker-breaks-down-high-profile-attacks/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;working theory&lt;/a&gt;&amp;nbsp;on how the attacks happened. Stephanie’s take: the criminal may have purchased already stolen credentials of users off the dark web, used that data to research the target victims, and then combine those sources of information to engineer highly targeted attacks.Which raises the question: Is your information out on the dark web, and how can it be used by a criminal?Let’s find out. Join us as we venture, Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:36] Introduction&lt;/li&gt;&lt;li&gt;[01:55&amp;nbsp;-&amp;nbsp;02:30] The genesis of online name Snow&lt;/li&gt;&lt;li&gt;[05:42&amp;nbsp;-&amp;nbsp;06:41] Spearfishing vs. social engineering&lt;/li&gt;&lt;li&gt;[07:21&amp;nbsp;-&amp;nbsp;08:21] What Snow knows about Uber and Rockstar hacks&lt;/li&gt;&lt;li&gt;[08:45&amp;nbsp;-&amp;nbsp;10:37] Snow&apos;s thoughts on TeaPot purchasing credentials from the dark web for who they were targeting&lt;/li&gt;&lt;li&gt;[11:04&amp;nbsp;-&amp;nbsp;12:20] What Snow looks for to find information from a social media perspective&lt;/li&gt;&lt;li&gt;[19:37&amp;nbsp;-&amp;nbsp;22:43] Advice on how to avoid being attacked&lt;/li&gt;&lt;li&gt;[21:00&amp;nbsp;-&amp;nbsp;22:43] How the attacks happened&lt;/li&gt;&lt;li&gt;[23:38&amp;nbsp;-&amp;nbsp;24:38] For the average citizen: What to do or not to do&lt;/li&gt;&lt;/ul&gt;</googleplay:description><googleplay:explicit>Yes</googleplay:explicit></item><item><title><![CDATA[Operational Technology: The evolving threats that might shift regulatory policy]]></title><description><![CDATA[<p>Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure.</p><p><br></p><p>Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are behind us, and the threats to OT and ICS are real and ongoing.</p><p><br></p><p><a href="https://www.linkedin.com/in/roya-gordon-16245437/" rel="noopener noreferrer" target="_blank">Roya Gordon</a> and her team at Nozomi Networks keep a close eye on these kinds of threats, and recently released their biannual <a href="https://www.nozominetworks.com/blog/nozomi-networks-researchers-take-a-deep-look-into-the-ics-threat-landscape/" rel="noopener noreferrer" target="_blank">OT/IoT Security Report</a> that examines what’s happened in the landscape for this sector in the latter half of 2022.</p><p><br></p><p>She joins me in this episode to talk in-depth about what her team found—including the latest on the types of attacks hitting OT and IoT, what effect increased regulation may have on industries in this sector, how Russia’s invasion of Ukraine continues to change the landscape, and what may be on the horizon for cyber insurance. And maybe most importantly, she helps us understand what OT/IoT organizations can do to stay safer.</p><p><br></p><p>Join us—and together we’ll venture Into the Breach.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;00:44] Introduction</li><li>[01:00&nbsp;-&nbsp;02:50] Important pieces from Nozomi's security report</li><li>[03:23&nbsp;-&nbsp;05:21] Threat actors Roya sees at Nozomi</li><li>[06:16&nbsp;-&nbsp;08:10] Roya explains being anti-cyber insurance</li><li>[11:40&nbsp;-&nbsp;15:21] Sector-specific plans: What do we know and are they needed?</li><li>[16:19&nbsp;-&nbsp;17:21] International efforts for a safer sector</li><li>[20:45&nbsp;-&nbsp;23:06] Advice for loT and OT friends</li></ul><p><br></p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/09271c74</link><guid isPermaLink="false">3a58035f-9626-47b4-be76-b31d78cd97e5</guid><pubDate>Thu, 23 Mar 2023 15:15:41 GMT</pubDate><enclosure url="https://media.casted.us/95/09271c74.mp3" length="30400718" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical ...</itunes:subtitle><itunes:summary>&lt;p&gt;Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are behind us, and the threats to OT and ICS are real and ongoing.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/in/roya-gordon-16245437/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Roya Gordon&lt;/a&gt; and her team at Nozomi Networks keep a close eye on these kinds of threats, and recently released their biannual &lt;a href=&quot;https://www.nozominetworks.com/blog/nozomi-networks-researchers-take-a-deep-look-into-the-ics-threat-landscape/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;OT/IoT Security Report&lt;/a&gt; that examines what’s happened in the landscape for this sector in the latter half of 2022.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;She joins me in this episode to talk in-depth about what her team found—including the latest on the types of attacks hitting OT and IoT, what effect increased regulation may have on industries in this sector, how Russia’s invasion of Ukraine continues to change the landscape, and what may be on the horizon for cyber insurance. And maybe most importantly, she helps us understand what OT/IoT organizations can do to stay safer.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join us—and together we’ll venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;00:44] Introduction&lt;/li&gt;&lt;li&gt;[01:00&amp;nbsp;-&amp;nbsp;02:50] Important pieces from Nozomi&apos;s security report&lt;/li&gt;&lt;li&gt;[03:23&amp;nbsp;-&amp;nbsp;05:21] Threat actors Roya sees at Nozomi&lt;/li&gt;&lt;li&gt;[06:16&amp;nbsp;-&amp;nbsp;08:10] Roya explains being anti-cyber insurance&lt;/li&gt;&lt;li&gt;[11:40&amp;nbsp;-&amp;nbsp;15:21] Sector-specific plans: What do we know and are they needed?&lt;/li&gt;&lt;li&gt;[16:19&amp;nbsp;-&amp;nbsp;17:21] International efforts for a safer sector&lt;/li&gt;&lt;li&gt;[20:45&amp;nbsp;-&amp;nbsp;23:06] Advice for loT and OT friends&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1900</itunes:duration><itunes:season>2</itunes:season><itunes:episode>3</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are behind us, and the threats to OT and ICS are real and ongoing.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/in/roya-gordon-16245437/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Roya Gordon&lt;/a&gt; and her team at Nozomi Networks keep a close eye on these kinds of threats, and recently released their biannual &lt;a href=&quot;https://www.nozominetworks.com/blog/nozomi-networks-researchers-take-a-deep-look-into-the-ics-threat-landscape/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;OT/IoT Security Report&lt;/a&gt; that examines what’s happened in the landscape for this sector in the latter half of 2022.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;She joins me in this episode to talk in-depth about what her team found—including the latest on the types of attacks hitting OT and IoT, what effect increased regulation may have on industries in this sector, how Russia’s invasion of Ukraine continues to change the landscape, and what may be on the horizon for cyber insurance. And maybe most importantly, she helps us understand what OT/IoT organizations can do to stay safer.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join us—and together we’ll venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;00:44] Introduction&lt;/li&gt;&lt;li&gt;[01:00&amp;nbsp;-&amp;nbsp;02:50] Important pieces from Nozomi&apos;s security report&lt;/li&gt;&lt;li&gt;[03:23&amp;nbsp;-&amp;nbsp;05:21] Threat actors Roya sees at Nozomi&lt;/li&gt;&lt;li&gt;[06:16&amp;nbsp;-&amp;nbsp;08:10] Roya explains being anti-cyber insurance&lt;/li&gt;&lt;li&gt;[11:40&amp;nbsp;-&amp;nbsp;15:21] Sector-specific plans: What do we know and are they needed?&lt;/li&gt;&lt;li&gt;[16:19&amp;nbsp;-&amp;nbsp;17:21] International efforts for a safer sector&lt;/li&gt;&lt;li&gt;[20:45&amp;nbsp;-&amp;nbsp;23:06] Advice for loT and OT friends&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[The threat landscape 2023: Top targets, top attack types, top geographies]]></title><description><![CDATA[<p>Every year, the <a href="https://www.ibm.com/x-force" rel="noopener noreferrer" target="_blank">IBM Security X-Force</a> team of cyber experts mine billions of data points to reveal today's biggest attack trends and patterns. In this episode, host Mitch Mayne is joined by Michael Worley, one of this year’s primary authors, and digs into the guts of the X-Force <a href="https://www.ibm.com/reports/threat-intelligence" rel="noopener noreferrer" target="_blank">Threat Intelligence Index 2023</a> to uncover the continuously changing cybersecurity landscape and understand how to defend against the latest threats. Join us as we journey into 2023 — and Into the Breach.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;00:35] Introduction</li><li>[01:04&nbsp;-&nbsp;03:17] What changes were made to the X-Force Threat Intelligence Index for 2023</li><li>[03:48&nbsp;-&nbsp;04:37] How Michael's background shaped how he examined data for this years report</li><li>[05:00&nbsp;-&nbsp;06:04] The biggest aha moment from this year's report</li><li>[11:10&nbsp;-&nbsp;13:39] Phishing and other vulnerabilities</li><li>[15:20&nbsp;-&nbsp;16:30] Steps to to take to protect yourself</li></ul>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/20971e6b</link><guid isPermaLink="false">390829f5-b2cc-4413-a8d0-f17332cd6c2b</guid><pubDate>Wed, 01 Mar 2023 21:47:10 GMT</pubDate><enclosure url="https://media.casted.us/95/20971e6b.mp3" length="17440229" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Every year, the &lt;a href=&quot;https://www.ibm.com/x-force&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;IBM Security X-Force&lt;/a&gt; team of cyber experts mine billions of data points to reveal today&apos;s biggest attack trends and patterns. In this episode, host M...</itunes:subtitle><itunes:summary>&lt;p&gt;Every year, the &lt;a href=&quot;https://www.ibm.com/x-force&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;IBM Security X-Force&lt;/a&gt; team of cyber experts mine billions of data points to reveal today&apos;s biggest attack trends and patterns. In this episode, host Mitch Mayne is joined by Michael Worley, one of this year’s primary authors, and digs into the guts of the X-Force &lt;a href=&quot;https://www.ibm.com/reports/threat-intelligence&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Threat Intelligence Index 2023&lt;/a&gt; to uncover the continuously changing cybersecurity landscape and understand how to defend against the latest threats. Join us as we journey into 2023 — and Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;00:35] Introduction&lt;/li&gt;&lt;li&gt;[01:04&amp;nbsp;-&amp;nbsp;03:17] What changes were made to the X-Force Threat Intelligence Index for 2023&lt;/li&gt;&lt;li&gt;[03:48&amp;nbsp;-&amp;nbsp;04:37] How Michael&apos;s background shaped how he examined data for this years report&lt;/li&gt;&lt;li&gt;[05:00&amp;nbsp;-&amp;nbsp;06:04] The biggest aha moment from this year&apos;s report&lt;/li&gt;&lt;li&gt;[11:10&amp;nbsp;-&amp;nbsp;13:39] Phishing and other vulnerabilities&lt;/li&gt;&lt;li&gt;[15:20&amp;nbsp;-&amp;nbsp;16:30] Steps to to take to protect yourself&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1090</itunes:duration><itunes:season>2</itunes:season><itunes:episode>2</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Every year, the &lt;a href=&quot;https://www.ibm.com/x-force&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;IBM Security X-Force&lt;/a&gt; team of cyber experts mine billions of data points to reveal today&apos;s biggest attack trends and patterns. In this episode, host Mitch Mayne is joined by Michael Worley, one of this year’s primary authors, and digs into the guts of the X-Force &lt;a href=&quot;https://www.ibm.com/reports/threat-intelligence&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Threat Intelligence Index 2023&lt;/a&gt; to uncover the continuously changing cybersecurity landscape and understand how to defend against the latest threats. Join us as we journey into 2023 — and Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;00:35] Introduction&lt;/li&gt;&lt;li&gt;[01:04&amp;nbsp;-&amp;nbsp;03:17] What changes were made to the X-Force Threat Intelligence Index for 2023&lt;/li&gt;&lt;li&gt;[03:48&amp;nbsp;-&amp;nbsp;04:37] How Michael&apos;s background shaped how he examined data for this years report&lt;/li&gt;&lt;li&gt;[05:00&amp;nbsp;-&amp;nbsp;06:04] The biggest aha moment from this year&apos;s report&lt;/li&gt;&lt;li&gt;[11:10&amp;nbsp;-&amp;nbsp;13:39] Phishing and other vulnerabilities&lt;/li&gt;&lt;li&gt;[15:20&amp;nbsp;-&amp;nbsp;16:30] Steps to to take to protect yourself&lt;/li&gt;&lt;/ul&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[2023 Cybersecurity Predictions]]></title><description><![CDATA[<p>In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is <a href="https://www.linkedin.com/in/danlohrmann/" rel="noopener noreferrer" target="_blank">Dan Lohrmann</a>, a well-known voice in cybersecurity whose resume boasts an impressive list of positions in cyber leadership in both the public and private sector, in addition to authorship of three books on cybersecurity.</p><p>&nbsp;</p><p>Dan publishes an annual review of top cyber organization predictions (check out <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-1" rel="noopener noreferrer" target="_blank">Part One</a> and <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-2" rel="noopener noreferrer" target="_blank">Part Two</a>). Think of them like a content analysis of over two dozen industry leading reports. Among those surveyed is the 2022 IBM Security X-Force <a href="https://www.ibm.com/reports/threat-intelligence/" rel="noopener noreferrer" target="_blank">Threat Intelligence Index</a> and our annual <a href="https://securityintelligence.com/articles/cybersecurity-trends-ibm-predictions-2023/" rel="noopener noreferrer" target="_blank">predictions blog</a> published just last month. And of course, I’d miss the chance to humble-brag if I didn’t tease the fact that we’ll be releasing our 2023 Threat Intelligence Index in early February, too, so stay tuned for that one. &nbsp;</p><p>&nbsp;</p><p>Given the hours he’s devoted to analyzing the market predictions, Dan’s view is both broad and deep. We’re going to utilize his expertise to focus on a few hot topics for 2023:</p><p>&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ransomware: How it will evolve, and who may be targeted</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Social engineering: How increased sophistication (including attempts to bypass MFA) may impact business</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cyber insurance: Will it become more difficult to get in 2023</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Ukraine war: What fallout we might expect this year</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Crypto and social media: Given the tumult in 2022, what we might see changing both on a market and a policy front</p><p>&nbsp;</p><p>Join us, and together we’ll venture Into the Breach.</p><p><br></p><p><strong>Things to listen for:</strong></p><ul><li>[00:05&nbsp;-&nbsp;01:17] Introduction</li><li>[07:21&nbsp;-&nbsp;08:58] What we got right in 2022</li><li>[09:52&nbsp;-&nbsp;12:29] What we might see for ransomware in 2023</li><li>[13:50&nbsp;-&nbsp;16:33] What we might see in terms of social engineering, and what will be the role of deep fakes?</li><li>[17:37&nbsp;-&nbsp;19:55] Insurance providers in 2023</li><li>[25:06&nbsp;-&nbsp;26:08] Changes in crypto, and will there be a push to regulate?</li><li>[29:07&nbsp;-&nbsp;30:17] Potential positives to look for in 2023</li></ul><p><br></p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/66f11700</link><guid isPermaLink="false">5c79ac9a-8006-4085-a91c-3c058e674d0a</guid><pubDate>Tue, 21 Feb 2023 20:42:12 GMT</pubDate><enclosure url="https://media.casted.us/95/66f11700.mp3" length="30220889" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is &lt;a href=&quot;https://www.linkedin.com/in/danlohrmann/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Dan Lohrmann&lt;/a&gt;, a well-known voice in cyberse...</itunes:subtitle><itunes:summary>&lt;p&gt;In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is &lt;a href=&quot;https://www.linkedin.com/in/danlohrmann/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Dan Lohrmann&lt;/a&gt;, a well-known voice in cybersecurity whose resume boasts an impressive list of positions in cyber leadership in both the public and private sector, in addition to authorship of three books on cybersecurity.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Dan publishes an annual review of top cyber organization predictions (check out &lt;a href=&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Part One&lt;/a&gt; and &lt;a href=&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-2&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Part Two&lt;/a&gt;). Think of them like a content analysis of over two dozen industry leading reports. Among those surveyed is the 2022 IBM Security X-Force &lt;a href=&quot;https://www.ibm.com/reports/threat-intelligence/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Threat Intelligence Index&lt;/a&gt; and our annual &lt;a href=&quot;https://securityintelligence.com/articles/cybersecurity-trends-ibm-predictions-2023/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;predictions blog&lt;/a&gt; published just last month. And of course, I’d miss the chance to humble-brag if I didn’t tease the fact that we’ll be releasing our 2023 Threat Intelligence Index in early February, too, so stay tuned for that one. &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Given the hours he’s devoted to analyzing the market predictions, Dan’s view is both broad and deep. We’re going to utilize his expertise to focus on a few hot topics for 2023:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ransomware: How it will evolve, and who may be targeted&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Social engineering: How increased sophistication (including attempts to bypass MFA) may impact business&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cyber insurance: Will it become more difficult to get in 2023&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Ukraine war: What fallout we might expect this year&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto and social media: Given the tumult in 2022, what we might see changing both on a market and a policy front&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join us, and together we’ll venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:17] Introduction&lt;/li&gt;&lt;li&gt;[07:21&amp;nbsp;-&amp;nbsp;08:58] What we got right in 2022&lt;/li&gt;&lt;li&gt;[09:52&amp;nbsp;-&amp;nbsp;12:29] What we might see for ransomware in 2023&lt;/li&gt;&lt;li&gt;[13:50&amp;nbsp;-&amp;nbsp;16:33] What we might see in terms of social engineering, and what will be the role of deep fakes?&lt;/li&gt;&lt;li&gt;[17:37&amp;nbsp;-&amp;nbsp;19:55] Insurance providers in 2023&lt;/li&gt;&lt;li&gt;[25:06&amp;nbsp;-&amp;nbsp;26:08] Changes in crypto, and will there be a push to regulate?&lt;/li&gt;&lt;li&gt;[29:07&amp;nbsp;-&amp;nbsp;30:17] Potential positives to look for in 2023&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1889</itunes:duration><itunes:season>2</itunes:season><itunes:episode>1</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is &lt;a href=&quot;https://www.linkedin.com/in/danlohrmann/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Dan Lohrmann&lt;/a&gt;, a well-known voice in cybersecurity whose resume boasts an impressive list of positions in cyber leadership in both the public and private sector, in addition to authorship of three books on cybersecurity.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Dan publishes an annual review of top cyber organization predictions (check out &lt;a href=&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-1&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Part One&lt;/a&gt; and &lt;a href=&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-2&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Part Two&lt;/a&gt;). Think of them like a content analysis of over two dozen industry leading reports. Among those surveyed is the 2022 IBM Security X-Force &lt;a href=&quot;https://www.ibm.com/reports/threat-intelligence/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Threat Intelligence Index&lt;/a&gt; and our annual &lt;a href=&quot;https://securityintelligence.com/articles/cybersecurity-trends-ibm-predictions-2023/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;predictions blog&lt;/a&gt; published just last month. And of course, I’d miss the chance to humble-brag if I didn’t tease the fact that we’ll be releasing our 2023 Threat Intelligence Index in early February, too, so stay tuned for that one. &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Given the hours he’s devoted to analyzing the market predictions, Dan’s view is both broad and deep. We’re going to utilize his expertise to focus on a few hot topics for 2023:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ransomware: How it will evolve, and who may be targeted&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Social engineering: How increased sophistication (including attempts to bypass MFA) may impact business&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cyber insurance: Will it become more difficult to get in 2023&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Ukraine war: What fallout we might expect this year&lt;/p&gt;&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto and social media: Given the tumult in 2022, what we might see changing both on a market and a policy front&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join us, and together we’ll venture Into the Breach.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Things to listen for:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;[00:05&amp;nbsp;-&amp;nbsp;01:17] Introduction&lt;/li&gt;&lt;li&gt;[07:21&amp;nbsp;-&amp;nbsp;08:58] What we got right in 2022&lt;/li&gt;&lt;li&gt;[09:52&amp;nbsp;-&amp;nbsp;12:29] What we might see for ransomware in 2023&lt;/li&gt;&lt;li&gt;[13:50&amp;nbsp;-&amp;nbsp;16:33] What we might see in terms of social engineering, and what will be the role of deep fakes?&lt;/li&gt;&lt;li&gt;[17:37&amp;nbsp;-&amp;nbsp;19:55] Insurance providers in 2023&lt;/li&gt;&lt;li&gt;[25:06&amp;nbsp;-&amp;nbsp;26:08] Changes in crypto, and will there be a push to regulate?&lt;/li&gt;&lt;li&gt;[29:07&amp;nbsp;-&amp;nbsp;30:17] Potential positives to look for in 2023&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks]]></title><description><![CDATA[<p>Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.</p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:06&nbsp;-&nbsp;01:07 Intro to episode</p><p>01:40&nbsp;-&nbsp;03:17 The Middle East Institute</p><p>04:34&nbsp;-&nbsp;05:22 The difference between information technology and operational technology</p><p>11:39&nbsp;-&nbsp;13:08 Motives behind attacks</p><p>13:20&nbsp;-&nbsp;14:33 How we should think about operational technology security, that we aren't considering today</p><p>14:33&nbsp;-&nbsp;17:26 Do we need the government in order to follow cybersecurity safeguards?</p><p>18:47&nbsp;-&nbsp;19:57 Ideal state for operational technology security</p><p>20:26&nbsp;-&nbsp;24:38 Chris shares a recent, and very interesting experience</p><p>25:42&nbsp;-&nbsp;27:38 What keeps Chris awake at night when it comes to operational technology</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/0742c7dc</link><guid isPermaLink="false">8eeba02b-c3f1-4d67-847b-46a4ae9174a8</guid><pubDate>Wed, 16 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/0742c7dc.mp3" length="32863444" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we m...</itunes:subtitle><itunes:summary>&lt;p&gt;Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:06&amp;nbsp;-&amp;nbsp;01:07 Intro to episode&lt;/p&gt;&lt;p&gt;01:40&amp;nbsp;-&amp;nbsp;03:17 The Middle East Institute&lt;/p&gt;&lt;p&gt;04:34&amp;nbsp;-&amp;nbsp;05:22 The difference between information technology and operational technology&lt;/p&gt;&lt;p&gt;11:39&amp;nbsp;-&amp;nbsp;13:08 Motives behind attacks&lt;/p&gt;&lt;p&gt;13:20&amp;nbsp;-&amp;nbsp;14:33 How we should think about operational technology security, that we aren&apos;t considering today&lt;/p&gt;&lt;p&gt;14:33&amp;nbsp;-&amp;nbsp;17:26 Do we need the government in order to follow cybersecurity safeguards?&lt;/p&gt;&lt;p&gt;18:47&amp;nbsp;-&amp;nbsp;19:57 Ideal state for operational technology security&lt;/p&gt;&lt;p&gt;20:26&amp;nbsp;-&amp;nbsp;24:38 Chris shares a recent, and very interesting experience&lt;/p&gt;&lt;p&gt;25:42&amp;nbsp;-&amp;nbsp;27:38 What keeps Chris awake at night when it comes to operational technology&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>2054</itunes:duration><itunes:image href="https://files.casted.us/cef24cfa-e676-4835-8f44-7cd1e18bc05c.jpg"/><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:06&amp;nbsp;-&amp;nbsp;01:07 Intro to episode&lt;/p&gt;&lt;p&gt;01:40&amp;nbsp;-&amp;nbsp;03:17 The Middle East Institute&lt;/p&gt;&lt;p&gt;04:34&amp;nbsp;-&amp;nbsp;05:22 The difference between information technology and operational technology&lt;/p&gt;&lt;p&gt;11:39&amp;nbsp;-&amp;nbsp;13:08 Motives behind attacks&lt;/p&gt;&lt;p&gt;13:20&amp;nbsp;-&amp;nbsp;14:33 How we should think about operational technology security, that we aren&apos;t considering today&lt;/p&gt;&lt;p&gt;14:33&amp;nbsp;-&amp;nbsp;17:26 Do we need the government in order to follow cybersecurity safeguards?&lt;/p&gt;&lt;p&gt;18:47&amp;nbsp;-&amp;nbsp;19:57 Ideal state for operational technology security&lt;/p&gt;&lt;p&gt;20:26&amp;nbsp;-&amp;nbsp;24:38 Chris shares a recent, and very interesting experience&lt;/p&gt;&lt;p&gt;25:42&amp;nbsp;-&amp;nbsp;27:38 What keeps Chris awake at night when it comes to operational technology&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape]]></title><description><![CDATA[<p>Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.</p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:08&nbsp;-&nbsp;01:15 Intro to the episode</p><p>01:37&nbsp;-&nbsp;03:00 How easy is it for threat actors to hide funds and cover their trail?</p><p>05:28&nbsp;-&nbsp;08:14 The scale and scope of ransomware</p><p>12:00&nbsp;-&nbsp;14:25 Regulation that allows the market for investors to remain but also helps locate criminal actors</p><p>15:04&nbsp;-&nbsp;17:06 Blacklisting: Target known accounts or try to regulate the entire market?</p><p>17:33&nbsp;-&nbsp;19:16 Are sanctions effective, and why is it being used? How will it work?</p><p>19:57&nbsp;-&nbsp;24:48 Cryptocurrency mixing services</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/c8ac2591</link><guid isPermaLink="false">aab8d1ab-5c18-4124-8f78-6fc9a48b82cf</guid><pubDate>Wed, 09 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/c8ac2591.mp3" length="27228910" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate ...</itunes:subtitle><itunes:summary>&lt;p&gt;Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:08&amp;nbsp;-&amp;nbsp;01:15 Intro to the episode&lt;/p&gt;&lt;p&gt;01:37&amp;nbsp;-&amp;nbsp;03:00 How easy is it for threat actors to hide funds and cover their trail?&lt;/p&gt;&lt;p&gt;05:28&amp;nbsp;-&amp;nbsp;08:14 The scale and scope of ransomware&lt;/p&gt;&lt;p&gt;12:00&amp;nbsp;-&amp;nbsp;14:25 Regulation that allows the market for investors to remain but also helps locate criminal actors&lt;/p&gt;&lt;p&gt;15:04&amp;nbsp;-&amp;nbsp;17:06 Blacklisting: Target known accounts or try to regulate the entire market?&lt;/p&gt;&lt;p&gt;17:33&amp;nbsp;-&amp;nbsp;19:16 Are sanctions effective, and why is it being used? How will it work?&lt;/p&gt;&lt;p&gt;19:57&amp;nbsp;-&amp;nbsp;24:48 Cryptocurrency mixing services&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1702</itunes:duration><itunes:image href="https://files.casted.us/73521bc6-ab5c-499b-a61c-0e8e3a5399a4.jpg"/><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:08&amp;nbsp;-&amp;nbsp;01:15 Intro to the episode&lt;/p&gt;&lt;p&gt;01:37&amp;nbsp;-&amp;nbsp;03:00 How easy is it for threat actors to hide funds and cover their trail?&lt;/p&gt;&lt;p&gt;05:28&amp;nbsp;-&amp;nbsp;08:14 The scale and scope of ransomware&lt;/p&gt;&lt;p&gt;12:00&amp;nbsp;-&amp;nbsp;14:25 Regulation that allows the market for investors to remain but also helps locate criminal actors&lt;/p&gt;&lt;p&gt;15:04&amp;nbsp;-&amp;nbsp;17:06 Blacklisting: Target known accounts or try to regulate the entire market?&lt;/p&gt;&lt;p&gt;17:33&amp;nbsp;-&amp;nbsp;19:16 Are sanctions effective, and why is it being used? How will it work?&lt;/p&gt;&lt;p&gt;19:57&amp;nbsp;-&amp;nbsp;24:48 Cryptocurrency mixing services&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[I'd Like to Buy a Vowel: The Price of Poor Communication During a Data Breach]]></title><description><![CDATA[<p>When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.</p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:05&nbsp;-&nbsp;01:18 Intro to episode</p><p>01:32&nbsp;-&nbsp;03:06 Advice to a CEO on how to handle a data breach from a communication perspective</p><p>03:36&nbsp;-&nbsp;07:06 Crisis response plan vs a cyber communication plan</p><p>08:19&nbsp;-&nbsp;11:55 Missteps in communication: The Atlanta cyber attack in 2018</p><p>11:55&nbsp;-&nbsp;16:08 Missteps in communication: The Equifax breach</p><p>17:30&nbsp;-&nbsp;19:58 An example of communication gone well</p><p>22:52&nbsp;-&nbsp;24:12 What can we expect to see a new cybersecurity executive order do to communication?</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/65328555</link><guid isPermaLink="false">cc0d6fea-465c-4588-aaa9-a3a07eb577da</guid><pubDate>Wed, 02 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/65328555.mp3" length="28094958" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, bra...</itunes:subtitle><itunes:summary>&lt;p&gt;When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;01:18 Intro to episode&lt;/p&gt;&lt;p&gt;01:32&amp;nbsp;-&amp;nbsp;03:06 Advice to a CEO on how to handle a data breach from a communication perspective&lt;/p&gt;&lt;p&gt;03:36&amp;nbsp;-&amp;nbsp;07:06 Crisis response plan vs a cyber communication plan&lt;/p&gt;&lt;p&gt;08:19&amp;nbsp;-&amp;nbsp;11:55 Missteps in communication: The Atlanta cyber attack in 2018&lt;/p&gt;&lt;p&gt;11:55&amp;nbsp;-&amp;nbsp;16:08 Missteps in communication: The Equifax breach&lt;/p&gt;&lt;p&gt;17:30&amp;nbsp;-&amp;nbsp;19:58 An example of communication gone well&lt;/p&gt;&lt;p&gt;22:52&amp;nbsp;-&amp;nbsp;24:12 What can we expect to see a new cybersecurity executive order do to communication?&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1756</itunes:duration><itunes:image href="https://files.casted.us/5e850405-286d-4dc9-b3e8-83a31bedc690.jpg"/><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;01:18 Intro to episode&lt;/p&gt;&lt;p&gt;01:32&amp;nbsp;-&amp;nbsp;03:06 Advice to a CEO on how to handle a data breach from a communication perspective&lt;/p&gt;&lt;p&gt;03:36&amp;nbsp;-&amp;nbsp;07:06 Crisis response plan vs a cyber communication plan&lt;/p&gt;&lt;p&gt;08:19&amp;nbsp;-&amp;nbsp;11:55 Missteps in communication: The Atlanta cyber attack in 2018&lt;/p&gt;&lt;p&gt;11:55&amp;nbsp;-&amp;nbsp;16:08 Missteps in communication: The Equifax breach&lt;/p&gt;&lt;p&gt;17:30&amp;nbsp;-&amp;nbsp;19:58 An example of communication gone well&lt;/p&gt;&lt;p&gt;22:52&amp;nbsp;-&amp;nbsp;24:12 What can we expect to see a new cybersecurity executive order do to communication?&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Cybersecurity Superheroes Next Gen: How Higher-Ed Helps Them Find Their Crime-Fighting Niche]]></title><description><![CDATA[<p>Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.</p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:05&nbsp;-&nbsp;00:59 Intro to episode</p><p>02:01&nbsp;-&nbsp;03:42 How Chris because a professor focusing on a niche subject</p><p>03:56&nbsp;-&nbsp;05:30 How to stay current with the cyber landscape</p><p>05:59&nbsp;-&nbsp;07:42 Does university prepare students for a cyber career?</p><p>14:01&nbsp;-&nbsp;16:08 The role of mentorship at university and within the workplace</p><p>20:02&nbsp;-&nbsp;22:14 What would Chris include in his curriculum that he thinks is missing today?</p><p>23:09&nbsp;-&nbsp;26:22 Advice to those who are interested in becoming a mentor</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/87687455</link><guid isPermaLink="false">4e6e1f97-7cf8-44e3-b4e6-cec5f8a89fa6</guid><pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/87687455.mp3" length="26007676" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota Sta...</itunes:subtitle><itunes:summary>&lt;p&gt;Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;00:59 Intro to episode&lt;/p&gt;&lt;p&gt;02:01&amp;nbsp;-&amp;nbsp;03:42 How Chris because a professor focusing on a niche subject&lt;/p&gt;&lt;p&gt;03:56&amp;nbsp;-&amp;nbsp;05:30 How to stay current with the cyber landscape&lt;/p&gt;&lt;p&gt;05:59&amp;nbsp;-&amp;nbsp;07:42 Does university prepare students for a cyber career?&lt;/p&gt;&lt;p&gt;14:01&amp;nbsp;-&amp;nbsp;16:08 The role of mentorship at university and within the workplace&lt;/p&gt;&lt;p&gt;20:02&amp;nbsp;-&amp;nbsp;22:14 What would Chris include in his curriculum that he thinks is missing today?&lt;/p&gt;&lt;p&gt;23:09&amp;nbsp;-&amp;nbsp;26:22 Advice to those who are interested in becoming a mentor&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1625</itunes:duration><itunes:image href="https://files.casted.us/601ca663-a3aa-4bea-94e3-d583e5eeb436.jpg"/><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;00:59 Intro to episode&lt;/p&gt;&lt;p&gt;02:01&amp;nbsp;-&amp;nbsp;03:42 How Chris because a professor focusing on a niche subject&lt;/p&gt;&lt;p&gt;03:56&amp;nbsp;-&amp;nbsp;05:30 How to stay current with the cyber landscape&lt;/p&gt;&lt;p&gt;05:59&amp;nbsp;-&amp;nbsp;07:42 Does university prepare students for a cyber career?&lt;/p&gt;&lt;p&gt;14:01&amp;nbsp;-&amp;nbsp;16:08 The role of mentorship at university and within the workplace&lt;/p&gt;&lt;p&gt;20:02&amp;nbsp;-&amp;nbsp;22:14 What would Chris include in his curriculum that he thinks is missing today?&lt;/p&gt;&lt;p&gt;23:09&amp;nbsp;-&amp;nbsp;26:22 Advice to those who are interested in becoming a mentor&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Lured To The Dark Side The Criminal Hacker Journey Pt. 2]]></title><description><![CDATA[<p>Part 2 of this two-part episode looks at the flip side of criminal hacks &nbsp;—the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.</p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:05&nbsp;-&nbsp;00:40 Intro to this episode</p><p>01:12&nbsp;-&nbsp;03:14 Threat Intelligence: What is is, how it's gathers, and what it's used for</p><p>03:21&nbsp;-&nbsp;06:38 What the cybercrime industry is like right now</p><p>07:03&nbsp;-&nbsp;08:42 Ransomware as a service</p><p>12:08&nbsp;-&nbsp;14:48 Nick's experience at the CIA and the FBI before joining private industry</p><p>17:43&nbsp;-&nbsp;19:45 What businesses can do to help make a legitimate cyber career more interesting than a dark web cyber career</p><p>21:30&nbsp;-&nbsp;25:03 Advice for those interested in a cyber career</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/75bc8f2f</link><guid isPermaLink="false">74b477cc-4e5b-4889-9a45-603fccd7caa5</guid><pubDate>Wed, 19 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/75bc8f2f.mp3" length="29329526" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Part 2 of this two-part episode looks at the flip side of criminal hacks &amp;nbsp;—the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann...</itunes:subtitle><itunes:summary>&lt;p&gt;Part 2 of this two-part episode looks at the flip side of criminal hacks &amp;nbsp;—the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;00:40 Intro to this episode&lt;/p&gt;&lt;p&gt;01:12&amp;nbsp;-&amp;nbsp;03:14 Threat Intelligence: What is is, how it&apos;s gathers, and what it&apos;s used for&lt;/p&gt;&lt;p&gt;03:21&amp;nbsp;-&amp;nbsp;06:38 What the cybercrime industry is like right now&lt;/p&gt;&lt;p&gt;07:03&amp;nbsp;-&amp;nbsp;08:42 Ransomware as a service&lt;/p&gt;&lt;p&gt;12:08&amp;nbsp;-&amp;nbsp;14:48 Nick&apos;s experience at the CIA and the FBI before joining private industry&lt;/p&gt;&lt;p&gt;17:43&amp;nbsp;-&amp;nbsp;19:45 What businesses can do to help make a legitimate cyber career more interesting than a dark web cyber career&lt;/p&gt;&lt;p&gt;21:30&amp;nbsp;-&amp;nbsp;25:03 Advice for those interested in a cyber career&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1833</itunes:duration><itunes:image href="https://files.casted.us/f9ddcd1d-06d3-4fa5-bfa0-ebc0b7a648ed.jpg"/><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Part 2 of this two-part episode looks at the flip side of criminal hacks &amp;nbsp;—the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:05&amp;nbsp;-&amp;nbsp;00:40 Intro to this episode&lt;/p&gt;&lt;p&gt;01:12&amp;nbsp;-&amp;nbsp;03:14 Threat Intelligence: What is is, how it&apos;s gathers, and what it&apos;s used for&lt;/p&gt;&lt;p&gt;03:21&amp;nbsp;-&amp;nbsp;06:38 What the cybercrime industry is like right now&lt;/p&gt;&lt;p&gt;07:03&amp;nbsp;-&amp;nbsp;08:42 Ransomware as a service&lt;/p&gt;&lt;p&gt;12:08&amp;nbsp;-&amp;nbsp;14:48 Nick&apos;s experience at the CIA and the FBI before joining private industry&lt;/p&gt;&lt;p&gt;17:43&amp;nbsp;-&amp;nbsp;19:45 What businesses can do to help make a legitimate cyber career more interesting than a dark web cyber career&lt;/p&gt;&lt;p&gt;21:30&amp;nbsp;-&amp;nbsp;25:03 Advice for those interested in a cyber career&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Lured To The Dark Side: The Criminal Hacker Journey Pt. 1]]></title><description><![CDATA[<p>In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated &nbsp;that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.</p><p><br></p><p><a href="https://www.bbc.com/news/uk-england-devon-46757849" rel="noopener noreferrer" target="_blank">Read Chris's article on teen hackers here.</a></p><p><br></p><p><strong>Key Takeaways:</strong></p><p>00:06&nbsp;-&nbsp;00:52 Intro to the episode</p><p>01:15&nbsp;-&nbsp;01:48 How Chris landed on this story of The Criminal Hacker Journey</p><p>02:16&nbsp;-&nbsp;04:04 How teen boys end up as a criminal hacker, before having and education in cyber</p><p>09:31&nbsp;-&nbsp;10:35 The potential future of these teens if they hadn't been caught and ended up at Blue Screen IT</p><p>12:40&nbsp;-&nbsp;13:53 Lessons learned for the cybersecurity industry</p><p>14:23&nbsp;-&nbsp;15:17 Emotions that came up while writing this story</p><p>16:12&nbsp;-&nbsp;17:44 The ironic interaction between the arrester and the arrestee</p><p>19:12&nbsp;-&nbsp;21:04 Chris shares what he's learned during his cybersecurity journey</p><p>21:04&nbsp;-&nbsp;22:57 Mitch's story about what he's learned during his cybersecurity journey</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/1535ddcf</link><guid isPermaLink="false">2686258a-fd61-4e0c-97d1-9f3551e263b3</guid><pubDate>Wed, 12 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://media.casted.us/95/1535ddcf.mp3" length="22867574" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discu...</itunes:subtitle><itunes:summary>&lt;p&gt;In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated &amp;nbsp;that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.bbc.com/news/uk-england-devon-46757849&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Read Chris&apos;s article on teen hackers here.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:06&amp;nbsp;-&amp;nbsp;00:52 Intro to the episode&lt;/p&gt;&lt;p&gt;01:15&amp;nbsp;-&amp;nbsp;01:48 How Chris landed on this story of The Criminal Hacker Journey&lt;/p&gt;&lt;p&gt;02:16&amp;nbsp;-&amp;nbsp;04:04 How teen boys end up as a criminal hacker, before having and education in cyber&lt;/p&gt;&lt;p&gt;09:31&amp;nbsp;-&amp;nbsp;10:35 The potential future of these teens if they hadn&apos;t been caught and ended up at Blue Screen IT&lt;/p&gt;&lt;p&gt;12:40&amp;nbsp;-&amp;nbsp;13:53 Lessons learned for the cybersecurity industry&lt;/p&gt;&lt;p&gt;14:23&amp;nbsp;-&amp;nbsp;15:17 Emotions that came up while writing this story&lt;/p&gt;&lt;p&gt;16:12&amp;nbsp;-&amp;nbsp;17:44 The ironic interaction between the arrester and the arrestee&lt;/p&gt;&lt;p&gt;19:12&amp;nbsp;-&amp;nbsp;21:04 Chris shares what he&apos;s learned during his cybersecurity journey&lt;/p&gt;&lt;p&gt;21:04&amp;nbsp;-&amp;nbsp;22:57 Mitch&apos;s story about what he&apos;s learned during his cybersecurity journey&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>1429</itunes:duration><itunes:image href="https://files.casted.us/faaac13c-18c4-4333-9fe4-fd45ce27c886.jpg"/><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated &amp;nbsp;that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.bbc.com/news/uk-england-devon-46757849&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Read Chris&apos;s article on teen hackers here.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Takeaways:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;00:06&amp;nbsp;-&amp;nbsp;00:52 Intro to the episode&lt;/p&gt;&lt;p&gt;01:15&amp;nbsp;-&amp;nbsp;01:48 How Chris landed on this story of The Criminal Hacker Journey&lt;/p&gt;&lt;p&gt;02:16&amp;nbsp;-&amp;nbsp;04:04 How teen boys end up as a criminal hacker, before having and education in cyber&lt;/p&gt;&lt;p&gt;09:31&amp;nbsp;-&amp;nbsp;10:35 The potential future of these teens if they hadn&apos;t been caught and ended up at Blue Screen IT&lt;/p&gt;&lt;p&gt;12:40&amp;nbsp;-&amp;nbsp;13:53 Lessons learned for the cybersecurity industry&lt;/p&gt;&lt;p&gt;14:23&amp;nbsp;-&amp;nbsp;15:17 Emotions that came up while writing this story&lt;/p&gt;&lt;p&gt;16:12&amp;nbsp;-&amp;nbsp;17:44 The ironic interaction between the arrester and the arrestee&lt;/p&gt;&lt;p&gt;19:12&amp;nbsp;-&amp;nbsp;21:04 Chris shares what he&apos;s learned during his cybersecurity journey&lt;/p&gt;&lt;p&gt;21:04&amp;nbsp;-&amp;nbsp;22:57 Mitch&apos;s story about what he&apos;s learned during his cybersecurity journey&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item><item><title><![CDATA[Into the Breach - Trailer]]></title><description><![CDATA[<p>Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that <br>
manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we <br>
really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…<br>
</p>
<p>Join your host Mitch Mayne, IBM X-Force Public Information Officer and former journalist and, together, let’s venture into the breach.</p>]]></description><link>https://listen.casted.us/public/95/Into-the-Breach-by-IBM-34edaef6/a23ba185</link><guid isPermaLink="false">93ef369b-0cd9-4c9a-93bf-3f4475f872da</guid><pubDate>Fri, 24 Dec 2021 11:25:30 GMT</pubDate><enclosure url="https://media.casted.us/95/a23ba185.mp3" length="2345929" type="audio/mpeg"/><itunes:author>IBM</itunes:author><itunes:subtitle>&lt;p&gt;Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that &lt;br&gt;
manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think tha...</itunes:subtitle><itunes:summary>&lt;p&gt;Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that &lt;br&gt;
manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we &lt;br&gt;
really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…&lt;br&gt;
&lt;/p&gt;
&lt;p&gt;Join your host Mitch Mayne, IBM X-Force Public Information Officer and former journalist and, together, let’s venture into the breach.&lt;/p&gt;</itunes:summary><itunes:explicit>No</itunes:explicit><itunes:duration>146</itunes:duration><itunes:image href="https://files.casted.us/42b758a8-f324-4ae8-9fe1-9856403e8f52.jpg"/><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:episodeType>full</itunes:episodeType><googleplay:author>IBM</googleplay:author><googleplay:description>&lt;p&gt;Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that &lt;br&gt;
manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we &lt;br&gt;
really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…&lt;br&gt;
&lt;/p&gt;
&lt;p&gt;Join your host Mitch Mayne, IBM X-Force Public Information Officer and former journalist and, together, let’s venture into the breach.&lt;/p&gt;</googleplay:description><googleplay:explicit>No</googleplay:explicit></item></channel></rss>