Featured
Featured
Exposing Big Tech Security Flaws. Bryan Seely Interview.
🚨 New Episode🚨 Bryan Seely, a world-famous cyber security expert, ethical hacker and former U.S. Marine joins us in a refreshing and hilariously entertaining episode on Importance of Mindfulness in Cyber Security. He is known for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at Google, LinkedIn and several government 3-Letter agencies. We discuss: Exposing Big Tech Security Flaws, Hacker Stories Exposed, How Google Can Be Vulnerable, and Government Monitoring Vs Privacy.
Connect with Bryan: www.bryanseely.com
27
views
AI Unleashed! New Ways to Understand Cyber Risk for Business
Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses new ways to understand cyber risk for business and her creation of the “Security Intel” Bulletin.
We cover topics like hat cyber risk means for business leaders today and pros and cons of AI for small business. She emphasizes the importance of translating cybersecurity topics into plain language to increase awareness and understanding among business leaders and the general public.
Find more here: https://defensestorm.com/insights/author/elizabeth-houser/
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode! Stay ahead of cyber criminals with Cyber Crime Junkies.
Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions below. We'd love to hear your thoughts and suggestions for future episodes!
#CyberCrimeJunkies #CyberSecurity #CyberCrimeStories #CyberLeaders #Podcast #CyberAwareness #ProtectYourOrganization #CyberSecurityTips #CyberProtection
Don't forget to LIKE, SHARE, and SUBSCRIBE to stay updated with our latest episodes!
15
views
New Dangers of Synthetic Media. Asking Who Will Win the AI Race?
We review the latest New Dangers of Synthetic Media. Asking Who Will Win the AI Race? We identify the risks and current available solutions.
🎧 Subscribe now / @cybercrimejunkiespodcast and never miss an episode! Stay ahead of cyber criminals with Cyber Crime Junkies.
Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: / cybercrimejunkies
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast...
🎙️ Spotify: https://open.spotify.com/show/5y4U2v5...
🎙️ Google Podcasts: / @cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions below. We'd love to hear your thoughts and suggestions for future episodes!
#CyberCrimeJunkies #CyberSecurity #CyberCrimeStories #CyberLeaders #Podcast #CyberAwareness #ProtectYourOrganization #CyberSecurityTips #CyberProtection
Don't forget to LIKE, SHARE, and SUBSCRIBE to stay updated with our latest episodes!
CHAPTERS
00:00 Introduction
00:32 The Rise of Deepfakes and Their Threats
03:56 Deepfakes in Cybercrime and Social Engineering
06:46 latest cyber risks from deep fake
09:49 Strategies for Deepfake Detection and Prevention
13:59 new dangers of synthetic media
22:19 Legal and Ethical Implications of Deepfakes
23
views
Exposing Big Tech Security Flaws. Bryan Seely Interview.
🚨 New Episode🚨 Bryan Seely, a world-famous cyber security expert, ethical hacker and former U.S. Marine joins us in a refreshing and hilariously entertaining episode on Importance of Mindfulness in Cyber Security. He is known for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at Google, LinkedIn and several government 3-Letter agencies. We discuss: Exposing Big Tech Security Flaws, Hacker Stories Exposed, How Google Can Be Vulnerable, and Government Monitoring Vs Privacy.
Connect with Bryan: www.bryanseely.com
27
views
Death in Crypto Land. Ultimate Exit Scam.
his is the story of a notorious death in cryptoland. Many say it’s the ultimate exist scam. There are recent updates from news sources and investigative sources we share. Gerald Cotten, the founder of Quadriga, died in 2018 under mysterious circumstances, leading to the loss of $215 million in cryptocurrency. Despite claims that he passed away due to what is medically considered non-fatal Crohn’s disease while in India, many customers and investigators have questioned his death, suspecting a potential exit scam.
Let us know what you think by texting us direct at: 904-867-4466. We want to hear what you believe happened in this outrageous story.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode! Stay ahead of cyber criminals with Cyber Crime Junkies.
Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions below. We'd love to hear your thoughts and suggestions for future episodes!
#CyberCrimeJunkies #CyberSecurity #CyberCrimeStories #CyberLeaders #Podcast #CyberAwareness #ProtectYourOrganization #CyberSecurityTips #CyberProtection
Don't forget to LIKE, SHARE, and SUBSCRIBE to stay updated with our latest episodes!
20
views
Mind Games: Exploring Brain Reactions During Social Engineering | Cognitive Neuroscience Experiment
Exploring latest insight on cognitive neuroscience-brain reactions during social engineering. Meaning, the power of social engineering in cybercrime and the brain's reactions during phishing attacks. Our guest, Dr. Abbie Marono, discusses her background in behavioral analysis and her work as the Director of Education at Social Engineer. She explains the limitations of nonverbal communication in deception detection and the use of nonverbal mimicry to create cooperation and elicit information.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode! Stay ahead of cyber criminals with Cyber Crime Junkies.
Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions below. We'd love to hear your thoughts and suggestions for future episodes!
#CyberCrimeJunkies #CyberSecurity #CyberCrimeStories #CyberLeaders #Podcast #CyberAwareness #ProtectYourOrganization #CyberSecurityTips #CyberProtection
44
views
Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.
Crypto News, Cyber flash point about Why Was One Coin So Successful, self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova.
To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov
Or Call 1-800-CALL-FBI
25
views
Controlling AI Ethically: Navigating the Future of Cyber Crime
We interview Steve Orrin, the CTO of Intel, about Controlling AI Ethically. INTEL essentially makes the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more.
There is a special discussion inside so don't miss it!
TOPICS: Controlling AI Ethically, how to control ai ethically, what are the ethical considerations of ai, use of ai in cybersecurity, use of ai in cybercrime, and more.
26
views
1
comment
Chilling Reality Of How Zero Day Attacks Happen
Must-Watch new episode with famous Security leader, Matthew Rosenquist, about zero day attacks explained, privacy perspectives in the us and Europe, Importance of Privacy Education, How Zero Day Attacks Happen, the role of security leadership, Cultural Differences On Data Privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.
24
views
Cultural Divide: Privacy Perspectives in the US and Europe
🔍 Ever wondered how different parts of the world view privacy? Wonder how Zero Day Attacks slip through the cracks? Why do even top security leaders struggle to gauge risk accurately?
In our latest episode with Mathew Rosenquist, a top Security Voice, CISO and leader, we learned about:
• 🎯 The startling truth behind how Zero Day Attacks happen.
• •🌐 Privacy perspectives in the US and Europe.
• 🕵️♂️ Why even the best in cybersecurity can’t measure risk perfectly.
Check it out and please..tell a friend
#ZeroDayAttacks #CybersecurityLeadership #RiskAssessment #DataProtection #CyberThreats #SecurityAwareness #MustWatch
25
views
Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
Don't Miss the new episode! Covering the true cyber crime story of William Woods Identity Theft with topics like: how to keep your identity safe, how to protect your online identity and reputation, what happens when your identity is stolen, what can the thief do after stealing your identity today,
We address What Happens when Your Identity is Stolen. The William Woods Story and what should you do if your identity is stolen.
If enjoying please leave a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast... https://podcasts.apple.com/us/podcast...
Ask Questions and see more here https://cybercrimejunkies.com
CHAPTERS
00:00 Introduction and Overview
01:16 The Beginning: William Woods' Simple Life
03:27 The Theft
05:34 Double Life of Matthew Kierens
08:49 Identity Theft and Employment at a Hospital
13:04 William Woods Discovers the Debt
17:07 Bank Account Security Questions and Bias
22:49 Forced Medication and Mental Incompetence
25:05 Case of William Woods
26:16 Failures of the Legal and Medical Systems
28:36 Arrest and Guilty Plea: Matthew Kearns' Identity Theft Scheme Unravels
31:11 Seeking Justice: William Woods' Lawsuit and Plans for Compensation
33:06 Best Practices for Protecting Your Identity and Personal Information
26
views
Customers or Enemies Online.
Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online.
Difference between customers or enemies, importance of privacy online, ways to protect online privacy, Why Online Cyber Security Fails, why security fails to protect online privacy, how cybersecurity efforts usually fail, best practices for protecting personal data online, best practices identity protection, best ways to create a security culture, do Americans value their personal data, do people value their data, why do people not value their data,
Don’t miss the full discussion: https://youtu.be/Aurw4jLL2a8
Audio Podcast available everywhere: https://www.buzzsprout.com/2014652/12885183
Topics: 💡how cybersecurity efforts usually fail, 💡why does cybersecurity usually fail, 💡best practices for businesses to limit cyber liability, 💡best practices to limit cyber liability, 💡best ransomware protection for enterprise, 💡best ransomware protection for small business, 💡best security practices for business, 💡effective ways to protect business from cyber crime, 💡how ai will effect cyber security, 💡how partnerships help in cybersecurity, 💡how red team exercises help business, 💡how security awareness training lowers risk of breach, 💡how to limit cyber attack liability, 💡how to limit cyber liability, 💡new ways to protect business from cyber crime, 💡newest methods to limit cyber liability, 💡newest security expert insight
Customers or Enemies Online.
Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online.
Difference between customers or enemies, importance of privacy online, ways to protect online privacy, Why Online Cyber Security Fails, why security fails to protect online privacy, how cybersecurity efforts usually fail, best practices for protecting personal data online, best practices identity protection, best ways to create a security culture, do Americans value their personal data, do people value their data, why do people not value their data,
Audio Podcast available everywhere: https://www.buzzsprout.com/2014652/12885183
Topics: 💡how cybersecurity efforts usually fail, 💡why does cybersecurity usually fail, 💡best practices for businesses to limit cyber liability, 💡best practices to limit cyber liability, 💡best ransomware protection for enterprise, 💡best ransomware protection for small business, 💡best security practices for business, 💡effective ways to protect business from cyber crime, 💡how ai will effect cyber security, 💡how partnerships help in cybersecurity, 💡how red team exercises help business, 💡how security awareness training lowers risk of breach, 💡how to limit cyber attack liability, 💡how to limit cyber liability, 💡new ways to protect business from cyber crime, 💡newest methods to limit cyber liability, 💡newest security expert insight
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
110
views
Impact of AI on Business Cyber Risk
Cybersecurity experts Nick Mullen and Nick Oles discuss How AI Powered Social Engineering Affects You, artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
90
views
Story Behind Never Split the Difference. Chris Voss.
Chris Voss joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation.
Most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. He is the founder of the Black Swan Group.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
138
views
1
comment
Overcome Fear of Public Speaking
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more.
She shares her insights on modern ways to improve presentation skills.
From virtual (zoom etc) meetings to live public speaking in person, we touch on many little-known ways you can improve your communications.
Topics:
• why people fear public speaking,
• is it possible to overcome fear of public speaking?
• Modern Ways To Improve Communication Skills ,
• little known ways to overcome fear of public speaking,
• dangers of certain beverages, lighting errors and sound mistakes,
• Methodologies which help build authenticity and clarity
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
71
views
Top Cyber Risks in Higher Education
Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability.
We discuss:
• How Cyber Breach Litigation Works
• Why Security Layers Help Defend Against Law Suits
• How Cyber Breach Liability Can Destroy Business
• How To Reduce Your Cyber Breach Liability
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
59
views
1
comment
What To Do After Ransomware Attack
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware.
We dive into what to do after ransomware attack and how to plan up front so you can get your data back after ransomware.
Opinions of Chris are his own, not those of Rubrik. Connect with Chris on LinkedIn: https://www.linkedin.com/in/cmgardner/
This is the story of Chris Gardner and What happens when a ransom attack occurs and how to get your data back.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
94
views
1
comment
New Ways to Take Control Over Data Privacy
Kurt Long is CEO and founder of BUNKR (https://www.bunkr.life/) and we discuss New Ways to Take Control Over Data Privacy, how to keep criminals out of your private data, and why online privacy is important to freedom.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
52
views
How Deep Fake Videos Increase Security Risks
Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is AI making it harder to detect deep fakes.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
103
views
New Ways Leaders Can Assess their Risk Appetite
Dan Elliott, principal cybersecurity risk advisor at Zurich Canada, discusses new ways leaders can assess their risk appetite.
The conversation covers:
• how risk appetite effects your cyber security plans,
• explaining risk appetite in cyber security to leadership,
• how security planning involves risk appetite,
• new ways leaders can assess their risk appetite,
• how cyber insurance works,
• how cyber insurance is only one part of risk management,
• and risk management beyond cyber insurance.
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
67
views
Top Cyber Risks in Higher Education
John Hoyt is the Chief Information Security Officer (CISO) for Clemson University, having worked his way up from helpdesk. He created a student-run SOC (security operations center) giving Clemons students unsurpassed experience launching their careers early.
Chapters
00:00 Introduction and Background
01:30 First Experience with Ethical Hacker
06:32 Transition to Cybersecurity at Clemson University
07:00 Cyber Risks in Higher Education
09:04 Cyber Resiliency and Preparedness
11:18 Cyber Risks Faced by College Students
15:06 Social Engineering and Cyber Education
19:48 Collaboration and Information Sharing in Cybersecurity
22:12 Challenges of Cybercrime and Law Enforcement
28:15 Top Cyber Threats in Higher Education
30:11 Threats and Vulnerabilities
34:25 Creating a Student-Run SOC
38:02 Breaking into Cybersecurity
46:03 The Broad Scope of Cybersecurity
50:47 Generative AI and its Impact
51:32 Upcoming Events and Podcast
Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkiespodcast
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
86
views
How To Reduce Risk When Managing Data Privacy
Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy.
From a personal story sparking her into the privacy profession to serving leading brands in her role at DATAGRAIL.io, we explore the impact of privacy harms and the vast amount of personal data being collected.
Topics:
Data Brokers
Cookie Dangers
Social Media Risks
Best Practices
Recent Changes
Audio podcast episodes (of both parts) available now everywhere you get podcasts.
SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 Explore More Podcast Content at [https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Newsletter VIGILANCE-Translating Cyber into Business. No email necessary. [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothing and accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
Want to try podcasting yourself? We LOVE Riverside. Try it today. https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
45
views
1
comment
A Story of Innovation in Privacy.
This is the story of Merry Marwig and Innovative Approaches To Data Privacy. Second Episode in series on Privacy with Merry. Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy.
She emphasizes the value and power of data, as well as the need for transparency and consent. Merry also discusses the role of privacy in business and the challenges of privacy compliance. She concludes by highlighting the intersection of privacy and security and the importance of aligning the two.
Key Takeaways
• Data monetization has become normalized, with companies collecting and selling personal data without consumers being fully aware.
• User awareness about privacy practices and data collection is crucial.
• Moving beyond passwords and implementing stronger authentication methods is essential for better security.
• Personal privacy can be compromised, and hiring authorized agents can help manage privacy requests.
• Automation can help operationalize privacy requests and save time and resources.
• Privacy tools should have least privilege access to ensure data security.
SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 Explore More Podcast Content at [https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Newsletter VIGILANCE-Translating Cyber into Business. No email necessary. [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothing and accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
Want to try podcasting yourself? We LOVE Riverside. Try it today. https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
76
views
New Ways to Catch Online Predators.
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators.
We discuss topics on dark web dangers for children, new ways to stop online predators, and how law enforcement catches cyber criminals.
Ever wonder how to protect children online? How to uncover secrets from the Dark Web?
Join us Live! We have in the studio an international by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations.
We also have Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators.
We discuss topics on dark web dangers for children, new ways to stop online predators, and how law enforcement catches cyber criminals.
Come join us Live or catch the reply, ask questions. #proctectingchidrenonline #cybersecurity #darkweb #storytelling
SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 Explore More Podcast Content at [https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Newsletter VIGILANCE-Translating Cyber into Business. No email necessary. [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothing and accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
Want to try podcasting yourself? We LOVE Riverside. Try it today. https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
96
views
How You Can Catch Online Predators
Special guest we will call Carl and Chris Hadnagy
How to protect children online, dark web dangers for children, gaming dangers, parenting advice to protect children from dark web dangers…
New Ways to Stop Online Predators
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators.
We discuss topics on dark web dangers for children, new ways to stop online predators, and how law enforcement catches cyber criminals.
SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 Explore More Podcast Content at [https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Newsletter VIGILANCE-Translating Cyber into Business. No email necessary. [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothing and accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
Want to try podcasting yourself? We LOVE Riverside. Try it today. https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
182
views
US Secret Service. Espionage, Deepfakes and AI
Latest update on the largest cyber crime in recent history. Exclusive Move IT breach news. Learn how it started, what happened recently, who is running it and what you can do to protect yourselves.
SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 Explore More Podcast Content at [https://cybercrimejunkies.com](https://cybercrimejunkies.com/)
Newsletter VIGILANCE-Translating Cyber into Business. No email necessary. [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothing and accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
Want to try podcasting yourself? We LOVE Riverside. Try it today. https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
98
views
1
comment