9 Folgen

1st Responder Radio Podcast is a podcast for leadership, thought leadership in the cyber security space. This podcast is met for anyone interested in cyber security, how military tactics are applied inside security and how to be a 1st Responder in cyber security

By: Ricoh Danielson - US Army Veteran
1st Responder

1st Responder Radio Ricoh Danielson

    • Technologie

1st Responder Radio Podcast is a podcast for leadership, thought leadership in the cyber security space. This podcast is met for anyone interested in cyber security, how military tactics are applied inside security and how to be a 1st Responder in cyber security

By: Ricoh Danielson - US Army Veteran
1st Responder

    Episode: Dissection of Uber Security Chief Conviction

    Episode: Dissection of Uber Security Chief Conviction

    Episode: Dissection of Uber Security Chief Conviction

    In this episode, we take the dissection of Uber security chief officer going to jail for interference in the 2016 breach. This ruling from a federal judge set the presidents on many different fronts. This also jeopardizes the sanctity of being a CISO and sets the tone that many companies will throw their CSO/ CISO sacrificial lamb.



    With: Ricoh Danielson

    • 7 Min.
    Episode: Ransomware Negotiation

    Episode: Ransomware Negotiation

    Episode: Ransomware Negotiation 

    By: Ricoh Danielson

    In this episode we cover; ransomware negotiation, define a process for ransomware negotiation and also understand the phases of ransomware negotiation. 

    • 9 Min.
    HIT-T: High Intensity Technical Team

    HIT-T: High Intensity Technical Team

    1st Responder Radio 

    Eps 7. HIT-T: High Intensity Technical Team

    By: Ricoh Danielson

    Episode covers: 

    “Time is money,” a phrase commonly used throughout the years to highlight the importance of

    wealth, specifically financial gain. From a cyber security perspective, however, the phrase can

    mean the complete opposite. In the moment of a cyber incident, the phrase “time is money”

    goes into effect due to the importance of a timely response in order to not lose money and

    more importantly, customers. Decisions need to be made quickly and without hesitation as

    there may not be enough time to call up a team of executives and attorneys to discuss what

    needs to be done in depth. That being said, when an incident does occur, it is crucial to have a

    HIT-T and level threshold that allows you to evaluate and determine how the incident will be

    handled. For example, a company may have a level threshold of 0 to 5 and when an incident

    occurs, the level determines how they will respond. If it is considered a level 0, the company

    may determine that to be low risk (e.g. suspicious email found) and the response time does not

    have to be immediate. In fact, having a HIT-T that is on-call for a cyber incident allows them to

    evaluate and determine level threshold.



    “Remember, you are your own 1st Responder.”

    -Ricoh Danielson

    • 5 Min.
    Cyber Risk Management Determining Business Function

    Cyber Risk Management Determining Business Function

    1st Responder Radio:

    By: Ricoh Danielson

    Cyber Risk Management Determining Business Function

    Cyber Business. Ricoh Danielson    Nov 2nd, 2021

    In today’s era, when companies are undergoing digital transformation, cyber security is increasingly becoming one of the most significant concerns. As a result, before any kind of infrastructure is built, cyber security is an essential factor being considered, along with others.

    This is because, on the one hand, organizations and businesses are employing technology to make their workflows efficient, create innovative products to solve real-time problems across sectors, and on the other hand, cybercrimes are increasing in number.

    Furthermore, these cyberattacks are evolving with time, and the infrastructures of businesses are not always resilient to them. This makes cyber security a critical concern.

    • 4 Min.
    Cyberwarfare

    Cyberwarfare

    1st Responder Radio:

    By: Ricoh Danielson

    In this episode we cover the cyber warfare tactics and also how cyber warfare is very much like warfare. Threat actor has deployed new tactics very similar to the tactics seen in the battlefield of Iraq and Afghanistan.

    • 7 Min.
    Blockchain Digital Forensics Investigation

    Blockchain Digital Forensics Investigation

    Blockchain Digital Forensics Investigation

    With an increasing global trend toward cryptocurrency, there is a need for developing better blockchain systems and investigation procedures. A greater understanding of metadata in the blockchain will trace the money transactions in businesses and the marketplace. The forensic investigation involved in the blockchain system is a decentralized database in the peer-peer network, diminishing the subpoenas and court motions related to banking issues in business. Blockchain technology provides a comprehensive view of the transaction to the original end. This is a great success in the forensic field.

    This powerful forensic technology enables


    • Better transactional efficiency due to increased trust.
    • Reduction in fraud because of increased transparency.
    • Reduction in transaction costs due to elimination of specific ownerships etc.

    The blockchain system is a secure and immutable system between the blocks and the transactions in cryptography. It has greater traceability, auditability, accountability and transparency. This system is successfully used in various fields, including energy industries, supply chain, financial services and pharmaceutical. Blockchain technology is also promising for forensic applications.

    Blockchain forensics and smart contracts provide all the data via a ledger transaction tracking system. We can access the information where the money is transferred for which purchase, including time and dates.

    One thing worth considering is that cryptocurrency is coming with a high demand for privacy. With decentral banking, it will make investigation very hard on the cryptocurrency business. Privacy rights are hard to challenge in court or on any platform. Blockchain technology provides self-verification for digital evidence, which is a benefit in digital forensics.

    Call to Action:


    • Teaming up and doing working session involving investigators and Technologies is the need of the hour. Investigators can come up with new ways of how blockchain can provide metadata and improve the investigation.
    • From the Technology perspective, I highly encourage my fellow technologist to team up with the local investigation company/ firm .this relationship can provide examples of how blockchain and smart contracts work. These collaborative efforts can prove a dynamic unfold to serve our customers during investigations better.
    • This is where technologist, programmers and other investigators need to work together in synchronization.
    • This team effort can give rise to better solutions and skill sets covering all technical perspective for a secure and smooth business of all types.

    About Author

    Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Rachel helps to tackle the threats and risks of the digital world.

    Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases.

    Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.

    • 4 Min.

Top‑Podcasts in Technologie

13 Minutes to the Moon
BBC World Service
Passwort - der Podcast von heise security
Dr. Christopher Kunz, Sylvester Tremmel
Acquired
Ben Gilbert and David Rosenthal
Flugforensik - Abstürze und ihre Geschichte
Flugforensik
Hard Fork
The New York Times
Darknet Diaries
Jack Rhysider