1st Responder Radio

Ricoh Danielson
1st Responder Radio Podcast

1st Responder Radio Podcast is a podcast for leadership, thought leadership in the cyber security space. This podcast is met for anyone interested in cyber security, how military tactics are applied inside security and how to be a 1st Responder in cyber security By: Ricoh Danielson - US Army Veteran 1st Responder

Episodes

  1. 30/04/2021

    Blockchain Digital Forensics Investigation

    Blockchain Digital Forensics Investigation With an increasing global trend toward cryptocurrency, there is a need for developing better blockchain systems and investigation procedures. A greater understanding of metadata in the blockchain will trace the money transactions in businesses and the marketplace. The forensic investigation involved in the blockchain system is a decentralized database in the peer-peer network, diminishing the subpoenas and court motions related to banking issues in business. Blockchain technology provides a comprehensive view of the transaction to the original end. This is a great success in the forensic field. This powerful forensic technology enables • Better transactional efficiency due to increased trust. • Reduction in fraud because of increased transparency. • Reduction in transaction costs due to elimination of specific ownerships etc. The blockchain system is a secure and immutable system between the blocks and the transactions in cryptography. It has greater traceability, auditability, accountability and transparency. This system is successfully used in various fields, including energy industries, supply chain, financial services and pharmaceutical. Blockchain technology is also promising for forensic applications. Blockchain forensics and smart contracts provide all the data via a ledger transaction tracking system. We can access the information where the money is transferred for which purchase, including time and dates. One thing worth considering is that cryptocurrency is coming with a high demand for privacy. With decentral banking, it will make investigation very hard on the cryptocurrency business. Privacy rights are hard to challenge in court or on any platform. Blockchain technology provides self-verification for digital evidence, which is a benefit in digital forensics. Call to Action: • Teaming up and doing working session involving investigators and Technologies is the need of the hour. Investigators can come up with new ways of how blockchain can provide metadata and improve the investigation. • From the Technology perspective, I highly encourage my fellow technologist to team up with the local investigation company/ firm .this relationship can provide examples of how blockchain and smart contracts work. These collaborative efforts can prove a dynamic unfold to serve our customers during investigations better. • This is where technologist, programmers and other investigators need to work together in synchronization. • This team effort can give rise to better solutions and skill sets covering all technical perspective for a secure and smooth business of all types. About Author Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Rachel helps to tackle the threats and risks of the digital world. Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases. Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.

    4 min
  2. 17/04/2021

    1st Responder Radio- EPS 3 Stoicism during Cyber Security Incidents

    Stoicism during Cyber Security Incidents Stoicism is an ancient philosophy that describes how to strengthen minds and weed out the negative and non-productive thoughts and build up positive and productive thinking. Not diving into the depth of this ideology, the bottom line of this philosophy is what is essential while dealing with and managing cybersecurity threats. It teaches that the path to happiness is accepting the moment as it presents itself. There are some things you can control, and there are some things you cannot. So the uncontrollable factors in cybersecurity can be dealt with by being a stoicist. Stoicism -mental management tool in cybersecurity Cybersecurity is all about the activeness and control of the mind. You must be prepared and fully aware of the possible risks and attacks and have a strategy to work upon in case of any response immediately. After making all the possible efforts remain calm; you may not stop and are not under your control. Stop worrying and thinking about them as it will not change but only affect your mind and health. Being a stoicist is highly beneficial for an IT professional as they are always among security threats like Ransome attacks, crashing servers, buggy codes, network outages and many more. It is essential to consider and focus in any situation what you can and roll with it. Do not waste time and energy on the things you cannot do anything about. During an incident response or digital forensic legal matter, focus on what you can control and invest time and effort in that direction. We all know that cyber-attacks will happen despite the due diligence and hard work to prevent them. Things do not go the way we plan always. The best we can do is make the preparation we can as cyber preemptive security practices. We have a shot at staying in the game. Practicing Stoicism in Cyber Security Focusing on the items you can control and let go of the items you can not help manage your mental power and stability. If we get caught in the fears of 'what if this happens''? We will not perform fully in the mainstream of our work. In the book "Lead Yourself First: Inspiring Leadership Through Solitude", the writer explains how excellent and dynamic leaders lead their nations in times of crisis by engaging in stoicism and solitude, focusing their efforts on the items they could control. This strategy kept them moving ahead toward prosperity. Try the same strategy. Look at what you have in front of you and what you can do about it. After doing your part, leave the rest to settle. The Call to Action: Stoicism offers us a set of practices that can strengthen our will and makes us unshakable even in tough times of cyberattacks. It is developing a mindset that helps us understand what we can control and what we cannot. This philosophy can bring tranquillity and peace even in the most stressful days of cyber threats. About Author Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Ricoh helps to tackle the threats and risks of the digital world. Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases. Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.

    4 min
  3. 07/04/2021

    1st Responder Radio- EPS 2

    Cyber Advisory Board By: Ricoh Danielson Date: 03/25/2021 What is cyber advisory/ consultation? As global hackers are coming up with new ways of fraud and destruction, cybersecurity consultation is now a need of every online business system. Many businesses, firms, and organizations need guidance at the financial, operational, and legal level, but now we are starting to see Cyber Professionals having a chair at the table. Having a Cyber Professional on your Board of Advisory can be one of the best moves to help your organization strengthen the cyber world's core values. Why is cyber advisory necessary? Is it really worth paying a reasonable amount of your revenue to hire or get the consultation services of a cyber advisor? The plain answer is yes. A cybersecurity advisor can work and figure out the weaknesses in your system and guide you on strengthening your systems to prevent cyber attacks. In case of any problem or cyber-attack, an advisor can help you take prompt and proper action to safeguard your system and save your data and files from getting breached or corrupted. Manage a competent cyber advisory How will you do it? It not much difficult. You can hire a person or a group depending upon the kind of system you have and the safety requirement it demands. The team may comprise of • Network security consultant • Database security consultant • Computer security consultant • Information security consultant Or you may have a single advisor fulfilling your requirements. The important thing is you have to know what services your system wants. Make a thorough discussion with the persons willing for consultancy and select the most suitable for your setup. Conclusion In this growing digital era, when we are working with digital data in every field of our life, there is an increased risk to the security of our sensitive data. A cybersecurity advisor can assist us in evading security risks and prevent cyber attacks. The heavy reliance on technology and digitalization demands an experienced cybersecurity advisor to protect the systems and business from the emerging threats of cybercrimes. About Author Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Rachel helps to tackle the threats and risks of the digital world. Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases. Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.

    4 min

About

1st Responder Radio Podcast is a podcast for leadership, thought leadership in the cyber security space. This podcast is met for anyone interested in cyber security, how military tactics are applied inside security and how to be a 1st Responder in cyber security By: Ricoh Danielson - US Army Veteran 1st Responder

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada