74 episodes

Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.
Hosted on Acast. See acast.com/privacy for more information.

The Core Podcast Core To Cloud

    • Technology
    • 4.0 • 4 Ratings

Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.
Hosted on Acast. See acast.com/privacy for more information.

    How AI and Deepfakes can Steal your Identity

    How AI and Deepfakes can Steal your Identity

    Summary
    In this gripping episode, a Brooklyn couple receives a distressing call from the wife’s mother-in-law, demanding money for her safety. The husband, a law enforcement officer, tries to buy time by engaging the caller and following instructions to transfer money. Later, they uncover that the caller used AI to replicate their loved one’s voice.
    As AI scams and deepfake technology become more common, new challenges arise in cybersecurity. Jake Moore shares his firsthand experience with AI voice cloning, where he successfully mimicked a CEO’s voice to convince someone within the company to transfer money to his account. This incident highlights the importance of trust and the difficulties in combating voice scams.
    Jake and Kelly explore the broader implications of AI-generated content, discussing issues like identity theft, social media oversharing, and deepfake technology’s impact. They also cover the challenges of verifying information on platforms like TikTok and the need for robust cybersecurity measures.
    Jake stresses the importance of educating children about AI and misinformation, while Kelly discusses AI’s implications for dating and political propaganda. This episode underscores the critical need for increased awareness and vigilance in our digital age. Join us for an insightful conversation on the risks and precautions necessary to navigate today’s cybersecurity landscape.

    Key Takeaways:
    1: AI-Driven Scams: Scammers are using AI to replicate voices and create convincing deepfakes, leading to increased fraud and misinformation. Individuals must stay vigilant and verify suspicious requests through multiple communication channels.
    2: Importance of Trust and Verification: Trust plays a critical role in voice scams, making it essential to implement robust procedures, policies, and validation processes to prevent fraudulent activities and protect sensitive information.
    3: Cybersecurity Awareness: Oversharing personal information on social media and the challenge of verifying content on platforms like TikTok underscore the need for heightened cybersecurity measures and awareness.
    4: Educational Imperative: Educating adults and children about AI, deepfakes, and misinformation is crucial for safely and responsibly navigating the digital world.

    Connect with us and our guests:
    Follow our main LinkedIn: / core-to-cloud
    Follow our Podcast: / the-core-cyber-podcast
    Kelly Allen: / Kelly Allen
    Jake Moore: / Jake Moore

    Production Credits:
    Production Manager: / Daniel Aldred
    Audio Engineering and Editing: / Adam Titmuss

    Want to be a guest?Register here:


    Hosted on Acast. See acast.com/privacy for more information.

    • 1 hr 2 min
    Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack

    Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack

    Summary
    In this conversation, Kelly Allen interviews Andy Schneider about the illusion of security preparedness. They discuss Andy's background in cybersecurity, the NASA cyber attack in 1999, the importance of cloud security posture, and best practices for enhancing security in the cloud. They also touch on the talent shortage in the cybersecurity industry and the need for continuous detection capabilities. Andy shares the story of the NotPetya cyber attack as an example of the impact of cybersecurity on geopolitical events. The conversation covers various topics related to cybersecurity, including the impact of cyber attacks, the evolving nature of cybersecurity, the importance of human connection, and the role of technology in defense. The guest, Andy Schneider, emphasizes the need for continuous learning in the cybersecurity field and highlights the different career opportunities available. He also provides recommendations for building a comprehensive cybersecurity tool stack and selecting the right technology partner.
    Chapters
    00:00: The Evolution of Cyber Warfare: From 1999 to the Present
    03:56: Unveiling the Illusion of Security Preparedness: A Cybersecurity Journey
    09:41: The Role of Cloud Security Posture Management in Cyber Defense
    36:08: Human Connection and Trust in Cybersecurity
    50:02: Continuous Learning and Adaptation in the Cybersecurity Industry

    Takeaways
    The evolution of cyber warfare has led to a shift in the nature of cyber attacks and the actors involved.The NASA cyber attack of 1999 serves as a relevant case study highlighting the impact of cyber attacks and the vulnerabilities of digital infrastructure.Cloud security posture management (CSPM) is a crucial aspect of cybersecurity, but it is not the only defense mechanism needed to protect against cyber threats.The cybersecurity industry faces a talent shortage, and there is a need for upskilling and adapting to the evolving landscape.Human connection and trust play a significant role in cybersecurity, and the industry requires continuous learning and adaptation to stay ahead of cyber threats. 
    Keywordssecurity preparedness, cybersecurity, illusion, NASA cyber attack, cloud security posture, talent shortage, detection capabilities, NotPetya cyber attack, cybersecurity, cyber attacks, evolving nature, human connection, technology, defense, continuous learning, career opportunities, tool stack, technology partner

    Hosted on Acast. See acast.com/privacy for more information.

    • 51 min
    Exposing Insider Threats: Expert Secrets from Cyber Risk Expert

    Exposing Insider Threats: Expert Secrets from Cyber Risk Expert

    Summary
    Join Kelly as she sits down for an illuminating conversation with none other than James Moncrieff, the Global Cyber Risk Lead at GFK, who shares his journey from being a police officer to transitioning into the information security field. The two discuss James' childhood dream of becoming a firefighter and how he accidentally ended up in the police force. James also highlights his challenges in entering the cybersecurity industry and the importance of persistence and self-belief.
    In this conversation, James discusses the importance of understanding the risk of shadow IT and the need to shift from a culture of exception to accountability in cybersecurity. He highlights the complexity of insider threats and the different types of insiders that businesses must be aware of. James also stresses the limitations of security controls and the importance of preventing small attacks from escalating. He explains the role of human intelligence in cybersecurity and the process of sanitising intelligence for protection.
    Finally, we explore the importance of creating a culture of trust and protection and the opportunities available in cybersecurity.

    Chapters
    00:00 The Journey from Law Enforcement to Cybersecurity
    16:36 The Power of Persistence and Self-Belief in Career Transition
    27:07 Stepping Outside Your Lane: Understanding Security Principles
    33:55 The Strategic Role of GRC in Cybersecurity
    34:25 The Foundation of InfoSec: GRC Work and Risk Management
    36:21 Navigating Insider Threats and Human Intelligence in Cybersecurity
    01:04:09 Embracing Diversity and Unique Backgrounds in InfoSec

    Takeaways
    Transitioning from law enforcement to information security can be challenging, requiring persistence and self-belief.Diversity in problem-solving and different perspectives can lead to innovative solutions in the cybersecurity field.Understanding security principles and stepping outside one's lane can enhance the effectiveness of security professionals.The role of GRC (Governance, Risk, and Compliance) in cybersecurity goes beyond checklists and policies, requiring a broader understanding and strategic approach. GRC work is the foundation of InfoSec, encompassing risk management, governance, policies, and coordination of security development.Understanding the impact of systemic issues on the business is crucial for effective risk management and security posture.Insider threats are complex and can range from accidental to malicious, requiring a nuanced approach to detection and prevention.Human intelligence plays a vital role in cybersecurity, and a process to protect and utilize intelligence from individuals on the ground is needed.Diversity in InfoSec is essential, and individuals with unique backgrounds and skills bring valuable perspectives and problem-solving abilities to the industry.
    Keywords
    cybersecurity, career transition, police officer, persistence, self-belief, diversity, problem-solving, security principles, GRC, challenges, GRC work, risk management, governance, policies, vulnerability management, security development, SOC, insider threats, human intelligence, cybersecurity, diversity, unique backgrounds, InfoSec 
     

    Hosted on Acast. See acast.com/privacy for more information.

    • 1 hr 9 min
    Jamie McAnsh Reveals the Secret:

    Jamie McAnsh Reveals the Secret:

    Summary
    In this episode, Kelly meets with Jamie McAnsh, who shares his inspiring journey from a challenging childhood to becoming a successful entrepreneur and speaker. Jamie discusses the importance of overcoming obstacles and finding purpose in life.
    We also explore AI's potential for promoting inclusion and levelling the playing field for individuals with neurodiversity. In this conversation, Jamie discusses the use of AI in communication and writing, highlighting its benefits in improving efficiency and inclusivity. He emphasises the importance of embracing diversity in problem-solving, particularly in industries like cybersecurity. Jamie also explores the role of AI in idea generation and the potential for AI to create more opportunities for diverse talent. He addresses the challenges of ensuring ethical and unbiased AI and emphasises the need for diverse people to monitor and input non-biased information.
    The episode concludes with Jamie's advocacy for a work environment that values and invests in its employees, promoting equity over equality.

    Takeaways
    AI can be a valuable tool in communication and writing, improving efficiency and inclusivity.Diversity is crucial in problem-solving, particularly in industries like cybersecurity.AI can enhance idea generation and provide opportunities for diverse talent.Ensuring ethical and unbiased AI requires a diverse group of people to monitor and input non-biased information.A work environment that values and invests in its employees promotes equity and creates a better future.
    Chapters
    00:00 Introduction and Background
    06:41 Overcoming Challenges and Finding Purpose
    28:16 The Use of AI in Communication and Writing
    31:12 The Role of Diversity and Inclusion in Problem Solving
    36:11 The Benefits of AI in Problem Solving and Idea Generation
    37:57 Ensuring Ethical and Unbiased AI
    47:02 Creating a Better Work Environment through Diversity and Equity
    52:51 The Importance of Equity over Equality
    55:31 The Future Outlook for Diversity and Tech


    Hosted on Acast. See acast.com/privacy for more information.

    • 56 min
    Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers

    Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers

    Summary
    Join Lisa Ventura, founder of Cybersecurity Unity, as she takes us on a journey through the dynamic world of cybersecurity.

    In this episode, Lisa delves into:
    Her personal journey into cybersecurity and the vital role of collaboration and information sharing.The impact of generative AI on cybersecurity, focusing on the challenges of identifying phishing emails and addressing biases in AI-generated content.The importance of early education and awareness in safeguarding individuals from cyber threats.Addressing the gender gap in cybersecurity and advocating for inclusivity and diversity.Lisa's insights on neurodiversity and how it can be a superpower in the cybersecurity field.
    This enlightening conversation covers a wide array of topics, including workplace challenges, managing stress, overcoming imposter syndrome, and identifying narcissistic personality traits. Tune in to gain valuable insights into creating inclusive work environments and enhancing communication in interviews.

    Hosted on Acast. See acast.com/privacy for more information.

    • 1 hr 2 min
    Navigating the Frontlines of Cybersecurity:

    Navigating the Frontlines of Cybersecurity:

    Chris Hodson shares his journey into cybersecurity, driven by curiosity and a passion for understanding how things work. He emphasises the importance of gaining visibility and control in today's interconnected landscape.
    Chris also discusses the integration of AI in cybersecurity and the need for security products to solve real problems. He highlights the significance of effective communication and the need to bridge the gap between technical jargon and business understanding.
    The conversation covers various topics related to cybersecurity, including crisis simulation, the importance of understanding the business impact of cybersecurity, cloud security, effective communication to leadership, and the future of cybercrime.
    The key takeaway is the need for cybersecurity professionals to focus on the 'why' of cybersecurity solutions and to effectively communicate the business risks and impact to leadership. Additionally, there is a need for scenario-oriented and frequent security education and a focus on foundational strategies for managing and monitoring the cloud.


    Hosted on Acast. See acast.com/privacy for more information.

    • 48 min

Customer Reviews

4.0 out of 5
4 Ratings

4 Ratings

UST4EVER ,

Informative and entertaining! Thank you !

Informative and entertaining! Thank you

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
Darknet Diaries
Jack Rhysider
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
The Vergecast
The Verge
Search Engine
PJ Vogt, Audacy, Jigsaw