10 episodes

Hi everybody,
I’m Angel Mejia, currently working on Master’s degree in Cybersecurity.
I have a Bachelors in Psychology.
I will be questioning, investigating, finding truth, looking at different sides/perspectives when it comes to psychology and cybersecurity
Thank you for listening, I will be posting a podcast on a biweekly basis.
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

Thinker Fanatic Angel Mejia

    • Education

Hi everybody,
I’m Angel Mejia, currently working on Master’s degree in Cybersecurity.
I have a Bachelors in Psychology.
I will be questioning, investigating, finding truth, looking at different sides/perspectives when it comes to psychology and cybersecurity
Thank you for listening, I will be posting a podcast on a biweekly basis.
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    White Hat (Reconnaissance)

    White Hat (Reconnaissance)

    -Picked an organization and executed a bit of passive reconnaissance on the target. Provided as much data on the organization that is possible from publicly available sources. -Provided an explanation of the reconnaissance techniques that consist of ping sweeping, packet sniffing, port scanning, phishing, social engineering, and provide an example for each. Also, provide recommended defense tactics for each scenario

    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 12 min
    Answer to Cybersecurity

    Answer to Cybersecurity

    The requirement is to be able to comprehend psychology. One must find out how workers think, but above all one needs to understand how attackers think. Once one has that in their belt, they will have the knowledge to take charge and prevent data leaks and cyberattacks.
     
    By comprehending how one thinks and behaves- and why - one can be ready to develop their security position.
     
    Some of the questions that need to be considered are:
     
    ●      What equity needs to be protected and who can obtain it.
    ●      What safety equipment is already in use and how they influence the participation of the users.
    ●      How many times do you interact in cybersecurity classes with people and what do classes have to do with them?
    ●      Figuring out if one works with outside companies to run phishing campaigns or social engineering attacks
    ●      What personal devices are present in the work area such as tablets, smartphones, etc.
    ●      Password guidelines and if workers follow them
    ●      Attitude towards cybersecurity in a business.


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 8 min
    Advocacy Report On Eating Disorders

    Advocacy Report On Eating Disorders

    There are many eating disorders such as anorexia, bulimia and binge eating, some of the most common. All of them can have serious issues. Eating disorders are classified as illnesses that involve eating habits that are not healthy and fixation with body weight, shape, along with food. Eating disorders have one of the highest loss of life rate of mentally ill disorders. This
    disorder affects around 10 in 100 teen girls in the United States. Based on the statistics one can really see that eating disorders are very relevant in society and need to be addressed. There are many contributing factors for why a teen girl may develop an eating disorder and the one’s I will discuss are social media, stress, and abuse. The consequences for eating disorders are harmful to teen girl’s health, psychological well being, and relationships. The solutions for these issues are treatment, education, and prevention.


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 29 min
    Cybersecurity Investigations

    Cybersecurity Investigations

    1.    Explaining the legal challenges faced by an organization during an investigation while pursuing cyber attackers. Framed my answer based on the following points:
    o   Authorization needed to gather evidence
    o   Identifying evidence
    o   Admissible evidence
    o   Evidence handling
    o   Maintaining chain of custody
    2.    Explaining the working of the International Multilateral Partnership against Cyber Threats organization (IMPACT). How does IMPACT affect what we do in the US and abroad?
    3.    How does the Wassenaar Arrangement affect information security?
    4.     If an employee is found guilty of disclosing a company’s confidential data.
    What national laws are applicable to him? What are the laws applicable to him if this is a case of cross-border disclosure of information? Do I think security awareness trainings would have helped in this case?


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 8 min
    Cybersecurity in Organizations

    Cybersecurity in Organizations

    cybersecurity, what are the roles and responsibilities of organizations?
    Policymaking
    Role of an individual
    Laws and regulations
    Security awareness
    Monitoring
    Compliance
    implementing BCM as per ISO 22301. Describe 6 critical processes and include all the necessary fields required by the standard.
    Emerging and future technologies that organizations have to worry most about from a security perspective? 
    Explained the need for Business Continuity-Disaster Recovery Planning in organizations.


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 8 min
    Case Study: Equifax Data Breach

    Case Study: Equifax Data Breach

    -Identified the type of attack, loopholes in the controls at Equifax that led to compromise, listed the security practices that could have prevented the breach, listed the precautionary measures Equifax implemented after the breach, why hackers are targeting the financial sector, why this breach didn’t affect Equifax as much as other breaches like Target and Anthem

    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
    Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support

    • 7 min

Top Podcasts In Education

The Mel Robbins Podcast
Mel Robbins
Life Lessons with Siobhan O'Hagan
Siobhan O'Hagan
TED Talks Daily
TED
The Jordan B. Peterson Podcast
Dr. Jordan B. Peterson
The Rich Roll Podcast
Rich Roll
The Sinead Says Podcast
Sinead Hegarty