The Other Side Of The Firewall Ryan Williams
-
- Новости
Dive into the heart of cybersecurity with "The Other Side of the Firewall" podcast, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons.
Join us on a journey beyond the conventional, as we engage with the "movers and shakers and glass ceiling breakers" of the cybersecurity industry. These trailblazers offer insights, stories, and strategies that resonate with IT professionals eager to navigate their path through the complex maze of the tech world.
But it's not all serious business here. Our episodes are peppered with lively discussions on the latest cybersecurity news, practical tips to safeguard against the web's lurking threats, and yes, a healthy dose of games and entertainment. Because who says cybersecurity can't be fun?
Whether you're a seasoned expert or just starting out, "The Other Side of the Firewall" provides a unique blend of inspiration, information, and indulgence. Subscribe and tune in to be part of a community that's reshaping the landscape of technology, one breakthrough at a time. Let's break through those firewalls together and make the digital world a more inclusive, secure place for everyone. Join us, and enjoy the ride!
Stay safe, stay secure.
-
The Deadly Consequences Of Social Engineering Scams
In this episode, the hosts discuss a news article about the shooting of an Uber driver in Ohio and the scam surrounding it. The scam involved social engineering tactics targeting, William J. Brock, an elderly man, convincing him to hand over $12,000 to, Lo-Letha Hall, an Uber driver who was actually an innocent bystander. Lo-Letha was shot by William, resulting in her death.
The hosts emphasize the need to educate the elderly about these types of scams and the importance of having a code word or phrase to verify the authenticity of phone calls or messages. They also discuss the potential future risks of AI-generated voice and video impersonations in scams.
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/@theothersideofthefirewall7511
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Podcast Updates
07:43 The Future of Scams: AI-Generated Voice and Video Impersonations
13:10 The Evolution of Social Engineering Schemes
#cybersecurity #socialengineering #scam -
What Was The Root Cause Of The UnitedHealth Breach?
This is the laziest thumbnail I've ever made but is it as lazy as UnitedHealth's alleged lack of remote access authentication?
The jury is still out...
The conversation discusses the recent ransomware attack on Change Healthcare and the failure to implement multi-factor authentication (MFA) as a basic security measure. The hosts express their frustration with the lack of MFA adoption and emphasize the importance of implementing adequate remote access authentication in today's digital age. They also highlight the financial and reputational consequences of not implementing proper cybersecurity measures. The conversation touches on the need for legislation and regulations to enforce cybersecurity practices in the healthcare industry. The hosts speculate on the potential reasons behind Change Healthcare's failure to prioritize cybersecurity and suggest that a lack of budget, resources, and continuity in leadership may have contributed to the breach.
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/@theothersideofthefirewall7511
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Podcast Schedule
06:35 Reflections on the Importance of Cybersecurity
14:11 Challenges of Implementing Security Measures in Organizations
#cybersecurity #unitedhealth #ransomware -
Why Are We Banning TikTok?
The conversation revolves around the topic of TikTok and its potential shutdown in the US. The hosts discuss ByteDance's preference for shutting down TikTok rather than divesting or having an American company own it. They explore the reasons behind this preference, including the financial losses TikTok is experiencing and the value of its algorithm. The hosts also touch on the broader issues of social media platforms, their impact on society, and the potential for foreign interference. They emphasize the need for critical thinking and research when consuming news and highlight the importance of cybersecurity in protecting personal information.
Article: Exclusive: ByteDance prefers TikTok shutdown in US if legal options fail, sources say
https://www.reuters.com/technology/bytedance-prefers-tiktok-shutdown-us-if-legal-options-fail-sources-say-2024-04-25/?fbclid=IwZXh0bgNhZW0CMTAAAR0OpitUt3cQp6QiTVPG-gzv1bhhHTetQuCkLN9N-a1mJC1CcpYsGY-HgYo_aem_AaL-j_etT-HD2EzxjSD9YCqertcyeg8oCXTs-fFooShVxtH9pbOmCPDSbdJNUsEJhEPoUHrAn32gJiKb8B8rZbhp
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Podcast Schedule
08:11 China's Long-Term Plan and National Security Concerns
13:30 Algorithms, Attention Spans, and Social Media
#cybersecurity #tiktokbanned #tiktok -
The Weekly Run Down 4/26/24
In this episode, the hosts discuss their recent activities and what they've been watching. They mention the latest episodes of Invincible and X-Men 97, as well as a comedy special by Neil Brennan. They also talk about their experiences with video games, including Fallout and Horizon. The hosts express their opinions on the adaptation of video games into TV series, with a particular focus on the Fallout series. They also discuss the release format of TV shows and whether binge-watching or weekly episodes are preferable. In this conversation, the participants discuss their thoughts on the TV show 'Fallout' and the video game 'Final Fantasy'. They also talk about their experiences as homeowners and their plans for the summer. The conversation covers various topics including gaming, sports, and family life.
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Podcast Updates
08:13 Challenges of Managing the Podcast
12:15 Thoughts on the Halo Series
16:28 Mixed Reviews for 'Fallout'
27:13 Challenges of Being a Homeowner
#cybersecurity #podcast #videogames -
Throw Back Thursday | Sunburst or Bust (S1 Ep 5)
In this Throwback episode S1, Ep5), Ryan, Shannon, and LeVon discuss the SolarWinds supply chain attack, Sunburst, as the event was still unfolding. This was one of our first episodes and still sits at the top of one of the biggest cyber incidents in a decade.
Topic 1:
A supply chain attack on SolarWinds has resulted in a widespread cyber espionage campaign, with state-sponsored actors allegedly working for Russia targeting US government agencies and major companies. The attack exploited a backdoor in SolarWinds' software, affecting 18,000 customers and leading to the compromise of sensitive information. The breach is considered one of the biggest in a decade and will require extensive forensic investigation and rebuilding of security infrastructure. The incident highlights the need for increased cybersecurity measures and the demand for skilled professionals in the field.
Topic 2:
School districts in the US are purchasing mobile device forensics technology to search students' phones without a warrant, raising concerns about privacy and potential misuse. The Supreme Court ruled in New Jersey v. TLO that schools can search students' phones without a warrant if they have reasonable belief of a law or policy violation. However, this raises questions about the extent of privacy rights for students and the potential for targeting certain groups.
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Week Recap
19:46 Microsoft's Role in Identifying Compromised Systems
33:06 Introduction and Support for the Podcast
41:10 Targeting Certain Groups: Implications of Mobile Device Forensics in Schools
50:55 The Need for a Dedicated Space Force to Protect and Secure Space Assets
01:01:05 Conclusion and Holiday Wishes
#cybersecurity #solarwinds #supplychainattack -
MITRE ATT&CKed
The conversation discusses an article about MITRE, a leading organization in cybersecurity, getting hacked. The hosts highlight the importance of transparency in cybersecurity incidents and commend MITRE for openly sharing the details of the attack. They emphasize that anyone can be a target and that there is no foolproof solution to cybersecurity. The conversation also mentions the significance of MITRE's role in the industry and its contributions to threat analysis and intelligence. Overall, the hosts appreciate MITRE's transparency and view it as an opportunity for the industry to learn and improve.
Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks!
Socials:
Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/
Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181
YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw
Facebook - https://www.facebook.com/profile.php?id=61556539026086
Instagram - https://www.instagram.com/theothersideofthefw
X (Twitter) - https://twitter.com/Ask_a_CISSP
TikTok - https://www.tiktok.com/@ryanwilliams683
Medium - https://medium.com/@ryanwilliamssenior
Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728
Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy
Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/
Daniel on LinkedIn - https://www.linkedin.com/in/daniel-acevedo-3a8b641b/
Chapters
00:00 Introduction and Podcast Overview
06:10 Transparency and Lessons Learned: MITRE's Approach to a Cybersecurity Incident
10:13 MITRE: Setting the Standard for Cybersecurity Education and Improvement
13:16 TOS Motion Intro.mp4
#cybersecurity #mitre #cyberattack