25 episodes

Welcome to the Chief of Cybersecurity Podcast hosted by Dewayne Hart where we provide learning and discuss relevant information concerning the cybersecurity workforce, business development, and best practices. You can find more information for SEMAIS at www.semais.net and a list of authored publications at www.dewaynehart.com

Chief of Cybersecurity Dewayne Hart

    • Technology
    • 5.0 • 1 Rating

Welcome to the Chief of Cybersecurity Podcast hosted by Dewayne Hart where we provide learning and discuss relevant information concerning the cybersecurity workforce, business development, and best practices. You can find more information for SEMAIS at www.semais.net and a list of authored publications at www.dewaynehart.com

    From the National Cyber Director: No Degree Required

    From the National Cyber Director: No Degree Required

    The new National Cyber Director, Harry Coker, stated that the White House intends "to reduce unnecessary barriers" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a cybersecurity workforce without needing a traditional four-year degree. The benefit is that individuals can gain valuable skills and experience through alternative pathways such as apprenticeships, certifications, and on-the-job training. This initiative opens up opportunities for people from diverse backgrounds to enter the cybersecurity field and contribute to national security. Join us on this podcast as we dissect the strategy's rationale, impact, and outcomes. Will it reduce college entrance or bolster cybersecurity? How will job positions be affected, and should your pay be reduced due to the change? Let's talk!

    • 20 min
    Why AI and Hackers Are Becoming Closer

    Why AI and Hackers Are Becoming Closer

    With technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and the potential threats they pose to our digital security. Throughout this eye-opening video, we will explore the various ways hackers exploit AI algorithms, machine learning, and automation to infiltrate systems, steal sensitive data, and compromise online privacy.
    From AI-powered botnets to autonomous malware, the hacker's toolkit has evolved, requiring us to stay vigilant and well-informed about the potential risks lurking behind our screens. Furthermore, we will discuss the emerging challenges faced by cybersecurity professionals who strive to defend against these AI-driven attacks. As hackers exploit the vast capabilities of AI, defenders must constantly adapt to develop robust countermeasures that can detect, combat, and mitigate these evolving threats effectively. 

    • 20 min
    Unveiling The Dark Side of AI: It's About Business

    Unveiling The Dark Side of AI: It's About Business

    As AI continues to evolve and revolutionize traditional practices, it's crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask the business implications of AI, which often remain obscured by its mesmerizing abilities.
    Discover how AI can reshape market dynamics, disrupt industries, and challenge conventional business models. Moreover, we expose the potential risks associated with AI implementation, including job displacement, data privacy concerns, and ethical dilemmas. It's important for businesses to navigate these obstacles while embracing AI's potential, striking a delicate balance between innovation and responsibility.
    Join us as we raise awareness about the need for ethical AI practices, responsible decision-making, and the significance of human oversight.

    • 23 min
    CISA Has Healthcare Covered, This Podcast Tells You Why

    CISA Has Healthcare Covered, This Podcast Tells You Why

    In this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities.
    Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems.
    Additionally, we explore how CISA collaborates with public health agencies, healthcare providers, and stakeholders to conduct risk assessments, develop effective mitigation strategies, and share critical information. Through this podcast, listeners gain valuable insights into how CISA's cybersecurity expertise shapes and strengthens the healthcare landscape, ensuring the continuity of critical services.
    Safeguarding public health care starts with staying informed about the efforts and contributions of agencies like CISA. Don't miss this eye-opening discussion on "The Essential Role of CISA: Safeguarding Public Health Care" and learn how this agency's initiatives help protect health care systems.

    • 20 min
    We can Improve Healthcare Cybersecurity, Please Listen

    We can Improve Healthcare Cybersecurity, Please Listen

    The healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological dependence, sensitive data, and vulnerability to disruptions.
    Cyber incidents affecting hospitals and health systems have led to extended care disruptions caused by multi-week outages, patient diversion to other facilities, and strain on acute care provisioning and capacity, causing canceled medical appointments, non-rendered services, and delayed medical procedures (particularly elective procedures). More importantly, they put patients' safety at risk and impact local and surrounding communities that depend on the availability of the local emergency department, radiology unit, or cancer center for life-saving care.
    In this podcast, we discuss healthcare cybersecurity programs and operations and understand the importance of fortifying them in today's digital landscape. Join us as we explore practical strategies, cutting-edge technologies, and insights to enhance healthcare cybersecurity. Discover critical techniques for safeguarding sensitive patient data, preventing cyber threats, and ensuring the confidentiality and integrity of healthcare systems. Stay up-to-date with industry practices and learn how to optimize your organization's healthcare framework. Don't miss out on this valuable resource for anyone involved in healthcare cybersecurity. Watch and listen now and bolster your healthcare cybersecurity programs and operations!

    • 22 min
    How Does The Federal Government Modernization Strategy Affect Cybersecurity?

    How Does The Federal Government Modernization Strategy Affect Cybersecurity?

    Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have strategized and optimized their cyber protection programs based on modernization standards.
    Are we safe, and where does the federal government stand? Are there additional practices that can improve its modernization efforts? Newer tools and legacy systems are being discussed, and agencies are making significant progress. Despite the growth, cybersecurity plays a vital role in how modernization achieves its milestones and how the government approaches cybersecurity.
    We are back again! So, join the discussion and gather relevant information about the government modernization strategy and its effects on cybersecurity.

    • 24 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

The Neuron: AI Explained
The Neuron
Lex Fridman Podcast
Lex Fridman
No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod