39 episodes

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics.
IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs.

We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of your organization.

The Audit IT Audit Labs

    • Technology
    • 5.0 • 4 Ratings

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics.
IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs.

We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of your organization.

    Building the Future: AI and Cybersecurity in Construction

    Building the Future: AI and Cybersecurity in Construction

    In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Group. 
    John shares his insights on integrating technology to enhance cybersecurity and operational efficiency within the construction sector. The discussion covers a range of topics from combatting sophisticated phishing attacks to the strategic use of AI tools like ChatGPT and Copilot. Delve into the challenges of AI-generated content, governance, intellectual property concerns, and the transformative impact of AI on traditional business models. 
    In this episode we cover: 
    Best practices for AI in non-tech sectors Cybersecurity policies for AI Mitigating cyber security risks in construction AI's role in the construction industry Ethical challenges of AI-generated content Future trends in AI governance AI's implications for industry standards  
    Stay tuned for more insights into the future of IT technology and its transformative effects on the business landscape. 
    #AIcybersecurity #Cybersecurity #Infosec #ConstructionTech #AIPolicies 

    • 51 min
    Cybersecurity Brief: Water Systems & IoT Devices Under Threat

    Cybersecurity Brief: Water Systems & IoT Devices Under Threat

    Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT security standards.  
    In this episode, our team of cybersecurity experts, Eric Brown and Nick Mellum, dissect the Biden administration's recent warnings about cyber-attacks on U.S. water utilities and delve into the newly announced IoT device security specifications by The Cloud Security Alliance (CSA). From nation-state actors targeting essential infrastructure to the complexities of securing IoT devices in your home, this discussion offers invaluable insights into safeguarding our digital and physical worlds. 
    What You'll Learn: 
    The significance of recent cybersecurity warnings regarding the water sector. The importance of a unified cybersecurity standard for IoT devices. Strategies for securing IoT devices within corporate and home networks. The role of cybersecurity in ensuring the safety and reliability of essential public utilities. 

    • 39 min
    Phishing: The Number 1 Social Engineering Tactic with James Arndt

    Phishing: The Number 1 Social Engineering Tactic with James Arndt

    In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybersecurity. Join us as Jamie Arndt, a cybersecurity expert with extensive experience in reverse engineering and analyzing malicious emails, shares his insights and stories from the front lines. 
    We’ll cover: 
    • The rise of generative AI in crafting phishing emails that bypass traditional detection methods. 
    • Real-world stories of phishing attacks, from impersonating school communications to exploiting professional relationships. 
    • The psychological tactics used by attackers to exploit human nature and gain access to sensitive information. 
    • Innovative defense strategies and tools that organizations can employ to protect themselves against phishing attempts. 
    • Practical advice for individuals on recognizing phishing attempts and safeguarding personal information. 
    This episode arms you with the knowledge of what to look for in phishing emails, emphasizing the importance of vigilance and education in the digital age. 

    • 49 min
    Printing the Future: Navigating Cybersecurity in 3D Printing

    Printing the Future: Navigating Cybersecurity in 3D Printing

    How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themselves become targets for hackers?  
     
    As 3D printing technology becomes more integrated into various industries, its cybersecurity implications cannot be ignored. This episode sheds light on the exciting world of 3D printing, focusing on its potential for innovation while addressing the significant cybersecurity challenges it faces. 
    We'll explore: 
    • The basics of 3D printing technology and its cybersecurity implications. 
    • Protecting intellectual property in the realm of 3D printing. 
    • The vulnerabilities of 3D printers to hacking and how to safeguard them. 
    • Strategies for securing 3D printing operations against cyber threats. 
    • Real-world examples of cybersecurity breaches in 3D printing. 
    Whether you're a cybersecurity professional, a 3D printing enthusiast, or someone interested in the intersection of technology and security, this episode offers valuable insights into protecting your 3D printing projects.   

    • 46 min
    Are VPNs Secure? Insights on the Risks, and the Ivanti Breach

    Are VPNs Secure? Insights on the Risks, and the Ivanti Breach

    How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackle these pressing questions head-on.  
    As the cybersecurity landscape evolves, Virtual Private Networks (VPNs) are increasingly common among cybersecurity professionals and enthusiasts alike... but how secure are they? In this episode, we take you through the mechanics of VPNs, their role in safeguarding your data, and the vulnerabilities that can expose users to risk.  

    We'll cover: 
    •  What are VPNs and how do they work? 
    •  How to choose the right VPN provider: Considerations and pitfalls. 
    •  The difference between corporate and personal VPN use and their unique challenges. 
    •  How to mitigate risks associated with VPN usage. 
    •  The recent Ivanti VPN breach 
     
    If you care about your digital privacy, curious about how VPNs fit into your life, or pondering the real benefits and risks of using VPN services, then this episode is for you. 

    • 44 min
    A Veteran’s Journey into Cybersecurity with Clifton Robinson

    A Veteran’s Journey into Cybersecurity with Clifton Robinson

    It should come as no surprise that building a team can be challenging for cybersecurity professionals. However, we've found that individuals who have served in the military often possess a unique focus and drive, setting them apart in the cyber world. 
    Clifton Robinson, a former Army logistician and healthcare market analyst, joins our team to discuss his journey to becoming a cybersecurity professional.  
    Topics covered: 
    How military service helps individuals transition into cybersecurity Why employers appreciate military service in cybersecurity candidates Why are veterans drawn to the field of cybersecurity? How joining the military changed Clifton’s life The importance of mentorship and networking for veterans If you're a veteran considering a career in cybersecurity or seeking a fresh perspective on the cybersecurity industry, don't miss the latest episode of The Audit! 

    • 44 min

Customer Reviews

5.0 out of 5
4 Ratings

4 Ratings

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
TED Radio Hour
NPR

You Might Also Like

Cybersecurity Tech Brief By HackerNoon
HackerNoon
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
CyberWire Daily
N2K Networks
Hacking Humans
N2K Networks
Security Now (Audio)
TWiT