show episodes
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
C
Cyber Security Inside

1
Cyber Security Inside

Tom Garrison and Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Cyber Security is no longer a topic that is addressed only by programmers and coders. CISOs and their executive peers need to think about “cyber security” differently. In this podcast, Tom Garrison, Vice President and GM of Client Security Strategy and Initiatives, and co-host Camille Morhardt, Director of Security Initiative & Communications, will discuss relevant topics in clear, easy to understand language. This podcast is intended for security experts and businesspeople alike. We will ha ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-e ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
Loading …
show series
 
Igor Volovich has built a career as a global CISO, strategist, advisor, author, speaker, and global cybersecurity leader with 20+ years of service to the world’s largest private and public-sector entities, Fortune 100 firms, and US policy, legislative, and regulatory communities. As a cyber strategy advisor and leader, he has helped large multinati…
 
In this episode of Cyber Security Inside What That Means, Camille Morhardt jumps into the non-fungible token (NFT) conversation with Mic Bowman, Senior Principal Engineer at Intel. The conversation covers: - What an NFT is, with several examples - How an NFT is purchased and traded - How owning an NFT is different from owning the asset the NFT is c…
 
What’s up bombers, and welcome back to another great episode of Not A Bomb Podcast. This is the podcast where we reexamine films that bombed at the box office or were panned by critics. This month, the boys are taking a look at some of the biggest bombs of 2021. On this episode, Troy and Brad are joined by our resident comic book expert, John Nance…
 
In this episode of Cyber Security Inside, Camille and Tom get into the biggest cybersecurity topics of the past year with Maribel Lopez, Founder and Principal Analyst at Lopez Research. The conversation covers - The large scale attacks on infrastructure this year on a wide range of companies. - Where the attacks were occurring to have the biggest i…
 
Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical Employee of the Year’, ‘Role Model of the Year’, ‘Rising Star’, and ‘Woman of the Year’ in the CRN W…
 
In this episode of Cyber Security Inside What That Means, Camille talks with Roman Zhukov, Product Security Manager at Intel about Security Champions and their roles in product development. The conversation covers: - What a Security Champion is, and what they do in a product team. - How the role of a Security Champion has changed over time with new…
 
In this episode of Cyber Security Inside, Camille and Tom revisit the best pieces of cybersecurity advice from experts they have interviewed throughout the year 2021. This advice is for users, companies, and manufacturers. They talk about: - Always being prepared for the worst-case security scenario, such as the SolarWinds attack. - Accountability …
 
Incredible Thoughts, Incredible minds, I’m so overwhelmed How did my brain conceive them? Welcome back to another incredible…sorry….we mean dope episode of Not A Bomb! This week, the guys get funky fresh with the Style Boyzs and 2016’s mockumentary - Popstar: Never Stop Never Stopping. Written, directed, and produced by the guys of Lonely Island, P…
 
In this episode of Cyber Security Inside, Camille talks with undergraduate students Ifesi Dimma Onubogu, Isabella Siu, and Sarah Schaber, Princeton-Intel 2021 Alumni and participants in the Research Experience for Undergraduates Program. The conversation covers: - How undergraduate students got interested in the field of cybersecurity and privacy, …
 
Dr. Magda Chelly is a keynote speaker, serial entrepreneur and a senior security expert. She is a strong activist for women in security, and founded Women on Cyber in Singapore, which is focused on supporting female professionals in the industry. She’s is also the founder of of Responsible Cyber, and a member of the Advisory Board for the Executive…
 
The guys get right too it this episode! Colvin starts off by asking Ryan why the education systems seems to teach people how to work for others and not be a boss or a CEO. After that Colvin has a lot to say about personal feelings being wrong. Colvin then asks Ryan the age old question does the apology need to be as loud as the disrespect. Finally,…
 
Have you been hearing about the new Infrastructure Bill that passed Congress? Are you curious about what moves the government is making to address the semiconductor shortage? In this episode of Cyber Security Inside, Camille and Tom get into the Infrastructure Bill recently signed into law with Jason Oxman, President and CEO, Information Technology…
 
In this episode of Cyber Security Inside, Camille and Tom discuss the intent behind and the possible implications of the CHIPS Act and how it could impact the shortage of semiconductors. Their guest is Ollie Whitehouse, Group CTO for NCC Group. Among the topics they discuss: - What is the CHIPS Act? - If the CHIPS Act is passed, how will it impact …
 
The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made. Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches.” She is a recognized expert in cybersecurit…
 
In this episode of What That Means, Camille discusses data anonymization with Kristin Ulrich, Senior Solutions Specialist at SAP for HANA architecture. Find out why data privacy should matter to you. The conversation covers: - What data anonymization means - The difference between pseudonymization and anonymization - What questions you need to ask …
 
In the spirit of Thanksgiving Tom and Camille highlight the work their guests are doing that they are thankful for — including ethical considerations of AI, why the race for AI is one of most important for humankind, and how academia and the cyber security industry can work together. The conversation covers: - Leading thoughts on AI - Ethical consi…
 
3, 2, 1, Let’s Jam! The gang is all here for latest edition of Not A Bomb Watches! We continue our journey through the 1998 science fiction/western - Cowboy Bebop. On this episode, the guys discuss Session 19 - Wild Horses and Session 20 - Pierrot Le Fou. If you want to hear more of Sammy, make sure you subscribe to the Gentlemen’s Guide to Midnigh…
 
In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat. Timur Yunusov is a Security Expert in the area of payment security and application security, one of the organizers of Payment…
 
In this weeks episode, Craig and Geoff continue on their journey through the filmography of Michael Mann and discuss Public Enemies. Focusing on a 12 month period in the life of John Dillinger and the creation of the FBI, it's a welcome change of scenery from Mann's previous films. Together they discuss the film's journey to screen, where the film …
 
The kinds of personal information we put out there may seem safe today, but what about five, ten, twenty or thirty years down the line? On this episode of #CyberSecurityInside, Tom and Camille are joined by guest Alex Ionescu, a founder of Windsider Seminars & Solutions Inc. and the previous VP of Endpoint Engineering at CrowdStrike, to talk about …
 
3, 2, 1, Let’s Jam! The gang is all here for latest edition of Not A Bomb Watches! We continue our journey through the 1998 science fiction/western - Cowboy Bebop. On this episode, the guys discuss Session 17 - Mushroom Samba and Session 18 - Speak Like a Child. Additionally, Troy teaches the gang his Buddhist learnings, and the guys reminisce abou…
 
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's un…
 
On this weeks episode Colvin and Ryan discuss if you were once same sex and have changed or live under the opposite sex should you tell future partners. Colvin asks Ryan can kids save a relationship or ruin a relationship. They discuss what can happen if your partner has a short fuse in public places. Finally, the guys discuss if it is a cut off ag…
 
Supply chain security has taken on new importance, especially in a post-COVID world; from healthcare to finance, the cybersecurity threats posed to people’s lives are very real. On this episode of Cyber Security Inside, Tom and Camille are joined by Rick Martinez, Sr. Distinguished Engineer, Office of CTO at Dell Technologies, and John Boyle, Cyber…
 
This week on Not A Bomb, Spooktober comes to an end but the gang is going out with a bang. Everyone is talking about Halloween Kills, but we decided to discuss the Halloween film without Michael Myers. That’s right! It’s time to talk about Halloween 3: Season of the Witch! The pod welcomes back, Josh from The VHS Files, to aid us in talking about k…
 
There are infinite vulnerabilities out there that make us susceptible to instances of cyberattack, and as of this year, we’re on track to have identified 20,000 of them. While there’s a whole risk mitigation ecosystem in place, CVE (formerly known as the Common Vulnerabilities and Exposures Program) has played a huge role in establishing a dictiona…
 
How great are Christine's characters? What genre of film is Maximum Overdrive? And what music video did Siskel and Ebert review in 1983? Listen now to find out! Scott Croco and Mike Young unhack Christine (1983) and Maximum Overdrive (1986). When an unpopular teen gets a new car, things start to turn around for him. But his car has its own motivati…
 
In this week's episode, Craig and Geoff are joined by writer, producer and director Stuart Beattie whose work includes Collateral, 3:10 To Yuma, 30 Days of Night, Pirates of the Caribbean and so much more. Together they discuss Stuart's career, the journey to screen of Collateral, the Steven Spielberg produced Halo TV series and so much more.…
 
Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it is reported that an attack hits once every 11 seconds, and as if that stat isn’t hard enough to fathom, it’…
 
Welcome back listeners! We have another spooky episode to get you in the Halloween spirit! On this episode of Not A Bomb, we learn that perseverance and being related to one of the hosts will finally get your request moved to the top of the list. Troy’s daughter, Angelica, joins Not A Bomb to discuss one of her favorite spooky films - Elvira: Mistr…
 
Why would a tech employee turn to e-crime? Well, often it has to do with feelings of discontentment within their jobs or their lives. How, then, can companies best mitigate insider threats? On this episode of #CyberSecurityInside, Tom and Camille are joined by guest Rick Jordan, CEO and Founder of ReachOut Technology, to take a deep dive; if you’re…
 
3, 2, 1, Let’s Jam! The gang is all here for latest edition of Not A Bomb Watches! We continue our journey through the 1998 science fiction/western - Cowboy Bebop. On this episode, the guys discuss Session 15 - My Funny Valentine and Session 16 - Black Dog Serenade . If you want to hear more of Sammy, make sure you subscribe to the Gentlemen’s Guid…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login