LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back

LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back

If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll respond personally! 🌐 Visit us at: https://cybercrimejunkies.com #SecurityAwareness #CyberCrimeJunkies #Phishing #CyberSecurit...

Jaksot(283)

New Approaches to Enter the Cybersecurity Field

New Approaches to Enter the Cybersecurity Field

Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity. We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, and best practices for leveraging LinkedIn for your personal brand. 🔔 Site, Research and Direct contact with Podcast team: https://cybercrimejunkies.c...

11 Touko 202451min

New Insight on True Cyber Crime Examples.

New Insight on True Cyber Crime Examples.

What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to limit liability from data breach, new insight on true cyber crime examples, risk and brand protectionWe wanted to explore in today’s ep...

10 Touko 202454min

How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.

How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.

Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder of the Black Swan Group. Key Takeaways The Importance of Proof of Life in NegotiationUsing Decreasing Incremental Change in Bargaining...

20 Huhti 202428min

Inside Story of Chris Voss and Never Split The Difference Pt 1

Inside Story of Chris Voss and Never Split The Difference Pt 1

Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never split the difference started,Optimal Timing for NegotiationsThe Neuroscience Behind Tactical Empathybest ways to collaborate in negotiations,ways to n...

20 Huhti 202436min

The Story Behind the Sony Data Breach 2014

The Story Behind the Sony Data Breach 2014

This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore. Summary The conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on S...

14 Huhti 202447min

New Ways to Reduce Risks from Deep Fake

New Ways to Reduce Risks from Deep Fake

Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in terms of cybercrime. The conversation highlights the use of deepfake in cyberbullying, fraud, and social engineering attacks, as well as its pote...

6 Huhti 202437min

How To Stay Updated In Cyber Security and Business

How To Stay Updated In Cyber Security and Business

Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineering, Importance of visibility into operational risk, Most common hacking tactics, New approach to build a security cu...

28 Maalis 20248min

How To Plan For Ransomware

How To Plan For Ransomware

This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can get your data back after ransomware. Opinions of Chris are his own, not those of Rubrik. Connect with Chris on LinkedIn: https://www.linke...

21 Maalis 202439min

Suosittua kategoriassa Politiikka ja uutiset

rss-ootsa-kuullut-tasta
aikalisa
tervo-halme
ootsa-kuullut-tasta-2
politiikan-puskaradio
rss-podme-livebox
otetaan-yhdet
rss-vaalirankkurit-podcast
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rikosmyytit
rss-raha-talous-ja-politiikka
rss-pallo-keskelle-2
viisupodi
rss-suomen-lehdiston-podcast
rss-kaikki-uusiksi
rss-hyvaa-huomenta-bryssel
rss-merja-mahkan-rahat
rss-se-avun-kysymyspodcast
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset