Higher Education under Cyber Attack. Clemson CISO John Hoyt.

Higher Education under Cyber Attack. Clemson CISO John Hoyt.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber ...

Avsnitt(330)

Super AI Exposed | Should Humanity Surrender Control?

Super AI Exposed | Should Humanity Surrender Control?

What if AI didn't try to destroy humanity? What if it just gave us 7 days to decide if we even deserve to lead? That's the premise of "The God's Prompt" — a new techno-thriller from Dr. Sergio Sanchez...

10 Apr 57min

Can Brett Johnson Help You SPOT Fraud Before it's Too Late?

Can Brett Johnson Help You SPOT Fraud Before it's Too Late?

Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to iden...

10 Apr 49min

AI Exposed. Latest Social Engineering Business Cyber Risk.

AI Exposed. Latest Social Engineering Business Cyber Risk.

Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the import...

8 Apr 1h 12min

Biggest Cyber Insurance Mistakes To Avoid

Biggest Cyber Insurance Mistakes To Avoid

Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Questions? Text our Studio direct. We read t...

5 Apr 1h

FBI Most Wanted. Ruja Ignatova. Story of OneCoin.

FBI Most Wanted. Ruja Ignatova. Story of OneCoin.

This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency P...

3 Apr 35min

How Business Can Transfer Cyber Risk

How Business Can Transfer Cyber Risk

In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the ne...

1 Apr 42min

Moving Target. Trilogy Released.

Moving Target. Trilogy Released.

New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Moving Target: The Obedient Machine drops April 21.Book 3 -- Ghost and the Machine -- out soon!4 years. ...

1 Apr 3min

AI's Innocent | Your Cyber Flaws Steal the Show!

AI's Innocent | Your Cyber Flaws Steal the Show!

Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge? Because in this episode, we’re not talking about Ho...

31 Mars 49min

Populärt inom Business & ekonomi

framgangspodden
varvet
rss-jossan-nina
rss-svart-marknad
svd-tech-brief
rss-borsens-finest
badfluence
avanzapodden
uppgang-och-fall
bathina-en-podcast
fill-or-kill
rss-inga-dumma-fragor-om-pengar
rss-dagen-med-di
lastbilspodden
24fragor
tabberaset
rss-kort-lang-analyspodden-fran-di
kapitalet-en-podd-om-ekonomi
rss-veckans-trade
borsmorgon