Today’s guest Joel Larsgaard has been helping people take control of their finances for over 15 years. As the co-host of How To Money and a weekly radio show Joel breaks down the often confusing world of personal finance. His passion for financial literacy comes from personal experience and he’s been recognized for his work including being on the Forbes Advisory Board.
Brushing Scams with Venkat Margapuri
Scams come in many forms but receiving a freebie from a scammer doesn’t make sense. If something shows up at your door that you didn’t order, should you be worried? Brushing scams are becoming more common and while they may seem harmless at first they can be a gateway to fraud, identity theft and financial loss.
Ransomware, Phishing and Fraud With Bryce Austin
Cybersecurity isn’t just a concern for large corporations. It’s vital for businesses of all sizes. Bryce Austin is the CEO of TCE Strategy, a cybersecurity advisory firm. They provide vulnerability scans, penetration tests, fractional CISO services, and incident response services. He is also a professional speaker on ransomware. Bryce is the fractional CISO to many companies, including one on the S&P 500.
CISOs: The Ultimate Stress Test With Jill Knesek
With all the shifts in cybersecurity, it’s crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed at multiple levels and handle burnout amongst many other responsibilities. Today’s guest is Jill Knesek. Jill is the Chief Information Security Officer for Blackline, a company that does financial SaaS solutions.
AI, Automation, and the Future of Cybersecurity With Mike Lyborg
With the increase in targeted cyber attacks, it’s more important than ever for organizations to quickly identify and respond to threats. AI is helping security teams by acting as virtual analysts, handling much of the investigation work. However, human oversight is still essential for the final steps and judgment.
Cybersecurity Training from Boring to Engaging With Howard Goodman
Building a security culture and staying ahead of modern threats has never been more important. Today’s guest is Howard Goodman, Senior Technical Director at Skybox Security. We discuss organizational challenges, best practices, and the future of cybersecurity.
Next-Gen Account Security with Christiaan Brand
With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today’s guest is Christiaan Brand. Christiaan is the co-founder of Entersekt, a financial services security firm and a key player at Google in their security and identity teams.
5 Key Cybersecurity Elements with Kelly Hood
How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they’re redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today’s threats.
Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
It’s important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive data. Mona Terry analyzes victim experiences to create ITRC’s Identity Report and to provide information about new and ongoing trends in identity crimes.
Why Resolutions Fail with Dr. Leslie Becker-Phelps
We often put off changes and schedule them to start on January 1st. Many of these idealistic resolutions fail shortly after beginning, so it is important to be thoughtful when planning so that you can set yourself up for success.
Erasing Your Digital Footprint with Jeff Jockisch
Data is continuously being collected and this information can lead to misleading conclusions about an individual. Without proper context, behavior can be misinterpreted. This underscores the need for data privacy laws and stronger protections against data brokers.
Executive Recruiter Scams with John Sidoti
When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating to be this skeptical, being cautious can protect you and your finances.
Human Hacking with Peter Warmka
Peter Warmka is a retired CIA officer with over two decades of breaching the security of organizations overseas in pursuit of intelligence. He is the founder of The Counterintelligence Institute, author of two books, conference speaker, consultant, and educator on the dangers of human hacking.
Digital Deception: What Lies Ahead with Perry Carpenter
Perry Carpenter is an award-winning author, podcaster, and speaker with over two decades in cybersecurity, focusing on how cyber criminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust, human-centric defenses against social engineering-based threats.
Rethinking Online Anonymity with Lance Cottrell
Lance Cottrell founded Anonymizer in 1995 and is an internationally recognized expert in cryptography, online privacy, and internet security. VPNs are often promoted as the cure-all to our internet needs. Let’s talk about some of those misconceptions.
AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Understanding and Avoiding Triangulation Fraud with Soups Ranjan
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Finding Small Business Fraud with James Ratley
James Ratley graduated from the University of Texas at Dallas with a bachelor’s degree in Business Administration. In 1971, he joined the Dallas Police Department as a police officer. He was on numerous task forces with a concentration on major fraud cases. He joined a major forensic accounting practice and was in charge of fraud investigations.
Truth and Lies with Mark Bowden
Mark Bowden is a world-renowned body language expert, keynote speaker, and best-selling author. He is the founder of the communication training company, TruthPlane. It’s important to know ourselves well enough to know what areas we’ll be more easily influenced and are susceptible to being deceived. The greater our desire for something to be true, the easier it is for us to be scammed.
The Update That Broke America with Gabe Dimeglio
Many industries are reliant on software and if the software becomes corrupt or an update fails, it may require hands-on support. Do you have your infrastructure set for repair and recovery?
A Lesson in Crisis Management with Jeremiah Grossman
The potential of overestimating or undervaluing your data can make it difficult to establish how much protection you need for a cyber intrusion. Jeremiah Grossman has spent over 25 years as an InfoSec professional and hacker, and is an industry creator and founder of White Hat Security and Bit Discovery.
Pig Butchering Is Getting Worse with Erin West
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Protecting Parents with Terri Proctor
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Technology Regulation is Outdated with Bruce Schneier
Regulators have to invest a considerable amount of time in keeping legislation and policy up to date regarding technology and AI, but it’s not easy. We need floor debates, not for sound bytes or for political gain, but to move policy forward.
Threat Emulation with Andrew Costis
Security risks are dynamic. Projects, employees, change, tools, and configurations are modified. Many companies utilize PEN testers on an annual basis, but as quickly as systems are revised, you may need to implement threat emulation for regular monitoring.