Peter Warmka is a retired CIA officer with over two decades of breaching the security of organizations overseas in pursuit of intelligence. He is the founder of The Counterintelligence Institute, author of two books, conference speaker, consultant, and educator on the dangers of human hacking.
Digital Deception: What Lies Ahead with Perry Carpenter
Perry Carpenter is an award-winning author, podcaster, and speaker with over two decades in cybersecurity, focusing on how cyber criminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust, human-centric defenses against social engineering-based threats.
Rethinking Online Anonymity with Lance Cottrell
Lance Cottrell founded Anonymizer in 1995 and is an internationally recognized expert in cryptography, online privacy, and internet security. VPNs are often promoted as the cure-all to our internet needs. Let’s talk about some of those misconceptions.
AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Understanding and Avoiding Triangulation Fraud with Soups Ranjan
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Finding Small Business Fraud with James Ratley
James Ratley graduated from the University of Texas at Dallas with a bachelor’s degree in Business Administration. In 1971, he joined the Dallas Police Department as a police officer. He was on numerous task forces with a concentration on major fraud cases. He joined a major forensic accounting practice and was in charge of fraud investigations.
Truth and Lies with Mark Bowden
Mark Bowden is a world-renowned body language expert, keynote speaker, and best-selling author. He is the founder of the communication training company, TruthPlane. It’s important to know ourselves well enough to know what areas we’ll be more easily influenced and are susceptible to being deceived. The greater our desire for something to be true, the easier it is for us to be scammed.
The Update That Broke America with Gabe Dimeglio
Many industries are reliant on software and if the software becomes corrupt or an update fails, it may require hands-on support. Do you have your infrastructure set for repair and recovery?
A Lesson in Crisis Management with Jeremiah Grossman
The potential of overestimating or undervaluing your data can make it difficult to establish how much protection you need for a cyber intrusion. Jeremiah Grossman has spent over 25 years as an InfoSec professional and hacker, and is an industry creator and founder of White Hat Security and Bit Discovery.
Pig Butchering Is Getting Worse with Erin West
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Protecting Parents with Terri Proctor
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Technology Regulation is Outdated with Bruce Schneier
Regulators have to invest a considerable amount of time in keeping legislation and policy up to date regarding technology and AI, but it’s not easy. We need floor debates, not for sound bytes or for political gain, but to move policy forward.
Threat Emulation with Andrew Costis
Security risks are dynamic. Projects, employees, change, tools, and configurations are modified. Many companies utilize PEN testers on an annual basis, but as quickly as systems are revised, you may need to implement threat emulation for regular monitoring.
Ransomware: To Pay or Not To Pay? with Amitabh Sinha
Ransomware may not be on your machines due to your negligence or mistakes. It could be there because of third party software you are utilizing. Do you know what to do if this happens to you?
Firewalls Don’t Stop Dragons with Carey Parker
We all use technology. Things like internet browsers, search engines, instant messaging, and payment apps. But we aren’t always aware of the data being collected. This information can not only impact your privacy, but those around you as well.
Stopping Robocalls with Aaron Foss
Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics.
Safety Can’t Be an Afterthought with Kris Burkhardt
Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics.
Child Safety Tips with Steve Lazarus
Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics.
Fraud: Not Going Away with Steve Lenderman
Synthetic IDs can be used to open fake accounts, but without a person to file the fraud claim, how should companies deal with this type of deceit? There is no crime where someone doesn’t need to pay for the loss. Either way, the loss is passed on to the consumers in some way or another.
Phishing Attack Awareness and Training with Josh Bartolomie
Scammers know employees are busy and that they want to act promptly on requests, but they also understand it takes time to verify the validity of the email. How do we train employees to know what is real and what isn’t?
Consumer Education for Fraud Protection with Doug Shadel
Some scammers love the challenge of deceiving those they target while others are forced to scam. Doug Shadel has collaborated on numerous educational videos and academic studies and co-authored five books about fraud. He also co-authored the AARP Fraud Frontier 2021 Report. He is currently Managing Director of Fraud Prevention Strategies LLC, a Seattle-based consulting firm.
Educating Teens About Technology is Necessary with Clayton Cranford
We can all have vulnerable blindspots when it comes to those we love being exploited or endangered. Even the best trained educators can be manipulated into making a mistake. Today’s guest is Clayton Cranford. Clayton is the founder of Cyber Safety Cop. He is one of the nation’s leading law enforcement educators on social media, child safety, teen drug abuse prevention, and behavioral threat assessments.
Protecting Financial Accounts From Scams and Fraud with John Buzzard
Thieves used to rob banks and steal physical money, but in a digital world, it is much easier to sit behind a keyboard and deceive you into giving it to them. Fortunately, there are specific things you can do to protect your finances before scammers get into your accounts.
AI: Doomsday vs. A Very Bad Day with Dr. Robert Blumofe
Many criminals are beginning to use deep learning AI to categorize the information they have stolen. They’re using a steady amount of micro attacks on individuals and businesses and not just full-scale assaults
Preventing SIM Swapping Scams with Mark Kreitzman
Mark Kreitzman is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.