How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they’re redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today’s threats.
Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
It’s important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive data. Mona Terry analyzes victim experiences to create ITRC’s Identity Report and to provide information about new and ongoing trends in identity crimes.
Why Resolutions Fail with Dr. Leslie Becker-Phelps
We often put off changes and schedule them to start on January 1st. Many of these idealistic resolutions fail shortly after beginning, so it is important to be thoughtful when planning so that you can set yourself up for success.
Erasing Your Digital Footprint with Jeff Jockisch
Data is continuously being collected and this information can lead to misleading conclusions about an individual. Without proper context, behavior can be misinterpreted. This underscores the need for data privacy laws and stronger protections against data brokers.
Executive Recruiter Scams with John Sidoti
When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating to be this skeptical, being cautious can protect you and your finances.
Human Hacking with Peter Warmka
Peter Warmka is a retired CIA officer with over two decades of breaching the security of organizations overseas in pursuit of intelligence. He is the founder of The Counterintelligence Institute, author of two books, conference speaker, consultant, and educator on the dangers of human hacking.
Digital Deception: What Lies Ahead with Perry Carpenter
Perry Carpenter is an award-winning author, podcaster, and speaker with over two decades in cybersecurity, focusing on how cyber criminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust, human-centric defenses against social engineering-based threats.
Rethinking Online Anonymity with Lance Cottrell
Lance Cottrell founded Anonymizer in 1995 and is an internationally recognized expert in cryptography, online privacy, and internet security. VPNs are often promoted as the cure-all to our internet needs. Let’s talk about some of those misconceptions.
AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Understanding and Avoiding Triangulation Fraud with Soups Ranjan
As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Finding Small Business Fraud with James Ratley
James Ratley graduated from the University of Texas at Dallas with a bachelor’s degree in Business Administration. In 1971, he joined the Dallas Police Department as a police officer. He was on numerous task forces with a concentration on major fraud cases. He joined a major forensic accounting practice and was in charge of fraud investigations.
Truth and Lies with Mark Bowden
Mark Bowden is a world-renowned body language expert, keynote speaker, and best-selling author. He is the founder of the communication training company, TruthPlane. It’s important to know ourselves well enough to know what areas we’ll be more easily influenced and are susceptible to being deceived. The greater our desire for something to be true, the easier it is for us to be scammed.
The Update That Broke America with Gabe Dimeglio
Many industries are reliant on software and if the software becomes corrupt or an update fails, it may require hands-on support. Do you have your infrastructure set for repair and recovery?
A Lesson in Crisis Management with Jeremiah Grossman
The potential of overestimating or undervaluing your data can make it difficult to establish how much protection you need for a cyber intrusion. Jeremiah Grossman has spent over 25 years as an InfoSec professional and hacker, and is an industry creator and founder of White Hat Security and Bit Discovery.
Pig Butchering Is Getting Worse with Erin West
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Protecting Parents with Terri Proctor
Sometimes people only share their stories after they’ve gone through a challenging time. But it’s also important to learn from those in the middle of a scam to learn how people are manipulated and how vulnerable our loved ones can really be.
Technology Regulation is Outdated with Bruce Schneier
Regulators have to invest a considerable amount of time in keeping legislation and policy up to date regarding technology and AI, but it’s not easy. We need floor debates, not for sound bytes or for political gain, but to move policy forward.
Threat Emulation with Andrew Costis
Security risks are dynamic. Projects, employees, change, tools, and configurations are modified. Many companies utilize PEN testers on an annual basis, but as quickly as systems are revised, you may need to implement threat emulation for regular monitoring.
Ransomware: To Pay or Not To Pay? with Amitabh Sinha
Ransomware may not be on your machines due to your negligence or mistakes. It could be there because of third party software you are utilizing. Do you know what to do if this happens to you?
Firewalls Don’t Stop Dragons with Carey Parker
We all use technology. Things like internet browsers, search engines, instant messaging, and payment apps. But we aren’t always aware of the data being collected. This information can not only impact your privacy, but those around you as well.
Stopping Robocalls with Aaron Foss
Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics.
Safety Can’t Be an Afterthought with Kris Burkhardt
Most businesses rely on some type of software, either for scheduling, payment, banking, customer lists, or something else. It’s important to know where this information is stored and what would happen if that software was hacked or you weren’t able to access it. Today’s guest is Kris Burkhardt. As Accenture’s Chief Information Security Officer, Kris leads a team of over 800 security experts charged with protecting company client and customer data.
Child Safety Tips with Steve Lazarus
Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics.
Fraud: Not Going Away with Steve Lenderman
Synthetic IDs can be used to open fake accounts, but without a person to file the fraud claim, how should companies deal with this type of deceit? There is no crime where someone doesn’t need to pay for the loss. Either way, the loss is passed on to the consumers in some way or another.
Phishing Attack Awareness and Training with Josh Bartolomie
Scammers know employees are busy and that they want to act promptly on requests, but they also understand it takes time to verify the validity of the email. How do we train employees to know what is real and what isn’t?