Many people are comfortable sharing data in an environment that they believe to be a safe space. But not everyone considers where that health data goes after it has been collected. Today’s guest is Katie Lips. Katie is an author and entrepreneur who helps consumers to understand the value of their data and protect themselves online. She is currently creating a data-centric health app with her extensive experience.
How Cybercriminal Networks Are Organized with Peter Taylor
Today’s guest is Peter Taylor. Peter is a former police detective and Director of Fraud Management for major UK companies. Ten years ago he set up his own consultancy and has established a reputation as “The Fraud Guy” specializing in research, training, and investigation around organized crime.
Vehicle Hacking with Derrick Thiecke
Today’s guest is Derrick Thiecke. Derrick works as an Embedded Systems Security Tester in the automotive industry where he found himself after spending over a decade in the corporate IT world. When Derrick isn’t data dumping ROM chips, scouring through vehicle log data, or fuzzing CAN networks, he can be found as a brief blur passing by you on the highway.
Global Scammer Impact with Jorij Abraham
Scammers are brilliant at targeting the vulnerable and then often using the fear of exposure to extort even more out of them. Education about these manipulators isn’t enough. Can we do more to make a global impact knowing that less than 0.1% of scammers are ever prosecuted?
Today’s guest is Jorij Abraham. Jorij Abraham is the Managing Director of the Global Anti-Scam Alliance with a mission of preventing consumers worldwide from getting scammed. He is also the General Manager at ScamAdvisor.com, the global blacklist for malicious websites. In addition, Jorij is an ecommerce professor at University of Applied Sciences TIO.
Hacker to CISO with Alyssa Miller
Utilizing hacking skills cannot only make it easier to work with management, but helps translate technical information for non-technical staff. Today’s guest is Alyssa Miller. Alyssa is a lifelong hacker and cybersecurity leader. She is the CISO for Epiq Global and has over 16 years experience in security. She is an internationally recognized speaker, author, and researcher. She has also been featured in Tribe of Hackers blue team, Cybercrime magazine, and many other media.
How to Spot Fake Dating Profiles with Kathy Waters and Bryan Denny
Online dating has become more complicated than ever. Learning how to verify that the person you’re talking to is actually the person in the dating profile can save you from heartbreak and financial loss. Today’s guests are Kathy Waters and Bryan Denny. Kathy Waters is an expert advocate and an educator on the subject of online romance scams. Kathy is co-founder, along with retired Colonel Bryan Denny, of the non-profit organization Advocating Against Romance Scammers. Both have been working for safer platforms since 2016 with the same goals in mind: justice for victims and educating all online of the cybercrime known to tear people down emotionally, psychologically, and financially.
The Danger of Errors on Your Credit Report with Steve Baker
Every time you pay a bill, data is sent to a credit reporting agency. Errors can be made. It’s important to know where to look to see if your credit information is correct, stolen, or purchased. Today’s guest is Steve Baker. Steve is chairman of the Privacy Rights Institute. He is a lawyer and previously served as a leader at the FTC for over 27 years addressing consumer fraud in areas like telemarketing and spamming. Steve now writes The Baker Fraud Report, a free weekly newsletter covering consumer fraud from around the world.
Security Planning with Consumer Reports with Amira Dhalla
Consumer Reports is known for the research and comparisons of products and services, but they also offer a free personalized security and privacy planner. Today’s guest is Amira Dhalla. Amira is the Director of Impact Partnerships and Programs at Consumer Reports focusing on digital privacy and security. Amira works on projects that improve the cybersecurity and privacy products and tools on the marketplace while also tackling topics like discriminatory technologies, deceptive design, trust, and safety.
10 Situational Vulnerabilities with Lou Baxter
Criminals and trained to hone in on people who are vulnerable. Listen on to learn how you can protect the people you care about and what signs to look out for. Today’s guest is Louise Baxter. Lou graduated with a law degree and worked for Sussex Trading Standards. She took over as the chair of the Chartered Trading Standards Institute’s consumer power alliance and is the CTSI’s lead officer of education. She got frustrated by the system in relation to support of scam victims and started what is now the National Trading Standard Scams Teams, and she was awarded an MBE for protecting vulnerable consumers from financial abuse.
Protect Your Social Security Number with Kevin Roundy
Once a data breach has taken place, your data can be sold and resold and resold again. It’s important to know how to proactively protect your personal information. Today’s guest is Kevin Roundy. Dr. Roundy received his Ph.D. from the University of Wisconsin where he developed tools by which malware can be analyzed both with detailed statistical analysis techniques and dynamic instrumentation. He has collaboratively developed threat detection tools and has offered several research publications and patents. He also has a background in machine learning and database systems.