logo
episode-header-image
Dec 2024
52m 28s

Cyber Security Today: Year End Panel Dis...

Jim Love
About this episode

Cybersecurity Year in Review: Future Challenges and Industry Insights

Join host Jim Love and a panel of cybersecurity experts—Terry Cutler from Cyology Labs, David Shipley from Beauceron Security, and Laura Payne of White Tuque—as they review the key cybersecurity events of the past year. Topics discussed include the increasing cyber threats to universities, healthcare systems, and critical infrastructure; the importance of proper cybersecurity measures and employee training; the complexities of adopting quantum-safe encryption protocols; and the impact of AI and shadow IT on cybersecurity. The panel concludes with actionable advice for improving organizational cybersecurity posture in the coming year.

00:00 🎄 The 12 Days of Cyber Christmas 🎄 00:29 🔍 Year in Review: Cybersecurity Highlights 00:40 👥 Meet the Expert Panel 01:19 🏫 University Cyber Attacks: A Growing Concern 02:25 🔒 Penetration Testing vs. Vulnerability Scanning 03:09 🛡️ Persistent Threats and Active Directory Issues 06:28 💡 Strategies for Cybersecurity in Universities 07:34 💰 Funding and Legislation for Cybersecurity 13:52 🛠️ Practical Steps for Cybersecurity on a Budget 18:36 🔐 Quantum Readiness and Future Challenges 25:11 Quantum Computing: The Reality and Risks 25:53 Human Ingenuity and Risk Management 26:29 The Future of Cybersecurity: Q Day and Certificate Rotations 28:02 Major Cybersecurity Incidents of the Year 29:41 The Rise of Ransomware and Supply Chain Attacks 35:35 AI in Cybersecurity: Opportunities and Challenges 38:49 Critical Infrastructure Vulnerabilities 47:09 Year-End Reflections and Looking Forward

Up next
Today
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers ... Show More
12m 57s
Jul 7
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to ... Show More
10m 41s
Jul 4
AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the fa ... Show More
50m 50s
Recommended Episodes
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Nov 2024
3092: Infosec - The Future of Cybersecurity Training and Upskilling
How can the cybersecurity industry bridge the gap in its staggering 4 million open roles? This episode dives into the critical need for workforce development and how unconventional paths into cybersecurity are reshaping the field. Joining us is Keatron Evans, VP of Portfolio and ... Show More
20m 9s
Sep 2024
UK’s newest cybersecurity MVPs.
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from ... Show More
34m 29s
Jul 2023
Taking steps to stop a Chinese APT. Implementing the US National Cybersecurity Strategy. LokiBot is back. Malware masquerading as a proof-of-concept. Swapping cyber ops in a hybrid war.
CISA and the FBI issue a joint Cybersecurity Advisory on exploitation of Microsoft Exchange Online. Implementing the US National Cybersecurity Strategy. FortiGuard discovers a new LokiBot campaign. Training code turns out to be malicious in a new proof-of-concept attack discovere ... Show More
32m 18s
Nov 2019
Cyber Security monitoring with Robert Pritchard
In episode 4 Terry Pattar, head of the Jane’s Intelligence Unit, is joined by “The Cyber Security Expert”, Robert Pritchard, to discuss methods for OSINT analysts to mitigate online security risks and better understand the threat environment in which they operate. Rob is highly e ... Show More
36m 44s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Jan 2025
National security in the digital age.
A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a ... Show More
35m 20s
Apr 10
Former cybersecurity officials lose clearances.
Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large L ... Show More
32m 31s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Jun 9
White House reboots cybersecurity priorities.
A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drop ... Show More
36m 12s