logo
episode-header-image
Aug 23
1h 22m

The Evolving Landscape of Cybersecurity ...

Jim Love
About this episode

 

In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights the critical balance between training frequency and effectiveness, with data suggesting that monthly phishing simulations and quarterly training interventions offer optimal results. Despite recent headlines claiming phishing training is ineffective, the discussion underscores the nuanced understanding required to navigate cybersecurity education. The episode also delves into academic versus business perspectives, emphasizing the importance of empirical research and critical thinking in developing effective cybersecurity strategies.

00:00 Understanding Human Vigilance and Awareness Decay
00:33 Introduction to Cybersecurity Today
00:46 Meet the Experts: Michael Joyce and David Shipley
01:39 Exploring the Human-Centric Cybersecurity Partnership
03:38 The Role of Liberal Arts in Cybersecurity
04:23 Challenges in Cybersecurity: Technology vs. Human Behavior
06:34 The Importance of Independent Research in Cybersecurity
12:30 Analyzing Cybersecurity Awareness Month
18:32 Phishing Simulations and Security Fatigue
23:14 The Impact of Training on Phishing Awareness
39:38 Experimenting with Phishing Training Frequency
39:51 Critiques and Insights on Cybersecurity Training
41:51 Optimal Training Intervals and Their Impact
43:23 The Role of Awareness in Cybersecurity
44:13 Understanding Phishing Reporting and Skills Decay
45:22 Ethical Considerations in Phishing Simulations
46:38 New Data on Why People Click Phishing Links
55:52 The Importance of Psychological Safety
57:23 Debunking Misleading Headlines on Phishing Training
01:05:44 The Complexity of Cybersecurity Research
01:16:41 Final Thoughts and Recommendations

Up next
Nov 22
Understanding Cybersecurity Threats: Insights from Intelligence Experts
<p>In this episode of Cybersecurity Today, host Jim Love welcomes retired intelligence officer Neil Bisson and regular guest David Shipley for an in-depth discussion on current cybersecurity threats facing both Canada and the US. They explore the roles of major state actors like ... Show More
47m 7s
Nov 21
Major CloudFlare Outages, Black Friday Phishing Surge, AI Privacy Breach at Ontario Hospital, and Salesforce Data Theft Investigation
<p>In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. CloudFlare faced significant outages affecting major platforms like Amazon and YouTube, along with continued issues for Microsoft 365 users. NordVPN warned of a surge in fake sh ... Show More
12m 28s
Nov 19
Cybersecurity Today: CloudFlare Outage, Microsoft's AI Risk, New Red Team Tool, and More!
<p>In this episode of 'Cybersecurity Today,' host Jim Love covers multiple pressing topics: CloudFlare's major outage affecting services like OpenAI and Discord, Microsoft's new AI feature in Windows 11 and its potential malware risks, a new red team tool that exploits cloud-base ... Show More
15m 38s
Recommended Episodes
Nov 2024
3092: Infosec - The Future of Cybersecurity Training and Upskilling
<p>How can the cybersecurity industry bridge the gap in its staggering 4 million open roles? This episode dives into the critical need for workforce development and how unconventional paths into cybersecurity are reshaping the field.</p> <p>Joining us is Keatron Evans, VP of Port ... Show More
20m 9s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Nov 2019
Cyber Security monitoring with Robert Pritchard
In episode 4 Terry Pattar, head of the Jane’s Intelligence Unit, is joined by “The Cyber Security Expert”, Robert Pritchard, to discuss methods for OSINT analysts to mitigate online security risks and better understand the threat environment in which they operate. Rob is highly e ... Show More
36m 44s
Oct 22
3461: AI in Schools and the Cybersecurity Risks Behind It
<p data-start="83" data-end="533">What happens when classrooms become laboratories for artificial intelligence? As AI tools find their way into schools, from lesson planning to student assessments, educators and parents are wrestling with how to balance innovation and security.</ ... Show More
32m 40s
Dec 2024
Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]
This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected ... Show More
18m 15s
Jun 2021
Nobelium is back. A signed driver is gamer-focused malware. Idle hands. Third-party cloud risk. Bad practices. A net assessment of national cyber power.
The SVR’s Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts ... Show More
23m 18s
Jun 2024
U.S. tightens the cybersecurity belt.
Biden bans Kaspersky over security concerns. Accenture says reports of them being breached are greatly exaggerated. SneakyChef targets diplomats in Africa, the Middle East, Europe and Asia. A serious firmware flaw affects Intel CPUs. More headaches for car dealerships relying on ... Show More
28m 59s
Dec 2024
When AI goes offline.
ChatGPT and Meta face widespread outages. Trump advisors explore splitting NSA and CyberCom leadership roles. A critical vulnerability in Apache Struts 2 has been disclosed. “AuthQuake” allowed attackers to bypass Microsoft MFA protections. Researchers identify Nova, a sophistica ... Show More
27m 10s
Jul 2023
New phishing campaigns hit Microsoft 365 and Adobe users. Big Head ransomware. Multichain bridge compromised. CISA adds a KEV. Progress patches MOVEit. Telegram's role in Russia's war.
New phishing campaigns afflict users of Microsoft 365 and Adobe. An analysis of Big Head ransomware. Multichain reports a crypto heist with over $100 million stolen. CISA makes an addition to the Known Exploited Vulnerability Catalog. Progress Software issues additional MOVEit pa ... Show More
31m 15s
Jun 2025
Vibe Coding vs Low-Code/No-Code: Security Risks and CI/CD Pipeline Impacts for Citizen Developers
Explore the evolution from traditional coding to vibe coding and its relationship with low-code/no-code (LCNC) platforms. This comprehensive analysis examines how AI-assisted development and visual programming tools are creating a new generation of citizen developers, transformin ... Show More
9m 42s