Download the App!
show episodes
 
Topher Delaney in conversation with gardeners, farmers, activists, writers, and scientists. "If you look the right way, you can see that the whole world is a garden." ~Frances Hodgson Burnett. "People often ask me what one thing I would recommend to restore the relationship between land and people. My answer is almost always “Plant a garden.” It’s good for the health of the earth and it’s good for the health of people." ~Braiding Sweetgrass by Robin Wall Kimmerer pg 126.
  continue reading
 
Artwork

1
XS Malarkey Podcast

Richard Massara, Toby Hadoke, Lee Martin

Unsubscribe
Unsubscribe
Aylık
 
XS Malarkey is one of the UK's longest running comedy nights. For over 14 years it has provided mirth and jollity to the people of Manchester, and help to build up some of the most well know comedians in the UK. Every month the XS Malarkey Podcast will bring you little nuggets of comedy joy to your ears and mix that in with some backstage interviews with some of the acts, many famous, some just starting out.
  continue reading
 
Artwork

1
the CYBER5

Nisos, Inc.

Unsubscribe
Unsubscribe
Aylık
 
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
  continue reading
 
Artwork

1
Speaking Of Wealth with Jason Hartman

Jason Hartman with Dan Millman & Pat Flynn

Unsubscribe
Unsubscribe
Aylık
 
Welcome to the "Speaking of Wealth" podcast showcasing profit strategies for speakers, publishers, authors, consultants, and info-marketers. Learn valuable skills to make your business more successful, more passive, more automated, and more scalable. Your host, Jason Hartman interviews top-tier guests, bestselling authors and experts including; Dan Poynter (The Self-Publishing Manual), Harvey Mackay (Swim With The Sharks & Get Your Foot in the Door), Dan Millman (Way of the Peaceful Warrior) ...
  continue reading
 
Loading …
show series
 
In an interview with Jason Hartman, Keith Butcher, founder of Butcher Joseph, discusses business succession and Employee Stock Ownership Plans (ESOPs). With many business owners approaching retirement, ESOPs offer a tax-efficient way to transition ownership to employees. This model enhances employee retention and loyalty, providing long-term retire…
  continue reading
 
Jason interviews Johnny Serpilla, former President of Camping World, about his book, "Life is Hard, but I'll be Okay", and his experiences in leadership and business. Johnny emphasizes the importance of approaching life with one heart and mind, the role of gratitude in leadership, and the impact of personal problems on work. Johnny also discusses t…
  continue reading
 
In this interview, Matt Earle from Reputation.ca discusses the problem of online reputation damage and how it can affect individuals and businesses. When negative or false information appears in Google search results, it can harm a person's reputation. Reputation.ca focuses on deleting harmful content whenever possible, but it's challenging when de…
  continue reading
 
Topher Delaney in conversation with David Duskin, Public Artists, and co-founder of Petaluma River Park http://www.davidduskin.com/ https://www.petalumariverpark.org/ Publicly accessible collaborative works: Teaching Stones, Almaden Library and Community Center, San Jose, CA Norman Lear Monument, Emerson College, Boston, MA Castro Valley Creek Dayl…
  continue reading
 
In Episode 90 of TheCyber5, we are joined by Peter Warmka, founder of the Counterintelligence Institute. Warmka is a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection. With 20+ years of breaching security overseas for a living, Warmka now te…
  continue reading
 
Otow Orchard 6232 Eureka Rd Granite Bay, CA 95746 916-791-1656 www.otoworchard.com In 1911, Kitchitaro Kawanoand his wife, Momi, purchased 20 acres of land in the Rosedale Colony Tract of Loomis and named it Rosedale Farm. After Kitchitaro's death in 1939, his widow and youngest daughter, Helen, ran the farm. During World War II, Helen and her husb…
  continue reading
 
In Episode 89 of TheCyber5, we are joined by Nisos Research Principal, Vincas Ciziunas. It was 7 years ago, at a restaurant in Ashburn, Virginia, when Nisos’ co-founders Justin Zeefe and Landon Winkelvoss met Vincas. At the time, Vincas was working as a contractor for the US government but was considering a pivot into the private sector. It was Vin…
  continue reading
 
In Episode 88 of TheCyber5, we are joined by Nisos Senior Director for Customer Success, Brandon Kappus. Here are five topics we discuss in this episode: Intelligence Playbooks Start with Education to the Customer Playbooks should include three major steps. The first step is education on how intelligence is going to be consumed and not be nonstop n…
  continue reading
 
Topher Delaney and Park Ranger Yenyen Chan discuss the significance of the Chinese in the early history of Yosemite and our National Park Service. Resources discussed in the podcast: George Wright Forum Article: Interpreting the Contributions of Chinese Immigrants in Yosemite National Park’s History by Yenyen F. Chan - http://www.georgewright.org/3…
  continue reading
 
In Episode 87 of TheCyber5, we are joined by senior information security leader Charles Garzoni. Here are five topics we discuss in this episode: Defining When Attribution is Relevant and Necessary Many corporations are not overly concerned with attribution against cyber adversaries, they just want to get back to business operations. However, if so…
  continue reading
 
Topher Delaney in conversation with Joanna Letz, founder and owner-of Bluma Flower Farm, a rooftop farm in Berkeley, CA. Resources discussed in the podcast: Santa Cruz Farm Program - https://agroecology.ucsc.edu/ Resource for landscape fabric. Nolt's Produce Supplies - https://noltsproducesupplies.net/ Resource for Collinear Hoes - https://www.john…
  continue reading
 
In Episode 86 of TheCyber5, we are joined by Senior Manager of Threat Management for Nvidia Chris Cottrell. Here are six topics we discuss in this episode: What is a threat management department within enterprise security? Threat management departments are usually formed when security teams become mature and have table stakes functions within threa…
  continue reading
 
In Episode 85 of TheCyber5, we are joined by Chief Technologist of Transformative Cyber Innovation Lab for the Foundation for Defense of Democracies (FDD) Dr. George Shea. Here are four topics we discuss in this episode: What is the Operational Resiliency Framework (ORF)? The Operational Resiliency Framework (ORF) is a framework that is intended to…
  continue reading
 
In Episode 84 of TheCyber5, we are joined by members of the CrossCountry Consulting team: Brian Chamberlain, Offensive R&D Lead, Eric Eames, Associate Director, and Gary Barnabo, Director, Cyber and Privacy. Here are five topics we discuss in this episode: Adversary Emulation vs. Simulation and Use of Threat Intelligence Replaying attacks from adve…
  continue reading
 
Topher Delaney in conversation with Jean Wheeler, owner of Main Street Trees in Napa, CA. Main Street Trees: www.mainstreettrees.com Jean Wheeler's Favorite Trees: Figs Col de Dame noir Grosse Monstreuse Eve's Black Cherry Excel White Genoa Kadota Pomegranates Wonderful Ariana Desertnyi Early Wonderful Vkusnyi Apples Ashmead's Kernel Golden Delicio…
  continue reading
 
Topic: Title: Data Governance and Threat Intelligence Converge In Episode 83 of TheCyber5, we are joined by our guest, Egnyte’s Chief Governance Officer, Jeff Sizemore. We discuss the Cybersecurity Maturity Model Certification (CMMC) and the impact on Department of Defense (DOD) contractors to mature their cybersecurity hygiene in order to compete …
  continue reading
 
In episode 82 of The Cyber5, we are joined by guest moderator and senior intelligence analyst for Nisos, Valerie G., and CEO of BGH Security, Tennisha Martin. In this episode, we discuss the challenges and opportunities of promoting and enabling diversity and inclusion in cyber security. Key Takeaways: Showing Impact for Diversity and Inclusion (D&…
  continue reading
 
Topher Delaney in conversation with Darrel Schramm, rosarian and author of Rainbow (https://www.amazon.com/Rainbow-California-Darrell-g-h-Schramm/dp/1547175745) Rose Resources: helpmefind/roses: https://www.helpmefind.com/rose/plants.php The Friends of the Vintage Roses: https://thefriendsofvintageroses.org/ The Heritage Roses Group: http://www.the…
  continue reading
 
In episode 81 of The Cyber5, we are joined by the Head of Insider Threat at Uber and CEO of Vaillance Group, Shawnee Delaney. In this episode, we provide an overview of different functions within an insider threat program. We also discuss the support open source intelligence provides to such programs and how to change company culture to care about …
  continue reading
 
A book is the new business card and a great way to grow your business! Chandler Bolt is an investor, advisor, the CEO of Self-Publishing School & SelfPublishing.com, and the author of 6 bestselling books including his most recent book titled “Published.” Self-Publishing School is an INC 5000 company the last 3 years in a row as one of the 5,000 fas…
  continue reading
 
It takes a lifetime to build trust, and a minute to lose it. Jason Hartman welcomes Todd Duncan, author, speaker and the world’s leading authority on trust! People thrive on trust and the bigger the financial decision, the more trust is necessary. How can you create that? Todd also reminds us that nobody gets a paycheck for being busy! Managing you…
  continue reading
 
In episode 80 of The Cyber5, we are joined by Executive Director of the DISARM Foundation, Jon Brewer. We discuss the mission of the DISARM Framework, which is a common framework for combating disinformation. Much like how the MITRE ATT&CK framework is used for combating cyber attacks, the DISARM framework is used to identify what Jon calls “cognit…
  continue reading
 
Topher Delaney in conversation with Dr. Nancy Piotrowski, President of the Vallejo Garden Club. Please email questions to topher@virgiegilesfoundation.org Links: Vallejo Garden Club - https://www.facebook.com/VallejoGardenClub National Garden Club - https://gardenclub.org/ California Garden Club - California Garden Club California Native Plants Soc…
  continue reading
 
In episode 79 of The Cyber5, we are joined by senior security practitioner, Garrett Gross. We discuss the age old problem of spear phishing and why enterprises still struggle to fix this problem. We talk about the critical processes and technologies necessary to defend against spear phishing, including robust training programs and endpoint detectio…
  continue reading
 
In episode 78 of The Cyber5, we are joined by our guest, Gaurang Shah, former senior lead technology manager at Booz Allen Hamilton. We talk about the challenges of digital transformation and cybersecurity in the US federal government. We discuss solutions for bringing innovative technology and bespoke services into the federal space and how to sho…
  continue reading
 
In episode 77 of The Cyber5, we are joined by our guest, Eric Lekus, Senior Manager for Threat Intelligence at Deloitte. Eric delivers for Deloitte’s internal security team and is not a client-facing consultant. We talk about how to evolve cyber threat intelligence in a SOC environment, beyond basic indicators of compromise (IOC) integration. We di…
  continue reading
 
In episode 76 of The Cyber5, guest moderator and Nisos Director for Product Marketing, Stephen Helm, is joined by our guest, Dr. Maria Robson, the Program Coordinator for the Intelligence Project of the Belfer Center at Harvard University's Kennedy School. We discuss the evolution of intelligence roles in enterprise and the ultimate path for intell…
  continue reading
 
In episode 75 of The Cyber5, we are joined by Grist Mill Exchange CEO, Kristin Wood. We discuss open source intelligence (OSINT) use in the U.S. public sector, not only with national security but also with the emergency response sectors. We talk about how open source intelligence has evolved in the last ten years and talk about how adversaries use …
  continue reading
 
In episode 74 of The Cyber5, we are joined by Robert Gummer, the Director of the Global Security Operations Center (GSOC) for the National Football League (NFL). First, we talk about how to expand the mission of a global security operations center (GSOC) using open source intelligence. We talk about the role of vendors in the GSOC ecosystem and how…
  continue reading
 
In episode 73 of The Cyber5, we are joined by Snap Finance Chief Security Officer Upendra Mardikar. We discuss how threat intelligence is used in application programming interface (API) security and development security operations (devsecops). Any organization building an application has data or user-generated content as the primary product. Once c…
  continue reading
 
In episode 72 of The Cyber5, we are joined by DoorDash Application Security Manager, Patrick Mathieu. We talk about threat intelligence's role within applications security programs, particularly programs focusing on fraud. We discuss the importance of prioritization between what could happen, as often seen in penetration testing, and what is happen…
  continue reading
 
In episode 71 of The Cyber5, guest Nisos moderator and teammate Matt Brown is joined by security practitioner Matt Nelson. They talk about a recent intelligence blog Matt Nelson wrote about how to operationalize intelligence for the SOC and some outcomes that an incident response team looks for from intelligence. They also talk about how to make in…
  continue reading
 
In episode 70 of The Cyber5, we are joined by Open Source Context Director of Operations, Donald McCarthy. We discuss external telemetry available to the private sector, focusing on passive domain name systems or passive DNS, and Border Gateway Protocol or BGP. These data sets are critical for threat intelligence teams, as they often provide crucia…
  continue reading
 
Join Jason today as he welcomes Dr. Peter McCullough, MD. Dr. McCullough has over 50 peer-reviewed papers and is an extremely credible person in the medical field. You can also watch the video NOT on YouTube (having been censored) but on Jason’s other video sites: JasonHartman.com/Rumble JasonHartman.com/Bitchute JasonHartman.com/Odysee After recei…
  continue reading
 
In episode 69 of The Cyber5, we are joined by Lima Charlie’s CEO, Maxime Lamothe-Brassard. We discuss the future of what's known in the security industry as XDR, which is essentially an enrichment of endpoint detection response products. Three Key Takeaways: 1) What is XDR? Depends who you ask. XDR is not another tool, but merely an extension of En…
  continue reading
 
Today, Jason welcomes geopolitical expert Peter Zeihan to the show today to discuss the ongoing war between Russia and Ukraine. Peter discusses Putin’s motivations, Russia’s demographics and energy exports and if the response from the West will be enough to stop this conflict. What are the short and long term economic and agricultural implications …
  continue reading
 
The legendary Mark Victor Hansen, best selling author, real estate investor and entrepreneur is Jason's guest in today's 10th episode, talking about his new book, Ask!: The Bridge from Your Dreams to Your Destiny. Most people have beautiful dreams deep inside—the things they would like to have, the relationships they’d love to enjoy, and the wellne…
  continue reading
 
In episode 68 of The Cyber5, we are joined by Executive Director and Head of Global Threat Intelligence for Morgan Stanley, Valentina Soria. We discuss leading a large-scale threat intelligence program in the financial institution space and how to make intelligence absorbable by multiple consumers. We also talk about how intelligence teams can buil…
  continue reading
 
Topic: Value of Securing Containers in the Technology Supply Chain In episode 67 of The Cyber5, we are joined by senior security practitioner Julie Tsai. We discuss security and intelligence in modern-day technology platforms, concentrating on how to secure the impact that container and cloud environments have on the technology supply chain. Compli…
  continue reading
 
In episode 66 of The Cyber5, we are joined by H&R Block Chief Information Security Officer (CISO) Josh Brown. In this episode we discuss the importance in building an informed security team that can collect intelligence and proper risk strategy. We have a frank conversation about what the business of security means and how to develop a team that un…
  continue reading
 
In episode 65 of The Cyber5, we are joined by Jon Iadonisi, CEO and Co-Founder of VizSense. Many people think of open-source intelligence (OSINT) as identifying and mitigating threats for the security team. In this episode, we explore how OSINT is used to drive revenue. We talk about the role social media and OSINT play in marketing campaigns, part…
  continue reading
 
In episode 64 of The Cyber5, we are again joined by John Marshall, Senior Intelligence Analyst at Okta. We discuss building a threat intelligence program to protect executives, particularly on nuances of being a “solution-side security company”. We discuss a risk-based approach for protecting executives and the data that's important to aggregate an…
  continue reading
 
Register for the VIRTUAL LIVE Creating Wealth conference on January 28 and 29, 2022.Visit JasonHartman.com today! Meet Jon Ostenson of Franbridge Consulting. Today, he and Jason talk about the world of NON-FOOD franchising and how more and more people are discovering how lucrative owning a franchise can be. Franchising is the better path for many w…
  continue reading
 
Loading …

Hızlı referans rehberi