Live on Cyber

Auteur(s): Dr. Stan Stahl and Julie Morris
  • Résumé

  • Join SecureTheVillage founder and President Dr. Stan Stahl and thought leader Julie Morris as they riff on cybersecurity and privacy complexities, share actionable tips for businesses, boards, and a safer day-to-day digital experience.
    Dr. Stan Stahl and Julie Morris
    Voir plus Voir moins
activate_Holiday_promo_in_buybox_DT_T2
Épisodes
  • 56: "Business is more afraid of the sheriff than the cybercriminal."
    Feb 24 2024

    OH NO. "Business is more afraid of the sheriff than we are the cybercriminal." Overheard in our ongoing LACybersecure work from an attendee.  
    The point of entry isn't HELP - It's getting into TROUBLE. 
    What are we DOING??  
    For SMBs, the cavalry isn't coming. Even after a crime, the sheriff is going after the criminals. Don't count on asset recovery. 
    You have to take your security seriously, and get the guidance you need. If you're in Los Angeles, apply today to join us in our #LACybersecure pilot program for SMBs, nonprofits, IT-MSPs.  
    Outside of L.A.? The Cyber Readiness Institute's free, online program is designed to help small and medium-sized enterprises become more secure against today’s most common cyber vulnerabilities.

    As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on the complexities of cybersecurity and privacy.

    SecureTheVillage is a proud recipient of the CIS Alan Paller Laureate Program, funding our LA Cybersecure Pilot. Learn more about how SecureTheVillage is working to make Los Angeles the cyber-safest metropolitan area in America for our small and midsize businesses, our nonprofits, and our families.

    SecureTheVillage: ⁠⁠https://securethevillage.org/⁠⁠ ⁠Take the Test: ⁠How Hackable are you?⁠⁠

    Voir plus Voir moins
    15 min
  • 55: Do you have something cybercriminals want?
    Feb 10 2024

    “For every complex problem there is an answer that is clear, simple, and wrong.” - H.L. Mencken We humans want simple solutions to complex problems.

    It's built into our neurology.

    And it makes it harder to manage cybersecurity.

    The computer and telecommunications revolution that we’re in the middle of is upending our world.

    A simple cybercrime example:

    In the old days at the end of the last century, if a criminal wanted to rob a bank, the criminal had to go to the bank.  No more.

    Now the criminal can steal money from people’s bank accounts over the Internet from anywhere in the world.

    Complex problems don’t get solved, they get managed.


    Let’s take a step back and ask what we can do to manage our security and privacy; in our homes, in our places of work, in our schools, and throughout our community.

    As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on the complexities of cybersecurity and privacy.

    Please join us at: https://securethevillage.org/ Mentioned in the Episode: ⁠How Hackable are you?⁠ FREE SURVEY

    Voir plus Voir moins
    10 min
  • 54: When policy is YEARS behind today's digital world
    Feb 3 2024

    “Unfortunately, the technology underpinning our critical infrastructure is inherently insecure because of DECADES of software developers NOT BEING HELD LIABLE for defective technology. That has led to incentives where FEATURES and SPEED to market have been prioritized AGAINST SECURITY, leading our nation VULNERABLE to cyber invasion. That has to stop,” Jen Easterly, CISA

    The policy we need is YEARS behind the current technology, and utterly inadequate to protect citizens against threats and scams.

    We lack protections and bear the brunt of the damage.

    Two clear examples -

    1: SIM swapping.

    A bad actor was able to convince a telecommunications store to transfer a phone number to a new device by impersonating the owner. This allowed the criminal to:

    - Access private account information and steal money.

    - Gain all those 2FA codes sent via text message.

    - Gain access to their social media accounts, email accounts... what other apps are on your phone?

    Should telecom companies be held responsible for failures that enable financial crimes?


    2: Deepfakes and nonconsensual graphic images.

    The growing threat of manipulated media - widespread technology usage to generate fake but realistic graphic images and no legal consequences.

    While Taylor Swift's massive fan base is championing federal penalties for these deepfake images, we drag our feet in spite of the urgent need for policy reforms to protect individuals from harmful uses of emerging technologies that currently have little oversight.

    Listen to this 15-min episode of #LiveOnCyber with Stan Stahl, PhD and Julie Michelle Morris and let's talk today's problems and potential solutions.

    Voir plus Voir moins
    12 min

Ce que les auditeurs disent de Live on Cyber

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.