Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
محتوای ارائه شده توسط Security Management and ASIS International. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Security Management and ASIS International یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
با برنامه Player FM !
July 2024: Fakes, Frauds, and How Preparedness Pays Off
Manage episode 426545823 series 117025
محتوای ارائه شده توسط Security Management and ASIS International. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Security Management and ASIS International یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
If you were publicly depicted in a compromising position—even if the depiction is fake—it can result in emotional trauma. Bruce Blythe from R3 Continuum explains how to prepare to support victims of deepfakes. Glenn Schoen from Boardroom@Crisis shares how counterfeiting and fraud affect food and beverage companies worldwide. Security can help protect brand reputation by partnering with other teams, including marketing and consumer relations. Then, Ontic CSO Chuck Randolph and SM Highlights host Brendan Howard discuss converged risk—from cyber to site security to geopolitics—and what it means for event security and close protection. Additional Resources Learn about deepfake crimes and crisis management in Security Management’s June coverage here: https://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/ How should you adjust your crisis management plans to fit deepfake threats? https://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/crisis-preparedness-plan/ Learn about food fraud and counterfeiting here: https://www.asisonline.org/security-management-magazine/articles/2024/06/food/ What’s the difference between food safety, food defense, and food fraud? Watch this SM Fast Facts video for a quick primer. https://youtu.be/cDrYcXrtsLg How are major utilities and critical infrastructure firms preparing for converged threats? https://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/ How are converged risks and asymmetric threats affecting event security and situational awareness? Read Chuck Randolph’s July 2024 article here: https://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/emerging-technology-asymmetric-threats/ For more about extremism and geopolitical risk, see SM’s January 2024 coverage here: https://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/
…
continue reading
173 قسمت
Manage episode 426545823 series 117025
محتوای ارائه شده توسط Security Management and ASIS International. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Security Management and ASIS International یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
If you were publicly depicted in a compromising position—even if the depiction is fake—it can result in emotional trauma. Bruce Blythe from R3 Continuum explains how to prepare to support victims of deepfakes. Glenn Schoen from Boardroom@Crisis shares how counterfeiting and fraud affect food and beverage companies worldwide. Security can help protect brand reputation by partnering with other teams, including marketing and consumer relations. Then, Ontic CSO Chuck Randolph and SM Highlights host Brendan Howard discuss converged risk—from cyber to site security to geopolitics—and what it means for event security and close protection. Additional Resources Learn about deepfake crimes and crisis management in Security Management’s June coverage here: https://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/ How should you adjust your crisis management plans to fit deepfake threats? https://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/crisis-preparedness-plan/ Learn about food fraud and counterfeiting here: https://www.asisonline.org/security-management-magazine/articles/2024/06/food/ What’s the difference between food safety, food defense, and food fraud? Watch this SM Fast Facts video for a quick primer. https://youtu.be/cDrYcXrtsLg How are major utilities and critical infrastructure firms preparing for converged threats? https://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/ How are converged risks and asymmetric threats affecting event security and situational awareness? Read Chuck Randolph’s July 2024 article here: https://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/emerging-technology-asymmetric-threats/ For more about extremism and geopolitical risk, see SM’s January 2024 coverage here: https://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/
…
continue reading
173 قسمت
Alle episoder
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.