محتوای ارائه شده توسط Socializing Security. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Socializing Security یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Squid Game is back—and this time, the knives are out. In the thrilling Season 3 premiere, Player 456 is spiraling and a brutal round of hide-and-seek forces players to kill or be killed. Hosts Phil Yu and Kiera Please break down Gi-hun’s descent into vengeance, Guard 011’s daring betrayal of the Game, and the shocking moment players are forced to choose between murdering their friends… or dying. Then, Carlos Juico and Gavin Ruta from the Jumpers Jump podcast join us to unpack their wild theories for the season. Plus, Phil and Kiera face off in a high-stakes round of “Hot Sweet Potato.” SPOILER ALERT! Make sure you watch Squid Game Season 3 Episode 1 before listening on. Play one last time. IG - @SquidGameNetflix X (f.k.a. Twitter) - @SquidGame Check out more from Phil Yu @angryasianman , Kiera Please @kieraplease and the Jumpers Jump podcast Listen to more from Netflix Podcasts . Squid Game: The Official Podcast is produced by Netflix and The Mash-Up Americans.…
محتوای ارائه شده توسط Socializing Security. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Socializing Security یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
In this episode, Milou and Brian discuss the challenges and reflections surrounding job loss, emphasizing the importance of mental health and support during career transitions. They share personal stories and insights on how to navigate the job search process, the significance of networking, and the human element in hiring. The conversation highlights the need for empathy and understanding in both job seekers and hiring managers, encouraging proactive outreach and support for those affected by layoffs. Chapters 00:00 Introduction 01:04 Using Your Job Loss to Help Others 06:32 The Importance of Taking a Break 11:33 Finding Silver Linings in Tough Times 13:56 Using Forced Downtime Wisely 18:19 Building Personal Brands and Freelancing 20:37 The Importance of Mental Health in Job Searching 26:02 Hiring for Potential vs. Experience 32:33 Wrapping Up 34:17 Outro
محتوای ارائه شده توسط Socializing Security. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Socializing Security یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
In this episode, Milou and Brian discuss the challenges and reflections surrounding job loss, emphasizing the importance of mental health and support during career transitions. They share personal stories and insights on how to navigate the job search process, the significance of networking, and the human element in hiring. The conversation highlights the need for empathy and understanding in both job seekers and hiring managers, encouraging proactive outreach and support for those affected by layoffs. Chapters 00:00 Introduction 01:04 Using Your Job Loss to Help Others 06:32 The Importance of Taking a Break 11:33 Finding Silver Linings in Tough Times 13:56 Using Forced Downtime Wisely 18:19 Building Personal Brands and Freelancing 20:37 The Importance of Mental Health in Job Searching 26:02 Hiring for Potential vs. Experience 32:33 Wrapping Up 34:17 Outro
In this episode of Socializing Security, Brian and Milou discuss the complexities and recent changes to the FedRAMP certification process, which is essential for cloud service providers working with the U.S. government. They explore the challenges of compliance, the costs involved, and the implications of the new FedRAMP 20X program aimed at streamlining the certification process. The conversation highlights the balance between maintaining security standards and making it easier for companies, especially startups, to engage with government contracts. Chapters 00:00 Introduction to FedRAMP and Its Importance 02:44 Understanding FedRAMP Certification Levels 04:58 Challenges and Costs of FedRAMP Compliance 09:51 Recent Changes: FedRAMP 20X Overview 16:28 Balancing Security and Efficiency in FedRAMP 21:48 Government Partnering with Industry 26:42 Conclusion and Looking to the Future…
In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountability. This is part two of a special edition episode that follows a tabletop framework where each of us presents our concerns with implementing a data governance strategy as different representatives from organizational units.…
In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountability. This is a special edition two-part exercise that follows a tabletop framework where each of us presents our concerns with implementing a data governance strategy as different representatives from organizational units.…
In this episode, Jack Bailey joins Milou and Brian to share his extensive experience in IT and sales enablement, emphasizing the importance of effective communication in technology. He discusses the role of storytelling in making complex topics more relatable and the significance of data management strategies. The conversation also touches on the evolving nature of privacy and security, the necessity of sales enablement in startups, and the challenges of technical communication. Jack provides valuable insights into how to engage with different audiences and the importance of understanding their needs. MEDDIC - https://meddicc.com/meddpicc-sales-methodology-and-process Tire swing analogy - https://www.smart-words.org/jokes/how-it-projects-really-work.html Chapters 00:00 Introduction 00:37 Introducing Jack Bailey and The Importance of Enablement 05:30 Understanding Sales Enablement 10:05 Using Analogies for Complex Topics 19:00 Frameworks for Effective Communication 25:30 The Case for Sales Enablement 36:48 The Evolving Fight for Privacy and Security 43:14 Reflections 51:30 Outro…
It’s been one year of Socializing Security , and in this special anniversary episode, Brian and Milou reflect on what they've learned—and unlearned—about the evolving world of cybersecurity. From redefining what "security" even means, to unpacking the human element behind most breaches, they explore why security isn’t just a tech problem—it’s a team sport. Tune in as they discuss the shifting role of security across organizations, how privacy and security continue to intersect, and why lifelong learning is essential in this space. Whether you're a seasoned pro or new to the field, this episode offers a thoughtful look back—and a hopeful look forward. Chapters 00:00 Celebrating One Year of Socializing Security 03:02 Defining Cybersecurity: What It Really Means 05:53 Understanding Information Security vs. Cybersecurity 08:53 The Importance of Collaboration in Security 11:52 Lessons Learned: Evolving Perspectives on Security 14:54 The Lifelong Learning Mindset in Cybersecurity 21:33 The Growing Importance of Cybersecurity in Infrastructure 24:20 Understanding Data Management and Recovery 27:23 The Human Element in Cybersecurity 29:27 Challenges for Small Businesses in Cybersecurity 32:29 The Cost of Security Compliance for Startups 35:47 Privacy vs. Security: A Complex Relationship 40:32 Trust and Personal Data Management…
In this episode of Socializing Security, the hosts discuss their experiences at the RSA Conference with guest Bharat Jogi, a seasoned attendee. They explore the evolution of the conference, the importance of networking, and share valuable tips for first-time attendees. The conversation also touches on the role of AI in cybersecurity and the significance of making meaningful connections at such events. Bharat's previous episode: Episode 34 - Researching Threats https://youtu.be/Kfbe_FaYwlc https://www.socializingsecurity.com/e/e034-researching-threats Socialize with Bharat on LinkedIn: https://www.linkedin.com/in/bharat-jogi-3a680b13/ Chapters 00:00 Introduction and RSA Experience 08:11 Making the Most of Conferences 15:50 Evolving Experiences and Technology at Conferences 20:41 Tips for RSAC First Timers 25:42 Reflections on Conference Experiences 28:36 Focusing On The Advantages of In-Person 36:02 Closing Out and Outro…
In this episode, Brian interviews Doug Landoll, a cybersecurity expert and assessment specialist with over 30 years of experience. They discuss the nuances of cybersecurity assessments versus compliance, the importance of continuous improvement in security practices, and common mistakes organizations make. Doug shares insights on navigating maturity models in cybersecurity and the ongoing battle between privacy and security, emphasizing that the fight for privacy is as relevant as we allow it to be. Chapters 00:00 Introduction 06:18 Introduction to Cybersecurity Assessments 11:34 Common Assessment Discoveries 15:34 Validating What You Think You Have 20:10 Understanding Maturity Models in Cybersecurity 22:29 The Intersection of Privacy and Security 25:19 Reflections 26:57 The Importance of Security Assessments 29:14 Cybersecurity Maturity…
In this episode, Brian and Milou socialize with Greg, a Director of IT and Security, discussing various aspects of the IT landscape, particularly in the context of the RSA Conference. They explore the challenges of vendor selection and the importance of building relationships with vendors. The conversation also touches on the cultural shifts within IT organizations, the role of AI in IT support, and the skills needed for hiring in the IT sector. As always, they address the ongoing debate between privacy and security. You can socialize with Greg on LinkedIn: https://www.linkedin.com/in/gregkn Chapters 00:00 Introduction 03:05 The RSA Experience and Mobile Studio Setup 06:18 Introducing Greg Karp-Neufeld and RSAC 07:44 Vendor Selection and Partnership 13:37 Helping Vendors Find the Right Market Fit 16:13 Building IT to Support Employees 24:27 Building IT Teams to Support the Business 35:06 Wrapping Up and the Fight for Privacy 39:01 Reflections 49:20 Outro…
In this episode, Brian and Milou reflect on their experiences at the RSA Conference, discussing the importance of in-person networking, strategic planning, and the spontaneity that comes with attending such events. They share insights on their expectations, the challenges of balancing work and networking, and the excitement of recording live content. The conversation highlights the growth of their podcasting venture and their commitment to continuing to engage with their audience and industry professionals. Chapters 00:00 Introduction to RSA Conference Experience 02:50 Prioritizing In-Person 09:42 Strategic Planning for Conference Attendance 12:20 Spontaneity and Flexibility at Conferences 21:33 Socializing In Person at RSA 28:25 A Year of Socializing Security 33:25 Wrapping up and Outro…
In this episode of Socializing Security, the hosts dive into the question of whether the cloud is safe. They discuss the evolution of cloud security, comparing it to on-premises solutions, and emphasize the importance of understanding the shared responsibility model between cloud providers and users. The conversation also covers different types of cloud services, compliance, and the significance of data control. Ultimately, they conclude that the cloud can be a safer option for data storage and management, provided users are informed and vigilant. And if you've ever wanted to know how The Chum Bucket and leaky buckets relate to cloud security, this is the episode for you. Chapters 00:00 Introduction 02:32 Understanding Cloud Security Practices 09:25 Defining Cloud Types 15:20 Shared Responsibility 19:29 A SpongeBob Reference? 20:08 You Still Need to Secure Data In The Cloud 25:18 Pick Your Clouds Wisely 29:03 Summarizing Cloud Safety 31:52 Outro…
Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes, even yours). This episode breaks down what really gets companies in trouble with telemarketing—and what you can do to stay out of the spammy danger zone. We talk about: - Why marketing compliance is more high-risk than CAN-SPAM implies - What “do not call” really means (and why systems integration matters) - State-by-state surprises (looking at you, Virginia) - Why privacy and marketing compliance are merging fast - How compliance isn’t red tape—it’s proactive guardrails If you’ve ever wondered how many times you can legally call a customer before it’s a lawsuit—or why unsubscribe pages are getting increasingly complex—this one’s for you. Chapters 00:00 Introduction to Telemarketing Compliance 05:29 Proactive Compliance Strategies 05:32 Introduction to Marketing Compliance 08:45 The Role of a Compliance Consultant 11:36 Understanding Marketing Compliance Challenges 14:27 The Importance of Compliance in Telemarketing 17:22 Navigating State and Federal Regulations 20:40 The Impact of Private Right of Action 23:39 Consumer Perspectives on Compliance 29:29 International Compliance Considerations 32:22 The Intersection of Privacy and Compliance 44:05 Understanding Risk in Compliance…
In this episode of Socializing Security, Brian goes SOLO for an episode and breaks down the complex world of cybersecurity, exploring how cyber warfare, espionage, and ransomware are reshaping the digital landscape. From real-world impacts of data breaches to the silent threat of cyber spies, we uncover why your personal security matters more than ever. Tune in as he discusses/rants about: - How ransomware works like a digital hostage crisis - The role of cyber espionage in stealing and manipulating sensitive data - Why everyday people are often the weakest link in information security - How cyber attacks can have serious, even life-threatening, consequences - What you can do today to protect your data and stay safe online If you’ve ever wondered what’s really at stake when you hear about a breach or hack—this episode is your frontline briefing. "You could be the first target. Prevention is key in cybersecurity." Chapters: 00:00 Introduction to Cybersecurity Concepts 01:28 Understanding Cyber Espionage 08:34 The Rise of Ransomware 18:03 Exploring Cyber Warfare 27:33 The Role of Individuals in Cybersecurity…
In this episode of Socializing Security, hosts Brian and Milou discuss the importance of cybersecurity in everyday technology use. They share insights on setting up new devices, the significance of encryption keys, and practical security practices for personal and work devices. The conversation highlights the challenges of modern technology and the need for effective security tools. Links InnoTech Austin: https://www.innotechaustin.com/ Chapters 00:00 Introduction and Podcast Growth 03:25 Community Engagement and Feedback 09:29 Setting Up New Devices 13:24 Security Practices for New Devices 17:42 Device Encryption and Key Management 25:29 The Personal Security Calculus 34:43 Essential Security Tools 39:08 Navigating Communication in a Digital Age…
In this episode, the hosts discuss the recent bankruptcy of 23andMe, exploring the implications for data privacy and genetic testing. They reflect on personal experiences with genetic testing, the risks associated with genetic material, and the ethical considerations surrounding consent and privacy. The conversation highlights the importance of regulation in data privacy, particularly in the context of GDPR and HIPAA. The hosts also emphasize the need for companies to build cyber resiliency and respond effectively to data breaches. Finally, they provide actionable steps for individuals to protect their data and navigate the fallout from the 23andMe situation. Links E026 - Cyber Resilience: https://www.socializingsecurity.com/e/cyber-resilience | https://youtu.be/v5DGxcCHQjo Chapters 00:00 Introduction 02:48 The 23andMe Bankruptcy and Implications 08:26 Consent and Family Privacy in Genetic Testing 12:33 History of 23andMe 17:02 How Companies Respond to a Breach Matters 23:52 Regulatory Protections 28:48 23andMe Customer Action Plans 38:35 Closing 39:31 Outro…
In this episode of Socializing Security, the hosts reflect on their recent experience at the HIMSS conference, discussing the importance of networking in the healthcare sector and the challenges of communicating cybersecurity concepts to medical professionals. They delve into the topic of ransomware, its implications for healthcare, and the need for better understanding among non-technical staff. The conversation also touches on cultural references to compliance and cybersecurity in popular media, emphasizing the significance of edge cases in data breaches. Links: NIST definition of ransomware: https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/ransomware IRAP Glossary: https://www.cyber.gov.au/learn-basics/view-resources/glossary A Golden Girls commentary on healthcare: https://nursingclio.org/2018/09/25/golden-girls-chronic-fatigue-syndrome-and-the-legacies-of-hysteria/ Previous episodes: Episode 21 - Fighting Security Monsters Through Psychology https://youtu.be/G1OASsJRDQc https://www.socializingsecurity.com/e/fighting-security-monsters-through-psychology Chapters 00:00 Intro 00:41 Reconnecting at HIMSS Conference 05:07 Insights from HIMSS 08:39 Communicating Cybersecurity and Compliance 11:41 Ransomware in Healthcare 16:52 Cybersecurity in Popular Culture 23:34 Eye Opening Technology for Security 27:59 Cybersecurity in Unexpected Places 30:50 Bringing a Friend to Conferences 36:11 Building Community in Cybersecurity…
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.
به بهترین برنامه ی پادکست جهان ملحق شوید تا نمایش های مورد علاقه ی خود را در برنامه های اندروید و iOS آنلاین مدیریت کنید و آفلاین پخش کنید. خیلی راحت و کاملا رایگان!