Artwork

محتوای ارائه شده توسط Mary Baird. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Mary Baird یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

356: How to be cybersecurity smart to AI threats - with Richard Hollis

50:17
 
اشتراک گذاری
 

Manage episode 436404066 series 2451791
محتوای ارائه شده توسط Mary Baird. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Mary Baird یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

We’ve been talking a lot about AI (artificial intelligence) this season… And I feel now is an important time to talk about cybersecurity as it relates to AI. More specifically, do you know how hackers are using AI to infiltrate your business or compromise your private company, customer or employee data? It’s time to simplify it.

My special guest today is cybersecurity expert Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. No matter what department you work in (HR, sales & marketing, strategy and especially if you work in an non-IT or cybersecurity function), you need to be up to speed on why hackers do what they do and how to keep your company safe.

Here’s how.

My special guest today is Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. We tackle and simplify all aspects of it, including:
  • That “all hacking boils down to three objectives.” What they are and why they want that access inside your organization.

    • To change a config

    • Upload a program, or

    • Get physical access to change a config or upload a program

  • What the best advice is that he gives his clients to help them take cybersecurity seriously and put a crisis management plan in place.

  • What the 6 stages are that you need to consider when building a Cyber Incident Response Plan:

    • Preparation

    • Identification

    • Containment

    • Eradication

    • Recovery

    • Lessons Learned

      • NOTE: Build this plan *before* you get hacked.

  • The best practices and strategies that mid-size businesses are utilizing today to keep their business IT systems as well prepared as possible to fight against hackers, includes:

    • Conducting risk assessments

    • Build information security policies

    • Ensure all employees and contractors get regular cybersecurity training

  • …and ultimately, he shared his insights on how he anticipates cyber criminals to use AI to hack your systems in the coming months ahead and what you can do to prevent this.

Q: Are you ready to learn how to be cybersecurity smart to AI threats? If yes, this one is for you.

It’s time to #DoTheThing!

----

Show notes available with all links mentioned here:https://www.thesimplifiers.com/posts/356-how-to-be-cybersecurity-smart-to-ai-threats---with-richard-hollis

  continue reading

503 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 436404066 series 2451791
محتوای ارائه شده توسط Mary Baird. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Mary Baird یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

We’ve been talking a lot about AI (artificial intelligence) this season… And I feel now is an important time to talk about cybersecurity as it relates to AI. More specifically, do you know how hackers are using AI to infiltrate your business or compromise your private company, customer or employee data? It’s time to simplify it.

My special guest today is cybersecurity expert Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. No matter what department you work in (HR, sales & marketing, strategy and especially if you work in an non-IT or cybersecurity function), you need to be up to speed on why hackers do what they do and how to keep your company safe.

Here’s how.

My special guest today is Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. We tackle and simplify all aspects of it, including:
  • That “all hacking boils down to three objectives.” What they are and why they want that access inside your organization.

    • To change a config

    • Upload a program, or

    • Get physical access to change a config or upload a program

  • What the best advice is that he gives his clients to help them take cybersecurity seriously and put a crisis management plan in place.

  • What the 6 stages are that you need to consider when building a Cyber Incident Response Plan:

    • Preparation

    • Identification

    • Containment

    • Eradication

    • Recovery

    • Lessons Learned

      • NOTE: Build this plan *before* you get hacked.

  • The best practices and strategies that mid-size businesses are utilizing today to keep their business IT systems as well prepared as possible to fight against hackers, includes:

    • Conducting risk assessments

    • Build information security policies

    • Ensure all employees and contractors get regular cybersecurity training

  • …and ultimately, he shared his insights on how he anticipates cyber criminals to use AI to hack your systems in the coming months ahead and what you can do to prevent this.

Q: Are you ready to learn how to be cybersecurity smart to AI threats? If yes, this one is for you.

It’s time to #DoTheThing!

----

Show notes available with all links mentioned here:https://www.thesimplifiers.com/posts/356-how-to-be-cybersecurity-smart-to-ai-threats---with-richard-hollis

  continue reading

503 قسمت

ทุกตอน

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع