Improving security without impeding the war fighter's mission is the topic of discussion between our host Dr. Shawn Murray, and today's guest, Patrick Laverty. Today's remarkably candid conversation reveals some high points and exciting deficiencies experienced by our two interlocutors. We hope you enjoyed this show and some insight into what is usually a closed conversation on mission-critical security for the warfighter. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security ...
Aug 02, 2022•34 min•Transcript available on Metacast Our guest, Larry Karisny, talks with our host Tim Montgomery about what will become of current security practices once quantum computing capabilities are mainstream. We have explored both sides of this relatively new topic over the past couple of years. Firstly, what things can be broken once quintom computing is around. Secondly, is this something near enough in the future that we should be worried about it. After today’s show, we will let you be the deciding factor. Is quantum a big scare to y...
Jul 26, 2022•35 min•Transcript available on Metacast Our next installment of the IEEE Blockchain for Transactive Energy explores the need for uniformity to make next-generation energy possible. Today, guest Claudio Lima Ph.D. founder of the Blockchain Engineering Council BEC- and chair for IEEE global Standards, talks about standardization efforts. Listen as he defines the different segments where silos exist, which uniform standards need to address. Aggressive targets for renewable energy capability set by governments worldwide will eventually re...
Jul 19, 2022•30 min•Transcript available on Metacast Out host, Christopher Gorog, and today's guest Sachin Shah, have some great dialog on the next generation's needs for IoT Security. Sachin Shaw is from ARMIS, one of the leading-edge technology trailblazers for industrial IoT digital transformation. This exciting conversation is about what's next for industrial controls cybersecurity. Our guest tells us the importance of applying security practices before they become security standards through knowing your technology. Sachin Shah talks about hav...
Jul 12, 2022•34 min•Transcript available on Metacast Welcome to today's episode of the New Cyber Frontier podcast; today, our guest Timothy Montgomery discusses the opportunities available to engage in education for cybersecurity with online resources and the best practices for teaching cyber topics. Today's guest in this discussion is Mohammed Alani, a cybersecurity expert in supply chain technologies. There is a lot of knowledge about workplace education responsibilities in this episode of NCF. Visit our sponsors: BlockFrame Inc. SecureSet Acade...
Jun 29, 2022•50 min•Transcript available on Metacast Our host, Christopher Gorog, talks with today's guest, Diego Kaminker, about cybersecurity in the healthcare industry. Communication on terminology and standards between hospitals is required to ensure secure systems. Listen in as we discuss the current issues with individual rights to privacy and healthcare needs. We hope you enjoy this episode of New Cyber Frontier! Visit our sponsors: BlockFrame Inc. SecureSet Academy Murray Security Services...
Jun 15, 2022•32 min•Transcript available on Metacast Our host, Shawn Murray, talks with today’s guest Tony Muiccio about his experience with machine learning and its impact on cybersecurity. In the world of progressively bigger data, machine learning algorithms have become an indispensable tool for piecing together vital information to be found, where humans by themselves could never find such patterns. As current events unfold in Ukraine, the conversation of cyber threat protection and the potential dangers and uses of machine learning are at the...
Jun 08, 2022•32 min•Transcript available on Metacast Our host, Timothy Montgomery, talks with today's guest, Holger Spohn, about the ever-growing cybersecurity needs and how we look to solving cyber problems as a culture. In addition, Holger discusses the new intricacies in the internet age as individuals come back from the pandemic with new strategies for malicious acts. It is vital to ensure that we adapt to these ever-growing changes in the virtual age. We hope you enjoy this episode of New Cyber Frontier! Visit our sponsors: BlockFrame Inc. Se...
May 24, 2022•43 min•Transcript available on Metacast Today, our guest, Robert Wood, CISO at Centers for Medicare & Medicaid Services, which is under the Health and Human Services department of the Federal Government, has a unique closing plea. Everyone in the Cybersecurity industry should embrace empathy for their users. So often, users are expected to perform many tasks to keep secure, but these do not support their work and often make their jobs more difficult. Hear how HHS is adopting a focus on the culture to become focused on the customer. Ho...
May 17, 2022•36 min•Transcript available on Metacast In this episode, Dr. Shawn Murray interviews Katie Adams, a Senior Director for Safal Partners, on a U.S. Department of Labor (USDOL) national industry intermediary contract to expand apprenticeship in cybersecurity and the tech industry. Katie is a USDOL-recognized subject matter expert (SME) in apprenticeship and workforce development. Previously, Katie provided workforce and marketing SME and technical assistance on several USDOL and National Science Foundation contracts and grants over 11 ye...
May 17, 2022•33 min•Transcript available on Metacast We continue our IEEE Blockchain series with a Healthcare and AI episode. Today's Guest, Tavpritesh Sethi, is an expert researcher in Computational Biology and Data for Predicting Critical Health Conditions. As the pandemic showed us, wide ranges of data from across the population are valuable to predicting and reducing impact in pandemics, but how do we balance that with the patients' privacy rights. Dr. Sethi explains some of the leading research using the Decentralized and Federated capabiliti...
May 02, 2022•32 min•Transcript available on Metacast Our host, Shawn Murray, talks with today’s guest, Eric Kant, about command and control systems within the emergency services industry and the use of what he calls “no code, low code.” Kant describes “no code, low code” to be the ability to build computer functions and programs without going into programming directly by using a drag and drop environment. The ability to give each client their own personalized program comes from such capabilities of newfound human resources that may not be capable ...
Apr 25, 2022•32 min•Transcript available on Metacast Our host, Christopher Gorog, talks with today's guest, Taylor Merry, about the cybersecurity involved with transport logistics. Taylor discusses the process of tackling the problem of information unavailability and tracking of goods as they go onto each leg of their journey. As transport logistics is an industry that still heavily relies on physical paper in a virtual age, it is vital to ensure that digitizing information is done securely. We hope you enjoy this episode of New Cyber Frontier! Vi...
Apr 19, 2022•27 min•Transcript available on Metacast Tom Alrich is a consultant in Cybersecurity for the Electric Power Industry. Today’s show talks about the possible worst-case cyber attack on the electric grid. Tom talks about imaginary vs. real threats and what these mean to the industry. In addition, our guest spends some time explaining what the presidential orders on the electric grid mean for cybersecurity practitioners. Listen today to find out about a great blog to follow and some insight about critical infrastructure security. Visit our...
Apr 11, 2022•32 min•Transcript available on Metacast Today, our guest David Kruger has a self-proclaimed contrarian view of cybersecurity and how to accomplish cybersecurity overall. He says that he likes to look at the underbelly of the problem and the mathematics behind cybersecurity issues in ways many tend not to look. David’s passion lies in designing cybersecurity, and his perspective tends toward how the cyber world could be different from what it is today. David pulls back the misteak and perceived ‘magic’ of technology to discuss the real...
Apr 05, 2022•33 min•Transcript available on Metacast Welcome back to another edition of the New Cyber Frontier. Our host, Dr. Shawn Murray, interviews Blake Marvin, the owner and founder of Avajen, LLC, based in Colorado Springs, Colorado. Listen as they discuss Blake’s background in technology and what he has learned along the way in providing advice and quality service in the tech industry as a technician, later as a CTO for a startup, and now as an entrepreneur running a Managed Service Provider company who he founded with his wife, Jennifer. I...
Mar 28, 2022•34 min•Transcript available on Metacast This week, host Chris Gorog interviews Gora Datta, the founding member of HL7 mobile health. This conversation is packed full of interesting perspectives from IEEE healthcare and the world of emerging technologies. The exciting matter of emerging technologies is not to take lightly – from A.I. or simpler machine learning algorithm designs to blockchain and quantum computing. However, there is an ever-present danger to blindsight us on what is possible and miss out on the most crucial focus path:...
Mar 21, 2022•33 min•Ep 292•Transcript available on Metacast Our Guest Bill Alderson has taken an independent look a the SolarWinds breach and provides a detailed look into the attack sequence. Bills paper called "SolarWinds Breach – December 2020 a Comprehensive Paper" walks us through the series of events surrounding the highly publicized breach. This very colorful conversation is an excellent high-level look at the most important things you will need to know to identify how this may have affected you or your organization. Next, we unpack the breach, di...
Mar 14, 2022•35 min•Transcript available on Metacast In this episode of New Cyber Frontier, our host Tim Montgomery talks with today's guest, Amichi Shulman, about man the middle attacks and how companies can keep their employees secure. Everyday systems are at more risk than many think. From bot-nets to phishing, we are in a world of ever-increasing connectivity, and with that comes a more considerable risk for malicious activity. Amichi Shulman has an interesting perspective about securing your company's devices. If you have a small company, you...
Mar 08, 2022•37 min•Ep 290•Transcript available on Metacast Join us for another episode of the New Cyber Frontier with Dr. Shawn Murray. He interviews his friend and special guest Pamela Fusco, the new Chief Information Security Officer at Splunk and the Chief Financial Officer at the Information Systems Security Association! Dr. Murray and Ms. Fusco will discuss her background from the time she spent as a cryptologist in the U.S. Navy, her history as a contributing board member at ISSA, the new start-up she founded earlier this year protecting your pet ...
Feb 28, 2022•32 min•Ep 289•Transcript available on Metacast Our guest talks about micro-segmentation, the implementation of firewall protection divided into tiny segments of your network; this is done by minimizing your firewall rulesets to one or a minimal set of computers. He describes why he is excited about security working for large banking institutions. Micro-segmentation supports zero-trust security models, which is also a subject on today's show. This show will pique the interest of technical network administrators out there. We hope you enjoy th...
Feb 21, 2022•31 min•Transcript available on Metacast Our host, Tim Montgomery, had the opportunity to speak with a guest, an Assistant Chair at the Leads School of Business at the University of Colorado. Our show looks at Blockchain Technologies from the business point of view. Dr. Lacek has spent a lot of time and written his Dissertation on the “Definition of Blockchain.” This very relevant and timely topic is something that many people wonder about as we hear different definitions from almost every article or researcher. The case studies show t...
Feb 14, 2022•39 min•Transcript available on Metacast Today's guest has a unique team-building method by finding out whether the team member's personality meets the organization's needs. He explains that the people will always be the challenge, as you can continually update technology and processes, but people are the determining factor. The discussion is on how finding the "We" and "Us" type team member makes a better performing team than the "I" and "Me" type team members. A CISO needs to be more of a team leader than a manager. Individualized ap...
Feb 07, 2022•32 min•Ep 286•Transcript available on Metacast This next episode of IEEE Blockchain for Transactive Energy defines and explains the participatory grid. Our guest, Dr. Farrokh Rahimi, Executive Vice President with Open Access Technology International, goes through an exciting insider history for energy trading. Will we ever get to the point where each person trades energy for themselves? It could be the case, as we open up for transactive power between distributed energy providers, anyone with an electric car or renewable battery banks can pa...
Jan 31, 2022•33 min•Transcript available on Metacast Today's show is about overexposure on the internet; as companies provide more business, those services offered make them easier to find and exploit. As a result, malicious agents can scrape the internet and companies' networks to learn more about them than they would often like to be known. Combatting overexposure is a massive undertaking, and companies always find higher priorities; thus, the picture worsens. Our host says that business growth through M&A is a significant culprit leading to unk...
Jan 25, 2022•36 min•Transcript available on Metacast Today we hear from Doug Britton at Haystack , who has come up with a great approach that tells us whether a candidate will be successful in a cybersecurity career. The CATA (Cyber Aptitude and Talent Assessment) relates to cognitive skills in various cybersecurity practices and jobs. This is excellent for job seekers and hiring managers alike. Doug brings student Maria Marquez , who explains her experience and how results were successful. We also demonstrate correlations between NICE (National I...
Jan 17, 2022•34 min•Transcript available on Metacast Today’s show is about the secure development of software, known as DevSecOpps, as our guest calls it. We look at how to secure software from the perspective of someone trying to break it. Our Guest Ted Harrington has a background as a “Hacker” but has now turned from the dark side of the force to use his skills to help develop secure software. Ted has published a book called “Hackable.” After having the same conversation for years, Ted says the same ten categories kept coming to the top, and in ...
Jan 10, 2022•32 min•Transcript available on Metacast Today, we have an exciting episode, the second part of our "Year in Review," where we look forward to what to expect in 2022. We bring back our panel from the first show, representing our user listener engagement selected panel. All four of our hosts join to discuss with our forum and provide some insights of their own. You may be surprised to hear the common themes our guest brings up for 2022, but you will not be able to deny that they will impact us in the coming year. As post-pandemic uncert...
Jan 03, 2022•30 min•Transcript available on Metacast Today's special "Year in Review" episode brings back our guests from the top-performing shows of 2021 in a roundtable format. This is the first of two parts to this series, where we recap the highlights of what was the most impactful for the year 2021. All four of our hosts join to discuss with our panel and provide some insights of their own. The overwhelming theme that has emerged is the transition to focus on security for critical infrastructure; our guests selected by listener engagement see...
Dec 29, 2021•42 min•Transcript available on Metacast In this segment of the NCF, Dr. Murray discusses with Bob Zinga. The latter is the Director of Information Security at Directly and an Information Warfare Officer for the United States Navy Reserve in San Francisco. Bob and Shawn discuss the similarities and differences related to the security culture between both roles. In addition, Bob explains how a security leader needs to communicate to multiple audiences on the commercial side and how that can impact how security is perceived. To be succes...
Dec 13, 2021•32 min•Transcript available on Metacast