エピソード

  • BONUS: BCP LIVE on Rendezvous Yacht II
    2024/10/18

    SESSION TITLE: BCP LIVE on Rendezvous Yacht II
    RECORDED: 9/26/24
    VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/
    LOCATION: Philadelphia, PA
    GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia
    SPONSOR: Philly Tech Council

    ABOUT GUESTS:​
    Damian Oravez
    is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previously served as the CISO for the Philadelphia International Airport for five years, where he honed his skills in monitoring and securing a vast array of technological systems in both the public sector and critical infrastructure.

    Jessica Hoffman plays a pivotal role in Philadelphia's cybersecurity landscape, working side by side with Damian Oreves. With experience in both private and public sectors, Jessica brings a comprehensive understanding of cybersecurity and is keenly focused on safeguarding citizens and workforce digital environments. Her expertise encompasses both tactical implementation and strategic oversight, demonstrating her dedication to making a difference in her community.

    Key Takeaways:
    Scrutinizing the broad scale of city-level cybersecurity necessitates efficient, automated asset inventory management.

    • The public sector is distinctly impacted by regulatory entities, and cybersecurity officers uphold a crucial role in maintaining not only digital safety but also public trust.
    • Engaging with city departments on cybersecurity imperatives fosters greater buy-in and alignment with defensive measures.
    • The team stresses balancing innovation with caution, especially in the realm of emerging technologies like AI, to maintain operational security.
    • There is inherent cultural importance in municipal service roles, reflecting a deeper connection to meaningful cybersecurity contributions.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    18 分
  • Leading Edge
    2024/10/17

    Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she shares her holistic approach to leadership. A distinguished speaker and thought leader in the Philadelphia cybersecurity community, Klotz actively engages with various initiatives and forums to inspire future leaders.

    Her book highlights 25 essential qualities for leaders across any industry. Focusing on traits like empathy, grace, and self-awareness, the book underscores the growing importance of these soft skills in building resilient, high-performing teams—crucial to modern leadership. The "TTIPPC" Framework emphasizes the need for transparency, inclusion, and consistency in fostering united and productive teams. Through engaging career stories, Klotz offers valuable insights into navigating professional challenges while balancing personal life with a compassionate and determined leadership approach.

    TIMESTAMPS:
    0:16 - Leading With Empathy and Building High-Performing Teams
    2:18 - Cybersecurity Leadership Across Industries and Unique Challenges
    7:15 - Balancing Leadership, Family, and Community Involvement
    17:02 - Empathy and Grace: Essential Leadership Qualities for Success
    25:03 - Building High-Performing Teams Through Positive Energy and Collaboration
    37:04 - Leading With Empathy and Grace Through the TTIPPC Framework
    45:25 - Cybersecurity Conversations and Creative Bar Concepts

    SYMLINKS
    Leading with Grace and Empathy - https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573
    URL where Tammy Klotz's book Leading with Empathy and Grace is available for purchase.

    LinkedIn - https://www.linkedin.com/in/tammyklotz/
    Platform where Tammy Klotz is available for professional networking.

    Redstone Grill - https://redstonegrill.com
    Tammy's go-to restaurant in Plymouth Meeting,PA with a great atmosphere and outdoor patio. Frequently used for professional dinners and happy hours.

    Trinseo - https://www.trinseo.com
    Tammy’s current employer, where she is focused on improving the cybersecurity program with a particular emphasis on OT security.

    DRINK INSTRUCTION
    Empathy Elixer
    2 oz Bourbon
    1 oz Elderflower Liqueur
    1/2 oz Lemon Juice
    Dash of Bitters
    Optional: Lemon Twist
    Combine all ingredients in a shaker with ice. Shake thoroughly, then strain into a glass. Optionally, garnish with a lemon twist.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    49 分
  • Cyborg
    2024/10/07

    Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era.

    Len shares his personal and professional evolution, describing the cutting-edge technologies that allow him to boost human abilities through cybernetics. He explores the future of biohacking, touching on the legal, ethical, and social questions raised by integrating tech into our bodies. From the potential security risks to the thrill of becoming a cyborg, Len offers a clear look at a future where technology and humanity are more closely connected than ever before.

    TIMESTAMPS:
    0:16 - Exploring Transhumanism and Cybersecurity with Len, the Transhumanist Hacker
    5:24 - A Gen Xer’s Journey Through the Evolution of Computers
    12:01 - From Outlaw to Cybersecurity: A Journey of Transformation
    19:05 - Exploring Transhumanism and Its Philosophical Divergence
    21:49 - Pioneering Biohacking and Implantable Technology Innovations
    35:53 - The Painful Process of Implant Procedures Without Anesthesia
    39:54 - Body Modification and the Search for a Skilled Mechanic
    42:43 - Advanced Implant Technology for Security and Cyber Attacks
    52:23 - The Future of Augmented Humans and Technological Integration
    1:06:10 - Unique Bars, Cybersecurity Themes, and Signature Drinks

    SYMLINKS
    Dangerous Things - https://dangerousthings.com
    Website where Len purchased implantable technology for biohacking.

    Grindhouse Wetware - https://en.wikipedia.org/wiki/Grindhouse_Wetware
    Historical reference to the pioneering group that developed consumer-grade implantable technology and led the biohacking movement.

    Pineapple Tangaroa (Body Mechanic) - https://www.austintattoo.com/pineapple-tangaroa.html
    Pineapple is Len's body mechanic based in Austin, TX, specializing in body modifications like RFID and NFC implants.

    Magnavox Odyssey 2 - https://en.wikipedia.org/wiki/Magnavox_Odyssey%C2%B2
    Len’s first gaming system, sparking his curiosity in technology.

    Newsweek Article (Tesla Key Implant) - https://www.newsweek.com/man-implants-chip-unlock-tesla-wave-1478879
    Newsweek published an article about Pineapple Tangaroa implanting a Tesla car key into a human.

    FM-2030 (Cryonics Pioneer) - https://en.wikipedia.org/wiki/FM-2030
    FM-2030 was a key figure in the cryonics movement and transhumanism.

    Rich Lee (DIY Cyborg) - https://golden.com/wiki/Rich_Lee_(Biohacker)
    Rich Lee is known for his biohacking experiments, including magnetic ear implants and the Lovetron 9000 device.

    RSA Conference - https://www.rsaconference.com
    One of the major cybersecurity conferences where Len has presented.

    DEF CON (Biohacking Village) -

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    1 時間 10 分
  • BarCode @ Barcode 2 LIVE
    2024/08/16

    In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.

    The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.

    As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.

    TIMESTAMPS:
    00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey
    04:17:00 - AI's Impact on Job Automation and Cybersecurity
    09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation
    17:29:00 - The Future of AI: Security, Ethics, and Human Impact
    28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes
    34:05:00 - The Future of Humanity and AI Integration

    SYMLINKS
    BarCode Security: https://barcodesecurity.com/
    BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/
    X Foundation: https://xfoundation.org/
    Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/
    ThreatLocker: https://www.threatlocker.com/
    Exploit Security: https://www.exploitsecurity.io/
    Ironwood Cyber: https://www.ironwoodcyber.com/
    Sevn-X: https://www.sevnx.com/
    The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
    TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs
    Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/
    OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing
    AI Trust Council: https://aitrustcouncil.org/
    VFX Los Angeles: https://vfxlosangeles.com/
    Inspira AI: https://inspira.ai/
    PsyberLabs: https://psyber-labs.com/

    DRINK INSTRUCTION
    Keep it 100
    1 oz Captain Morgan 100 proof
    1/2 oz Coffee Liqueur
    1/4 oz Simple Syrup
    1 ½ oz Espresso
    Add all ingredients to a shaker and shake. Strain into a coupe glass.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    48 分
  • Paradox
    2024/08/07

    A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.

    We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.

    TIMESTAMPS:
    00:16:00 - Navigating the AI Paradox: Innovation and Danger
    07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate
    12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon
    19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development
    26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape
    31:36:00 - AI’s Impact on Jobs and Cybersecurity
    38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions
    41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in Vegas

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/
    ConnectCon: https://www.connectcon.world/
    C&C Generative AI Policy -

    DRINK INSTRUCTION
    m.AI t.AI
    1 1/2 oz White Rum
    3/4 oz Orange Curacao
    3/4 oz Lime Juice
    1/2 oz Orgeat Syrup
    1/2 Dark Rum
    Add the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    44 分
  • War Machine
    2024/06/12

    Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust.

    The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, and the risks of rapid AI development. Chris explains the concept of Artificial General Intelligence (AGI) and its potential to reshape human existence, emphasizing the need for regulated and ethically aligned AI systems. He also highlights the AI Trust Council's mission to promote a pro-human future amidst technological advancements. This discussion provides listeners with a comprehensive, and often not heard, understanding of the challenges and opportunities in the AI landscape.

    TIMESTAMPS:
    00:00:00 - Chris Wright’s Mission to Combat AI Corruption
    00:04:39 - The Future of AI and Its Societal Implications
    00:14:12 - The Impending Impact of AI and the Singularity
    00:19:10 - Political Corruption and Corporate Influence in AI Legislation
    00:21:10 - The Psychological Impact of AI Relationships and Their Realism
    00:24:00 - The Impact of Chatbots on Mental Health and Society
    00:27:08 - Tech Engineers’ Fascination with AI’s Potential World-Ending Future
    00:28:25 - AI-Driven Drone Warfare and Its Rapid Evolution
    00:32:44 - Building Trust in AI Through a Pro Human Network
    00:40:41 - Exploring AI, Vegas Venues, and Cybersecurity-Themed Bars

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/christopherwrightaitc/
    AI Trust Council: https://www.theaitc.com/

    DRINK INSTRUCTION
    Fallen Angel
    2 oz Dry Gin
    1 oz Lemon Juice
    2 tsp Creme De Menthe
    2 tsp Simple Syrup
    2 dashes Aromatic Bitters
    Combine all ingredients in a shaker with ice. Shake well for 15-20 seconds for maximum chill, and then strain into a cocktail glass. Optionally, garnish with mint.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    43 分
  • Human Element
    2024/05/09

    Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecurity, is widely recognized and respected. In addition to her corporate achievements, Dr. Barker has also recently been honored with an MBE (Member of the Order of the British Empire) for services to cybersecurity, cementing her status as a leading voice and advocate in the field.

    Our discussion focuses on the human element of security breaches and the importance of cultivating a culture of cybersecurity awareness within organizations. Dr. Barker shares her journey into the world of cybersecurity and discusses the evolving landscape of cyber threats, including the use of AI by cybercriminals for social engineering and deepfake technology. We highlight the significance of leadership commitment and values congruence in cultivating a robust cybersecurity culture. The effectiveness of gamification in training, a practical aspect, is also explored. The segment concludes with a personal touch, as Jessica shares her experience of receiving an MBE at Windsor Castle from Prince William. She then provides insights on her new book "Hacked: The Secrets Behind Cyberattacks".

    TIMESTAMPS:
    00:02:53 - From Civic Design to Cybersecurity: A Human-Centric Journey
    00:06:21 - AI's Escalating Role in Cybercrime and Social Engineering
    00:09:18 - Strategies for Enhancing Digital Critical Thinking
    00:13:00 - Cultivating Successful Cybersecurity Cultures in Organizations
    00:16:57 - Rethinking Security Culture and Training Effectiveness
    00:20:27 - Dreamlike Investiture: Receiving an MBE from Prince William
    00:22:15 - Royal Recognition for Cybersecurity Expertise
    00:25:40 - Demystifying Cybersecurity Through Engaging Stories and Practical Advice
    00:31:20 - Discovering Local Vegas Gems and Cybersecurity Bar Concepts

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/jessica-barker/
    Twitter (personal): https://twitter.com/drjessicabarker
    Twitter (organization): https://twitter.com/CygentaHQ
    Cygenta (company): https://www.cygenta.co.uk/
    Hacked: The Secrets Behind Cyber Attacks (book): https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703
    Las Vegas Arts District (location): https://dtlvarts.com/

    DRINK INSTRUCTION
    Purple Haze
    2 oz Gin
    1 oz Violet Liqueur
    1 oz Fresh Lemon Juice
    1/2 oz Honey Syrup
    1 Dash Orange Bitters
    Combine all ingredients in ashaker with ice. Shake well and straininto a chilled glass. Optionally, garnishwith a twist of lemon peel or a sprig of lavender.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    35 分
  • BONUS: BCP LIVE at WiCys Career Fair II
    2024/05/08

    SESSION TITLE:WiCys Delaware Valley Career Fair II
    RECORDED: 4/25/24
    VENUE: Chestnut Hill College - www.chc.ed
    LOCATION: Philadelphia, PA
    GUEST: Job Seekers, Hiring Organizations, and Recruiters
    SPONSOR: WiCys Delaware Valley - LinkedIn Page

    ABOUT WICYS AND GUESTS:​
    WiCys Delaware Valley - A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their knowledge and expertise to support one another in their career advancement and personal development. By cultivating strong relationships and creating a supportive environment, The organization aims to empower its members to achieve their professional goals and enhance their skills. The organization welcomes the participation of male allies who share the same vision of promoting diversity and inclusivity in the workplace.

    Pam King - A faculty member and director of the cybersecurity program at Chestnut Hill College, Pam King has played a pivotal role in establishing a robust cybersecurity and digital forensics education curriculum. With both undergraduate and graduate programs under her leadership, King has overseen the implementation of accelerated and online offerings to advance cybersecurity education.

    Alex Pickenich - A recent graduate with a double major in computer science and data science and a minor in cybersecurity, Alex Pickenich is actively pursuing a career where she can merge his passion for data science with the field of cybersecurity.

    Manasa Pisipati - As a second-year grad student at Penn State University Park and the president of the Women in Cybersecurity student chapter there, Manasa Pisipati leads efforts to create a supportive community for women in the cybersecurity field and to provide them with opportunities for professional development.

    Yvonne Brown - A professional seeking a transition into cybersecurity, Yvonne Brown has a background in project management and shares her interest in consulting within cybersecurity, emphasizing the need for mentorship and support in new roles.

    Jessica Sylvester - A risk and cybersecurity division lead for TekSystems, Jessica Sylvester has years of experience in tech staffing and professional services, and she provides insight into the recruitment process and the qualities that make candidates stand out.

    Emily Rose Nunez - Software Engineer at Leidos, designs, develops, and deploys scalable and secure software solutions for diverse clients, leveraging tools like Jenkins and Jira to automate processes and collaborating with cross-functional teams to deliver innovative, high-quality solutions that meet stakeholder and end-user requirements and expectations.

    Tyler Yeagor- IT Client Relations partner at Ark, leverages his strong background in technology services, client relations, and certifications in Sandler Foundation, Microsoft 365 Fundamentals, and AWS Cloud Practitioner to assist businesses with their IT obstacles, projects, and initiatives through consultative insight and timely execution, while passionately creating new and better experiences for customers and partners, and continuously learning and collabor

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    続きを読む 一部表示
    53 分